paper_id
stringlengths 9
16
| version
stringclasses 26
values | yymm
stringclasses 311
values | created
timestamp[s] | title
stringlengths 6
335
| secondary_subfield
sequencelengths 1
8
| abstract
stringlengths 25
3.93k
| primary_subfield
stringclasses 124
values | field
stringclasses 20
values | fulltext
stringlengths 0
2.84M
|
---|---|---|---|---|---|---|---|---|---|
1309.7524 | 3 | 1309 | 2019-07-09T20:06:48 | Meme and Variations: A Computer Model of Cultural Evolution | [
"cs.MA",
"cs.NE"
] | Holland's (1975) genetic algorithm is a minimal computer model of natural selection that made it possible to investigate the effect of manipulating specific parameters on the evolutionary process. If culture is, like biology, a form of evolution, it should be possible to similarly abstract the underlying skeleton of the process and develop a minimal model of it. Meme and Variations, or MAV, is a computational model, inspired by the genetic algorithm, of how ideas evolve in a society of interacting individuals (Gabora 1995). The name is a pun on the classical music form 'theme and variations', because it is based on the premise that novel ideas are variations of old ones; they result from tweaking or combining existing ideas in new ways (Holland et al. 1981). MAV explores the impact of biological phenomena such as over-dominance and epistasis as well as cognitive and social phenomena such as the ability to learn generalizations or imitate others on the fitness and diversity of cultural transmissible actions. | cs.MA | cs | Gabora, L. (1995). Meme and Variations: A comp uter model of cultural evolution. In L. Nadel & D. L.
Stein (Eds.), 1993 Lectures in complex systems (pp. 471-486). Boston: Addison-Wesley.
Meme and Variations:
A Computer Model of Cultural Evolution
Liane Gabora
Holland's (1975) genetic algorithm is a minimal computer model of natural selection that made it
possible to investigate the effect of manipulating specific parameters on the evolutionary process.
If culture is, like biology, a form of evolution, it should be possible to similarly abstract the
underlying skeleton of the process and develop a minimal model of it. Meme and Variations, or
MAV, is a computational model, inspired by the genetic algorithm, of how ideas evolve in a
society of interacting individuals (Gabora 1995). The name is a pun on the classical music form
'theme and variations', because it is based on the premise that novel ideas are variations of old
ones; they result from tweaking or combining existing ideas in new ways (Holland et al. 1981).
MAV explores the impact of several phenomena that are unique to culture. These are introduced
briefly here, and the technical details of how they are implemented will be presented shortly.
The first is knowledge-based operators. Brains detect regularity and build schemas with which
they adapt the mental equivalents of mutation and recombination to the constraints of their world,
and the situation at hand. Thus they generate novelty strategically, on the basis of past
experience. Knowledge-based operators are a crude attempt to incorporate this into the model.
The second crudely implemented cultural phenomenon is imitation. Ideas for how to perform
actions spread when agents copy what one another is doing. This enables them to share solutions
to the problems they face.
The third is mental simulation; agents can 'imagine', or guess, how successful an idea would be if
it were implemented before they actually commit to implementing it. This provides them with a
rudimentary form of selection before the phenotypic expression of an idea. Once again, the way
this phenomenon is implemented is not terribly life-like, but the goal here was to abstract the
essence of the phenomenon and see how it affects the evolution of culture.
Every iteration, each neural-network based agent in an artificial society has the opportunity to
acquire a new idea, either through 1) innovation, by changing a previously learned idea, or 2)
imitation, by copying what a neighbor is doing. Thus, variation occurs through mutation of pre-
existing ideas, selection occurs through choice of which pre-existing idea to mutate, and how to
mutate it, and ideas spread through imitation.
1. THE MODEL
Since the model is artificially limited with respect to the number and kinds of features an idea can
have, it does not hurt in this case to adopt the terminology of biology. Thus the features or
components of an idea are referred to as loci, and alternative forms of a locus are referred to as
1
alleles. The processes that generate variation are referred to as mutation operators. Forward
mutation is mutation away from the original (or, as biologists refer to it, the wild type) allele, and
backmutation is mutation from an alternative form back to the original. An individual is referred
to as an agent, and the set of all agents is referred to as the society.
1.1 The Domain
Donald (1991) has provided substantial evidence that the earliest culture took the form of
physical actions, such as displays of aggression or submission. The ideas in MAV can be thought
of as mating displays. An idea is a pattern consisting of six loci that dictate the degree of
movement for six body parts: left arm, right arm, left leg, right leg, head, and tail. Each locus has
a floating point activation between -0.5 and 0.5 which determines the amount of movement
(angle of rotation from rest position) of the corresponding body part when the idea is
implemented. A value of 0.0 corresponds to rest position; values above 0.0 correspond to upward
movement, and values below 0.0 correspond to downward movement. Floating point loci
activations produce graded limb movement. However, for the purpose of mutation, loci are
treated as if there are only three possible alleles at each locus: stationary, up, and down. Six loci
with three possible alleles each gives a total of 729 possible ideas.
1.2 The Neural Network
The neural network is an autoassociator; it learns the identity function between input and output
patterns. It has six input/output units numbered 1 through 6, corresponding to the six body parts.
It has six hidden units numbered 7 through 12, corresponding to the general concepts, "arms",
"legs", "left", "right", "movement", and "symmetry" (Figure 1).
Figure 1. The neural network. Arrows represent connections with positive weights. For clarity,
negative connections and connections to the symmetry unit are not shown.
Hidden units are linked with positive weights to input/output units that are positive instances of
the concepts they represent, and linked with negative weights to input/output units that represent
2
negative instances of the ideas they represent (thus "left arm" is positively linked to "left" and
negatively linked to "right"). Hidden units that represent opposite concepts have negative
connections between them. The hidden units enable the network to encode the semantic structure
of an idea, and their activations are used to bias the generation of variation.
The neural network starts with small random weights between input/output nodes. Weights
between hidden nodes, and weights between hidden nodes and input/output nodes, are fixed at +/-
1.0. Patterns (representing ideas) are learned by training for 50 iterations using the generalized
delta rule (Rumelhart et. al. 1986) with a sigmoid activation function (Hinton 1981). The basic
idea is that patterns are repeatedly presented to the network, and each time, the network's actual
output is compared to the desired output. Since this neural network is an autoassociator, we
desire simply that the output be identical to the input. The relevant variables are:
aj = activation of unit j
tj = the jth component of the target pattern (the external input)
ωij = weight on line from unit i to unit j
β = 0.15
θ = 0.5
(1)
For the movement node, we use the absolute value of ai (since negative movement is not
possible; the least you can move is to not move at all).
The comparison between input and output involves computing an error term, which is used to
modify the pattern of connectivity in the network such that its responses become more correct.
The error signal, δj, is calculated such that the more intermediate (and thus 'uncommitted's) the
activation of the unit, the more it is affected. For input/output units it is computed as follows:
(2)
For hidden units we do the same thing by determining how much each unit is contributing to the
error as follows:
(3)
1.3 The Embodiment
The embodiment is a six-digit array specifying the behavior of the six body parts. While the
output of the neural network represents what the agent is thinking about, the embodiment
represents what it is actually doing. An idea cannot be observed and imitated by other agents
until it has been copied from the neural network to the embodiment and is implemented as an
action.
1.4 The Fitness Function
An optimal action is one where all body parts except the head are moving, and limb movement is
anti-symmetrical. (Thus if the left arm is moving up, the right arm is moving down, and vice
versa.) This is implemented as follows:
3
F = fitness
µ = 2.5
am = activation of movement hidden node
as = activation of symmetry hidden node
ah = activation of head node
i = 1 if ah = 0.0, otherwise i = 0
F = µam + 2µas + µi (4)
This fitness function corresponds to a relatively realistic display, but it also has some
interesting properties. An agent that develops the general rule "movement improves fitness" risks
overgeneralization since head stability contributes as much to fitness as movement at every other
limb. This creates a situation that is the cultural analog of overdominance in genetics; the optimal
value of this locus lies midway between the two extremes. We also have a situation analogous to
bidirectional selection or underdominance; the optimal value of the tail locus lies at either of the
two extremes. (The desire to investigate underdominance was the reason for giving the agents
tails). There is a cultural analog of epistasis-where the fitness at one locus depends on which
allele is present at another locus. Epistasis is present because the value of what one limb is doing
depends on what its counterpart is doing; for example, if the left leg is moving backward the right
should be moving forward, and vice versa. Finally, since there is one optimal allele for the head,
two optimal alleles for the tail, two optimal arm combinations, and two optimal leg combinations,
we have a total of eight different optimal actions. This enables us to perform a comparative
analysis of diversity under different ratios of creation to imitation.
1.5 Using Experience to Bias the Generation of Novelty
The idea here is to translate knowledge acquired during evaluation of an action into educated
guesses about what increases fitness. Each locus starts out with the allele for no movement, and
with an equal probability of mutating to each of the other two alleles (those for upward and
downward movement). A new action is not learned unless it is fitter than the currently-
implemented action, so we use the difference between the two to bias the direction of mutation.
Two rules of thumb are used. The first rule is: if the fitter action codes for more movement,
increase the probability of forward mutation and decrease the probability of back mutation. Do
the opposite if the fitter action codes for less movement. This rule of thumb is based on the
assumption that movement in general (regardless of which particular body part is moving) can be
beneficial or detrimental. This seems like a useful generalization since movement of any body
part uses energy and increases the likelihood of being detected. It is implemented as follows:
am1 = activation of movement unit for currently-implemented meme
am2 = activation of movement unit for new meme
p(fmut)i = probability of forward mutation at allele i (increased movement)
p(bmut)i = probability of backward mutation at allele i (decreased movement)
IF (am2 > am1)
THEN p(fmut)i = MAX(1.0, p(fmut)i + 0.1)
ELSE IF (am2 < am1)
THEN p(fmut)i= MIN(0.0, p(fmut)i - 0.1)
p(bmut)i = 1 - p(fmut)i
4
The second rule of thumb biases the agent either toward or away from symmetrical limb
movement. It has two parts. First, if in the fitter action both members of one pair of limbs are
moving either up or down, increase the probability that you will do the same with the other pair
of limbs. Second, if in the fitter action, one member of a pair of limbs is moving in one direction
and its counterpart is moving in the opposite direction, increase the probability that you will do
the same with the other pair of limbs. This generalization is also biologically useful, since many
beneficial behaviors (walking, etc.) entail movement of limbs in opposite directions, while others
(galloping, etc.) entail movement of limbs in the same direction. The implementation of this rule
is analogous to that of the first rule.
In summary, each action is associated with a measure of its effectiveness, and
generalizations about what seems to work and what does not are translated into guidelines that
specify the behavior of the cultural algorithm.
2. PROTOCOL
Agents are in a two-dimensional wrap-around 10x10 grid-cell world, one agent per cell. Each
iteration, every agent has the opportunity to (1) acquire an idea for a new action, either by
imitating a neighbor, or creating one anew (2) update the mutation operator, and (3) implement
the new action.
Agents have an equal probability of creating and imitating. To invent or create a new idea,
the cultural algorithm is applied to the idea currently represented on the input/output layer of the
neural network. For each locus, the agent decides whether mutation will take place. The
probability of mutation is specified globally at the beginning of a run. If it decides to mutate, the
direction of mutation is stochastically determined. If the new idea has a higher fitness than the
currently-implemented idea, the agent learns and implements the action specified by that idea.
To acquire an idea through imitation, an agent randomly chooses one of its eight neighbors
and evaluates the fitness of the action the neighbor is implementing. If its own action is fitter than
that of the neighbor, it chooses another neighbor, until it has either observed all eight neighbors,
or found one with a fitter action. If no fitter action is found, the agent does nothing. Otherwise,
the neighbor's action is copied to the input/output layer, and it is learned and implemented.
Since in both creation and imitation, a new idea is not acquired unless it is fitter than the
currently implemented action, the new idea provides information that is used by the cultural
algorithm. For example, since we arbitrarily chose a fitness function in which movement is
generally beneficial, if the new action does code for more movement than the old one, the
probability of forward mutation will almost always increase.
No matter how the new idea has been acquired, it gets implemented as an action when it is
copied from the neural network to the embodiment. In the 'no mental simulation' condition,
whether the new idea was acquired through creation or imitation, it must be implemented as an
action for at least one iteration before its fitness can be assessed. In this case, mutation operators
are updated the following iteration.
3. RESULTS
5
The following experiments were conducted using a mutation rate of 0.17 per locus, a 1:1 creation
to imitation ratio, and all cultural evolution strategies operative, unless otherwise indicated.
3.1 Outline of a Run: Culture Evolves
Initially all agents were immobile, thus the number of different actions implemented was zero, as
shown in Figure 2. The immobility idea quickly mutated to a new idea that coded for movement
of a body part. This new idea had a higher fitness and was preferentially implemented. As ideas
continued to be created, get implemented as actions, and spread through imitation, the society
evolved toward increasingly fit actions.
Figure 2. Effect of varying p(create) to p(imitate) ratio on number of different ideas.
3.2 Trade-off Between Diversity and Global Optimization
Figure 2 shows how diversity peaked when the first maximally fit idea was found, and decreased
as the society converged on maximally-fit ideas. As in a genetic algorithm, increasing the
frequency of variation-inducing operations-in this case, the creativity to imitation ratio-increased
diversity. This was true both as the society was evolving, and when it finally stabilized. An
interesting result can be seen if one looks more closely at how diversity varied with the creation
to imitation ratio. Diversity ranged from 1-2 actions when p(create) = 0.25, to 10-11 actions when
p(create) = 1.0. When p(create) = 0.75, the society converged on 7-8 actions. Thus it found all (or
nearly all) of the fittest actions. A nice balance was thereby struck between the diversifying effect
of creation and the converging effect of imitation.
6
3.3 Frequency of Change Must be Intermediate
Agents could vary with respect to not only just the frequency with which they invented, but with
respect to how much change they introduced when they did. As in a genetic algorithm, evolution
did not occur in the complete absence of mutation. The best performance was obtained with
between 0.07 and 0.22 mutations per locus (Figure 3). In biological terms this would constitute a
very high mutation rate, however because there are so few loci it ends up being approximately
one mutation per innovation event, which is very reasonable. There are however two reasons why
it can afford to be high. The first is that mental simulation ensures that unfit ideas are not
implemented as actions. The second is that fit actions are imitated by others, thus never lost from
the society as a whole.
Figure 3. Optimization time decreases sharply, and then increases slowly, as mutation rate
increases. This trend holds true for both the mean fitness of all ideas and the fittest idea that has
appeared in a given iteration.
Note that this is similar to what happens in a genetic algorithm when the mutation rate is much
above the minimum necessary for evolution. In both MAV and the GA, the frequency of change
must be intermediate between the two extremes.
3.4 Epistasis Decreases Rate of Fitness Increase
As in biology, fitness increased more slowly, and stabilization took longer, for epistatically
7
linked loci than for either over- or underdominant loci Figures 4 and 5 show this at two different
mutation rates; in fact, it was observed at every mutation rate tested. In figure 4, we see that
whereas the over-dominant locus had stabilized by the 100th iteraction, and the under-dominant
by the 150th, the two epistatic loci took 200 iterations to stabilize. In figure 5 whereas the
overdominant locus stabilizes by the 70th iteration, and the under-dominant by approximately
iteration 130, the two epistatic loci never do manage to stabilize. The phenomenon can be
attributed to the fact that for epistatically linked loci there are more constraints to be met; what
one arm should be doing, for example, depends on what the other arm is doing. It is also
interesting to note that the epistatic loci to some extent mirror one another, such that if the mean
activation for one locus increases, the mean activation for the epistatically linked locus decreases,
and vice versa.
3.5 Cultural Drift
Since we have eight optimal ideas, there are many stable configurations for the distribution of
ideas. Figures 4 and 5 reveal amongst equally-fit alleles the presence of drift -- the term
biologists use to refer to changes in the relative frequencies of different alleles due to random
Figure 4. Mean loci activations with a mutation rate of 0.01. Over-dominant locus stabilizes most
quickly, followed by under-dominant locus, and then epistatic loci.
8
sampling processes in a finite population (Wright, 1969). Drift is indicated by the fact that since
we are looking at mean activation values across the entire society, if the activation value is very
high or very low that means that almost all agents had stabilized on the same value at a particular
locus. This is the case for both the over-dominant and epistatic loci. (For the under-dominant
locus it is not possible to distinguish between all individuals stabilized on the intermediate value,
or as many stabilized above this value as below.) This is in accord with Cavalli-Sforza and
Feldman's (1981) mathematical model of culture.
Figure 5. Mean loci activations with a mutation rate of 0.67. Over-dominant locus stabilizes most
quickly. Under-dominant locus takes longer. After 200 iterations, epistatic loci still have not
stabilized.
3.6 Effect of Knowledge-based Operators, Imitation, and Mental Simulation
The three cultural evolution strategies-knowledge-based operators, imitation, and mental
simulation-were made inoperative one at a time to determine their contribution to optimization
speed and peak mean fitness. These experiments were performed separately, and also
cumulatively, adding each strategy one at a time. Since, the results were comparable for the
separate and cumulative experiments, only the cumulative results are presented here (Figure 6).
9
Figure 6. Cumulative improvement with successively applied cultural strategies. MS refers to
mental simulation. 'Imit' refers to imitation. 'Kmut' refers to knowledge based operators.
All three cultural evolution strategies increased the rate of optimization. Mental simulation and
imitation also increased peak mean fitness.
3.7 Fittest Society with Creation to Imitation Ratio of 2:1
The highest mean fitness was achieved when both creation and imitation were employed, as
illustrated in Figure 7. The best performance was observed when the creativity to imitation ratio
was either 1:1 or 3:1. The society with a 3:1 ratio improved most quickly until the 21st iteration,
at a mean fitness of 8.6. The society with a 1:1 ratio then overtook it and converged entirely on
optimal actions slightly earlier than the 3:1 society (32 iterations as opposed to 37). Thus it can
be said that overall the optimal creativity to imitation ratio is most likely midway between these
values, or approximately 2:1. The 1:3 ratio society took longer to converge, though it did
eventually after 47 iterations. The society that just created and never imitated had the opposite
problem. It did as well as the 1:1 and 3:1 ratio societies for the first ten iterations or so, at which a
mean fitness of 6.2 was attained. However, after that, its performance dropped compared to the
others, such that even after 100 generations it never did converge on optimal solutions. As might
be expected, when there was no creativity, just imitation, then there was no evolution at all; the
agents simply remained immobile.
10
Figure 7. Effect of varying the creation-to-imitation ratio. The optimum seems to be between 0.5
and 0.75.
However, it is interesting to note that the fitness of the fittest idea (Figure 8) increased as a
function of the ratio of creation to imitation. Since the agents with the fittest ideas gain nothing
by imitating others, there is a trade-off between average action fitness, and fitness of the fittest
action. (Of course, this result should not be taken too seriously as indicating that smart people
don't need to imitate, since the agents in MAV only had one problem to solve. Thus, those who
happened to be lucky simply got a head start.)
11
Figure 8. Effect of varying p(create) to p(imitate) ratio on the fitness of the fittest idea.
4. COMPARISON WITH OTHER APPROACHES
The computational approach taken here allows us to look for patterns that arise over time when
the cultural activities of inventing and imitating are carried out in parallel in a society of
interacting individuals. To my knowledge, MAV is the first computational model of the evolution
of culture as opposed to the effect of culture on biological evolution. For example, Hutchins and
Hazelhurst (1992) used a computer model to explore the relationship between environment,
internal representation of the environment, and cultural artifacts that mediate the transmission of
knowledge about environmental regularity vertically across generations. In MAV, on the other
hand, we stick to one generation so that the effects of cultural evolution can be disentangled from
biological evolution. Similarly, computer models of the evolution of creativity (Sims, 1991; Todd
& Latham, 1992) and cooperation (Axelrod, 1985), although they explore a cultural process, they
use a genetic algorithm-a model of biological evolution. Axelrod's work has inspired others, who
have taken a more culturally realistic approach (e.g., Conte & Paolucci forthcoming; Hales
forthcoming), but in these studies the space of possible cultural entities is too small to evolve, so
the study is really a study of how particular cooperative strategies diffuse across a population of
agents. Note, however, that although MAV is modeled after cultural evolution, even it is too
simple to explore many cultural phenomena. The space of possible ideas is fixed and small, and
12
(unlike real life) the fitness function is predetermined and static. It would be particularly
interesting to explore the effects of a dynamically changing fitness function given recent findings
that maintaining diversity in a population is, over the long term, more important than global
fitness in the short term (Hutter, 2001). Another shortcoming of MAV, imitation and innovation
are not as discrete in real life as MAV would suggest. Despite these shortcomings, however,
MAV demonstrates the feasibility of computationally modeling the processes by which creative
ideas spread through a society giving rise to observable patterns of cultural diversity.
5. SUMMARY
If culture, like biology, is a form of evolution, it should be possible to abstract the underlying
skeleton of the process and develop a minimal model of it analogous to the genetic algorithm.
MAV is a minimal computer model of the process by which culture evolves. It consists of an
artificial society of neural network-based agents that don't have genomes, and neither die nor
have offspring, but they invent, imitate, and implement ideas, and thereby their actions gradually
become more fit. Every iteration, each neural-network based agent in an artificial society has the
opportunity to acquire a new idea, either through 1) innovation, by mutating a previously learned
idea, or 2) imitation, by copying an action performed by a neighbor.
The program exhibits features observed in biology such as: (1) drift, (2) epistasis increases
time to reach equilibrium, (3) increasing the frequency of innovative or variation-generating
operations increases diversity, and (4) although in the absence of variation-generating operations,
culture does not evolve, increasing innovation much beyond the minimum necessary for
evolution causes average fitness to decrease.
The model also addresses the evolutionary consequences of phenomena specific to culture.
Imitation, mental simulation (ability to assess the relative fitness of an action before actually
implementing it), and strategic (as opposed to random) generation of variation all increase the
rate at which fitter actions evolve. The higher the ratio of innovation to imitation, the greater the
diversity, and the higher the fitness of the fittest action. Interestingly, however, for the society as
a whole, the optimal innovation-to-imitation ratio was approximately 2:1 (but diversity is then
compromised). For the agent with the fittest behavior, the less it imitated (i.e. the more
computational effort reserved for innovation), the better.
REFERENCES
Axelrod, R. Modeling the Evolution of Norms. Paper presented at the American Political Science
Association Meeting, New Orleans, 1985.
Bonner, J. T. The Evolution of Culture in Animals. Princeton: Princeton University Press, 1980.
Boyd, R. and P. J. Richerson. Culture and the Evolutionary Process. Chicago: The University of
Chicago Press, 1985.
Braitenberg, V. Vehicles. Cambridge: MIT Press, 1984.
Cavalli-Sforza, L. L. and M. W. Feldman. Cultural Transmission and Evolution: A Quantitative
Approach. Princeton: Princeton University Press, 1981.
Dawkins, R. The Selfish Gene. Oxford: Oxford University Press, 1976.
13
Donald, M. Origins of the Modern Mind. Cambridge: Harvard University Press, 1991.
Hinton, G. E. Implementing Semantic Networks in Parallel Hardware. In Parallel Models of
Associative Memory. Hillsdale NJ: Erlbaum Press, 1981.
Holland, J. K. Adaptation in Natural and Artificial Systems. Ann Arbor: University of Michigan
Holland, J. H., K. J. Holyoak, R. E. Nisbett, and P. R. Thagard. Induction. Cambridge: MIT
Press, 1975.
Press, 1986.
1981.
1969.
Hutchins, E. and B. Hazelhurst. Learning in the Cultural Process. In Artificial Life II. Redwood
City, CA: Addison-Wesley, 1992.
Lumsden, C. and E. O. Wilson. Genes, Mind, and Culture. Cambridge: Harvard University Press,
Robert, M. Observational Learning in Fish, Birds, and Mammals: A Classified Bibliography
Spanning over 100 Years of Research. Psych Record, 40 (1990): 289-311.
Smith, W. J. The Behavior of Communicating. Cambridge: Harvard University Press, 1977.
Wright, S. Evolution and the Genetics of Populations. Chicago: University of Chicago Press,
14
|
1604.04359 | 2 | 1604 | 2017-07-13T03:30:09 | Complexity of Manipulation with Partial Information in Voting | [
"cs.MA",
"cs.AI",
"cs.CC",
"cs.CY",
"cs.DS"
] | The Coalitional Manipulation problem has been studied extensively in the literature for many voting rules. However, most studies have focused on the complete information setting, wherein the manipulators know the votes of the non-manipulators. While this assumption is reasonable for purposes of showing intractability, it is unrealistic for algorithmic considerations. In most real-world scenarios, it is impractical for the manipulators to have accurate knowledge of all the other votes. In this paper, we investigate manipulation with incomplete information. In our framework, the manipulators know a partial order for each voter that is consistent with the true preference of that voter. In this setting, we formulate three natural computational notions of manipulation, namely weak, opportunistic, and strong manipulation. We say that an extension of a partial order is if there exists a manipulative vote for that extension.
1. Weak Manipulation (WM): the manipulators seek to vote in a way that makes their preferred candidate win in at least one extension of the partial votes of the non-manipulators.
2. Opportunistic Manipulation (OM): the manipulators seek to vote in a way that makes their preferred candidate win in every viable extension of the partial votes of the non-manipulators.
3. Strong Manipulation (SM): the manipulators seek to vote in a way that makes their preferred candidate win in every extension of the partial votes of the non-manipulators.
We consider several scenarios for which the traditional manipulation problems are easy (for instance, Borda with a single manipulator). For many of them, the corresponding manipulative questions that we propose turn out to be computationally intractable. Our hardness results often hold even when very little information is missing, or in other words, even when the instances are quite close to the complete information setting. | cs.MA | cs |
Complexity of Manipulation with Partial Information in
Voting
Palash Dey
Tata Institute of Fundamental Research, Mumbai
[email protected]
Neeldhara Misra
Y. Narahari
Indian Institute of Technology, Gandhinagar
Indian Institute of Science, Bangalore
[email protected]
[email protected]
October 11, 2018
Abstract
The Coalitional Manipulation problem has been studied extensively in the literature for many
voting rules. However, most studies have focused on the complete information setting, wherein
the manipulators know the votes of the non-manipulators. While this assumption is reason-
able for purposes of showing intractability, it is unrealistic for algorithmic considerations. In
most real-world scenarios, it is impractical to assume that the manipulators to have accurate
knowledge of all the other votes. In this work, we investigate manipulation with incomplete
information. In our framework, the manipulators know a partial order for each voter that is
consistent with the true preference of that voter.
In this setting, we formulate three natural
computational notions of manipulation, namely weak, opportunistic, and strong manipulation.
We say that an extension of a partial order is viable if there exists a manipulative vote for that ex-
tension. We propose the following notions of manipulation when manipulators have incomplete
information about the votes of other voters.
1. WEAK MANIPULATION: the manipulators seek to vote in a way that makes their preferred
candidate win in at least one extension of the partial votes of the non-manipulators.
2. OPPORTUNISTIC MANIPULATION:
the manipulators seek to vote in a way that makes
their preferred candidate win in every viable extension of the partial votes of the non-
manipulators.
3. STRONG MANIPULATION: the manipulators seek to vote in a way that makes their preferred
candidate win in every extension of the partial votes of the non-manipulators.
We consider several scenarios for which the traditional manipulation problems are easy (for
instance, Borda with a single manipulator). For many of them, the corresponding manipulative
questions that we propose turn out to be computationally intractable. Our hardness results often
hold even when very little information is missing, or in other words, even when the instances are
very close to the complete information setting. Our results show that the impact of paucity of
information on the computational complexity of manipulation crucially depends on the notion
of manipulation under consideration. Our overall conclusion is that computational hardness
continues to be a valid obstruction to manipulation, in the context of a more realistic model.
Keywords: voting, manipulation, incomplete information, algorithm, computational complexity
1
1 Introduction
In many real life and AI related applications, agents often need to agree upon a common decision
although they have different preferences over the available alternatives. A natural tool used in these
situations is voting. Some classic examples of the use of voting rules in the context of multiagent
systems include Clarke tax [ER91], collaborative filtering [PHG00], and similarity search [FKS03],
etc. In a typical voting scenario, we have a set of candidates and a set of voters reporting their
rankings of the candidates called their preferences or votes. A voting rule selects one candidate as
the winner once all voters provide their votes. A set of votes over a set of candidates along with
a voting rule is called an election. A central issue in voting is the possibility of manipulation. For
many voting rules, it turns out that even a single vote, if cast differently, can alter the outcome.
In particular, a voter manipulates an election if, by misrepresenting her preference, she obtains an
outcome that she prefers over the "honest" outcome. In a cornerstone impossibility result, Gibbard
and Satterthwaite [Gib73, Sat75] show that every unanimous and non-dictatorial voting rule with
three candidates or more is manipulable. We refer to [BCE+15] for an excellent introduction to
various strategic issues in computational social choice theory.
Considering that voting rules are indeed susceptible to manipulation, it is natural to seek ways
by which elections can be protected from manipulations. The works of Bartholdi et al. [BITT89,
BIO91] approach the problem from the perspective of computational intractability. They exploit
the possibility that voting rules, despite being vulnerable to manipulation in theory, may be hard to
manipulate in practice. Indeed, a manipulator is faced with the following decision problem: given
a collection of votes P and a distinguished candidate c, does there exist a vote v that, when tallied
with P, makes c win for a (fixed) voting rule r? The manipulation problem has subsequently been
generalized to the problem of COALITIONAL MANIPULATION by Conitzer et al. [CSL07], where one
or more manipulators collude together and try to make a distinguished candidate win the election.
The manipulation problem, fortunately, turns out to be NP-hard in several settings. This established
the success of the approach of demonstrating a computational barrier to manipulation.
However, despite having set out to demonstrate the hardness of manipulation, the initial results
in [BITT89] were to the contrary, indicating that many voting rules are in fact easy to manipulate.
Moreover, even with multiple manipulators involved, popular voting rules like plurality, veto, k-
approval, Bucklin, and Fallback continue to be easy to manipulate [XZP+09]. While we know that
the computational intractability may not provide a strong barrier [PR06, PR07, FKN08, XC08a,
XC08b, FHH10, Wal10, Wal11, IKM12, Dey15, DMN15b, DMN16, DMN15a, DN14, DN15] even for
rules for which the coalitional manipulation problem turns out to be NP-hard, in all other cases the
possibility of manipulation is a much more serious concern.
1.1 Motivation and Problem Formulation
In our work, we propose to extend the argument of computational intractability to address the
cases where the approach appears to fail. We note that most incarnations of the manipulation
problem studied so far are in the complete information setting, where the manipulators have com-
plete knowledge of the preferences of the truthful voters. While these assumptions are indeed the
best possible for the computationally negative results, we note that they are not reflective of typ-
ical real-world scenarios. Indeed, concerns regarding privacy of information, and in other cases,
the sheer volume of information, would be significant hurdles for manipulators to obtain complete
information. Motivated by this, we consider the manipulation problem in a natural partial infor-
2
mation setting. In particular, we model the partial information of the manipulators about the votes
of the non-manipulators as partial orders over the set of candidates. A partial order over the set
of candidates will be called a partial vote. Our results show that several of the voting rules that
are easy to manipulate in the complete information setting become intractable when the manipu-
lators know only partial votes. Indeed, for many voting rules, we show that even if the ordering
of a small number of pairs of candidates is missing from the profile, manipulation becomes an in-
tractable problem. Our results therefore strengthen the view that manipulation may not be practical
if we limit the information the manipulators have at their disposal about the votes of other voters
[CWX11].
We introduce three new computational problems that, in a natural way, extend the question of
manipulation to the partial information setting. In these problems, the input is a set of partial votes
P corresponding to the votes of the non-manipulators, a non-empty set of manipulators M, and a
preferred candidate c. The task in the WEAK MANIPULATION (WM) problem is to determine if there
is a way to cast the manipulators' votes such that c wins the election for at least one extension of
the partial votes in P. On the other hand, in the STRONG MANIPULATION (SM) problem, we would
like to know if there is a way of casting the manipulators' votes such that c wins the election in
every extension of the partial votes in P.
We also introduce the problem of OPPORTUNISTIC MANIPULATION (OM), which is an "interme-
diate" notion of manipulation. Let us call an extension of a partial profile viable if it is possible
for the manipulators to vote in such a way that the manipulators' desired candidate wins in that
extension. In other words, a viable extension is a YES-instance of the standard COALITIONAL MANIP-
ULATION problem. We have an opportunistic manipulation when it is possible for the manipulators
to cast a vote which makes c win the election in all viable extensions. Note that any YES-instance
of STRONG MANIPULATION is also an YES-instance of OPPORTUNISTIC MANIPULATION, but this may
not be true in the reverse direction. As a particularly extreme example, consider a partial profile
where there are no viable extensions: this would be a NO-instance for STRONG MANIPULATION, but
a (vacuous) YES-instance of OPPORTUNISTIC MANIPULATION. The OPPORTUNISTIC MANIPULATION
problem allows us to explore a more relaxed notion of manipulation: one where the manipula-
tors are obliged to be successful only in extensions where it is possible to be successful. Note that
the goal with STRONG MANIPULATION is to be successful in all extensions, and therefore the only
interesting instances are the ones where all extensions are viable.
It is easy to see that YES instance of STRONG MANIPULATION is also a YES instance of OPPOR-
TUNISTIC MANIPULATION and WEAK MANIPULATION. Beyond this, we remark that all the three
problems are questions with different goals, and neither of them render the other redundant. We
refer the reader to Figure 1 for a simple example distinguishing these scenarios.
All the problems above generalize COALITIONAL MANIPULATION, and hence any computa-
tional intractability result for COALITIONAL MANIPULATION immediately yields a corresponding
intractability result for WEAK MANIPULATION, STRONG MANIPULATION, and OPPORTUNISTIC MA-
NIPULATION under the same setting. For example, it is known that the COALITIONAL MANIPULA-
TION problem is intractable for the maximin voting rule when we have at least two manipula-
tors [XZP+09]. Hence, the WEAK MANIPULATION, STRONG MANIPULATION, and OPPORTUNISTIC
MANIPULATION problems are intractable for the maximin voting rule when we have at least two
manipulators.
3
Figure 1: An example of a partial profile. Consider the plurality voting rule with one manipulator.
If the favorite candidate is A, then the manipulator simply has to place A on the top of his vote
to make A win in any extension. If the favorite candidate is B, there is no vote that makes B win
in any extension. Finally, if the favorite candidate is C, then with a vote that places C on top, the
manipulator can make C win in the only viable extension (Extension 2).
1.2 Related Work
A notion of manipulation under partial
information has been considered by Conitzer et
al. [CWX11]. They focus on whether or not there exists a dominating manipulation and show
that this problem is NP-hard for many common voting rules. Given some partial votes, a dom-
inating manipulation is a non-truthful vote that the manipulator can cast which makes the win-
ner at least as preferable (and sometimes more preferable) as the winner when the manipulator
votes truthfully. The dominating manipulation problem and the WEAK MANIPULATION, OPPOR-
TUNISTIC MANIPULATION, and STRONG MANIPULATION problems do not seem to have any apparent
complexity-theoretic connection. For example, the dominating manipulation problem is NP-hard
for all the common voting rules except plurality and veto, whereas, the STRONG MANIPULATION
problem is easy for most of the cases (see Table 1). However, the results in [CWX11] establish the
fact that it is indeed possible to make manipulation intractable by restricting the amount of infor-
mation the manipulators possess about the votes of the other voters. Elkind and Erd´elyi [EE12]
study manipulation under voting rule uncertainty. However, in our work, the voting rule is fixed
and known to the manipulators.
Two closely related problems that have been extensively studied in the context of incomplete
votes are POSSIBLE WINNER and NECESSARY WINNER [KL05]. In the POSSIBLE WINNER problem,
we are given a set of partial votes P and a candidate c, and the question is whether there ex-
ists an extension of P where c wins, while in the NECESSARY WINNER problem, the question
is whether c is a winner in every extension of P. Following the work in [KL05], a number
of special cases and variants of the POSSIBLE WINNER problem have been studied in the litera-
ture [CLMM10, BBF10, BRR11, BRR+12, GNNW14, XC11, DL13, NW14, BFLR12, ML15]. The
flavor of the WEAK MANIPULATION problem is clearly similar to POSSIBLE WINNER. However, we
emphasize that there are subtle distinctions between the two problems. A more elaborate compar-
ison is made in the next section.
4
1.3 Our Contribution
Our primary contribution in this work is to propose and study three natural and realistic general-
izations of the computational problem of manipulation in the incomplete information setting. We
summarize the complexity results in this work in Table 1. Our results provide the following inter-
esting insights on the impact of lack of information on the computational difficulty of manipulation.
We note that the number of undetermined pairs of candidates per vote are small constants in all
our hardness results.
(cid:66) We observe that the computational problem of manipulation for the plurality and veto vot-
ing rules remains polynomial time solvable even with lack of information, irrespective of the
notion of manipulation under consideration [Proposition 1, Theorem 11 and 15, and Obser-
vation 4]. We note that the plurality and veto voting rule also remain vulnerable under the
notion of dominating manipulation [CWX11].
(cid:66) The impact of absence of information on the computational complexity of manipulation is
more dynamic for the k-approval, k-veto, Bucklin, Borda, and maximin voting rules. Only
the WEAK MANIPULATION and OPPORTUNISTIC MANIPULATION problems are computationally
intractable for the k-approval [Theorem 1 and 5], k-veto [Theorem 2 and 6], Bucklin [Theo-
rem 3 and 10], Borda [Observation 3 and Theorem 7], and maximin [Observation 3 and The-
orem 8] voting rules, whereas the STRONG MANIPULATION problem remains computationally
tractable [Theorem 11 to 14].
(cid:66) Table 1 shows an interesting behavior of the Fallback voting rule. The Fallback voting rule is
the only voting rule among the voting rules we study here for which the WEAK MANIPULATION
problem is NP-hard [Theorem 3] but both the OPPORTUNISTIC MANIPULATION and STRONG
MANIPULATION problems are polynomial time solvable [Theorem 13 and Observation 4]. This
is because the OPPORTUNISTIC MANIPULATION problem can be solved for the Fallback voting
rule by simply making manipulators vote for their desired candidate.
(cid:66) Our results show that absence of information makes all the three notions of manipulations
intractable for the Copelandα voting rule for every rational α ∈ [0, 1] \ {0.5} for the WEAK
MANIPULATION problem [Observation 3] and for every α ∈ [0, 1] for the OPPORTUNISTIC
MANIPULATION and STRONG MANIPULATION problems [Theorem 4 and 9].
Our results (see Table 1) show that whether lack of information makes the manipulation prob-
lems harder, crucially depends on the notion of manipulation applicable to the situation under
consideration. All the three notions of manipulations are, in our view, natural extension of manip-
ulation to the incomplete information setting and tries to capture different behaviors of manipula-
tors. For example, the WEAK MANIPULATION problem maybe applicable to an optimistic manipula-
tor whereas for an pessimistic manipulator, the STRONG MANIPULATION problem may make more
sense.
Organization of the paper: We define the problems and introduce the basic terminology in the
next section. We present our hardness results in Section 3. In Section 4, we present our polynomi-
ally solvable algorithms. Finally we conclude with future directions of research in Section 5.
5
WM, (cid:96) = 1 WM OM, (cid:96) = 1 OM SM, (cid:96) = 1
SM
Plurality
Veto
k-Approval
k-Veto
Bucklin
Fallback
Borda
maximin
Copelandα
P
P
NP-complete
coNP-hard
P
NP-complete
coNP-hard
P
P
NP-hard
coNP-hard
Table 1: Summary of Results ((cid:96) denotes the number of manipulators). The results in white follow
immediately from the literature (Observation 1 to 3). Our results for the Copelandα voting rule
hold for every rational α ∈ [0, 1]\{0.5} for the WEAK MANIPULATION problem and for every α ∈ [0, 1]
for the OPPORTUNISTIC MANIPULATION and STRONG MANIPULATION problems.
2 Preliminaries
In this section, we begin by providing the technical definitions and notations that we will need in
the subsequent sections. We then formulate the problems that capture our notions of manipulation
when the votes are given as partial orders, and finally draw comparisons with related problems
that are already studied in the literature of computational social choice theory.
2.1 Notations and Definitions
Let V = {v1, . . . , vn} be the set of all voters and C = {c1, . . . , cm} the set of all candidates. If not
specified explicitly, n and m denote the total number of voters and the total number of candidates
respectively. Each voter vi's vote is a preference (cid:31)i over the candidates which is a linear order over
C. For example, for two candidates a and b, a (cid:31)i b means that the voter vi prefers a to b. We
denote the set of all linear orders over C by L(C). Hence, L(C)n denotes the set of all n-voters'
preference profile ((cid:31)1, . . . ,(cid:31)n). A map r : ∪n,C∈N+L(C)n −→ 2C \ {∅} is called a voting rule. For
some preference profile (cid:31)∈ L(C)n, if r((cid:31)) = {w}, then we say w wins uniquely and we write
r((cid:31)) = w. From here on, whenever we say some candidate w wins, we mean that the candidate w
wins uniquely. For simplicity, we restrict ourselves to the unique winner case in this paper. All our
proofs can be easily extended in the co-winner case.
A more general setting is an election where the votes are only partial orders over candidates.
A partial order is a relation that is reflexive, antisymmetric, and transitive. A partial vote can be
extended to possibly more than one linear vote depending on how we fix the order of the unspeci-
fied pairs of candidates. For example, in an election with the set of candidates C = {a, b, c}, a valid
partial vote can be a (cid:31) b. This partial vote can be extended to three linear votes namely, a (cid:31) b (cid:31) c,
6
a (cid:31) c (cid:31) b, c (cid:31) a (cid:31) b. In this paper, we often define a partial vote like (cid:31) \A, where (cid:31)∈ L(C)
and A ⊂ C × C, by which we mean the partial vote obtained by removing the order among the pair
of candidates in A from (cid:31). Also, whenever we do not specify the order among a set of candidates
while describing a complete vote, the statement/proof is correct in whichever way we fix the order
among them. We now give examples of some common voting rules.
(cid:66) Positional scoring rules: An m-dimensional vector (cid:126)α = (α1, α2, . . . , αm) ∈ Rm with α1 (cid:62)
α2 (cid:62) . . . (cid:62) αm and α1 > αm naturally defines a voting rule -- a candidate gets score αi
from a vote if it is placed at the ith position, and the score of a candidate is the sum of the
scores it receives from all the votes. The winners are the candidates with maximum score.
Scoring rules remain unchanged if we multiply every αi by any constant λ > 0 and/or add
any constant µ. Hence, we assume without loss of generality that for any score vector (cid:126)α, there
exists a j such that αj − αj+1 = 1 and αk = 0 for all k > j. We call such a (cid:126)α a normalized score
vector. For (cid:126)α = (m − 1, m − 2, . . . , 1, 0), we get the Borda voting rule. With αi = 1 ∀i (cid:54) k
and 0 else, the voting rule we get is known as k-approval. For the k-veto voting rule, we have
αi = 0 ∀i (cid:54) m − k and −1 else. Plurality is 1-approval and veto is 1-veto.
(cid:66) Bucklin and simplified Bucklin: Let (cid:96) be the minimum integer such that at least one can-
didate gets majority within top (cid:96) positions of the votes. The winners under the simplified
Bucklin voting rule are the candidates having more than n/2 votes within top (cid:96) positions. The
winners under the Bucklin voting rule are the candidates appearing within top (cid:96) positions of
the votes highest number of times.
(cid:66) Fallback and simplified Fallback: For these voting rules, each voter v ranks a subset Xv ⊂ C
of candidates and disapproves the rest of the candidates [BS09]. Now for the Fallback and
simplified Fallback voting rules, we apply the Bucklin and simplified Bucklin voting rules re-
spectively to define winners. If there is no integer (cid:96) for which at least one candidate gets more
than n/2 votes, both the Fallback and simplified Fallback voting rules output the candidates
with most approvals as winners. We assume, for simplicity, that the number of candidates
each partial vote approves is known.
(cid:66) Maximin: For any two candidates x and y, let D(x, y) be N(x, y) − N(y, x), where N(x, y)
(respectively N(y, x)) is the number of voters who prefer x to y (respectively y to x). The
election we get by restricting all the votes to x and y only is called the pairwise election
between x and y. The maximin score of a candidate x is miny(cid:54)=x D(x, y). The winners are the
candidates with maximum maximin score.
(cid:66) Copelandα. The Copelandα score of a candidate x is {y (cid:54)= x : DE(x, y) > 0} + α{y (cid:54)= x :
DE(x, y) = 0}, where α ∈ [0, 1]. That is, the Copelandα of a candidate x is the number of
other candidates it defeats in pairwise election plus α times the number of other candidates it
ties with in pairwise elections. The winners are the candidates with the maximum Copelandα
score.
2.2 Problem Definitions
We now formally define the three problems that we consider in this work, namely WEAK MANIPU-
LATION, OPPORTUNISTIC MANIPULATION, and STRONG MANIPULATION. Let r be a fixed voting rule.
We first introduce the WEAK MANIPULATION problem.
7
Definition 1. r-WEAK MANIPULATION
Given a set of partial votes P over a set of candidates C, a positive integer (cid:96) (> 0) denoting the number
of manipulators, and a candidate c, do there exist votes (cid:31)1, . . . ,(cid:31)(cid:96) ∈ L(C) such that there exists an
extension (cid:31)∈ L(C)P of P with r((cid:31),(cid:31)1, . . . ,(cid:31)(cid:96)) = c?
To define the OPPORTUNISTIC MANIPULATION problem, we first introduce the notion of an (r, c)-
opportunistic voting profile, where r is a voting rule and c is any particular candidate.
Definition 2. (r, c)-Opportunistic Voting Profile
Let (cid:96) be the number of manipulators and P a set of partial votes. An (cid:96)-voter profile ((cid:31)i)i∈[(cid:96)] ∈ L(C)(cid:96) is
called an (r, c)-opportunistic voting profile if for each extension P of P for which there exists an (cid:96)-vote
profile ((cid:31)(cid:48)
(cid:16)
P ∪ ((cid:31)i)i∈[(cid:96)]
i)i∈[(cid:96)] ∈ L(C)(cid:96) with r
(cid:16)
P ∪(cid:0)(cid:31)(cid:48)
(cid:17)
i∈[(cid:96)]
i
= c, we have r
(cid:1)
(cid:17)
= c.
In other words, an (cid:96)-vote profile is (r, c)-opportunistic with respect to a partial profile if, when
put together with the truthful votes of any extension, c wins if the extension is viable to begin with.
We are now ready to define the OPPORTUNISTIC MANIPULATION problem.
Definition 3. r-OPPORTUNISTIC MANIPULATION
Given a set of partial votes P over a set of candidates C, a positive integer (cid:96) (> 0) denoting the number
of manipulators, and a candidate c, does there exist an (r, c)-opportunistic (cid:96)-vote profile?
We finally define the STRONG MANIPULATION problem.
Definition 4. r-STRONG MANIPULATION
Given a set of partial votes P over a set of candidates C, a positive integer (cid:96) (> 0) denoting the number
of manipulators, and a candidate c, do there exist votes ((cid:31)i)i∈(cid:96) ∈ L(C)(cid:96) such that for every extension
(cid:31)∈ L(C)P of P, we have r((cid:31), ((cid:31)i)i∈[(cid:96)]) = c?
We use (P, (cid:96), c) to denote instances of WEAK MANIPULATION, OPPORTUNISTIC MANIPULATION,
and STRONG MANIPULATION, where P denotes a profile of partial votes, (cid:96) denotes the number of
manipulators, and c denotes the desired winner.
For the sake of completeness, we provide the definitions of the COALITIONAL MANIPULATION
and POSSIBLE WINNER problems below.
Definition 5. r-COALITIONAL MANIPULATION
Given a set of complete votes (cid:31) over a set of candidates C, a positive integer (cid:96) (> 0) denoting the number
of manipulators, and a candidate c, do there exist votes ((cid:31)i)i∈(cid:96) ∈ L(C)(cid:96) such that r
=
c?
(cid:16)(cid:31), ((cid:31)i)i∈[(cid:96)]
(cid:17)
Definition 6. r-POSSIBLE WINNER
Given a set of partial votes P and a candidate c, does there exist an extension (cid:31) of the partial votes in
P to linear votes such that r((cid:31)) = c?
2.3 Comparison with Possible Winner and Coalitional Manipulation
For any fixed voting rule, the WEAK MANIPULATION problem with (cid:96) manipulators reduces to the
POSSIBLE WINNER problem. This is achieved by simply using the same set as truthful votes and
introducing (cid:96) empty votes. We summarize this in the observation below.
8
Observation 1. The WEAK MANIPULATION problem many-to-one reduces to the POSSIBLE WINNER
problem for every voting rule.
Proof. Let (P, (cid:96), c) be an instance of WEAK MANIPULATION. Let Q be the set consisting of (cid:96) many
copies of partial votes {∅}. Clearly the WEAK MANIPULATION instance (P, (cid:96), c) is equivalent to the
POSSIBLE WINNER instance (P ∪ Q, c).
However, whether the POSSIBLE WINNER problem reduces to the WEAK MANIPULATION problem
or not is not clear since in any WEAK MANIPULATION problem instance, there must exist at least
one manipulator and a POSSIBLE WINNER instance may have no empty vote. From a technical
point of view, the difference between the WEAK MANIPULATION and POSSIBLE WINNER problems
may look marginal; however we believe that the WEAK MANIPULATION problem is a very natural
generalization of the COALITIONAL MANIPULATION problem in the partial information setting and
thus worth studying. Similarly, it is easy to show, that the COALITIONAL MANIPULATION problem
with (cid:96) manipulators reduces to WEAK MANIPULATION, OPPORTUNISTIC MANIPULATION, and STRONG
MANIPULATION problems with (cid:96) manipulators, since the former is a special case of the latter ones.
Observation 2. The COALITIONAL MANIPULATION problem with (cid:96) manipulators many-to-one reduces
to WEAK MANIPULATION, OPPORTUNISTIC MANIPULATION, and STRONG MANIPULATION problems
with (cid:96) manipulators for all voting rules and for all positive integers (cid:96).
Proof. Follows from the fact that every instance of the COALITIONAL MANIPULATION problem is also
an equivalent instance of the WEAK MANIPULATION, OPPORTUNISTIC MANIPULATION, and STRONG
MANIPULATION problems.
Finally, we note that the COALITIONAL MANIPULATION problem with (cid:96) manipulators can be
reduced to the WEAK MANIPULATION problem with just one manipulator, by introducing (cid:96)−1 empty
votes. These votes can be used to witness a good extension in the forward direction. In the reverse
direction, given an extension where the manipulator is successful, the extension can be used as the
manipulator's votes. This argument leads to the following observation.
Observation 3. The COALITIONAL MANIPULATION problem with (cid:96) manipulators many-to-one reduces
to the WEAK MANIPULATION problem with one manipulator for every voting rule and for every positive
integer (cid:96).
Proof. Let (P, (cid:96), c) be an instance of COALITIONAL MANIPULATION. Let Q be the set of consisting of
(cid:96)−1 many copies of partial vote {c (cid:31) others}. Clearly the WEAK MANIPULATION instance (P∪Q, 1, c)
is equivalent to the COALITIONAL MANIPULATION instance (P, (cid:96), 1).
This observation can be used to derive the hardness of WEAK MANIPULATION even for one ma-
nipulator whenever the hardness for COALITIONAL MANIPULATION is known for any fixed number
of manipulators (for instance, this is the case for the voting rules such as Borda, maximin and
Copeland). However, determining the complexity of WEAK MANIPULATION with one manipulator
requires further work for voting rules where COALITIONAL MANIPULATION is polynomially solvable
for any number of manipulators (such as k-approval, Plurality, Bucklin, and so on).
9
3 Hardness Results
In this section, we present our hardness results. While some of our reductions are from the POS-
SIBLE WINNER problem, the other reductions in this section are from the EXACT COVER BY 3-SETS
problem, also referred to as X3C. This is a well-known NP-complete [GJ79] problem, and is defined
as follows.
Definition 7 (Exact Cover by 3-Sets (X3C)). Given a set U and a collection S = {S1, S2, . . . , St} of t
subsets of U with Si = 3 ∀i = 1, . . . , t, does there exist a T ⊂ S with T =
3 such that ∪X∈TX = U?
We use X3C to refer to the complement of X3C, which is to say that an instance of X3C is a YES
instance if and only if it is a NO instance of X3C. The rest of this section is organized according to
the problems being addressed.
U
3.1 Weak Manipulation
To begin with, recall that the COALITIONAL MANIPULATION problem is NP-complete for the
Borda [DKNW11, BNW11], maximin [XZP+09], and Copelandα [FHS08, FHHR09, FHS10] vot-
ing rules for every rational α ∈ [0, 1] \ {0.5}, when we have two manipulators. Therefore, it follows
from Observation 3 that the WEAK MANIPULATION problem is NP-complete for the Borda, maximin,
and Copelandα voting rules for every rational α ∈ [0, 1] \ {0.5}, even with one manipulator.
For the k-approval and k-veto voting rules, we reduce from the corresponding POSSIBLE WIN-
NER problems. While it is natural to start from the same voting profile, the main challenge is in
undoing the advantage that the favorite candidate receives from the manipulator's vote, in the
reverse direction.
We begin with proving that the WEAK MANIPULATION problem is NP-complete for the k-approval
voting rule even with one manipulator and at most 4 undetermined pairs per vote.
Theorem 1. The WEAK MANIPULATION problem is NP-complete for the k-approval voting rule even
with one manipulator for any constant k > 1, even when the number of undetermined pairs in each
vote is no more than 4.
Proof. For simplicity of presentation, we prove the theorem for 2-approval. We reduce from the
POSSIBLE WINNER problem for 2-approval which is NP-complete [XC11], even when the number of
undetermined pairs in each vote is no more than 4. Let P be the set of partial votes in a POSSIBLE
WINNER instance, and let C = {c1, . . . , cm, c} be the set of candidates, where the goal is to check if
there is an extension of P that makes c win. For developing the instance of WEAK MANIPULATION,
we need to "reverse" any advantage that the candidate c obtains from the vote of the manipulator.
Notice that the most that the manipulator can do is to increase the score of c by one. Therefore,
in our construction, we "artificially" increase the score of all the other candidates by one, so that
despite of the manipulator's vote, c will win the new election if and only if it was a possible winner
in the POSSIBLE WINNER instance. To this end, we introduce (m + 1) many dummy candidates
d1, . . . , dm+1 and the complete votes:
wi = ci (cid:31) di (cid:31) others, for every i ∈ {1, . . . , m}
Further, we extend the given partial votes of the POSSIBLE WINNER instance to force the dummy
candidates to be preferred least over the rest - by defining, for every vi ∈ P, the corresponding
10
partial vote v(cid:48)
i as follows.
i = vi ∪ {C (cid:31) {d1, . . . , dm+1}}.
v(cid:48)
This ensures that all the dummy candidates do not receive any score from the modified partial votes
corresponding to the partial votes of the POSSIBLE WINNER instance. Notice that since the number
of undetermined pairs in vi is no more than 4, the number of undetermined pairs in v(cid:48)
i is also no
more than 4. Let (C(cid:48), Q, c) denote this constructed WEAK MANIPULATION instance. We claim that
the two instances are equivalent.
vi ∈ P}. Notice that this is well-defined since vi and v(cid:48)
In the forward direction, suppose c is a possible winner with respect to P, and let P be an
extension where c wins. Then it is easy to see that the manipulator can make c win in some
extension by placing c and dm+1 in the first two positions of her vote (note that the partial score
of dm+1 is zero in Q). Indeed, consider the extension of Q obtained by mimicking the extension P
on the "common" partial votes, {v(cid:48)
i have
exactly the same set of incomparable pairs. In this extension, the score of c is strictly greater than
the scores of all the other candidates, since the scores of all candidates in C is exactly one more
than their scores in P, and all the dummy candidates have a score of at most one.
In the reverse direction, notice that the manipulator puts the candidates c and dm+1 in the top
two positions without loss of generality. Now suppose the manipulator's vote c (cid:31) dm+1 (cid:31) others
makes c win the election for an extension Q of Q. Then consider the extension P obtained by
restricting Q to C. Notice that the score of each candidate in C in this extension is one less than
their scores in Q. Therefore, the candidate c wins this election as well, concluding the proof.
i
The above proof can be imitated for any other constant values of k by reducing it from the
POSSIBLE WINNER problem for k-approval and introducing (m + 1)(k − 1) dummy candidates.
We will use Lemma 1 in subsequent proofs which has been used before [BRR11, DMN15b,
DMN16].
Lemma 1. Let C = {c1, . . . , cm} (cid:93) D, (D > 0) be a set of candidates, and (cid:126)α a normalized score vector
of length C. Then, for any given X = (X1, . . . , Xm) ∈ Zm, there exists λ ∈ R and a voting profile such
that the (cid:126)α-score of ci is λ + Xi for all 1 (cid:54) i (cid:54) m, and the score of candidates d ∈ D is less than λ.
Moreover, the number of votes is O(poly(C ·
(cid:80)
m
i=1
Xi, λ)).
Note that the number of votes used in Lemma 1 is polynomial in m if λ and Xi is polynomial
in m for every i ∈ [m], which indeed is the case in all the proofs that use Lemma 1. We next show
that the WM problem is NP-complete for the k-veto voting rule.
Theorem 2. The WEAK MANIPULATION problem for the k-veto voting rule is NP-complete even with
one manipulator for any constant k > 1.
Proof. We reduce from the POSSIBLE WINNER problem for the k-veto voting rule which is known to
be NP-complete [BD09]. Let P be the set of partial votes in a POSSIBLE WINNER problem instance,
and let C = {c1, . . . , cm, c} be the set of candidates, where the goal is to check if there is an extension
that makes c win with respect to k-veto. We assume without loss of generality that c's position is
fixed in all the partial votes (if not, then we fix the position of c as high as possible in every vote).
We introduce k + 1 many dummy candidates d1, . . . , dk, d. The role of the first k dummy can-
didates is to ensure that the manipulator is forced to place them at the "bottom k" positions of her
vote, so that all the original candidates get the same score from the additional vote of the manip-
ulator. The most natural way of achieving this is to ensure that the dummy candidates have the
11
same score as c in any extension (note that we know the score of c since c's position is fixed in
all the partial votes). This would force the manipulator to place these k candidates in the last k
positions. Indeed, doing anything else will cause these candidates to tie with c, even when there is
an extension of P that makes c win.
To this end, we begin by placing the dummy candidates in the top k positions in all the partial
votes. Formally, we modify every partial vote as follows:
w = di (cid:31) others, for every i ∈ {1, . . . , k}
At this point, we know the scores of c and di, for every i ∈ {1, . . . , k}. Using Lemma 1, we add
complete votes such that the final score of c is the same with the score of every di and the score of
c is strictly more than the score of d. The relative score of every other candidate remains the same.
This completes the description of the construction. We denote the augmented set of partial votes
by P.
We now argue the correctness. In the forward direction, if there is an extension of the votes that
makes c win, then we repeat this extension, and the vote of the manipulator puts the candidate di
at the position m + i + 2; and all the other candidates in an arbitrary fashion. Formally, we let the
manipulator's vote be:
v = c (cid:31) c1 (cid:31) ··· (cid:31) cm (cid:31) d (cid:31) d1 (cid:31) ··· (cid:31) dk.
By construction c wins the election in this particular setup.
In the reverse direction, consider a
vote of the manipulator and an extension Q of P in which c wins. Note that the manipulator's vote
necessarily places the candidates di in the bottom k positions -- indeed, if not, then c cannot win
the election by construction. We extend a partial vote w ∈ P by mimicking the extension of the
corresponding partial vote w(cid:48) ∈ P, that is, we simply project the extension of w(cid:48) on the original
set of candidates C. Let Q denote this proposed extension of P. We claim that c wins the election
given by Q. Indeed, suppose not. Let ci be a candidate whose score is at least the score of c in the
extension Q. Note that the scores of ci and c in the extension Q are exactly the same as their scores
in Q, except for a constant offset -- importantly, their scores are offset by the same amount. This
implies that the score of ci is at least the score of c in Q as well, which is a contradiction. Hence,
the two instances are equivalent.
We next prove, by a reduction from X3C, that the WEAK MANIPULATION problem for the Bucklin
and simplified Bucklin voting rules is NP-complete even with one manipulator and at most 16
undetermined pairs per vote.
Theorem 3. The WEAK MANIPULATION problem is NP-complete for Bucklin, simplified Bucklin, Fall-
back, and simplified Fallback voting rules, even when we have only one manipulator and the number
of undetermined pairs in each vote is no more than 16.
Proof. We reduce the X3C problem to WEAK MANIPULATION for simplified Bucklin. Let (U =
{u1, . . . , um}, S := {S1, S2, . . . , St}) be an instance of X3C, where each Si is a subset of U of size
three. We construct a WEAK MANIPULATION instance based on (U, S) as follows.
Candidate set: C = W ∪ X ∪ D ∪ U ∪ {c, w, a, b}, where W = m − 3, X = 4, D = m + 1
We first introduce the following partial votes P in correspondence with the sets in the family as
follows.
W (cid:31) X (cid:31) Si (cid:31) c (cid:31) (U \ Si) (cid:31) D \ ({X × ({c} ∪ Si)}) ,∀i (cid:54) t
12
Notice that the number of undetermined pairs in every vote in P is 16. We introduce the following
additional complete votes Q:
(cid:66) t copies of U (cid:31) c (cid:31) others
(cid:66) m/3 − 1 copies of U (cid:31) a (cid:31) c (cid:31) others
(cid:66) m/3 + 1 copies of D (cid:31) b (cid:31) others
The total number of voters, including the manipulator, is 2t + 2m/3 + 1. Now we show equivalence
of the two instances.
In the forward direction, suppose we have an exact set cover T ⊂ S. Let the vote of the
manipulator v be c (cid:31) D (cid:31) others. We consider the following extension P of P.
On the other hand, if Si ∈ S \ T, then we have:
W (cid:31) Si (cid:31) c (cid:31) X (cid:31) (U \ Si) (cid:31) D
W (cid:31) X (cid:31) Si (cid:31) c (cid:31) (U \ Si) (cid:31) D
We claim that c is the unique simplified Bucklin winner in the profile (P, W, v). Notice that the
simplified Bucklin score of c is m + 1 in this extension, since it appears in the top m + 1 positions
in the m/3 votes corresponding to the set cover, t votes from the complete profile Q and one vote
v of the manipulator. For any other candidate ui ∈ U, ui appears in the top m + 1 positions once
in P and t + m
3 − 1 times in Q. Thus, ui does not get majority in top m + 1 positions making its
simplified Bucklin score at least m + 2. Hence, c is the unique simplified Bucklin winner in the
profile (P, W, v). Similarly, the candidate w1 appears only t times in the top m + 1 positions. The
same can be argued for the remaining candidates in D, W, and w.
In the reverse direction, suppose the WEAK MANIPULATION is a YES instance. We may assume
without loss of generality that the manipulator's vote v is c (cid:31) D (cid:31) others, since the simplified
Bucklin score of the candidates in D is at least 2m. Let P be the extension of P such that c is the
unique winner in the profile (P, Q, v). As every candidate in W is ranked within top m + 2 positions
in t + m
3 votes in P. In those votes, all the
candidates in Si are also within top m + 2 positions. Now if any candidate in U is within top m + 1
positions in P more than once, then c will not be the unique winner. Hence, the Si's corresponding
to the votes where c (cid:31) X in P form an exact set cover.
3 + 1 votes in Q, for c to win, c (cid:31) X must hold in at least m
The reduction above also works for the Bucklin voting rule. Specifically, the argument for the
forward direction is exactly the same as the simplified Bucklin above and the argument for the
reverse direction is as follows. Every candidate in W is ranked within top m + 2 positions in
3 + 1 votes in Q and c is never placed within top m + 2 positions in any vote in Q. Hence, for
t + m
c to win, c (cid:31) X must hold in at least m
3 votes in P. In those votes, all the candidates in Si are also
within top m positions. Notice that c never gets placed within top m positions in any vote in (P, Q).
Now if any candidate x ∈ U is within top m positions in P more than once, then x gets majority
within top m positions and thus c cannot win.
The result for the Fallback and simplified Fallback voting rules follow from the corresponding
results for the Bucklin and simplified Bucklin voting rules respectively since every Bucklin and
simplified Bucklin election is also a Fallback and simplified Fallback election respectively.
13
3.2 Strong Manipulation
We know that the COALITIONAL MANIPULATION problem is NP-complete for the Borda, maximin,
and Copelandα voting rules for every rational α ∈ [0, 1] \ {0.5}, when we have two manipulators.
Thus, it follows from Observation 2 that STRONG MANIPULATION is NP-hard for Borda, maximin,
and Copelandα voting rules for every rational α ∈ [0, 1] \ {0.5} for at least two manipulators.
For the case of one manipulator, STRONG MANIPULATION turns out to be polynomial-time solv-
able for most other voting rules. For Copelandα, however, we show that the problem is co-NP-hard
for every α ∈ [0, 1] for a single manipulator, even when the number of undetermined pairs in each
vote is bounded by a constant. This is achieved by a careful reduction from X3C. The following
lemma has been used before [McG53].
Lemma 2. For any function f : C × C −→ Z, such that
1. ∀a, b ∈ C, f(a, b) = −f(b, a).
2. ∀a, b, c, d ∈ C, f(a, b) + f(c, d) is even,
there exists a n-voters' profile such that for all a, b ∈ C, a defeats b with a margin of f(a, b). Moreover,
(cid:88)
{a,b}∈C×C
n is even and n = O
f(a, b)
We have following intractability result for the STRONG MANIPULATION problem for the
Copelandα rule with one manipulator and at most 10 undetermined pairs per vote.
Theorem 4. STRONG MANIPULATION is co-NP-hard for Copelandα voting rule for every α ∈ [0, 1]
even when we have only one manipulator and the number of undetermined pairs in each vote is no
more than 10.
Proof. We reduce X3C to STRONG MANIPULATION for Copelandα rule. Let (U = {u1, . . . , um}, S =
{S1, S2, . . . , St}) is an X3C instance. We assume, without loss of generality, t to be an even integer
(if not, replicate any set from S). We construct a corresponding WEAK MANIPULATION instance for
Copelandα as follows.
Candidate set C = U ∪ {c, w, z, d}
Partial votes P:
∀i (cid:54) t, (U \ Si) (cid:31) c (cid:31) z (cid:31) d (cid:31) Si (cid:31) w \ {{z, c} × (Si ∪ {d, w})}
Notice that the number of undetermined pairs in every vote in P is 10. Now we add a set Q of
complete votes with Q even and Q = poly(m, t) using Lemma 2 to achieve the following margin
of victories in pairwise elections. Figure 2 shows the weighted majority graph of the resulting
election.
(cid:66) DQ(d, z) = DQ(z, c) = DQ(c, d) = DQ(w, z) = 4t
(cid:66) DQ(ui, d) = DQ(c, ui) = 4t ∀ui ∈ U
(cid:66) DQ(z, ui) = t ∀ui ∈ U
14
3 − 2
(cid:66) DQ(c, w) = t − 2m
(cid:66) DQ(ui, ui+1 (mod ∗)m) = 4t ∀ui ∈ U
(cid:66) DQ(a, b) = 0 for every a, b ∈ C, a (cid:54)= b, not mentioned above
4t
d
c
4t
4t
4t
t − 2m
3 − 2
4t
uj
4t
uj+1
w
t
4t
z
Figure 2: Weighted majority graph of the reduced instance in Theorem 4. The weight of all the
edges not shown in the figure are 0. For simplicity, we do not show edges among {u1, . . . , um}.
We have only one manipulator who tries to make c winner. Notice that the number of votes in
the STRONG MANIPULATION instance (P ∪ Q, 1, c) including the manipulator's vote is odd (since P
and Q are even integers). Therefore, DP∗∪Q∪{v∗}(a, b) is never zero for every a, b ∈ C, a (cid:54)= b in
every extension P∗ of P and manipulators vote v∗ and consequently the particular value of α does
not play any role in this reduction. Hence, we assume, without loss of generality, α to be zero from
here on and simply use the term Copeland instead of Copelandα.
Now we show that the X3C instance (U, S) is a YES instance if and only if the STRONG MANIPU-
LATION instance (P∪ Q, 1, c) is a NO instance (a STRONG MANIPULATION instance is a NO instance if
there does not exist a vote of the manipulator which makes c the unique winner in every extension
of the partial votes). We can assume without loss of generality that manipulator puts c at first
position and z at last position in her vote v.
Assume that the X3C instance is a YES instance. Suppose (by renaming) that S1, . . . , S m
forms
an exact set cover. We claim that the following extension P of P makes both z and c Copeland
co-winners.
3
Extension P of P:
, (U \ Si) (cid:31) c (cid:31) z (cid:31) d (cid:31) Si (cid:31) w
i (cid:54) m
3
+ 1, (U \ Si) (cid:31) d (cid:31) Si (cid:31) w (cid:31) c (cid:31) z
i (cid:62) m
3
We have summarize the pairwise margins between z and c and the rest of the candidates from
the profile (P ∪ Q ∪ v) in Table 2. The candidates z and c are the co-winners with Copeland score
(m + 1).
15
C \ {z} DP∪Q∪v(z,·)
c
w, d
ui ∈ U
(cid:62) 3t
(cid:54) −3t
1
C \ {c}
z, ui ∈ U
DP∪Q∪v(c,·)
(cid:62) 3t
w
d
−1
(cid:54) −3t
Table 2: DP∪Q∪v(z,·) and DP∪Q∪v(c,·)
For the other direction, notice that Copeland score of c is at least m + 1 since c defeats d and
every candidate in U in every extension of P. Also notice that the Copeland score of z can be at
most m + 1 since z loses to w and d in every extension of P. Hence the only way c cannot be the
unique winner is that z defeats all candidates in U and w defeats c.
3 extensions of P. We claim that the sets Si in the remaining of
the extensions where c (cid:31) w forms an exact set cover for (U, S). Indeed, otherwise some candidate
ui ∈ U is not covered. Then, notice that ui (cid:31) z in all t votes, making D(z, ui) = −1.
This requires w (cid:31) c in at least t− m
3.3 Opportunistic Manipulation
All our reductions for the co-NP-hardness for OPPORTUNISTIC MANIPULATION start from X3C. We
note that all our hardness results hold even when there is only one manipulator. Our overall
approach is the following. We engineer a set of partial votes in such a way that the manipulator is
forced to vote in a limited number of ways to have any hope of making her favorite candidate win.
For each such vote, we demonstrate a viable extension where the vote fails to make the candidate
a winner, leading to a NO instance of OPPORTUNISTIC MANIPULATION. These extensions rely on
the existence of an exact cover. On the other hand, we show that if there is no exact set cover,
then there is no viable extension, thereby leading to an instance that is vacuously a YES instance of
OPPORTUNISTIC MANIPULATION. Our first result on OPPORTUNISTIC MANIPULATION shows that the
OPPORTUNISTIC MANIPULATION problem is co-NP-hard for the k-approval voting rule for constant
k (cid:62) 3 even when the number of manipulators is one and the number of undetermined pairs in each
vote is no more than 15.
Theorem 5. The OPPORTUNISTIC MANIPULATION problem is co-NP-hard for the k-approval voting
rule for constant k (cid:62) 3 even when the number of manipulators is one and the number of undetermined
pairs in each vote is no more than 15.
Proof. We reduce X3C to OPPORTUNISTIC MANIPULATION for k-approval rule.
Let (U =
{u1, . . . , um}, S = {S1, S2, . . . , St}) is an X3C instance. We construct a corresponding OPPORTUNISTIC
MANIPULATION instance for k-approval voting rule as follows. We begin by introducing a candidate
for every element of the universe, along with k − 3 dummy candidates (denoted by W), and special
candidates {c, z1, z2, d, x, y}. Formally, we have:
Candidate set C = U ∪ {c, z1, z2, d, x, y} ∪ W.
Now, for every set Si in the universe, we define the following total order on the candidate set,
which we denote by P(cid:48)
i:
W (cid:31) Si (cid:31) y (cid:31) z1 (cid:31) z2 (cid:31) x (cid:31) (U \ Si) (cid:31) c (cid:31) d
16
Using P(cid:48)
i, we define the partial vote Pi as follows:
Pi = P(cid:48)
i
\ ({{y, x, z1, z2} × Si} ∪ {(z1, z2), (x, z1), (x, z2)}).
We denote the set of partial votes {Pi : i ∈ [t]} by P and {P(cid:48)
i : i ∈ [t]} by P(cid:48). We remark that the
number of undetermined pairs in each partial vote Pi is 15.
We now invoke Lemma 1 from [DMN16], which allows to achieve any pre-defined scores on the
candidates using only polynomially many additional votes. Using this, we add a set Q of complete
votes with Q = poly(m, t) to ensure the following scores, where we denote the k-approval score of
a candidate from a set of votes V by sV(·): sQ(z1) = sQ(z2) = sQ(y) = sQ(c) − m/3; sQ(d), sQ(w) (cid:54)
sQ(c) − 2t ∀w ∈ W; sQ(x) = sQ(c) − 1; sP(cid:48)∪Q(uj) = sQ(c) + 1 ∀j ∈ [m].
Our reduced instance is (P∪ Q, 1, c). The reasoning for this score configuration will be apparent
as we argue the equivalence. We first argue that if we had a YES instance of X3C (in other words,
there is no exact cover), then we have a YES instance of OPPORTUNISTIC MANIPULATION. It turns
out that this will follow from the fact that there are no viable extensions, because, as we will show
next, a viable extension implies the existence of an exact set cover.
To this end, first observe that the partial votes are constructed in such a way that c gets no
additional score from any extension. Assuming that the manipulator approves c (without loss of
generality), the final score of c in any extension is going to be sQ(c) + 1. Now, in any viable
extension, every candidate uj has to be "pushed out" of the top k positions at least once. Observe
that whenever this happens, y is forced into the top k positions. Since y is behind the score of c by
only m/3 votes, Si's can be pushed out of place in only m/3 votes. For every uj to lose one point,
these votes must correspond to an exact cover. Therefore, if there is no exact cover, then there is
no viable extension, showing one direction of the reduction.
On the other hand, suppose we have a NO instance of X3C -- that is, there is an exact cover. Let
{Si : i ∈ [m/3]} forms an exact cover of U. We will now use the exact cover to come up with two
viable extensions, both of which require the manipulator to vote in different ways to make c win.
Therefore, there is no single manipulative vote that accounts for both extensions, leading us to a
NO instance of OPPORTUNISTIC MANIPULATION.
First, consider this completion of the partial votes:
i = 1, W (cid:31) y (cid:31) x (cid:31) z1 (cid:31) z2 (cid:31) Si (cid:31) (U \ Si) (cid:31) c (cid:31) d
2 (cid:54) i (cid:54) m/3, W (cid:31) y (cid:31) z1 (cid:31) z2 (cid:31) x (cid:31) Si (cid:31) (U \ Si) (cid:31) c (cid:31) d
m/3 + 1 (cid:54) i (cid:54) t, W (cid:31) Si (cid:31) y (cid:31) z1 (cid:31) z2 (cid:31) x (cid:31) (U \ Si) (cid:31) c (cid:31) d
Notice that in this completion, once accounted for along with the votes in Q, the score of c is tied
with the scores of all uj's, z1, x and y, while the score of z2 is one less than the score of c. Therefore,
the only k candidates that the manipulator can afford to approve are W, the candidates c, d and z2.
However, consider the extension that is identical to the above except with the first vote changed to:
W (cid:31) y (cid:31) x (cid:31) z2 (cid:31) z1 (cid:31) Si (cid:31) (U \ Si) (cid:31) c (cid:31) d
Here, on the other hand, the only way for c to be an unique winner is if the manipulator ap-
proves W, c, d and z1. Therefore, it is clear that there is no way for the manipulator to provide
a consolidated vote for both these profiles. Therefore, we have a NO instance of OPPORTUNISTIC
MANIPULATION.
17
We next move on to the k-veto voting rule and show that the OPPORTUNISTIC MANIPULATION
problem for the k-veto is co-NP-hard for every constant k (cid:62) 4 even when the number of manipula-
tors is one and the number of undetermined pairs in each vote is no more than 15.
Theorem 6. The OPPORTUNISTIC MANIPULATION problem is co-NP-hard for the k-veto voting rule for
every constant k (cid:62) 4 even when the number of manipulators is one and the number of undetermined
pairs in each vote is no more than 15.
Proof. We reduce X3C to OPPORTUNISTIC MANIPULATION for k-veto rule. Let (U = {u1, . . . , um}, S =
{S1, S2, . . . , St}) is an X3C instance. We construct a corresponding OPPORTUNISTIC MANIPULATION
instance for k-veto voting rule as follows.
Candidate set C = U ∪ {c, z1, z2, d, x, y} ∪ A ∪ W, where A = {a1, a2, a3}, W = k − 4
For every i ∈ [t], we define P(cid:48)
i as follows:
∀i (cid:54) t, c (cid:31) A (cid:31) (U \ Si) (cid:31) d (cid:31) Si (cid:31) y (cid:31) x (cid:31) z1 (cid:31) z2 (cid:31) W
i, we define partial vote Pi = P(cid:48)
\ ({{y, x, z1, z2} × Si} ∪ {(z1, z2), (x, z1), (x, z2)}) for every
Using P(cid:48)
i ∈ [t]. We denote the set of partial votes {Pi : i ∈ [t]} by P and {P(cid:48)
i : i ∈ [t]} by P(cid:48). We note that
the number of undetermined pairs in each partial vote Pi is 15. Using Lemma 1, we add a set Q
of complete votes with Q = poly(m, t) to ensure the following. We denote the k-veto score of a
candidate from a set of votes W by sW(·).
i
(cid:66) sP(cid:48)∪Q(z1) = sP(cid:48)∪Q(z2) = sP(cid:48)∪Q(c) − m/3
(cid:66) sP(cid:48)∪Q(ai) = sP(cid:48)∪Q(uj) = sP(cid:48)∪Q(w) = sP(cid:48)∪Q(c) ∀ai ∈ A, uj ∈ U, w ∈ W
(cid:66) sP(cid:48)∪Q(y) = sP(cid:48)∪Q(c) − m/3 − 1
(cid:66) sP(cid:48)∪Q(x) = sP(cid:48)∪Q(c) − 2
We have only one manipulator who tries to make c winner. Now we show that the X3C instance
(U, S) is a YES instance if and only if the OPPORTUNISTIC MANIPULATION instance (P ∪ Q, 1, c) is a
NO instance.
In the forward direction, let us now assume that the X3C instance is a YES instance. Suppose
(by renaming) that S1, . . . , Sm/3 forms an exact set cover. Let us assume that the manipulator's vote
v disapproves every candidate in W ∪ A since otherwise c can never win uniquely. We now show
that if v does not disapprove z1 then, v is not a c-optimal vote. Suppose v does not disapprove z1.
Then we consider the following extension P of P.
i = 1, c (cid:31) A (cid:31) (U \ Si) (cid:31) d (cid:31) y (cid:31) z1 (cid:31) x (cid:31) z2 (cid:31) Si (cid:31) W
2 (cid:54) i (cid:54) m/3, c (cid:31) A (cid:31) (U \ Si) (cid:31) d (cid:31) y (cid:31) z1 (cid:31) z2 (cid:31) x (cid:31) Si (cid:31) W
m/3 + 1 (cid:54) i (cid:54) t, c (cid:31) A (cid:31) (U \ Si) (cid:31) d (cid:31) Si (cid:31) y (cid:31) x (cid:31) z1 (cid:31) z2 (cid:31) W
We have the following scores sP∪Q(c) = sP∪Q(z1) = sP∪Q(z2) + 1 = sP∪Q(x) + 1 = sP∪Q(uj) +
1 ∀uj ∈ U. Hence, both c and z1 win for the votes P∪Q∪{v}. However, the vote v(cid:48) which disapproves
a1, a2, a3, z1 makes c a unique winner for the votes P ∪ Q ∪ {v(cid:48)}. Hence, v is not a c-optimal vote.
Similarly, we can show that if the manipulator's vote does not disapprove z2 then, the vote is not
18
c-optimal. Hence, there does not exist any c-optimal vote and the OPPORTUNISTIC MANIPULATION
instance is a NO instance.
In the reverse direction, we show that if the X3C instance is a NO instance, then there does not
exist a vote v of the manipulator and an extension P of P such that c is the unique winner for the
votes P∪ Q∪ {v(cid:48)} thereby proving that the OPPORTUNISTIC MANIPULATION instance is vacuously YES
(and thus every vote is c-optimal). Notice that, there must be at least m/3 votes P1 in P where the
corresponding Si gets pushed in bottom k positions since sP(cid:48)∪Q(uj) = sP(cid:48)∪Q(c) ∀ai ∈ A, uj ∈ U.
However, in each vote in P1, y is placed within top m − k many position and thus we have P1
is exactly m/3 since sP(cid:48)∪Q(y) = sP(cid:48)∪Q(c) − m/3 − 1. Now notice that there must be at least one
candidate u ∈ U which is not covered by the sets Sis corresponding to the votes P1 because
the X3C instance is a NO instance. Hence, c cannot win the election uniquely irrespective of the
manipulator's vote. Thus every vote is c-optimal and the OPPORTUNISTIC MANIPULATION instance
is a YES instance.
We show next similar intractability result for the Borda voting rule too with only at most 7
undetermined pairs per vote.
Theorem 7. The OPPORTUNISTIC MANIPULATION problem is co-NP-hard for the Borda voting rule
even when the number of manipulators is one and the number of undetermined pairs in every vote is
no more than 7.
Proof. We reduce X3C to OPPORTUNISTIC MANIPULATION for the Borda rule.
Let (U =
{u1, . . . , um}, S = {S1, S2, . . . , St}) is an X3C instance. Without loss of generality we assume that
m is not divisible by 6 (if not, then we add three new elements b1, b2, b3 to U and a set {b1, b2, b3}
to S). We construct a corresponding OPPORTUNISTIC MANIPULATION instance for the Borda voting
rule as follows.
Candidate set C = U ∪ {c, z1, z2, d, y}
For every i ∈ [t], we define P(cid:48)
i as follows:
∀i (cid:54) t, y (cid:31) Si (cid:31) z1 (cid:31) z2 (cid:31) (U \ Si) (cid:31) d (cid:31) c
Using P(cid:48)
i
i, we define partial vote Pi = P(cid:48)
\ ({({y} ∪ Si) × {z1, z2}} ∪ {(z1, z2)}) for every i ∈ [t]. We
denote the set of partial votes {Pi : i ∈ [t]} by P and {P(cid:48)
i : i ∈ [t]} by P(cid:48). We note that the number of
undetermined pairs in each partial vote Pi is 7. Using Lemma 1, we add a set Q of complete votes
with Q = poly(m, t) to ensure the following. We denote the Borda score of a candidate from a set
of votes W by sW(·).
(cid:66) sP(cid:48)∪Q(y) = sP(cid:48)∪Q(c) + m + m/3 + 3
(cid:66) sP(cid:48)∪Q(z1) = sP(cid:48)∪Q(c) − 3(cid:98)m/6(cid:99) − 2
(cid:66) sP(cid:48)∪Q(z2) = sP(cid:48)∪Q(c) − 5(cid:98)m/6(cid:99) − 3
(cid:66) sP(cid:48)∪Q(ui) = sP(cid:48)∪Q(c) + m + 5 − i ∀i ∈ [m]
(cid:66) sP(cid:48)∪Q(d) (cid:54) sP(cid:48)∪Q(c) − 5m
19
We have only one manipulator who tries to make c winner. Now we show that the X3C instance
(U, S) is a YES instance if and only if the OPPORTUNISTIC MANIPULATION instance (P∪Q, 1, c) is a NO
instance. Notice that we can assume without loss of generality that the manipulator places c at the
first position, d at the second position, the candidate ui at (m + 5 − i)th position for every i ∈ [m],
and y at the last position, since otherwise c can never win uniquely irrespective of the extension of
P (that it, the manipulator's vote looks like c (cid:31) d (cid:31) {z1, z2} (cid:31) um (cid:31) um−1 (cid:31) ··· (cid:31) u1 (cid:31) y).
In the forward direction, let us now assume that the X3C instance is a YES instance. Suppose
(by renaming) that S1, . . . , Sm/3 forms an exact set cover. Let the manipulator's vote v be c (cid:31) d (cid:31)
z1 (cid:31) z2 (cid:31) um (cid:31) ··· (cid:31) u1 (cid:31) y. We now argue that v is not a c-optimal vote. The other case where
the manipulator's vote v(cid:48) be c (cid:31) d (cid:31) z2 (cid:31) z1 (cid:31) um (cid:31) ··· (cid:31) u1 (cid:31) y can be argued similarly. We
consider the following extension P of P.
1 (cid:54) i (cid:54) (cid:98)m/6(cid:99), z2 (cid:31) y (cid:31) Si (cid:31) z1 (cid:31) (U \ Si) (cid:31) d (cid:31) c
(cid:100)m/6(cid:101) (cid:54) i (cid:54) m/3, z1 (cid:31) y (cid:31) Si (cid:31) z2 (cid:31) (U \ Si) (cid:31) d (cid:31) c
m/3 + 1 (cid:54) i (cid:54) t, y (cid:31) Si (cid:31) z1 (cid:31) z2 (cid:31) (U \ Si) (cid:31) d (cid:31) c
We have the following Borda scores sP∪Q∪{v}(c) = sP∪Q∪{v}(y) + 1 = sP∪Q∪{v}(z2) + 6 =
sP∪Q∪{v}(z1) = sP∪Q∪{v}(ui) + 1 ∀i ∈ [m]. Hence, c does not win uniquely for the votes P∪ Q∪ {v}.
However, c is the unique winner for the votes P∪ Q∪ {v(cid:48)}. Hence, there does not exist any c-optimal
vote and the OPPORTUNISTIC MANIPULATION instance is a NO instance.
In the reverse direction, we show that if the X3C instance is a NO instance, then there does not
exist a vote v of the manipulator and an extension P of P such that c is the unique winner for the
votes P ∪ Q ∪ {v(cid:48)} thereby proving that the OPPORTUNISTIC MANIPULATION instance is vacuously
YES (and thus every vote is c-optimal). Notice that the score of y must decrease by at least m/3 for
c to win uniquely. However, in every vote v where the score of y decreases by at least one in any
extension P of P, at least one of z1 or z2 must be placed at top position of the vote v. However,
the candidates z1 and z2 can be placed at top positions of the votes in P at most m/3 many times
while ensuring c does not lose the election. Also, even after manipulator places the candidate ui at
(m + 5 − i)th position for every i ∈ [m], for c to win uniquely, the score of every ui must decrease
by at least one. Hence, altogether, there will be exactly m/3 votes (denoted by the set P1) in any
extension of P where y is placed at the second position. However, since the X3C instance is a NO
instance, the Sis corresponding to the votes in P1 does not form a set cover. Let u ∈ U be an
element not covered by the Sis corresponding to the votes in P1. Notice that the score of u does
not decrease in the extension P and thus c does not win uniquely irrespective of the manipulator's
vote. Thus every vote is c-optimal and thus the OPPORTUNISTIC MANIPULATION instance is a YES
instance. Thus every vote is c-optimal and the OPPORTUNISTIC MANIPULATION instance is a YES
instance.
For the maximin voting rule, we show intractability of OPPORTUNISTIC MANIPULATION with one
manipulator even when the number of undetermined pairs in every vote is at most 8.
Theorem 8. The OPPORTUNISTIC MANIPULATION problem is co-NP-hard for the maximin voting rule
even when the number of manipulators is one and the number of undetermined pairs in every vote is
no more than 8.
20
Proof. We reduce X3C to OPPORTUNISTIC MANIPULATION for the maximin rule.
Let (U =
{u1, . . . , um}, S = {S1, S2, . . . , St}) is an X3C instance. We construct a corresponding OPPORTUNISTIC
MANIPULATION instance for the maximin voting rule as follows.
Candidate set C = U ∪ {c, z1, z2, z3, d, x, y}
For every i ∈ [t], we define P(cid:48)
i as follows:
∀i (cid:54) t, Si (cid:31) x (cid:31) d (cid:31) y (cid:31) (U \ Si) (cid:31) z1 (cid:31) z2 (cid:31) z3
i, we define partial vote Pi = P(cid:48)
i
Using P(cid:48)
the set of partial votes {Pi : i ∈ [t]} by P and {P(cid:48)
undetermined pairs in each partial vote Pi is 8. We define another partial vote p as follows.
\ ({({x} ∪ Si) × {d, y}}) for every i ∈ [t]. We denote
i : i ∈ [t]} by P(cid:48). We note that the number of
p = (z1 (cid:31) z2 (cid:31) z3 (cid:31) others ) \ {(z1, z2), (z2, z3), (z1, z3)}
Using Lemma 2, we add a set Q of complete votes with Q = poly(m, t) to ensure the following
pairwise margins (notice that the pairwise margins among z1, z2, and z3 does not include the partial
vote p). Figure 3 shows the weighted majority graph of the resulting election.
(cid:66) DP(cid:48)∪Q∪{p}(d, c) = 4t + 1
(cid:66) DP(cid:48)∪Q∪{p}(x, d) = 4t + 2m/3 + 1
(cid:66) DP(cid:48)∪Q∪{p}(y, x) = 4t − 2m/3 + 1
(cid:66) DP(cid:48)∪Q∪{p}(d, uj) = 4t − 1 ∀uj ∈ U
(cid:66) DP(cid:48)∪Q(z1, z2) = DP(cid:48)∪Q(z2, z3) = DP(cid:48)∪Q(z3, z1) = 4t + 2
(cid:66) DP(cid:48)∪Q∪{p}(a, b) (cid:54) 1 for every a, b ∈ C not defined above.
We have only one manipulator who tries to make c winner. Now we show that the X3C instance
(U, S) is a YES instance if and only if the OPPORTUNISTIC MANIPULATION instance (P ∪ Q ∪ {p}, 1, c)
is a NO instance. Notice that we can assume without loss of generality that the manipulator's vote
prefers c to every other candidate, y to x, x to d, and d to uj for every uj ∈ U.
In the forward direction, let us now assume that the X3C instance is a YES instance. Suppose
(by renaming) that S1, . . . , Sm/3 forms an exact set cover. Notice that the manipulator's vote must
prefer either z2 to z1 or z1 to z3 or z3 to z2. We show that if the manipulator's vote v prefers z2
to z1, then v is not a c-optimal vote. The other two cases are symmetrical. Consider the following
extension P of P and p of p.
1 (cid:54) i (cid:54) m/3, d (cid:31) y (cid:31) Si (cid:31) x (cid:31) (U \ Si) (cid:31) z1 (cid:31) z2 (cid:31) z3
m/3 + 1 (cid:54) i (cid:54) t, Si (cid:31) x (cid:31) d (cid:31) y (cid:31) (U \ Si) (cid:31) z1 (cid:31) z2 (cid:31) z3
p = z2 (cid:31) z3 (cid:31) z1 (cid:31) others
From the votes in P ∪ Q ∪ {v, p}, the maximin score of c is −4t, of d, x, uj ∀uj ∈ U are −4t − 2,
of z1, z3 are at most than −4t − 2, and of z2 is −4t. Hence, c is not the unique maximn winner.
21
4t + 1
d
c
4t − 1
uj
z1
4t + 2
z3
4t + 2
4t + 2
4t + 2m/3 + 1
z2
y
x
4t − 2m/3 + 1
Figure 3: Weighted majority graph of the reduced instance in Theorem 8. Solid line and dashed
line represent pairwise margins in P(cid:48)∪Q∪{p} and P(cid:48)∪Q respectively. The weight of all the edges not
shown in the figure are within −1 to 1. For simplicity, we do not show edges among {u1, . . . , um}.
However, the manipulator's vote c (cid:31) z1 (cid:31) z2 (cid:31) z3 (cid:31) other makes c the unique maximin winner.
Hence, v is not a c-optimal vote.
For the reverse direction, we show that if the X3C instance is a NO instance, then there does
not exist a vote v of the manipulator and an extension P of P such that c is the unique winner for
the votes P∪ Q∪ {v(cid:48)} thereby proving that the OPPORTUNISTIC MANIPULATION instance is vacuously
YES (and thus every vote is c-optimal). Consider any extension P of P. Notice that, for c to win
uniquely, y (cid:31) x must be at least m/3 of the votes in P; call these set of votes P1. However, d (cid:31) x in
every vote in P1 and d (cid:31) x can be in at most m/3 votes in P for c to win uniquely. Hence, we have
P1 = m/3. Also for c to win, each d (cid:31) uj must be at least one vote of P and d (cid:31) uj is possible
only in the votes in P1. However, the sets Sis corresponding to the votes in P1 does not form a set
cover since the X3C instance is a NO instance. Hence, there must exist a uj ∈ U for which uj (cid:31) d
in every vote in P and thus c cannot win uniquely irrespective of the vote of the manipulator. Thus
every vote is c-optimal and the OPPORTUNISTIC MANIPULATION instance is a YES instance.
Our next result proves that the OPPORTUNISTIC MANIPULATION problem is co-NP-hard for the
Copelandα voting rule too for every α ∈ [0, 1] even with one manipulator and at most 8 undeter-
mined pairs per vote.
Theorem 9. The OPPORTUNISTIC MANIPULATION problem is co-NP-hard for the Copelandα voting
rule for every α ∈ [0, 1] even when the number of manipulators is one and the number of undetermined
pairs in each vote is no more than 8.
Proof. We reduce X3C to OPPORTUNISTIC MANIPULATION for the Copelandα voting rule. Let (U =
{u1, . . . , um}, S = {S1, S2, . . . , St}) is an X3C instance. We construct a corresponding OPPORTUNISTIC
MANIPULATION instance for the Copelandα voting rule as follows.
Candidate set C = U ∪ {c, z1, z2, z3, d1, d2, d3, x, y}
For every i ∈ [t], we define P(cid:48)
i as follows:
22
Using P(cid:48)
i, we define partial vote Pi = P(cid:48)
∀i (cid:54) t, Si (cid:31) x (cid:31) y (cid:31) c (cid:31) others
of partial votes {Pi : i ∈ [t]} by P and {P(cid:48)
pairs in each partial vote Pi is 8. We define another partial vote p as follows.
p = (z1 (cid:31) z2 (cid:31) z3 (cid:31) others ) \ {(z1, z2), (z2, z3), (z1, z3)}
i
\({({x}∪Si)×{c, y}}) for every i ∈ [t]. We denote the set
i : i ∈ [t]} by P(cid:48). We note that the number of undetermined
Using Lemma 2, we add a set Q of complete votes with Q = poly(m, t) to ensure the following
pairwise margins (notice that the pairwise margins among z1, z2, and z3 does not include the partial
vote p). Figure 4 shows the weighted majority graph of the resulting election.
(cid:66) DP(cid:48)∪Q∪{p}(uj, c) = 2 ∀uj ∈ U
(cid:66) DP(cid:48)∪Q∪{p}(x, y) = 2m/3
(cid:66) DP(cid:48)∪Q∪{p}(c, y) = DP(cid:48)∪Q∪{p}(x, c) = DP(cid:48)∪Q∪{p}(di, c) = DP(cid:48)∪Q∪{p}(zk, c) =
DP(cid:48)∪Q∪{p}(uj, x) = DP(cid:48)∪Q∪{p}(x, zk) = DP(cid:48)∪Q∪{p}(di, x) = DP(cid:48)∪Q∪{p}(y, uj) =
DP(cid:48)∪Q∪{p}(di, y) = DP(cid:48)∪Q∪{p}(y, zk) = DP(cid:48)∪Q∪{p}(zk, uj) = DP(cid:48)∪Q∪{p}(uj, di) =
DP(cid:48)∪Q∪{p}(zk, d1) = DP(cid:48)∪Q∪{p}(zk, d2) = DP(cid:48)∪Q∪{p}(d3, zk) = 4t ∀i, k ∈ [3], j ∈ [m]
(cid:66) DP(cid:48)∪Q∪{p}(uj, u(cid:96)) = −4t for at least m/3 many u(cid:96) ∈ U
(cid:66) DP(cid:48)∪Q(z1, z2) = DP(cid:48)∪Q(z2, z3) = DP(cid:48)∪Q(z3, z1) = 1
(cid:66) DP(cid:48)∪Q∪{p}(a, b) (cid:54) 1 for every a, b ∈ C not defined above.
We have only one manipulator who tries to make c winner. Now we show that the X3C instance
(U, S) is a YES instance if and only if the OPPORTUNISTIC MANIPULATION instance (P ∪ Q ∪ {p}, 1, c)
is a NO instance. Since the number of voters is odd, α does not play any role in the reduction and
thus from here on we simply omit α. Notice that we can assume without loss of generality that the
manipulator's vote prefers c to every other candidate and x to y.
In the forward direction, let us now assume that the X3C instance is a YES instance. Suppose
(by renaming) that S1, . . . , Sm/3 forms an exact set cover. Suppose the manipulator's vote v order
z1, z2, and z3 as z1 (cid:31) z2 (cid:31) z3. We will show that v is not a c-optimal vote. Symmetrically, we
can show that the manipulator's vote ordering z1, z2, and z3 in any other order is not c-optimal.
Consider the following extension P of P and p of p.
1 (cid:54) i (cid:54) m/3, y (cid:31) c (cid:31) Si (cid:31) x (cid:31) others
m/3 + 1 (cid:54) i (cid:54) t, Si (cid:31) x (cid:31) y (cid:31) c (cid:31) others
p = z1 (cid:31) z2 (cid:31) z3 (cid:31) others
From the votes in P∪ Q∪ {v, p}, the Copeland score of c is m + 4 (defeating y, zk, uj ∀k ∈ [3], j ∈
[m]), of y is m+3 (defeating zk, uj ∀k ∈ [3], j ∈ [m]), of uj is at most 2m/3+4 (defeating x, di ∀i ∈ [3]
and at most 2m/3 many u(cid:96) ∈ U), of x is 5 (defeating c, y, zk ∀l ∈ [3]), of d1, d2 is 2 (defeating y
and c), of d3 is 5 (defeating y, c, zk ∀k ∈ [3]). of z3 is m + 3 (defeating di, uj∀i ∈ [3], j ∈ [m])
for every k ∈ [3], of z3 is m + 2 (defeating d1, d2, uji ∈ [3], j ∈ [m]), z2 is m + 3 (defeating
23
uj
2
c
y
2m/3
x
z1
1
1
z2
1
z3
d1
d2
d3
Figure 4: Weighted majority graph of the reduced instance in Theorem 9. Solid line and dashed
line represent pairwise margins in P(cid:48) ∪ Q ∪ {p} and P(cid:48) ∪ Q respectively. The weight of all the edges
not shown in the figure are within −1 to 1. The weight of all unlabeled edges are 4t. For simplicity,
we do not show edges among {u1, . . . , um}.
24
d1, d2, z3, uji ∈ [3], j ∈ [m]), z1 is m + 4 (defeating d1, d2, z2, z3, uji ∈ [3], j ∈ [m]). Hence, c
co-wins with z1 with Copeland score m + 4. However, the manipulator's vote c (cid:31) z3 (cid:31) z2 (cid:31) z1
makes c win uniquely. Hence, v is not a c-optimal vote and thus the OPPORTUNISTIC MANIPULATION
instance is a NO instance.
For the reverse direction, we show that if the X3C instance is a NO instance, then there does
not exist a vote v of the manipulator and an extension P of P such that c is the unique winner for
the votes P∪ Q∪ {v(cid:48)} thereby proving that the OPPORTUNISTIC MANIPULATION instance is vacuously
YES (and thus every vote is c-optimal). Consider any extension P of P. Notice that, for c to win
uniquely, c must defeat each uj ∈ U and thus c is preferred over uj in at least one vote in P; we
call these votes P1. However, in every vote in P1, y is preferred over x and thus P1 (cid:54) m/3 because
x must defeat y for c to win uniquely. Since the X3C instance is a NO instance, there must be a
candidate u ∈ U which is not covered by the sets corresponding to the votes in P1 and thus u is
preferred over c in every vote in P. Hence, c cannot win uniquely irrespective of the vote of the
manipulator. Thus every vote is c-optimal and the OPPORTUNISTIC MANIPULATION instance is a YES
instance.
For the Bucklin and simplified Bucklin voting rules, we show intractability of the OPPORTUNIS-
TIC MANIPULATION problem with at most 15 undetermined pairs per vote and only one manipulator.
Theorem 10. The OPPORTUNISTIC MANIPULATION problem is co-NP-hard for the Bucklin and simpli-
fied Bucklin voting rules even when the number of manipulators is one and the number of undetermined
pairs in each vote is no more than 15.
Proof. We reduce X3C to OPPORTUNISTIC MANIPULATION for the Bucklin and simplified Bucklin
voting rules. Let (U = {u1, . . . , um}, S = {S1, S2, . . . , St}) is an X3C instance. We assume without
loss of generality that m is not divisible by 6 (if not, we introduce three elements in U and a set
containing them in S) and t is an even integer (if not, we duplicate any set in S). We construct
a corresponding OPPORTUNISTIC MANIPULATION instance for the Bucklin and simplified Bucklin
voting rules as follows.
Candidate set C = U ∪ {c, z1, z2, x1, x2, d} ∪ W, where W = m − 3
For every i ∈ [t], we define P(cid:48)
i as follows:
Using P(cid:48)
i
∀i (cid:54) t, (U \ Si) (cid:31) Si (cid:31) d (cid:31) x1 (cid:31) x2 (cid:31) z1 (cid:31) z2 (cid:31) others
i, we define partial vote Pi = P(cid:48)
\ ({({d} ∪ Si) × {x1, x2, z1, z2}} ∪ {(z1, z2)}) for every
i ∈ [t]. We denote the set of partial votes {Pi : i ∈ [t]} by P and {P(cid:48)
i : i ∈ [t]} by P(cid:48). We note that the
number of undetermined pairs in each partial vote Pi is 15. We introduce the following additional
complete votes Q:
(cid:66) t/2 − (cid:98)m/6(cid:99) − 1 copies of W (cid:31) z1 (cid:31) z2 (cid:31) x1 (cid:31) c (cid:31) others
(cid:66) t/2 − (cid:98)m/6(cid:99) − 1 copies of W (cid:31) z1 (cid:31) z2 (cid:31) x2 (cid:31) c (cid:31) others
(cid:66) 2(cid:100)m/6(cid:101) copies of W (cid:31) z1 (cid:31) z2 (cid:31) d (cid:31) c (cid:31) others
(cid:66) (cid:98)m/6(cid:99) copies of W (cid:31) z1 (cid:31) d (cid:31) x1 (cid:31) c (cid:31) others
(cid:66) (cid:98)m/6(cid:99) copies of W (cid:31) z1 (cid:31) d (cid:31) x2 (cid:31) c (cid:31) others
25
(cid:66) 2(cid:100)m/6(cid:101) − 1 copies of U (cid:31) x1 (cid:31) others
(cid:66) One U (cid:31) c (cid:31) others
We have only one manipulator who tries to make c winner. Now we show that the X3C instance
(U, S) is a YES instance if and only if the OPPORTUNISTIC MANIPULATION instance (P∪Q, 1, c) is a NO
instance. The total number of voters in the OPPORTUNISTIC MANIPULATION instance is 2t + 2m/3 + 1.
We notice that within top m + 1 positions of the votes in P(cid:48) ∪ Q, c appears t + m/3 times, z1 and z2
appear t + (cid:98)m/6(cid:99) times, x1 appears t/2 + m/3 − 1 times, x2 appears t/2 − 1 times, every candidate in
W appears t + m/3 − 1 times, every candidate in U appears t + m/3 + 1 times. Also every candidate
in U appears t + m/3 + 1 times within top m positions of the votes in P∪ Q. Hence, for both Bucklin
and simplified Bucklin voting rules, we can assume without loss of generality that the manipulator
puts c, every candidate in W, x1, x2, and exactly one of z1 and z2.
In the forward direction, let us now assume that the X3C instance is a YES instance. Suppose
(by renaming) that S1, . . . , Sm/3 forms an exact set cover. Suppose the manipulator's vote v puts
c, every candidate in W, x1, x2, and z1 within top m + 1 positions. We will show that v is not
c-optimal. The other case where the manipulator's vote v(cid:48) puts c, every candidate in W, x1, x2, and
z2 within top m + 1 positions is symmetrical. Consider the following extension P of P:
1 (cid:54) i (cid:54) (cid:98)m/6(cid:99), (U \ Si)d (cid:31) x1 (cid:31) x2 (cid:31) z2 (cid:31) Si (cid:31)(cid:31) z1 (cid:31) others
(cid:100)m/6(cid:101) (cid:54) i (cid:54) m/3, (U \ Si)d (cid:31) x1 (cid:31) x2 (cid:31) z1 (cid:31) Si (cid:31)(cid:31) z2 (cid:31) others
m/3 + 1 (cid:54) i (cid:54) t, (U \ Si) (cid:31) Si (cid:31) d (cid:31) x1 (cid:31) x2 (cid:31) z1 (cid:31) z2 (cid:31) others
For both Bucklin and simplified Bucklin voting rules, c co-wins with z1 for the votes in P ∪ Q ∪ {v}.
However, c wins uniquely for the votes in P∪ Q∪ {v(cid:48)}. Hence, v is not a c-optimal vote and thus the
OPPORTUNISTIC MANIPULATION instance is a NO instance.
For the reverse direction, we show that if the X3C instance is a NO instance, then there does
not exist a vote v of the manipulator and an extension P of P such that c is the unique winner for
the votes P∪ Q∪ {v(cid:48)} thereby proving that the OPPORTUNISTIC MANIPULATION instance is vacuously
YES (and thus every vote is c-optimal). Consider any extension P of P. Notice that, for c to win
uniquely, every candidate must be pushed out of top m + 1 positions in at least one vote in P; we
call these set of votes P1. Notice that, P1 (cid:62) m/3. However, in every vote in P1, at least one of
z1 and z2 appears within top m + 1 many positions. Since, the manipulator has to put at least
one of z1 and z2 within its top m + 1 positions and z1 and z2 appear t + (cid:98)m/6(cid:99) times in the votes
in P(cid:48) ∪ Q, we must have P1 (cid:54) m/3 and thus P1 = m/3, for c to win uniquely. However, there
exists a candidate u ∈ U not covered by the Sis corresponding to the votes in P1. Notice that u gets
majority within top m positions of the votes and c can never get majority within top m + 1 positions
of the votes. Hence, c cannot win uniquely irrespective of the vote of the manipulator. Thus every
vote is c-optimal and the OPPORTUNISTIC MANIPULATION instance is a YES instance.
4 Polynomial Time Algorithms
We now turn to the polynomial time cases depicted in Table 1. This section is organized in three
parts, one for each problem considered.
26
4.1 Weak Manipulation
Since the POSSIBLE WINNER problem is in P for the plurality and the veto voting rules [BD09], it
follows from Observation 1 that the WEAK MANIPULATION problem is in P for the plurality and veto
voting rules for any number of manipulators.
Proposition 1. The WEAK MANIPULATION problem is in P for the plurality and veto voting rules for
any number of manipulators.
Proof. The POSSIBLE WINNER problem is in P for the plurality and the veto voting rules [BD09].
Hence, the result follows from Observation 1.
4.2 Strong Manipulation
We now discuss our algorithms for the STRONG MANIPULATION problem. The common flavor in all
our algorithms is the following: we try to devise an extension that is as adversarial as possible for
the favorite candidate c, and if we can make c win in such an extension, then roughly speaking,
such a strategy should work for other extensions as well (where the situation only improves for c).
However, it is challenging to come up with an extension that is globally dominant over all the others
in the sense that we just described. So what we do instead is we consider every potential nemesis
w who might win instead of c, and we build profiles that are "as good as possible" for w and "as
bad as possible" for c. Each such profile leads us to constraints on how much the manipulators can
afford to favor w (in terms of which positions among the manipulative votes are safe for w). We
then typically show that we can determine whether there exists a set of votes that respects these
constraints, either by using a greedy strategy or by an appropriate reduction to a flow problem.
We note that the overall spirit here is similar to the approaches commonly used for solving the
NECESSARY WINNER problem, but as we will see, there are non-trivial differences in the details. We
begin with the k-approval and k-veto voting rules.
Theorem 11. The STRONG MANIPULATION problem is in P for the k-approval and k-veto voting rules,
for any k and any number of manipulators.
Proof. For the time being, we just concentrate on non-manipulators' votes. For each candidate
c(cid:48) ∈ C \ {c}, calculate the maximum possible value of smax
NM (c, c(cid:48)) = sNM(c(cid:48)) − sNM(c) from non-
manipulators' votes, where sNM(a) is the score that candidate a receives from the votes of the
non-manipulators. This can be done by checking all 4 possible score combinations that c and c(cid:48) can
get in each vote v and choosing the one which maximizes sv(c(cid:48)) − sv(c) from that vote. We now fix
the position of c at the top position for the manipulators' votes and we check if it is possible to place
NM (c, c(cid:48))+ sM(c(cid:48))− sM(c)
other candidates in the manipulators' votes such that the final value of smax
is negative which can be solved easily by reducing it to the max flow problem which is polynomial
time solvable.
We now prove that the STRONG MANIPULATION problem for scoring rules is in P for one manip-
ulator.
Theorem 12. The STRONG MANIPULATION problem is in P for any scoring rule when we have only
one manipulator.
27
Proof. For each candidate c(cid:48) ∈ C \ {c}, calculate smax
NM (c, c(cid:48)) using same technique described in
the proof of Theorem 11. We now put c at the top position of the manipulator's vote. For each
candidate c(cid:48) ∈ C \ {c}, c(cid:48) can be placed at positions i ∈ {2, . . . , m} in the manipulator's vote which
NM (c, c(cid:48)) + αi − α1 negative. Using this, construct a bipartite graph with C \ {c} on left and
makes smax
{2, . . . , m} on right and there is an edge between c(cid:48) and i iff the candidate c(cid:48) can be placed at i in
the manipulator's vote according to the above criteria. Now solve the problem by finding existence
of perfect matching in this graph.
Our next result proves that the STRONG MANIPULATION problem for the Bucklin, simplified
Bucklin, Fallback, and simplified Fallback voting rules are in P.
Theorem 13. The STRONG MANIPULATION problem is in P for the Bucklin, simplified Bucklin, Fall-
back, and simplified Fallback voting rules, for any number of manipulators.
Proof. Let (C, P, M, c) be an instance of STRONG MANIPULATION for simplified Bucklin, and let m
denote the total number of candidates in this instance. Recall that the manipulators have to cast
their votes so as to ensure that the candidate c wins in every possible extension of P. We use
Q to denote the set of manipulating votes that we will construct. To begin with, without loss of
generality, the manipulators place c in the top position of all their votes. We now have to organize
the positioning of the remaining candidates across the votes of the manipulators to ensure that c is
a necessary winner of the profile (P, Q).
To this end, we would like to develop a system of constraints indicating the overall number of
times that we are free to place a candidate w ∈ C \ {c} among the top (cid:96) positions in the profile Q.
In particular, let us fix w ∈ C \ {c} and 2 (cid:54) (cid:96) (cid:54) m. Let ηw,(cid:96) be the maximum number of votes of Q
in which w can appear in the top (cid:96) positions. Our first step is to compute necessary conditions for
ηw,(cid:96).
We use Pw,(cid:96) to denote a set of complete votes that we will construct based on the given partial
votes. Intuitively, these votes will represent the "worst" possible extensions from the point of view
of c when pitted against w. These votes are engineered to ensure that the manipulators can make
c win the elections Pw,(cid:96) for all w ∈ C \ {c} and (cid:96) ∈ {2, . . . , m}, if, and only if, they can strongly
manipulate in favor of c. More formally, there exists a voting profile Q of the manipulators so that
c wins the election Pw,(cid:96) ∪ Q, for all w ∈ C \ {c} and (cid:96) ∈ {2, . . . , m} if and only if c wins in every
extension of the profile P ∪ Q.
We now describe the profile Pw,(cid:96). The construction is based on the following case analysis,
where our goal is to ensure that, to the extent possible, we position c out of the top (cid:96) − 1 positions,
and incorporate w among the top (cid:96) positions.
(cid:66) Let v ∈ P be such that either c and w are incomparable or w (cid:31) c. We add the complete vote
v(cid:48) to Pw,(cid:96), where v(cid:48) is obtained from v by placing w at the highest possible position and c at
the lowest possible position, and extending the remaining vote arbitrarily.
(cid:66) Let v ∈ P be such that c (cid:31) w, but there are at least (cid:96) candidates that are preferred over w in
v. We add the complete vote v(cid:48) to Pw,(cid:96), where v(cid:48) is obtained from v by placing c at the lowest
possible position, and extending the remaining vote arbitrarily.
(cid:66) Let v ∈ P be such that c is forced to be within the top (cid:96) − 1 positions, then we add the
complete vote v(cid:48) to Pw,(cid:96), where v(cid:48) is obtained from v by first placing w at the highest possible
position followed by placing c at the lowest possible position, and extending the remaining
vote arbitrarily.
28
(cid:66) In the remaining votes, notice that whenever w is in the top (cid:96) positions, c is also in the top
(cid:96) − 1 positions. Let P∗
w,(cid:96) denote this set of votes, and let t be the number of votes in P∗
w,(cid:96).
We now consider two cases. Let d(cid:96)(c) be the number of times c is placed in the top (cid:96) − 1 positions
in the profile Pw,(cid:96) ∪ Q, and let d(cid:96)(w) be the number of times w is placed in the top (cid:96) positions in
the profile Pw,(cid:96). Let us now formulate the requirement that in Pw,(cid:96) ∪ Q, the candidate c does not
have a majority in the top (cid:96) − 1 positions and w does have a majority in the top (cid:96) positions. Note
that if this requirement holds for any w and (cid:96), then strong manipulation is not possible. Therefore,
to strongly manipulate in favor of c, we must ensure that for every choice of w and (cid:96), we are able
to negate the conditions that we derive.
The first condition from above simply translates to d(cid:96)(c) (cid:54) n/2. The second condition amounts
to requiring first, that there are at least n/2 votes where w appears in the top (cid:96) positions, that is,
d(cid:96)(w) + ηw,(cid:96) + t > n/2. Further, note that the gap between d(cid:96)(w) + ηw,(cid:96) and majority will be filled
by using votes from P∗
w,(cid:96) to "push" w forward. However, these votes contribute equally to w and
c being in the top (cid:96) and (cid:96) − 1 positions, respectively. Therefore, the difference between d(cid:96)(w) +
ηw,(cid:96) and n/2 must be less than the difference between d(cid:96)(c) and n/2. Summarizing, the following
conditions, which we collectively denote by ((cid:63)), are sufficient to defeat c in some extension: d(cid:96)(c) (cid:54)
n/2, d(cid:96)(w) + ηw,(cid:96) + t > n/2, n/2 − d(cid:96)(w) + ηw,(cid:96) < n/2 − d(cid:96)(c).
From the manipulator's point of view, the above provides a set of constraints to be satisfied as
they place the remaining candidates across their votes. Whenever d(cid:96)(c) > n/2, the manipulators
place any of the other candidates among the top (cid:96) positions freely, because c already has majority.
On the other hand, if d(cid:96)(c) (cid:54) n/2, then the manipulators must respect at least one of the following
constraints: ηw,(cid:96) (cid:54) n/2 − t − d(cid:96)(w) and ηw,(cid:96) (cid:54) d(cid:96)(c) − d(cid:96)(w).
Extending the votes of the manipulator while respecting these constraints (or concluding that
this is impossible to do) can be achieved by a natural greedy strategy -- construct the manipulators'
votes by moving positionally from left to right. For each position, consider each manipulator and
populate her vote for that position with any available candidate. We output the profile if the process
terminates by completing all the votes, otherwise, we say NO.
We now argue the proof of correctness. Suppose the algorithm returns NO. This implies that
there exists a choice of w ∈ C \ {c} and (cid:96) ∈ {2, . . . , m} such that for any voting profile Q of the
manipulators, the conditions in ((cid:63)) are satisfied. (Indeed, if there exists a voting profile that violated
at least one of these conditions, then the greedy algorithm would have discovered it.) Therefore,
no matter how the manipulators cast their vote, there exists an extension where c is defeated. In
particular, for the votes in P \ P∗
w,(cid:96), this extension is given by Pw,(cid:96). Further, we choose n/2 − ηw,(cid:96) −
d(cid:96)(w) votes among the votes in P∗
w,(cid:96) and extend them by placing w in the top (cid:96) positions (and
extending the rest of the profile arbitrary). We extend the remaining votes in P∗
w,(cid:96) by positioning
w outside the top (cid:96) positions. Clearly, in this extension, c fails to achieve majority in the top (cid:96) − 1
positions while w does achieve majority in the top (cid:96) positions.
On the other hand, if the algorithm returns YES, then consider the voting profile of the manipu-
lators. We claim that c wins in every extension of P ∪ Q. Suppose, to the contrary, that there exists
an extension R and a candidate w such that the simplified Bucklin score of c is no more than the
simplified Bucklin score of w in R. In this extension, therefore, there exists (cid:96) ∈ {2, . . . , m} for which
w attains majority in the top (cid:96) positions and c fails to attain majority in the top (cid:96) − 1 positions.
However, note that this is already impossible in any extension of the profile Pw,l ∪ P∗
w,(cid:96), because
of the design of the constraints. By construction, the number of votes in which c appears in the top
(cid:96) − 1 positions in R is only greater than the number of times c appears in the top (cid:96) − 1 positions in
29
any extension of Pw,l ∪ P∗
w,(cid:96) (and similarly for w). This leads us to the desired contradiction.
for some w ∈ C \ {c} and (cid:96) < m, then we make ηw,(cid:96) =∞. The proof of correctness for the Bucklin
For the Bucklin voting rule, we do the following modifications to the algorithm. If d(cid:96)(c) > d(cid:96)(w)
voting rule is similar to the proof of correctness for the simplified Bucklin voting rule above.
For Fallback and simplified Fallback voting rules, we consider the number of candidates each
voter approves while computing ηw,(cid:96). We output YES if and only if ηw,(cid:96) (cid:62) 0 for every w ∈ C \ {c}
and every (cid:96) (cid:54) m, since we can assume, without loss of generality, that the manipulator approves
the candidate c only. Again the proof of correctness is along similar lines to the proof of correctness
for the simplified Bucklin voting rule.
We next show that the STRONG MANIPULATION problem for the maximin voting rule is
polynomial-time solvable when we have only one manipulator.
Theorem 14. The STRONG MANIPULATION problem for the maximin voting rules are in P, when we
have only one manipulator.
Proof. For the time being, just concentrate on non-manipulators' votes. Using the algorithm for
NW for maximin in [XC11], we compute for all pairs w, w(cid:48) ∈ C, N(w,w(cid:48))(w, d) and N(w,w(cid:48))(c, w(cid:48))
for all d ∈ C \ {c}. This can be computed in polynomial time. Now we place c at the top position
in the manipulator's vote and increase all N(w,w(cid:48))(c, w(cid:48)) by one. Now we place a candidate w at
the second position if for all w(cid:48) ∈ C, N(cid:48)
(w,w(cid:48))(w, d) < N(w,w(cid:48))(c, w(cid:48)) for all d ∈ C \ {c}, where
N(cid:48)
(w,w(cid:48))(w, d) = N(w,w(cid:48))(w, d) of the candidate d has already been assigned some position in the
manipulator's vote, and N(cid:48)
(w,w(cid:48))(w, d) = N(w,w(cid:48))(w, d) + 1 else. The correctness argument is in the
similar lines of the classical greedy manipulation algorithm of [BITT89].
4.3 Opportunistic Manipulation
For the plurality, Fallback, and simplified Fallback voting rules, it turns out that the voting profile
where all the manipulators approve only c is a c-opportunistic voting profile, and therefore it is
easy to devise a manipulative vote.
Observation 4. The OPPORTUNISTIC MANIPULATION problem is in P for the plurality and Fallback
voting rules for a any number of manipulators.
For the veto voting rule, however, a more intricate argument is needed, that requires building
a system of constraints and a reduction to a suitable instance of the maximum flow problem in a
network, to show polynomial time tractability of OPPORTUNISTIC MANIPULATION.
Theorem 15. The OPPORTUNISTIC MANIPULATION problem is in P for the veto voting rule for a
constant number of manipulators.
Proof. Let (P, (cid:96), c) be an input instance of OPPORTUNISTIC MANIPULATION. We may assume without
loss of generality that the manipulators approve c. We view the voting profile of the manipulators
as a tuple (na)a∈C\{c} ∈ (N ∪ {0})m−1 with
a∈C\{c} na = (cid:96), where the na many manipulators
disapprove a. We denote the set of such tuples as T and we have T = O((2m)(cid:96)) which is poly-
nomial in m since (cid:96) is a constant. A tuple (na)a∈C\{c} ∈ T is not c-optimal if there exists another
a)a∈C\{c} ∈ T and an extension P of P with the following properties. We denote the veto
tuple (n(cid:48)
score of a candidate from P by s(·). For every candidate a ∈ C \ {c}, we define two quantities w(a)
and d(a) as follows.
(cid:80)
30
(cid:66) s(c) > s(a) for every a ∈ C \ {c} with na = n(cid:48)
(cid:66) s(c) > s(a)−n(cid:48)
a for every a ∈ C\{c} with na (cid:62) n(cid:48)
a = 0 and we define w(a) = s(c) − 1, d(a) = 0
a and we define w(a) = s(c)−n(cid:48)
a −1, d(a) =
0
(cid:66) s(a) − na (cid:62) s(c) > s(a) − n(cid:48)
a for every a ∈ C \ {c} with na < n(cid:48)
a and we define w(a) =
s(c) − n(cid:48)
a, d(a) = s(a) − na
We guess the value of s(c). Given a value of s(c), we check the above two conditions by reducing
this to a max flow problem instance as follows. We have a source vertex s and a sink t. We have a
vertex for every a ∈ C (call this set of vertices Y) and a vertex for every vote v ∈ P (call this set of
vertices X). We add an edge from s to each in X of capacity one. We add an edge of capacity one
from a vertex x ∈ X to a vertex y ∈ Y if the candidate corresponding to the vertex y can be placed
at the last position in an extension of the partial vote corresponding to the vertex x. We add an
edge from a vertex y to t of capacity w(a), where a is the voter corresponding to the vertex y. We
also set the demand of every vertex y d(a) (that is the total amount of flow coming into vertex y
must be at least d(a)), where a is the voter corresponding to the vertex y. Clearly, the above three
conditions are met if and only if there is a feasible P amount of flow in the above flow graph. Since
s(c) can have only P + 1 possible values (from 0 to P) and T = O((2m)(cid:96)), we can iterate over
all possible pairs of tuples in T and all possible values of s(c) and find a c-optimal voting profile if
there exists a one.
5 Conclusion
We revisited many settings where the complexity barrier for manipulation was non-existent, and
studied the problem under an incomplete information setting. Our results present a fresh perspec-
tive on the use of computational complexity as a barrier to manipulation, particularly in cases that
were thought to be dead-ends (because the traditional manipulation problem was polynomially
solvable). To resurrect the argument of computational hardness, we have to relax the model of
complete information, but we propose that the incomplete information setting is more realistic,
and many of our hardness results work even with very limited incompleteness of information.
Our work is likely to be the starting point for further explorations. To begin with, we leave
open the problem of completely establishing the complexity of strong, opportunistic, and weak
manipulations for all the scoring rules. Other fundamental forms of manipulation and control do
exist in voting, such as destructive manipulation and control by adding candidates. It would be
interesting to investigate the complexity of these problems in a partial information setting.
Another exciting direction is the study of average case complexity, as opposed to the worst
case results that we have pursued. These studies have already been carried out in the setting of
complete information [PR06, FP10, Wal10]. Studying the problems that we propose in the average-
case model would reveal further insights on the robustness of the incomplete information setting
as captured by our model involving partial orders.
Our results showed that the impact of paucity of information on the computational complexity
of manipulation crucially depends on the notion of manipulation under consideration. We also ar-
gued that different notions of manipulation may be applicable to different situations, maybe based
of how optimistic (or pessimistic) the manipulators are. One important direction of future research
31
is to run extensive experimentations on real and synthetic data to know how people manipulate in
the absence of complete information.
Acknowledgement
Palash Dey wishes to gratefully acknowledge support from Google India for providing him with a
special fellowship for carrying out his doctoral work. Neeldhara Misra acknowledges support by
the INSPIRE Faculty Scheme, DST India (project IFA12-ENG-31).
References
[BBF10]
Yoram Bachrach, Nadja Betzler, and Piotr Faliszewski. Probabilistic possible winner
determination. In International Conference on Artificial Intelligence (AAAI), volume 10,
pages 697 -- 702, 2010.
[BCE+15] Felix Brandt, Vincent Conitzer, Ulle Endriss, J´erome Lang, and Ariel D Procaccia. Hand-
book of computational social choice, 2015.
[BD09]
Nadja Betzler and Britta Dorn. Towards a dichotomy of finding possible winners in
In Mathematical Foundations of Computer Science
elections based on scoring rules.
(MFCS), pages 124 -- 136. Springer, 2009.
[BFLR12] Dorothea Baumeister, Piotr Faliszewski, J´erome Lang, and Jorg Rothe. Campaigns for
lazy voters: truncated ballots. In International Conference on Autonomous Agents and
Multiagent Systems, AAMAS 2012, Valencia, Spain, June 4-8, 2012 (3 Volumes), pages
577 -- 584, 2012.
[BIO91]
John Bartholdi III and James B. Orlin. Single transferable vote resists strategic voting.
Soc. Choice Welf., 8(4):341 -- 354, 1991.
[BITT89]
John Bartholdi III, C.A. Tovey, and M.A. Trick. The computational difficulty of manip-
ulating an election. Soc. Choice Welf., 6(3):227 -- 241, 1989.
[BNW11] Nadja Betzler, Rolf Niedermeier, and Gerhard J Woeginger. Unweighted coalitional
In IJCAI, volume 11, pages 55 -- 60,
manipulation under the borda rule is NP-hard.
2011.
[BRR11]
Dorothea Baumeister, Magnus Roos, and Jorg Rothe. Computational complexity of
two variants of the possible winner problem. In The 10th International Conference on
Autonomous Agents and Multiagent Systems (AAMAS), pages 853 -- 860, 2011.
[BRR+12] Dorothea Baumeister, Magnus Roos, Jorg Rothe, Lena Schend, and Lirong Xia. The
possible winner problem with uncertain weights. In ECAI, pages 133 -- 138, 2012.
[BS09]
Steven J Brams and M Remzi Sanver. Voting systems that combine approval and pref-
erence. In The mathematics of preference, choice and order, pages 215 -- 237. Springer,
2009.
32
[CLMM10] Yann Chevaleyre, J´erome Lang, Nicolas Maudet, and J´erome Monnot. Possible winners
In Proc. International
when new candidates are added: The case of scoring rules.
Conference on Artificial Intelligence (AAAI), 2010.
[CSL07]
Vincent Conitzer, Tuomas Sandholm, and J´erome Lang. When are elections with few
candidates hard to manipulate? J. ACM, 54(3):14, 2007.
[CWX11]
[Dey15]
Vincent Conitzer, Toby Walsh, and Lirong Xia. Dominating manipulations in voting
with partial information. In International Conference on Artificial Intelligence (AAAI),
volume 11, pages 638 -- 643, 2011.
Palash Dey. Computational complexity of fundamental problems in social choice theory.
In Proc. 2015 International Conference on Autonomous Agents and Multiagent Systems,
pages 1973 -- 1974. International Foundation for Autonomous Agents and Multiagent
Systems, 2015.
[DKNW11] Jessica Davies, George Katsirelos, Nina Narodytska, and Toby Walsh. Complexity of
and algorithms for borda manipulation. In Proc. International Conference on Artificial
Intelligence (AAAI), pages 657 -- 662, 2011.
[DL13]
Ning Ding and Fangzhen Lin. Voting with partial information: what questions to ask?
In Proc. 12th International Conference on Autonomous Agents and Multi-agent Systems
(AAMAS), pages 1237 -- 1238. International Foundation for Autonomous Agents and
Multiagent Systems, 2013.
[DMN15a] Palash Dey, Neeldhara Misra, and Y. Narahari. Detecting possible manipulators in
elections. In Proc. 2015 International Conference on Autonomous Agents and Multiagent
Systems, AAMAS 2015, Istanbul, Turkey, May 4-8, 2015, pages 1441 -- 1450, 2015.
[DMN15b] Palash Dey, Neeldhara Misra, and Y. Narahari. Kernelization complexity of possi-
In Proc. 2015 Interna-
ble winner and coalitional manipulation problems in voting.
tional Conference on Autonomous Agents and Multiagent Systems, AAMAS 2015, Istan-
bul, Turkey, May 4-8, 2015, pages 87 -- 96, 2015.
[DMN16]
Palash Dey, Neeldhara Misra, and Y. Narahari. Kernelization complexity of possible
winner and coalitional manipulation problems in voting. Theor. Comput. Sci., 616:111 --
125, 2016.
[DN14]
[DN15]
[EE12]
Palash Dey and Y Narahari. Asymptotic collusion-proofness of voting rules: the case
of large number of candidates. In Proc. 13th International Conference on Autonomous
Agents and Multiagent Systems (AAMAS), pages 1419 -- 1420. International Foundation
for Autonomous Agents and Multiagent Systems, 2014.
Palash Dey and Y Narahari. Asymptotic collusion-proofness of voting rules: The case
of large number of candidates. Studies in Microeconomics, 3(2):120 -- 139, 2015.
Edith Elkind and G´abor Erd´elyi. Manipulation under voting rule uncertainty. In Proc.
11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS),
pages 627 -- 634. International Foundation for Autonomous Agents and Multiagent Sys-
tems, 2012.
33
[ER91]
Eithan Ephrati and Jeffrey S Rosenschein. The Clarke tax as a consensus mechanism
among automated agents. In Proc. Ninth International Conference on Artificial Intelli-
gence (AAAI), pages 173 -- 178, 1991.
[FHH10]
Piotr Faliszewski, Edith Hemaspaandra, and Lane A Hemaspaandra. Using complexity
to protect elections. Commun ACM, 53(11):74 -- 82, 2010.
[FHHR09] Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra, and Jorg Rothe. Llull
and copeland voting computationally resist bribery and constructive control. J. Artif.
Intell. Res., 35:275 -- 341, 2009.
[FHS08]
[FHS10]
[FKN08]
[FKS03]
[FP10]
[Gib73]
[GJ79]
Piotr Faliszewski, Edith Hemaspaandra, and Henning Schnoor. Copeland voting: Ties
In Proc. 7th International Conference on Autonomous Agents and Multiagent
matter.
Systems (AAMAS), pages 983 -- 990. International Foundation for Autonomous Agents
and Multiagent Systems, 2008.
Piotr Faliszewski, Edith Hemaspaandra, and Henning Schnoor. Manipulation of
In Proc. 9th International Conference on Autonomous Agents
copeland elections.
and Multiagent Systems (AAMAS), pages 367 -- 374. International Foundation for Au-
tonomous Agents and Multiagent Systems, 2010.
Ehud Friedgut, Gil Kalai, and Noam Nisan. Elections can be manipulated often.
In
IEEE 49th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages
243 -- 249. IEEE, 2008.
Ronald Fagin, Ravi Kumar, and D. Sivakumar. Efficient similarity search and classifi-
cation via rank aggregation. In Proc. 2003 ACM SIGMOD International Conference on
Management of Data, SIGMOD '03, pages 301 -- 312, New York, NY, USA, 2003. ACM.
Piotr Faliszewski and Ariel D Procaccia. Ai's war on manipulation: Are we winning?
AI Magazine, 31(4):53 -- 64, 2010.
Allan Gibbard. Manipulation of voting schemes: a general result. Econometrica, pages
587 -- 601, 1973.
Michael R Garey and David S Johnson. Computers and Intractability, volume 174.
freeman New York, 1979.
[GNNW14] Serge Gaspers, Victor Naroditskiy, Nina Narodytska, and Toby Walsh. Possible and
In Proc. 13th International Conference on
necessary winner problem in social polls.
Autonomous Agents and Multiagent Systems (AAMAS), pages 613 -- 620. International
Foundation for Autonomous Agents and Multiagent Systems, 2014.
[IKM12] M. Isaksson, G. Kindler, and E. Mossel. The geometry of manipulation - a quantitative
proof of the gibbard-satterthwaite theorem. Combinatorica, 32(2):221 -- 250, 2012.
[KL05]
Kathrin Konczak and J´erome Lang. Voting procedures with incomplete preferences. In
Proc. International Joint Conference on Artificial Intelligence-05 Multidisciplinary Work-
shop on Advances in Preference Handling, volume 20, 2005.
34
[McG53]
David C McGarvey. A theorem on the construction of voting paradoxes. Econometrica,
pages 608 -- 610, 1953.
[ML15]
[NW14]
[PHG00]
[PR06]
[PR07]
[Sat75]
[Wal10]
[Wal11]
[XC08a]
[XC08b]
[XC11]
Vijay Menon and Kate Larson. Complexity of manipulation in elections with partial
votes. CoRR, abs/1505.05900, 2015.
Nina Narodytska and Toby Walsh. The computational impact of partial votes on strate-
In Proc. 21st European Conference on Artificial Intelligence, 18-22 August
gic voting.
2014, Prague, Czech Republic - Including Prestigious Applications of Intelligent Systems
(PAIS 2014), pages 657 -- 662, 2014.
David M. Pennock, Eric Horvitz, and C. Lee Giles. Social choice theory and recom-
mender systems: Analysis of the axiomatic foundations of collaborative filtering.
In
Proc. Seventeenth National Conference on Artificial Intelligence and Twelfth Conference
on on Innovative Applications of Artificial Intelligence, July 30 - August 3, 2000, Austin,
Texas, USA., pages 729 -- 734, 2000.
Ariel D Procaccia and Jeffrey S Rosenschein. Junta distributions and the average-
case complexity of manipulating elections. In Proc. Fifth International Conference on
Autonomous Agents and Multiagent Systems (AAMAS), pages 497 -- 504. ACM, 2006.
Ariel D. Procaccia and Jeffrey S. Rosenschein. Average-case tractability of manipulation
in voting via the fraction of manipulators. In Proc. 6th International Joint Conference
on Autonomous Agents and Multiagent Systems (AAMAS 2007), Honolulu, Hawaii, USA,
May 14-18, 2007, page 105, 2007.
Mark Allen Satterthwaite. Strategy-proofness and Arrow's conditions: Existence and
correspondence theorems for voting procedures and social welfare functions. J. Econ.
Theory, 10(2):187 -- 217, 1975.
Toby Walsh. An empirical study of the manipulability of single transferable voting. In
Proc. 19th European Conference on Artificial Intelligence (ECAI), pages 257 -- 262, 2010.
Toby Walsh. Where are the hard manipulation problems? J. Artif. Intell. Res., pages
1 -- 29, 2011.
Lirong Xia and Vincent Conitzer. Generalized scoring rules and the frequency of coali-
tional manipulability. In Proc. 9th ACM conference on Electronic Commerce (EC), pages
109 -- 118. ACM, 2008.
Lirong Xia and Vincent Conitzer. A sufficient condition for voting rules to be frequently
manipulable. In Proc. 9th ACM conference on Electronic Commerce (EC), pages 99 -- 108.
ACM, 2008.
Lirong Xia and Vincent Conitzer. Determining possible and necessary winners under
common voting rules given partial orders. volume 41, pages 25 -- 67. AI Access Founda-
tion, 2011.
35
[XZP+09] Lirong Xia, Michael Zuckerman, Ariel D Procaccia, Vincent Conitzer, and Jeffrey S
Rosenschein. Complexity of unweighted coalitional manipulation under some common
voting rules. In Proc. 21st International Joint Conference on Artificial Intelligence (IJCAI),
volume 9, pages 348 -- 352, 2009.
36
|
1911.07290 | 1 | 1911 | 2019-10-31T02:30:45 | Dynamic Conflict Resolution Using Justification Based Reasoning | [
"cs.MA",
"cs.LO"
] | We study conflict situations that dynamically arise in traffic scenarios, where different agents try to achieve their set of goals and have to decide on what to do based on their local perception. We distinguish several types of conflicts for this setting. In order to enable modelling of conflict situations and the reasons for conflicts, we present a logical framework that adopts concepts from epistemic and modal logic, justification and temporal logic. Using this framework, we illustrate how conflicts can be identified and how we derive a chain of justifications leading to this conflict. We discuss how conflict resolution can be done when a vehicle has local, incomplete information, vehicle to vehicle communication (V2V) and partially ordered goals. | cs.MA | cs | Dynamic Conflict Resolution Using Justification Based
Reasoning∗
Werner Damm Martin Fränzle Willem Hagemann
Paul Kröger Astrid Rakow
Department of Computing Science, University of Oldenburg, Germany
{werner.damm, martin.fraenzle, willem.hagemann, paul.kroeger, a.rakow}@uol.de
We study conflict situations that dynamically arise in traffic scenarios, where different agents try
to achieve their set of goals and have to decide on what to do based on their local perception. We
distinguish several types of conflicts for this setting. In order to enable modelling of conflict situations
and the reasons for conflicts, we present a logical framework that adopts concepts from epistemic and
modal logic, justification and temporal logic. Using this framework, we illustrate how conflicts can
be identified and how we derive a chain of justifications leading to this conflict. We discuss how
conflict resolution can be done when a vehicle has local, incomplete information, vehicle to vehicle
communication (V2V) and partially ordered goals.
1 Introduction
As humans are replaced by autonomous systems, such systems must be able to interact with each other
and resolve dynamically arising conflicts. Examples of such conflicts arise when a car wants to enter the
highway in dense traffic or simply when a car wants to drive faster than the preceding. Such "conflicts"
are pervasive in road traffic and although traffic rules define a jurisdictional frame, the decision, e.g.,
to give way, is not uniquely determined but influenced by a list of prioritised goals of each system and
the personal preferences of its user. If it is impossible to achieve all goals simultaneously, autonomous
driving systems (ADSs) have to decide "who" will "sacrifice" what goal in order to decide on their
manoeuvres. Matters get even more complicated when we take into account that the ADS has only partial
information. It perceives the world via sensors of limited reach and precision. Moreover, measurements
can be contradicting. An ADS might use V2V to retrieve more information about the world, but it
inevitably has a confined insight to other traffic participants and its environment. Nevertheless, for the
acceptance of ADSs, it is imperative to implement conflict resolution mechanisms that take into account
the high dimensionality of decision making. These decisions have to be explained and in case of an
incident, the system's decisions have to be accountable.
In this paper we study conflict situations as dynamically occurring in road traffic and develop a
formal notion of conflict between two agents. We distinguish several types of conflicts and propose a
conflict resolution process where the different kinds of conflicts are resolved in an incremental fashion.
This process successively increases the required cooperation and decreases the privacy of the agents,
finally negotiating which goals of the two agents have to be sacrificed. We present a logical framework
enabling the analysis of conflicts. This framework borrows from epistemic and modal logic in order to
accommodate the bookkeeping of evidences used during a decision process. The framework in particular
∗This work is partly supported by the German Research Council (DFG) as part of the PIRE SD-SSCPS project (Science
of Design of Societal Scale CPS, grant no. DA 206/11-1, FR 2715/4-1) and the Research Training Group SCARE (System
Correctness under Adverse Conditions, grant no. DFG GRK 1765).
G. Caltais and J. Krivine (eds.): CREST 2019
EPTCS 308, 2019, pp. 47 -- 65, doi:10.4204/EPTCS.308.4
c(cid:13) W. Damm, M. Fränzle, W. Hagemann, P. Kröger and A. Rakow
This work is licensed under the
Creative Commons Attribution License.
48
Dynamic Conflict Resolution
provides a mean to summarise consistent evidences and keep them apart from inconsistent evidences.
We hence can, e.g., fuse compatible perceptions into a belief b about the world and fuse another set of
compatible perceptions to a belief b(cid:48) and model decisions that take into account that b might contradict
b(cid:48). Using the framework we illustrate how conflicts can be explained and algorithmically analysed as
required for our conflict resolution process. Finally we report on a small case study using a prototype
implementation (employing the Yices SMT solver [14]) of the conflict resolution algorithm. We discuss
related work in Sect. 5. In particular we discuss work regarding the notion of traffic conflict and relate
our works with work on the perimeter in game theory [10] and strategy synthesis for levels of cooperation
like [11, 7].
Outline
In Sect. 2 we introduce the types of conflict on a running example and develop a formal notion
of conflict between two agents. We elaborate on the logical foundations for modelling and analysing
conflicts and the logical framework itself in Sect. 3. We sketch our case study on conflict analysis
in Sect. 4 and outline in Sect. 4.2 an algorithm for analysing conflict situations as requested by our
resolution protocol and for deriving explanation of the conflict for the resolution. Before drawing the
conclusions in Sect. 6, we discuss related work in Sect. 5.
2 Conflict
Already in 1969 in the paper "Violence, Peace and Peace Research" [18] J. Galtung presents his theory
of the Conflict Triangle, a framework used in the study of peace and conflict. Following this theory a
conflict comprises three aspects: opposing actions, incompatible goals, inconsistent beliefs (regarding
the reasons of the conflict, knowledge of the conflict parties,. . . ).
We focus on conflicts that arise dynamically between two agents in road traffic. We develop a char-
acterisation of conflict as a situation where one agent can accomplish its goals with the help of the other,
but both agents cannot accomplish all their goals simultaneously and the agents have to decide what to
do based on their local beliefs. In Sect. 2.1 we formalise our notion of conflict. For two agents with
complete information, we may characterise a conflict as: Agents A and B are in conflict, if 1. A would
accomplish its set of goals ΦA, if B will do what A requests, while 2. B would accomplish its set of
goals ΦB, if A will do what B requests, and 3. it is impossible to accomplish the set of goals ΦA ∪ ΦB.
A situation where A and B both compete to consume the same resource is thus an example of a conflict
situation. Since we study conflicts from the view-point of an agent's beliefs, we also consider believed
conflicts, which can be resolved by sharing information regarding the others observations, strategies or
goals. To resolve a conflict we propose a sequence of steps that require an increasing level of cooperation
and decreasing level of privacy -- the steps require to reveal information or to constrain acting options.
Our resolution process defines the following steps:
(C1) Shared situational awareness
(C2) Sharing strategies
(C3) Sharing goals
(C4) Agreeing on which goals to sacrifice and which strategy to follow
Corresponding to (C1) to (C4), we introduce different kinds of conflicts on a running example -- a two
lane highway, where one car, A, is heading towards an obstacle at its lane and at the lane to its left a fast
car, B, is approaching from behind (cf. Fig. 1). An agent has a prioritised list of goals (like 1. "collision-
freedom", 2."changing lane" and 3. "driving fast"). We assume that an agent's goals are achievable.
W. Damm, M. Fränzle, W. Hagemann, P. Kröger and A. Rakow
49
Figure 1: Car A wants to circumvent the
obstacle (grey box). Car B is approaching
from behind.
An agent A has a set of actions actA and exists within a world. At a time the world has a certain
state. The world "evolves" (changes state) as determined by the chosen actions of the agents within the
world and events determined by the environment within the world. The agent perceives the world only
via a set of observation predicates, that are predicates whose valuation is determined by an observation
of the agent. Without an observation the agent has no (direct) evidence for the valuation of the respective
observation predicate.
Example 1. Let car A want to change lane. It perceives that it is on a two lane highway, the way ahead
is free for the next 500 m and B is approaching. Let A perceive B's speed via radar. That is A makes the
observation car B is fast justified by the evidence radar. We annotate this briefly as radar:car B
is fast. Further let A derive from lidar data that B is slow -- lidar:car B is slow.
In this situation we say agent A has contradicting evidences. Certain evidences can be combined
without contradiction and others not. We assume that an agent organises its evidences in maximal con-
sistent sets (i.e., justification graphs of Sect. 3), where each represents a set of possible worlds:
Example 2. There are possible worlds of A where it is on a two lane highway, the way ahead is free for
the next 500 m and B is slowly approaching. Analogously A considers possible worlds where B is fast.
The state of the world outside of its sensors' reach is unconstrained.
Observing the world (for some time), an agent A assesses what it can do to achieve its goals in all
possible worlds. That is, A tries to find a strategy that guarantees to achieve its goals in all its possible
worlds. A strategy determines at each state the action of the agent -- the agent decides for an action based
on its believed past. If there is one such strategy for A to accomplish its goals ΦA, then A has a (believed)
winning strategy for ΦA. This strategy might not be winning in the "real" world though, e.g., due to
misperceptions.
Example 3. Let A want to drive slowly and comfortably. A wants to avoid collisions and it assumes that
also B wants to avoid collisions. Although A has contradicting evidences on the speed of B and hence
believes that it is possible that "B is fast" and also that "B is slow", it can follow the strategy to stay at
its lane and wait until B has passed. This strategy is winning in all of A's possible worlds.
Even when A has no believed winning strategy, it can have a winning strategy for a subset of possible
worlds. Additional information on the state of world might resolve the conflict by eliminating possible
worlds. We call such conflicts observation-resolvable conflicts.
Example 4. Let A want to change lane to circumvent the obstacle. It is happy to change directly after B
but only if B is fast. If B is slow, it prefers to change before B passed. Further let A have contradicting
evidences on the speed of B. A considers a conflict with B possible in some world and hence has no
believed winning strategy. Now it has to resolve its inconsistent beliefs. Let B tell A, it is fast, and A trust
B more than its own sensors, then A might update its beliefs by dismissing all worlds where B is slow.
Then "changing after B passed" becomes a believed winning strategy.
In case of inconsistent evidences, as above, A has to decide how to update its beliefs. The decision
how to update its beliefs will be based on the analysis of justifications (cf. Sect. 3) of (contradicting)
evidences. The lidar contradicts the radar and B reports on its speed. Facing the contradiction of
evidences justified by lidar and radar A trusts the evidence justified by B.
AB50
Dynamic Conflict Resolution
Let the agents already have exchanged observations and A still have no believed winning strategy. A
conflict might be resolved by communicating part of the other agent's (future) strategy:
Example 5. Let A want to change lane. It prefers to change directly after B, if B passes A fast. Otherwise,
A wants to change in front of B. Let B so far away that B might decelerate, in which case it might slow
down so heavily that A would like to change in front of B even if B currently is fast.
Let A believe "B is fast". Now A has no believed winning strategy, as B might decelerate. According
to (C2), information about parts of the agent's strategies are now communicated. A asks B whether it
plans to decelerate. Let B be cooperative and tell A that it will not decelerate. Then A can dismiss all
worlds where B slows down and "changing after B passed" becomes a believed winning strategy for A.
Let the two agents have performed steps (C1) and (C2), i.e., they exchanged missing observations
and strategy parts, and still A has no winning strategy for all possible worlds.
Example 6. Let now, in contrast to Ex. 5, B not tell A whether it will decelerate. Then step (C3) is
performed. So A asks B to respect A's goals. Since A prefers B to be fast and B agrees to adopt A's goal
as its own, A can again dismiss all worlds where B slows down.
Here the conflict is resolved by communicating goals and the agreement to adopt the other's goals.
So an agent's strategy might change in order to support the other agent. We call this kind of conflicts
goal-disclosure-resolvable conflicts.
The above considered conflicts can be resolved by some kind of information exchange between the
two agents, so that the sets of an agent's possible worlds is adapted and in the end all goals ΦA of A and
ΦB of B are achievable in all remaining possible worlds. The price to pay for conflict resolution is that
the agents will have to reveal information. Still there are cases where simply not all goals are (believed to
be) achievable. In this case A and B have to negotiate which goals ΦAB ⊆ ΦA∪ΦB shall be accomplished.
While some goals may be compatible, other goals are conflicting. We hence consider goal subsets ΦAB
for which a combined winning strategy for A and B exists. We assume that there is a weight assignment
function w that assigns a value to a given goal combination 2ΦA∪ΦB → N based on which decision for
a certain goal combination is taken. This weighting of goals reflects the relative value of goals for the
individual agents. Such a function will have to reflect, e.g., moral, ethics and jurisdiction.
Example 7. Let A's and B's highest priority goal be collision-freedom, reflected in goals ϕA,col and
ϕB,col. Further let A want to go fast ϕA, f ast and change lane immediately ϕA,lc. Let also B want to go fast
ϕB, f ast, so that A cannot change immediately. Now in step (C4) A and B negotiate what goals shall be
accomplished. In our scenario collision-freedom is valued most, and B's goals get priority over A's, since
B is on the fast lane. Hence our resolution is to agree on a strategy accomplishing {ϕA,col,ϕB,col,ϕB, f ast},
which is the set of goals having the highest value among all those for which a combined winning strategy
exists.
Note that additional agents are captured as part of the environment here. At each step an agent can
also decide to negotiate with some other agent than B in order to resolve its conflict.
2.1 Formal Notions
In the following we introduce basic notions to define a conflict. Conflicts, as introduced above, arise in a
wide variety of system models, but we consider in this paper only a propositional setting.
Let f1 : X → Y1,. . . , fn : X → Yn, and f : X → Y1× . . .×Yn be functions. We will write f = ( f1, . . . , fn)
if and only if f (x) = ( f1(x), . . . , fn(x)) for all x ∈ X. Note that for any given f as above the decomposition
into its components fi is uniquely determined by the projections of f onto the corresponding codomain.
W. Damm, M. Fränzle, W. Hagemann, P. Kröger and A. Rakow
51
Each agent A has a set of actions AA. The sets of actions of two agents are disjoint. To formally
define a (possible) world model of an agent A, let S be a set of states and V be a set of propositional
variables. A believes at a state s ∈ S that a subset V of V is true and V\V is false. A (possible) world
model M for an agent A is a transition system over S with designated initial state and current state, all
states are labelled with the belief propositions that hold at that state and transitions labeled with actions
(cid:104)actA,actB,actEnv(cid:105) where actA ∈ AA is an action of A, actB ∈ AB an action of B and actEnv ∈ AEnv an
action of the environment. The set of actions of an agent includes send and receive actions via which
information can be exchanged, the environment guarantees to transmit a send message to the respective
receiver. Formally a possible world is MA = (S,T,λ ,π,s∗,sc) with T ⊆ S× S, λ : T → AA × AB × AEnv,
π : S → 2V and s∗,sc ∈ S representing the initial state and the current state respectively. We use MA
to encode the current believes on the present, past and about the possible futures. If an agent, let us
say A wlog, follows a strategy, it decides for an action based on its believed past, i.e., a strategy for
A is a function δA : (2V)∗ → AA. Given strategies δA : (2V)∗ → AA for A, δB : (2V)∗ → AB for B,
δ = (δA,δB) : (2V)∗ → AA × AB is a common strategy of A and B, which chooses the actions of A
according to δA and the actions of B according to δB.
A (believed) run r = (s0,s1, . . .) is an infinite sequence of states starting with the initial state s0 = s∗
and (si,si+1) ∈ T for all i ∈ N. A run r = (s0,s1, . . .) results from a strategy δA in A's world MA, denoted as
r ∈ r(δA,MA), if and only if λ (si,si+1) = δA(π(s0),π(s1), . . .π(si)) for all i ∈ N. Given a set of possible
worlds M(A) for A, we use r(δA, M(A)) to denote the set of runs that result from δA in a MA ∈ M(A),
r(δA, M(A)) =(cid:83)
MA∈M(A) r(δA,MA).
write r = Φ as shorthand for r =(cid:86)
We use linear-time temporal logic (LTL) to specify goals. For a run r and a goal (or a conjunction of
goals) ϕ we write r = ϕ, if the valuation of propositions along r satisfies ϕ1. We say δ is a (believed)
winning strategy for ϕ in MA, if for all r ∈ r(δ ,MA) it holds that r = ϕ. An agent A has a set of goals
Φ and a weight assignment function wA : 2Φ → N that assigns values to a given goal combination. We
ϕ∈Φ ϕ. We say subgoal Φ(cid:48) ⊆ Φ is maximal for r if r = Φ(cid:48) and
w(Φ(cid:48)) ≥ w(Φ(cid:48)(cid:48)) for all Φ(cid:48)(cid:48) ⊆ Φ with r = Φ(cid:48)(cid:48). true is the empty subgoal. We say Φ(cid:48) ⊆ Φ is maximal for
a set R of runs if for all r ∈ R r = Φ(cid:48) and for all Φ(cid:48)(cid:48) ⊆ Φ with r = Φ(cid:48)(cid:48) for all r ∈ R, w(Φ(cid:48)) ≥ w(Φ(cid:48)(cid:48)).
There is one "special" world model that represents the ground truth, i.e., it reflects how the reality
evolves. We refer the interested reader to [12] for a more elaborate presentation of our concept of reality
and associated beliefs. Agent A considers several worlds possible at a time. At each state s of the real
world A has a set of possible worlds MA(s) and for each world MA ∈ M(A) a believed current state
and beliefs on the goals of B, ΦB(MA) and the goal weight assignment function of B, wB. A possible
world is labeled with the set of evidences that justifies that the world is regarded as possible. The real
world changes states according to the actions of A, B and E. The set of possible worlds MA(s) changes
to MA(s(cid:48)) due to the believed passing of time and due to belief updates triggered by e.g. observations.
For the scope of this paper though, we do not consider the actual passing of time, but study the conflict
analysis at a single state of the real world.
strategy for ΦA in all possible worlds MA ∈ MA(sc).
Definition 1 (Believed Possible Conflict). Let Φmax
which a believed winning strategy (δA,δ(cid:48)
(δA,δ(cid:48)
Agent A believes at state s it is in a possible conflict with B, if for each of its winning strategies
B) : (2VA)∗ → AA × AB for a maximal subgoal ΦA ∈ Φmax
We say that A has a (believed) winning strategy δA for ΦA at the real world state sc if δA is a winning
be the set of maximal subgoals of A at state s for
A
B) : (2VA)∗ → AA × AB in MA exists.
,
A
1cf. Def. 9
52
Dynamic Conflict Resolution
A,δB) : (2VA)∗ → AA × AB and a possible world M ∈ MA such that (δ(cid:48)
winning strategy in M for ΦB, a believed maximal subgoal of the believed goals of B in M.
• there is a strategy (δ(cid:48)
• but (δA,δB) is not a winning strategy for ΦA ∪ ΦB in MA.
A,δB) is a
A
In Def. 1 Φmax
is the set of maximal subgoals that A can achieve in all possible worlds with the help
of B. A believes that B might decide for a strategy to accomplish some of its maximal subgoals and B
takes this decision wrt A's possible worlds. Note that A assuming the goals of B being true means that
A has to deal with arbitrary behaviour of B. Also note that B always has a winning strategy in every M
since ΦB is maximal wrt M. If A cannot find one winning strategy that fits all possible choices of B then
A believes that it is in a conflict with B. Note that A analyses the conflict within its possible worlds MA(s)
and in particular it beliefs that B believes that in one of its possible wolds. That A has got beliefs about
(deviations of) the beliefs of B is an interesting future extension.
3 Epistemic Logic, Justifications and Justification Graph
Conflict analysis demands to know who believes to be in conflict with whom and what pieces of infor-
mation made him belief that he is in conflict. To this end we introduce the logic of justification graphs
that allows to keep track of external information and extends purely propositional formulae by so called
belief atoms (cf. p. 54), which are used to label the sources of information. In Sect. 2 we already used
such formulae, e.g., "radar:car B is fast". Our logic provides several atomic accessibility relations
representing justified beliefs of various sources, as required for our examples of Sect. 2. It provides jus-
tification graphs as a mean to identify belief entities which compose different justifications to consistent
information even when the information base contains contradicting information of different sources, as
required for analysing conflict situations.
First, this section provides a short overview on epistemic modal logics and multi-modal extensions
thereof. Such logics use modal operators to expressing knowledge and belief stemming from different
sources. Often we will refer to this knowledge and belief as information, especially when focusing on the
sources or of the information. Thereupon the basic principles of justifications logics are shortly reviewed.
Justification logics are widely seen as interesting variants to epistemic logics as they allow to trace back
intra-logical and external justifications of derived information. In the following discussion it turns out
that tracing back external justifications follows the same principles as the distribution of information over
different sources.
Consequently, the concept of information source and external justification are then unified in our
variant of an epistemic modal logic. This logic of justification graphs extends the modal logic by a
justification graph. The nodes of a justification graph are called belief entities and represent groups
of consistent information. The leaf nodes of a justification graphs are called belief atoms, which are
information source and external justifications at the same time, as they are the least constituents of
external information. We provide a complete axiomatisation with respect to the semantics of the logic of
justification graphs.
Justification Graphs
3.1
Modal Logic and Epistemic Logic Modal logic extends the classical logic by modal operators ex-
pressing necessity and possibility. The formula (cid:50)φ is read as "φ is necessary" and (cid:51)φ is read as "φ is
possible". The notions of possibility and necessity are dual to each other, (cid:51)φ can be defined as ¬(cid:50)¬φ.
The weakest modal logic K extends propositional logic by the axiom K(cid:50) and the necessitation rule Nec(cid:50)
W. Damm, M. Fränzle, W. Hagemann, P. Kröger and A. Rakow
53
as follows
(K(cid:50))
(cid:96)(cid:50)(φ → ψ) → ((cid:50)φ →(cid:50)ψ),
(Nec(cid:50))
The axiom K(cid:50) ensures that whenever φ → ψ and φ necessarily hold, then also ψ necessarily has to hold.
The necessitation rule Nec(cid:50) allows to infer the necessity of φ from any proof of φ and, hence, pushes
any derivable logical truth into the range of the modal operator(cid:50). This principle is also known as logical
awareness. Various modalities like belief or knowledge can be described by adding additional axioms
encoding the characteristic properties of the respective modal operator. The following two axioms are
useful to model knowledge and belief:
from (cid:96) φ conclude (cid:96)(cid:50)φ.
(cid:96)(cid:50)φ → φ,
(cid:96)(cid:50)φ →(cid:51)φ.
(T(cid:50))
it postulates the weaker property that everything which is necessary is also possible. Under both axioms
(D(cid:50))
The axiom T(cid:50) and D(cid:50) relate necessity with the factual world. While the truth axiom T(cid:50) characterises
knowledge as it postulates that everything which is necessary is also factual, D(cid:50) characterises belief as
(cid:96)(cid:50)⊥ → ⊥ holds, i.e. a necessary contradiction yields also a factual contradiction.
Multi-modal logics are easily obtained by adding several modal operators with possibly different
properties and can be used to express the information of more than one agent. E.g., the formula ei:φ
expresses that the piece of information φ belongs to the modality ei. Modal operators can also be used
to represent modalities referring to time. E.g., in the formula Xφ the temporal modality X expresses that
φ will hold in the next time step. An important representative of a temporal extension is linear temporal
logic (LTL).
In multi-agent logics the notions of common information and distributed information play an im-
portant role. While common knowledge captures the information which is known to every agent ei, we
are mainly interested in information that is distributed within a group of agents E = {e1, . . . ,en}. The
distributed information within a group E contains any piece of information that at least one of the agent
e1, . . . , en has. Consequently, we introduce a set-like notion for groups, where an agent e is identified
with the singleton group {e} and the expression {e1, . . . ,en}:φ is used to denote that φ is distributed
information within the group E. The distribution of information is axiomatised by
(cid:96) E:φ → F:φ, where E is a subgroup of F.
(DistE,F)
Note that groups may not be empty. The modal logic for distributed information contains for every group
E at least the axiom KE, the necessitation rule NecE, and the axiom DistE,F for any group F with E ⊆ F.
Justification Logics
Justification logics [5] are variants of epistemic modal logics where the modal
operators of knowledge and belief are unfolded into justification terms. Hence, justification logics allow
a complete realisation of Plato's characterisation of knowledge as justified true belief. A typical formula
of justification logic has the form s:φ, where s is a justification term built from justification constants,
and it is read as "φ is justified by s". The basic justification logic J0 results from extending propositional
logic by the application axiom and the sum axioms
(cid:96) s:(φ → ψ) → (t:φ → [s·t]:ψ),
(Sum)
where s, t, [s·t], [s +t], and [t +s] are justification terms which are assembled from justification constants
using the operators + and · according to the axioms. Justification logics tie the epistemic tradition
(cid:96) s:φ → [s +t]:φ,
(cid:96) s:φ → [t + s]:φ,
(Appl)
54
Dynamic Conflict Resolution
together with proof theory. Justification terms are reasonable abstractions for constructions of proofs. If
s is a proof of φ → ψ and t is a proof of φ then the application axiom postulates that there is a common
proof, namely s·t, for ψ. Moreover, if we have a proof s for φ and some proof t then the concatenations
of both proofs, s + t and t + s, are still proofs for φ. In our framework we were not able to derive any
meaningful example using the sum axiom of justification logic. Therefore this axiom is omitted in the
following discussion.
Discussion All instances of classical logical tautologies, like A∨¬A and s:A∨¬s:A, are provable in
justification logics. But in contrast to modal logics, justification logics do not have a necessitation rule.
The lack of the necessitation rule allows justification logics to break the principle of logical awareness,
as s:(A∨¬A) is not necessarily provable for an arbitrary justification term s. Certainly, restricting the
principle of logical awareness is attractive to provide a realistic model of restricted logical resources.
Since we are mainly interested in revealing and resolving conflicts, the principle of logical awareness is
indispensable in our approach.
Nevertheless, justification logic can simulate unrestricted logical awareness by adding proper axiom
internalisation rules (cid:96) e:φ for all axioms φ and justification constants e. In such systems a weak variant
of the necessitation rule of modal logic holds: for any derivation (cid:96) φ there exists a justification term t
such that (cid:96) t:φ holds. Since φ was derived using axioms and rules only, also the justification term t is
exclusively built from justification constants dedicated to the involved axioms. Beyond that, t is hardly
informative as it does not help to reveal external causes of a conflict. Hence, we omit the axiom internal-
isation rule and add the modal axiom Kt and the modal necessitation rule Nect for any justification term t
to obtain a justification logic where each justification term is closed under unrestricted logical awareness.
An important consequence of the proposed system is that · becomes virtually idempotent and com-
mutative.2 These insights allows us to argue merely about justification groups instead of justification
terms. It turns out that a proper reformulation of Appl with regard to justification groups is equivalent to
DistE,F, finally yielding the same axiomatisation for distributed information and compound justifications.
Belief Atoms, Belief Groups, and Belief Entities So far, we argued that assembling distributed in-
formation and compound justifications follow the same principle. In the following we even provide a
unified concept for the building blocks of both notions. A belief atom e is the least constituent of ex-
ternal information in our logic. To each e we assign the modal operator e:. Hence, for any formula φ
also e:φ is a formula saying "e has information φ". Belief atoms play different roles in our setting. A
belief atom may represent a sensor collecting information about the state of the world, or it may represent
certain operational rules as well as a certain goal of the system. The characteristic property of a belief
atom is that the information of a belief atom has to be accepted or rejected as a whole. Due to its external
and indivisible nature, e is the only source of evidence for its information. The only justification for
information of e is e itself. Consequently, e:φ can also be read as "e is the justification for φ". This is
what belief atoms and justifications have in common: either we trust a justification or not.
The information of a system is distributed among its belief atoms. The modal logic for distributed
information allows us to consider the information which is distributed over a belief group. While belief
groups can be built arbitrarily from belief atoms, we also introduce the concept of belief entities. A belief
entity is either a belief atom, or a distinguished group of belief entities. Belief entities are dynamically
2For any instance (cid:96) s:(φ → ψ) → (s:φ → [s· s]:ψ) of Appl there is an instance (cid:96) s:(φ → ψ) → (s:φ → s:ψ) of Ks in the
proposed system. Moreover, it is an easy exercise to show that any instance of (cid:96) s:(φ → ψ) → (t:φ → [t · s]:ψ) is derivable in
the proposed system.
W. Damm, M. Fränzle, W. Hagemann, P. Kröger and A. Rakow
55
distinguished by a justification graph. In contrast to belief groups, belief entities and belief atoms are not
allowed to have inconsistent information. Hence a justification graph allows us to restrict the awareness
of extra-logical evidences -- so we can distinctively integrate logical resources that have to be consistent.
Justification Graphs Let V be a set of propositional variables and let E be the set of belief entities.
The designated subset EA of E denotes the set of belief atoms.
Definition 2 (Language of Justification Graphs). A formula φ is in the language of justification graphs
if and only if φ is built according to the following BNF, where A ∈ V and /0 (cid:54)= E ⊆ E:
φ ::= ⊥ A (φ → φ ) E:(φ ) X(φ ) P(φ ) (φ )U(φ ) (φ )S(φ ).
Using the descending sequence of operator precedences (:, ¬, ∨, ∧, →, ↔), we can define the well-
known logical connectives ¬, ∨, ∧ and ↔ from → and ⊥. Often, we omit brackets if the formula is still
uniquely readable. We define → to be right associative. For singleton sets {e} ⊆ E we also write e:φ
instead of {e}:φ. The language allows the usage of temporal operators for next time (X), previous time
(P), until (U), and since (S). Operators like always in the future (G) or always in the past (H) can be
defined from the given ones.
Definition 3 (Justification Graph). A justification graph is a directed acyclic graph G whose nodes are
belief entities of E. An edge e (cid:55)→G f denotes that the belief entity e has the component f . The set of all
direct components of an entity e is defined as G(e) := { f e (cid:55)→G f}.
holds e ∈ EA if and only if G(e) = /0.
Definition 4 (Axioms of a Justification Graph). Let G be a justification graph. The logic of a justification
graph has the following axioms and rules.
(i) As an extension of propositional logic the rule of modus ponens MP has to hold: from (cid:96) φ and
The leaf nodes of a justification graph are populated by belief atoms, i.e. for any belief entity e it
(cid:96) φ → ψ conclude (cid:96) ψ. Any substitution instance of a propositional tautology φ is an axiom.
(ii) Belief groups are closed under logical consequence and follow the principle of logical awareness.
Information is freely distributed along the subgroup-relation. For any belief group E the axiom KE
and the necessitation rule NecE hold. For groups E and F with E ⊆ F the axiom DistE,F holds.
(iii) Belief entities are not allowed to have inconsistent information. Non-atomic belief entities inherit
all information of their components. For any belief entity e the axiom De holds. If E is a subgroup
of the components of e, then the axiom DistE,e holds.
Past-LTL (LTL with past operator). A comprehensive list of axioms can be found in [24].
(iv) In order to express temporal relation the logic for the justification graph includes the axioms of
(v) Information of a belief entity e ∈ E and time are related. The axiom (PRE) : (cid:96) e:Pφ ↔ Pe:φ
ensures that every belief entity e correctly remembers its prior beliefs and establishes a principle
which is also known as perfect recall (e.g., see [17]).
Definition 5 (Proof). Let G be a justification graph. A proof (derivation) of φ in G is a sequence of
formulae φ1, . . . ,φn with φn = φ such that each φi is either an axiom of the justification graph or φi is
obtained by applying a rule to previous members φ j1, . . . ,φ jk with j1, . . . , jk < i. We will write (cid:96)G φ if
and only if such a sequence exists.
Definition 6 (Proof from a set of formulae). Let G be a justification graph and Σ be a set of formulae.
The relation Σ (cid:96)G φ holds if and only if (cid:96)G (σ1 ∧···∧ σk) → φ for some finite subset {σ1, . . . ,σk} ⊆ Σ
with k ≥ 0.
56
Dynamic Conflict Resolution
Definition 7 (Consistency with respect to a justification graph). Let G be a justification graph.
(i) A set Σ of formulae is G-inconsistent if and only if Σ (cid:96)G ⊥. Otherwise, Σ is G-consistent. A formula
(ii) A set Σ of formulae is maximally G-consistent if and only if Σ is G-consistent and for all φ (cid:54)∈ Σ the
φ is G-inconsistent if and only if {φ} is G-inconsistent. Otherwise, φ is G-consistent.
set Σ∪{φ} is G-inconsistent.
Semantics Let S be the state space, that is the set of all possible states of the world. An interpretation
π over S is a mapping that maps each state s to a truth assignment over s, i.e. π(s) ⊆ V is the subset of
all propositional variables which are true in the state s. In Sect. 2 we introduced world models and runs
on world models. There a world model captured the evolution of a states in time.
In this section we focus an the epistemic notions of knowledge and belief and therefore our main
concern is the accessibility relation of information. We hence presume that the set of runs of a possible
world of Sect. 2 is given, that then defines the evolution in time. Formally a run over S is a function r
from the natural numbers (the time domain) to S. The set of all runs is denoted by R.
Definition 8. Let G be a justification graph. A Kripke structure M for G is a tuple M = (S, R,π, ((cid:55)→e)e∈E)
where
(i) S is a state space,
(ii) R is the set of all runs over S,
(iii) π is an interpretation over S,
(iv) each (cid:55)→e in ((cid:55)→e)e∈E is an individual accessibility relation (cid:55)→e⊆ S× S for a belief entity e in E.
Definition 9 (Model for a Justification Graph). Let M = (S, R,π, ((cid:55)→e)e∈E) be a Kripke structure for the
justification graph G, where
(i) (cid:55)→e is a serial relation for any belief entity e ∈ E,
e∈E (cid:55)→e for any belief group E ⊆ E,
(iii) (cid:55)→e ⊆ (cid:55)→E holds for all non-atomic belief entities e ∈ E\ EA and any subgroup E ⊆ G(e).
We recursively define the model relation (M,r(t)) =G φ as follows:
(ii) (cid:55)→E is defined as (cid:55)→E =(cid:84)
(M,r(t)) (cid:54)=G ⊥.
(M,r(t)) =G Q
(M,r(t)) =G φ → ψ :⇐⇒ (M,r(t)) =G φ implies (M,r(t)) =G ψ.
(M,r(t)) =G E:φ
(M,r(t)) =G Xφ
(M,r(t)) =G Pφ
(M,r(t)) =G φUψ
(M,r(t)) =G φSψ
:⇐⇒ Q ∈ π(r(t)).
:⇐⇒ (M,r(cid:48)(t)) =G φ for all r(cid:48) with r(t(cid:48)) (cid:55)→E r(cid:48)(t(cid:48)) for all t(cid:48) ≤ t.
:⇐⇒ (M,r(t + 1)) =G φ.
:⇐⇒ (M,r(t(cid:48))) =G φ for some t(cid:48) with t(cid:48) + 1 = t.
:⇐⇒ (M,r(t(cid:48))) =G ψ for some t(cid:48) ≥ t and
(M,r(t(cid:48)(cid:48))) =G φ for all t(cid:48)(cid:48) with t ≤ t(cid:48)(cid:48) < t(cid:48).
:⇐⇒ (M,r(t(cid:48))) =G ψ for some 0 ≤ t(cid:48) ≤ t and
(M,r(t(cid:48)(cid:48))) =G φ for all t(cid:48)(cid:48) with t(cid:48) < t(cid:48)(cid:48) ≤ t.
When (M,r(t)) =G φ holds, we call (M,r(t)) a pointed model of φ for G. If (M,r(0)) is a pointed
model of φ for G, then we write (M,r) =G φ and say that the run r satisfies φ. Finally, we say that φ is
satisfiable for G, denoted by =G φ if and only if there exists a model M and a run r such that (M,r) =G φ
holds.
Proposition 1 (Soundness and Completeness). The logic of a justification graph G is a sound and com-
plete axiomatisation with respect to the model relation =G. That is, a formula φ is G-consistent if and
only if φ is satisfiable for G.
W. Damm, M. Fränzle, W. Hagemann, P. Kröger and A. Rakow
57
While the soundness proof is straightforward, a self-contained completeness proof involve lengthy
sequences of various model constructions and is far beyond the page limit. However, it is well-known,
(e.g., [19]), that KD
n , the n-agent extension of K with distributive information is a sound and complete
axiomatisation with respect to the class of Kripke structures having n arbitrary accessibility relations,
where the additional accessibility relations for groups are given as the intersection of the participating
agents, analogously to Def. 9.(ii). Also the additional extension KDD
n with DE for any belief group E is
sound and complete with respect to Kripke structures having serial accessibility relations, analogously
to Def. 9.(i). The axioms of justification graph are between these two systems. Def. 9.(iii) explicitly
allows belief entities to have more information than its components. Various completeness proofs for
combining LTL and epistemic logics are given e.g., in [17].
Extracting Justifications Let Σ = {σ1, . . . ,σn} be a finite set of formulae logically describing the
situation which is object of our investigation. Each formula σi ∈ Σ encodes information of belief atoms
(σi ≡ ei:φi with ei ∈ EA), facts (σi ≡ φi where φi does not contain any epistemic modal operator), or is an
arbitrary Boolean combinations thereof. Further, let G be a justification graph such that Σ is G-consistent
and e be a non-atomic belief entity of G. For any formula φ we may now ask whether φ is part of
the information of e. If there is a proof Σ (cid:96)G e:φ, then φ is included in e's information. To extract a
justification for e:φ we use that Σ∪{¬e:φ} is G-inconsistent and accordingly unsatisfiable for G. If we
succeed in extracting a minimal unsatisfiable core Σ(cid:48) ⊆ Σ∪{¬e:φ} a minimal inconsistency proof can
be recovered, from which finally the used justifications are extracted.
The following proposition allows to use SAT/SMT-solvers for a restricted setting and has been used
in our case study.
Proposition 2 (SAT Reduction). Let Σ = {σ1, . . . ,σn} be a set of formulae such that each element σi is
of the form ei:φi with ei ∈ EA and φi does not contain any epistemic modal operators. Further, let e be
an arbitrary belief entity that does not occur in Σ. Then G = {e (cid:55)→G eiei occurs in Σ} is a justification
graph for Σ if and only if Φ = {φ1, . . .φn} is satisfiable over the non-epistemic fragment of the logic of
justification graphs.
In order to proof the proposition one shows that any model of Φ in the non-epistemic fragment can
be extended to a model of Σ for the given G by adding trivial accessibility relations. On the other hand,
for any model M and run r with (M,r) =G Σ there exists a run r(cid:48) which is accessible from (cid:55)→e such
that (M,r(cid:48)) =G Φ. Since Φ does not contain any epistemic modal operators, dropping the accessibility
relations from M still yields a model of Φ. A more detailed version of this proof can be found in [12].
4 Identifying and Analysing Conflicts
In this section we first present an abstract algorithm for the conflict resolution of Sect. 2 that starts at
level (C1) and proceeds resolution stepwise up to level (C4). We then sketch our small case study where
we applied an implementation of the abstract algorithm.
4.1 Analysing Conflicts
For the analysis of conflicts we employ SMT solvers. Prop. 2 reduces the satisfiability of a justification
graph to a SAT problem. To employ SMT solving for conflict analysis, we encode the (real and possible)
worlds of Sect. 2 via logic formulae as introduced in Sect. 3. Each state si is represented as a conjunction
of literals, si ≡(cid:86)v∧(cid:86)¬v(cid:48). Introducing a dedicated propositional variable vt for each v ∈ V and time step
10:
11:
12:
13:
14:
15:
16:
17:
for i ∈ [1,2,3,4] do
(cid:48),Φmax
B
if ∆A = /0 then
Σ(cid:48),Φmax
A
if (Σ(cid:48) (cid:54)= Σ)∨ (Φmax
A )∨ (Φmax
∆A ← FINDSTRATEGY(Σ(cid:48),Φmax
if ∆A (cid:54)= /0 then
(cid:48) (cid:54)= Φmax
B
A
A
break
return ∆A
(cid:48) ← FIXCONFLICT(C, (Ci),Σ,Φmax
A ,Φmax
B )
(cid:48) (cid:54)= Φmax
(cid:48),Φmax
B
B ) then
(cid:48), AA, AB)
58
Dynamic Conflict Resolution
B , AA, AB)
A ,Φmax
ΣM ← POSSIBLEWORLDS(Σ, AA, AB)
∆A ← STRATA(AA, AB,ΣM,Φmax
A )
C ← /0
B) ∈ ∆A with r((δ A,δ(cid:48)
for all (δ A,δ(cid:48)
Algorithm 1 Determining winning strategy based on observations, goals, and possible actions.
1: function FINDSTRATEGY(Σ,Φmax
2:
3:
4:
5:
6:
7:
8:
9:
(cid:46) construct(cid:8)(δ A,δ(cid:48)
B),ΣM) = ΦA ∈ Φmax
B),ΣM,ΦA,Φmax
(cid:46) (δ A,δ(cid:48)
E ← TESTIFNOTWINNING((δ A,δ(cid:48)
if E (cid:54)= /0 then
B) is not winning for all ΣM ∈ ΣM, i.e. r((δ A,δ(cid:48)
C ← C∪{E}
∆A = ∆A \{(δ A,δ(cid:48)
A do
B , AA, AB)
B) r((δ A,δ(cid:48)
B)}
(cid:46) construct set of possible worlds
B),ΣM) = ΦA with ΦA ∈ Φmax
(cid:46) set of conflict causes
A
(cid:46) cf. Alg. 2
B),ΣM) (cid:54)= ΦA
(cid:46) memorize justifications E
(cid:9)
(cid:46) A is in conflict with B
(cid:46) traverse resolution levels
(cid:46) cf. Alg. 3
(cid:46) new information generated
(cid:46) new attempt with new information
(cid:46) new attempt was successful, stop and return
(cid:46) select (δ A,δ(cid:48)
B) ∈ ∆A to reach some goal in Φmax
A
t allows us to obtain a formula describing a finite run on M. A predicate of the form(cid:86)
t+1)
encodes the transition relation T. The effect of performing an action at at state s is captured by a formula
of the form at → (st → s(cid:48)
t+1). Using this we can encode a strategy δ in a formula ψδ such that its
valuations represent runs of M according to δ . All runs according to δ achieve goals Φ if and only if
ψδ ∧¬Φ is unsatisfiable. These logical encodings are the main ingredients for using a SAT solver for
our conflict analysis. Since there are only finitely many possible strategies, we examine for each strategy
which goals can be (maximally) achieved in a world M or in a set of worlds M. Likewise we check
whether A has a winning strategy that is compatible with the strategies A believes B might choose.
(s,s(cid:48))∈T(st → s(cid:48)
Since we iterate over all possible worlds for our conflict analysis, we are interested in summarising
possible worlds. We are usually not interested in all vt -- e.g. the speed of B may at times t be irrelevant.
We are hence free to ignore differences in vt in different possible worlds and are even free to consider
all valuations of vt, even if A does not consider them possible. This insight leads us to a symbolic
representation of the possible worlds, collecting the relevant constraints. Now the justification graph
groups the constraints that are relevant, with other words, e:φ and e(cid:48):¬φ will not be components of the
same justification graph if the valuation of φ is relevant. In the following we hence consider the maximal
consistent set of possible worlds, meaning encodings of possible worlds that are uncontradictory wrt. the
relevant propositions, which are specified via the justification graph.
4.2 Algorithmic approach
In this section, we sketch an abstract algorithm for the conflict resolution at levels (C1) to (C4) as in
Sect. 2. Note that we do not aim with Alg. 1 for efficiency or optimal solutions but aim to illustrate how
satisfiability checks can be employed to analyse our conflicts.
The following algorithms describe how we deal with logic formulae encoding sets of possible worlds,
sets of runs on them, etc. to analyse conflicts (cf. Def. 1, p. 51) via SMT solving. We use ΣM to refer to a
formula that encodes a maximal consistent set of possible worlds (cf. Sect. 4.1), i.e., that corresponds to a
W. Damm, M. Fränzle, W. Hagemann, P. Kröger and A. Rakow
59
Figure 2: Abstract resolution process with information base, possible worlds and strategies.
justification graph. We use ΣM to refer to a set of formulas ΣM ∈ ΣM that encode the set of possible worlds
M structured into sets of possible worlds via justification graphs. We use M and ΣM synonymously. Also
we often do not distinguish between ΣM and M -- neglecting that ΣM represents a set of worlds that are
like M wrt to the relevant constraints.
Fig. 2 provides an overview of the relation between the initial information base ΣI of agent A, its
set ΣM of possible worlds ΣM, winning strategies, resolution, and stepwise update of the information ΣR
during our conflict resolution process. The initial information base defines the set of possible worlds
M, which is organised in sets of maximal consistent worlds ΣM. Based on ΣM, A's set of strategies ∆A
is checked whether it comprises a winning strategies in presence of an agent B that tries to achieve its
own goals. If no such winning strategy exists, A believes to be in conflict with B. At each level (Ci) the
resolution procedure tries to determine information ΣR of level (Ci) to resolve the conflict. If the possible
worlds are enriched by this information, the considered conflict vanishes. The new information is added
to the existing information base and the over-all process is re-started again until either winning strategies
are found or ΣR is empty.
How to find a believed winning strategy Alg. 1 finds a winning strategy of agent A for a goal ΦA in
ΣM tolerating that B follows an arbitrary winning strategy in ΣM ∈ ΣM for its goals, i.e. it finds a strategy
that satisfies ΦA in all possible worlds ΣM where ΦA is maximal for ΣM and in each possible world
ΣM ∈ ΣM agent B may also follow a winning strategy for one of its maximal goals ΦB. If such a strategy
cannot be found, A believes to be in conflict with B (cf. Def. 1).
Input for the algorithm is (i) a set Σ of formulae describing the current belief of A, e.g. its current
observations and its history of beliefs -- we call it the information base in the sequel -- , (ii) a set of goals
of B that is maximal for a ΣM ∈ ΣM,
Φmax
(iv) a set of possible actions AA for A and (v) a set of believed possible actions AB for B.
of A that is maximal in M, (iii) a set of believed goals Φmax
B
A
First (L. 2 of Alg. 1) is to construct sets of maximal consistent sets of possible worlds that together
represent M. In L. 3 the set ∆A is determined, which is the set of strategies accomplishing a maximal goal
B) that satisfy ΦA ∈ Φmax
combination for A assuming B agrees to help, i.e., all winning strategies (δ A,δ(cid:48)
in all possible worlds ΣM ∈ ΣM, where ΦA is maximal for M.
B follows its strategy to achieve one of its maximal goals ΦB ∈ Φmax
In lines 5 ff. we examine whether one of A's strategies (where B is willing to help) works even when
B) ∈ ∆A (L. 6). The
To this end TESTIFNOTWINNING is called for all of A's winning strategies (δ A,δ(cid:48)
function TESTIFNOTWINNING performs this test iteratively for one maximal consistent set of worlds ΣM
(Alg. 2 L. 2). Let ∆B be the set of joint strategies achieving a goal ΦB ∈ Φmax
that is maximal in ΣM.
A,δ B) ∈ ∆B (Alg. 2 L. 3). A strategy of A
B) to every (δ(cid:48)
We check the compatibility of A's strategy (δ A,δ(cid:48)
(δ A,δ(cid:48)
B) is compatible to all of B's strategies (δ(cid:48)
A,δ B) if all joint strategies (δ A,δ B) achieve the maximal
goals for A and B (Alg. 2 L. 6).3 If the joint strategy (δ A,δ B) is not a winning strategy for the joint goal
3Note that according to Sect. 2.1, we have ΦB = true if B cannot achieve any goal. This reflects that A cannot make any
in ΣM.
B
B
A
assumption about B's behaviour in such a situation.
initialjustifiedinformationbaseΣIΣ∪ΣMΣMΣMΣMΣM∆⊆∆Awinning?resolutionatlevelCi∆A∆constraints[no]justifications[yes]requiredinformationΣRCi←Ci+160
Dynamic Conflict Resolution
B , AA, AB)
B),ΣM,ΦA,Φmax
for all ΣM ∈ ΣM do
Algorithm 2 Test if a strategy is winning in all possible worlds.
1: function TESTIFNOTWINNING((δ A,δ(cid:48)
2:
∆B ← STRATB(AA, AB,ΣM,Φmax
3:
B )
for all (δ(cid:48)
4:
A,δ B),ΣM) = ΦB and ΦB is maximal in ΣM do
B with r((δ(cid:48)
5:
6:
7:
8:
9:
A,δ B) ∈ ∆B do
if r((δ A,δ B),ΣM) (cid:54)= ΦA ∪ ΦB then
return GETJUSTIFICATIONS((δ A,δ B) (cid:54)= ΦA ∪ ΦB)
(cid:46) construct(cid:8)(δ(cid:48)
A,δ B) r(cid:0)(δ(cid:48)
for all ΦB ∈ Φmax
(cid:46) (δ A,δ(cid:48)
A,δ B),ΣM
return /0
else
B) is not winning for all M and all (δ(cid:48)
A,δ B)
(cid:1) = ΦB with ΦB ∈ Φmax
(cid:9)
B
Algorithm 3 Try to fix a conflict by resolving contradictions.
1: function FIXCONFLICT(C, (Ci),Σ,Φmax
2:
3:
4:
C ← C\{E}
A ,Φmax
Σ,Φmax
for E ∈ C do
A ,Φmax
B )
A ,Φmax
B ← RESOLVE(Σ,E,Φmax
A ,Φmax
return Σ,Φmax
B , (Ci))
5:
B
(cid:46) try resolution according to level (Ci)
ΦA∪ΦB (Alg. 2 L. 6), the function GETJUSTIFICATIONS extracts the set of justifications for this conflict
situation (Alg. 2 L. 7). The set of justifications is added to the set of conflict causes C (Alg. 1 L. 8.).
Since strategy (δ A,δ(cid:48)
B) is not compatible to all of B's strategies, it is hence not further considered as a
possible conflict-free strategy for A (Alg. 1 L. 9).
A strategy that remains in ∆A at Alg. 1 L. 10 is a winning strategy for one of A's goals in all possible
worlds ΣM regardless of what maximal goals B tries to achieve in ΣM. However, if ∆A is empty at
Alg. 1 L. 10 , A is in a (believed) conflict with B (Def. 1). In this case, conflict resolution is attempted
(cf. lines 10 ff. in Alg. 1). Function FIXCONFLICT from Alg. 3 is called with the set of conflict causes,
the current conflict resolution level, and the current information base and goals. For each conflict cause,
an attempt of resolution is made by function RESOLVE. The conflict is analysed to identify whether
adding/updating information of the current resolution level helps to resolve the conflict. If there are
several ways to resolve a conflict, justifications can be used to decide which resolution should be chosen.
Note that conflict resolution hence means updating of the information base Σ or goal sets Φmax
and Φmax
B .
Line 13 of Alg. 1 checks if some new information was obtained from the resolution procedure. If not,
resolution will be restarted at the next resolution level. If new information was obtained, FINDSTRATEGY
is called with the updated information.
If the result is a non-empty set of strategies, the algorithm
terminates by returning them as (believed) winning strategies for A. However, if the result is the empty
set, resolution is restarted at the next resolution level. If ∆A is empty at level (C4), the conflict cannot be
resolved and the algorithm terminates.
A
Termination Alg. 1 eventually terminates under the following assumptions. The first assumption is
that the set of variables V and hence the information base Σ is finite. In this case, the construction of
maximal consistent possible worlds ΣM terminates since there is a finite number of possible consistent
combinations of formulae and the time horizon for the unrolling of a possible world ΣM is bounded.
Together with finite sets Φmax
B , AA, and AB, the construction of strategies, i.e. functions
STRATA and STRATA, terminates since there are only finite numbers of combinations of input histo-
A , Φmax
W. Damm, M. Fränzle, W. Hagemann, P. Kröger and A. Rakow
61
ries and output action and there is only a finite number of goals to satisfy. All loops in algorithms 1, 2,
and 3 hence iterate over finite sets.
The extraction of justifications terminates since runs are finite and consequently the number of ac-
tions involved in the run, too. Furthermore, for each state in a run, there are only a finite number of
propositions that apply. Together with a finite number of propositions representing the goal, GETJUSTI-
FICATIONS can simply return the (not necessarily minimal) set of justifications from all these finite many
formulae as a naive approach.
B
A , and Φmax
Alg. 1 terminates if a non-empty set ∆A is derived by testing and/or resolution, or if a fixed point re-
garding Σ, Φmax
is reached. Since all other loops and functions terminate, the only open aspect
is the fixed point whose achievement depends on RESOLVE. We assume that Alg. 1 is executed at a fixed
time instance s.t. A's perception of the environment does not change during execution. Thus, Σ contains
only a finite number of pieces of information to share. If we assume that that sharing information leads
only to dismissing possible worlds rather then considering more worlds possible, then this a monotonic
process never removing any information.4 Furthermore, we assume that the partial order of goals leads,
if necessary, to a monotonic process of goal negotiation which itself can repeated finite many times until
no further goals can be sacrificed or adopted from B. Thus, if ∆A remains to be the empty set in line 15,
the fixed point will eventually be reached.
Furthermore, we do not consider any kind of race conditions occurring from concurrency, e.g. dead-
lock situations where A can't serve B's request because it does not know what its strategy will be since A
wait's for B's respond, and vice versa.
So in summary, the algorithm terminates under certain artificial assumptions but cannot determine
a resolution in case without an outside arbiter. In practice such a conflict resolution process has to be
equipped with time bounds and monitors. We consider these aspects as future work.
4.3 Case study
We implemented the algorithm sketched above employing Yices [14] to determine contradictions and
analysed variations of a toy example to evaluate and illustrate our approach. More details on the
case study can be found in [12]. The implementation is available under https://uol.de/en/hs/
downloads/.
We modelled a system of two agents on a two lane highway. Each agent is represented by its position
and its lane. Each agent has a set of actions: it can change lane and drive forward with different speeds.
We captured this via a discrete transition relation where agents hop from position to position. The
progress of time is encoded via unrolling, that is we have for each point in time a corresponding copy
of a variable to hold the value of the respective attribute at that time. Accordingly the transition relation
then refers to these copies.
Since we analyse believed conflicts of an agent, we consider several worlds. In other words, we
consider several variations of a Yices model. Each variation represents a justification graph summarising
the maximal consistent set of evidences and thereby representing a set of worlds which is justified by
this set of evidences.
We modify the Yices file by adding additional constraints according to the algorithm Sect. 4.2. For
the steps (C1) to (C4) we add constraint predicates, e.g., that encode that information about certain ob-
servations have been communicated by say B to A, constraints that specify that B tells A it will decelerate
at step 4 and constraints that encode goal combinations.
4Otherwise the set of already examined worlds can be used to define a fixed point.
62
Dynamic Conflict Resolution
We employed Yices to determine whether there is conflict. The key observation is: If Yices deter-
mines that it holds that ¬ϕ is satisfiable in our system model, then there is the possibility that the goal is
not achieved -- otherwise each evolution satisfies ϕ and there is a winning strategy for the model.
5 Related work
Studying Traffic Conflicts According to Tiwari in his 1998 paper [26] studying traffic conflicts in
India, one of the earliest studies concerned with traffic conflicts is the 1963 paper [21] of Perkins and
Harris. It aims to predict crashes in road traffic and to obtain a better insight to causal factors. The term
traffic conflict is commonly used according to [26] as "an observable situation in which two or more
road users approach each other in space and time to such an extent that a collision is imminent if their
movements remain unchanged" [1]. In this paper we are interested in a more general and formal notion
of conflict. We are not only interested in collisions-avoidance but more generally in situations where
traffic participants have to cooperate with each other in order to achieve their goals -- which might be
collision-freedom. Moreover, we aim to provide a formal framework that allows to explain real world
observations as provided by, e.g., the studies of [26, 21].
Tiwari also states in [26] that it is necessary to develop a better understanding of conflicts and con-
jectures that illusion of control [23] and optimism bias theories like in [13] might explain fatal crashes.
In this paper we develop a formal framework that allows us to analyse conflicts based on beliefs of the
involved agents, -- although supported by our framework -- we here do not compare the real world evolu-
tion with the evolution that an agent considers possible. Instead we analyse believed conflicts, that are
conflicts which an agent expects to occur based on its beliefs. Such conflicts will have to be identified
and analysed by prediction components of the autonomous vehicles architecture, especially in settings
where misperception and, hence, wrong beliefs are possible.
In [15] Sameh et al. present their approach to modelling conflict resolution as done by humans in or-
der to generate realistic traffic simulations. The trade-off between anticipation and reactivity for conflict
resolution is analysed in [25] in order to determine trajectories for vehicles at an intersection. Both works
[15, 25] focus on conflicts leading to accidents. Regarding the suggested resolution approaches, our res-
olution process suggests cooperation steps with increasing level cooperation. This resolution process is
tailored for autonomous vehicles that remain autonomous during the negation process.
Strategies and Games For strategy synthesis Finkbeiner and Damm [10] determined the right perime-
ter of a world model. The approach aims to determine the right level of granularity of a world model
allowing to find a remorse-free dominant strategy. In order to find a winning (or remorse-free dominant)
strategy, the information of some aspects of the world is necessary to make a decision. We accommodated
this as an early step in our resolution protocol. Moreover in contrast to [10], we determine information
that agent A then want requests from agent B in order to resolve a conflict with B -- there may still be
no winning (or remorse-free dominant) strategy for all goals of A. In [11] Finkbeiner et. al.presented
an approach to synthesise a cooperative strategy among several processes, where the lower prioritised
process sacrifices its goals when a process of higher priority achieves its goals. In contrast to [11] we do
not enforce a priority of agents but leave it open how a conflict is resolved in case not all their goals are
achievable. Our resolution process aims to identify the different kinds of conflict as introduced in Sect. 2
that arise when local information and beliefs are taken into account and which not necessarily imply that
actually goals have to be sacrificed.
We characterize our conflict notion in a game theoretic setting by considering the environment of
W. Damm, M. Fränzle, W. Hagemann, P. Kröger and A. Rakow
63
agents A and B as adversarial and compare two scenarios where (i) the agent B is cooperative (angelic)
with the scenario where (ii) B is not cooperative and also not antagonistic but reasonable in following
a strategy to achieve its own goals. As Brenguier et al. in [7] remark, a fully adversarial environment
(including B) is usually a bold abstraction. By assuming in (ii) that B maximises its own goals -- we
assume that B follows a winning strategy for its maximal accomplishable goals. So we are in a similar
mind set than at assume-guarantee [9] and assume-admissible [7] synthesis. Basically we consider the
type of strategy (winning/admissible/dominant) as exchangeable, the key aspect of our definition is that
goals are not achievable but can be achieved with the help of the other.
Logics
Justification logic was introduced in [5, 6] as an epistemic logic incorporating knowledge and
belief modalities into justification terms and extends classical modal logic by Plato's characterisation of
knowledge as justified true belief. However, even this extension might be epistemologically insufficient
as Gettier already pointed out in 1963 [20]. In [4] a combination of justification logics and epistemic
logic is considered with respect to common knowledge. The knowledge modality Ki of any agent i
inherits all information that are justified by some justification term t, i.e. t:φ → Kiφ. In such a setting any
justified information is part of common knowledge. Moreover, justified common knowledge is obtained
by collapsing all justification terms into one modality J and can be regarded as a special constructive
sort of common knowledge. While our approach neglects the notion of common information, we use a
similar inheritance principle where a belief entity inherits information of its components, cf. Def. 4.(iii).
A comparison of the strength of this approach with different notions of common knowledge can be
found in [2]. While justification logic and related approaches [16, 3], aim to restrict the principle of
logical awareness and the related notion of logical omniscience, we argue in Sec. 3 that the principle of
logical awareness as provided by modal logic is indispensable in our approach. A temporal (LTL-based)
extension of justification logic has been sketched in [8]. This preliminary work differs from our approach
wrt. the axiom systems used for the temporal logic part and the justification / modal logic part, cf. the
logic of justification graphs axiomatised in Section 3. Our logic and its axiomatisation incorporates
a partial order on the set of beliefs that underlies their prioritization during conflict resolution, which
contrasts with the probabilistic extension of justification logic outlined in [22].
6 Conclusion
Considering local and incomplete information, we presented a new notion of conflict that captures sit-
uations where an agent believes it has to cooperate with another agent. We proposed steps for conflict
resolution with increasing level of cooperation. Key for conflict resolution is the analysis of a conflict,
tracing and identifying contradictory evidences. To this end we presented a formal logical framework
unifying justifications with modal logic. Alas, to the authors' best knowledge there are no efficient satis-
fiability solvers addressing distributed information so far. However, we exemplified the applicability of
our framework in a restricted but non-trivial setting. On the one hand, we plan to extend this framework
by efficient implementations of adapted satisfiability solvers, on the other hand by integrating richer log-
ics addressing decidable fragments of first order logic, like linear arithmetic, and probabilistic reasoning.
References
[1] F. H. Amundsen & C. Hyden (1977): Proc. of the first Workshop on Traffic Conflicts, Oslo, Norway. 1st
Workshop on Traffic Conflicts, LTH Lund.
64
Dynamic Conflict Resolution
[2] E. Antonakos (2007): Justified and common knowledge: Limited conservativity. In: International Symposium
on Logical Foundations of Computer Science, Springer, pp. 1 -- 11, doi:10.1007/978-3-540-72734-7_1.
[3] S. Artemov & R. Kuznets (2009): Logical omniscience as a computational complexity problem.
In:
Proc. of the 12th Conference on Theoretical Aspects of Rationality and Knowledge, ACM, pp. 14 -- 23,
doi:10.1145/1562814.1562821.
[4] S. Artemov & E. Nogina (2005): Introducing justification into epistemic logic. Journal of Logic and Com-
putation 15(6), pp. 1059 -- 1073, doi:10.1093/logcom/exi053.
Justified common knowledge.
[5] S. N. Artemov (2006):
doi:10.1016/j.tcs.2006.03.009.
[6] S. N. Artemov (2008):
The Logic of Justification.
doi:10.1017/S1755020308090060.
Theor. Comput. Sci. 357(1-3), pp. 4 -- 22,
Rew. Symb. Logic 1(4), pp. 477 -- 513,
[7] R Brenguier, J.-F. Raskin & O. Sankur (2017): Assume-admissible synthesis. Acta Informatica 54(1), pp.
41 -- 83, doi:10.1007/s00236-016-0273-2.
[8] S. Bucheli, M. Ghari & T. Studer (2017): Temporal Justification Logic.
In: Proc. of the 9th Work-
shop on Methods for Modalities, January 2017, EPTCS 243, Open Publishing Association, pp. 59 -- 74,
doi:10.4204/EPTCS.243.5.
[9] K. Chatterjee & T. A. Henzinger (2007): Assume-Guarantee Synthesis. In: Tools and Algorithms for the
Construction and Analysis of Systems, Springer, pp. 261 -- 275, doi:10.1007/978-3-540-71209-1_21.
[10] W. Damm & B. Finkbeiner (2011): Does It Pay to Extend the Perimeter of a World Model? In: FM 2011:
Formal Methods, Springer, pp. 12 -- 26, doi:10.1007/978-3-642-21437-0_4.
[11] W. Damm, B. Finkbeiner & A. Rakow (2016): What You Really Need To Know About Your Neighbor. In:
Proc. Fifth Workshop on Synthesis, SYNT@CAV 2016, EPTCS 229, pp. 21 -- 34, doi:10.4204/EPTCS.229.4.
[12] W. Damm, M Fränzle, W. Hagemann, P. Kröger & A. Rakow (2019): Justification Based Reasoning for
Dynamic Conflict Resolution. arXiv e-prints:arxiv:1905.11764. Available at http://arxiv.org/abs/
1905.11764.
[13] D. M. DeJoy (1989): The optimism bias and traffic accident risk perception. Accident Analysis & Prevention
21(4), pp. 333 -- 340, doi:10.1016/0001-4575(89)90024-9.
[14] B. Dutertre (2014): Yices 2.2. In: Computer Aided Verification, Springer, pp. 737 -- 744, doi:10.1007/978-3-
319-08867-9_49.
[15] S. El hadouaj, A. Drogoul & S. Espié (2001): How to Combine Reactivity and Anticipation: The Case of
Conflicts Resolution in a Simulated Road Traffic. In: Multi-Agent-Based Simulation, Springer, pp. 82 -- 96,
doi:10.1007/3-540-44561-7_6.
[16] R. Fagin & J. Y. Halpern (1987): Belief, awareness, and limited reasoning. Artificial intelligence 34(1), pp.
39 -- 76, doi:10.1016/0004-3702(87)90003-8.
[17] R. Fagin, J. Y. Halpern, Y. Moses & Moshe Y. Vardi (2003): Reasoning About Knowledge. MIT Press.
[18] J. Galtung (1969): Violence, Peace, and Peace Research. Journal of Peace Research 6(3), pp. 167 -- 191,
doi:10.1177/002234336900600301.
[19] J. Gerbrandy (1998): Distributed knowledge.
Dialogue, 98, pp. 111 -- 124.
In: Twendial 1998: Formal Semantics and Pragmatics of
[20] E. L. Gettier
Is
doi:10.1093/analys/23.6.121.
(1963):
justified true belief knowledge?
Analysis 23(6), pp. 121 -- 123,
[21] J. I. Harris & S. R. Perkins (1967): Traffic conflict characteristics: accident potential at intersections. High-
way Research Board 225, pp. 35 -- 43.
[22] I. Kokkinis, Z. Ognjanovic & T. Studer (2016): Probabilistic Justification Logic. In: Logical Foundations
of Computer Science - International Symposium, LFCS 2016. Proc., LNCS 9537, Springer, pp. 174 -- 186,
doi:10.1007/978-3-319-27683-0_13.
W. Damm, M. Fränzle, W. Hagemann, P. Kröger and A. Rakow
65
[23] J. E. Langer (1975): The Illusion of Control. Journal of Personality and Social Psychology 32, pp. 311 -- 328,
doi:10.1037/0022-3514.32.2.311.
[24] O. Lichtenstein, A. Pnueli & L. Zuck (1985): The glory of the past. In: Workshop on Logic of Programs,
Springer, pp. 196 -- 218, doi:10.1007/3-540-15648-8_16.
[25] N. Murgovski, G. R. de Campos & J. Sjöberg (2015): Convex modeling of conflict resolution at traf-
In: 2015 54th IEEE Conference on Decision and Control (CDC), pp. 4708 -- 4713,
fic intersections.
doi:10.1109/CDC.2015.7402953.
[26] G. Tiwari, D. Mohan & J. Fazio (1998): Conflict analysis for prediction of fatal crash locations in mixed
traffic streams. Accident Analysis & Prevention 30(2), pp. 207 -- 215, doi:10.1016/S0001-4575(97)00082-1.
|
cs/0407021 | 2 | 0407 | 2004-07-14T06:28:48 | Multi-agent coordination using nearest neighbor rules: revisiting the Vicsek model | [
"cs.MA",
"cs.AI"
] | Recently, Jadbabaie, Lin, and Morse (IEEE TAC, 48(6)2003:988-1001) offered a mathematical analysis of the discrete time model of groups of mobile autonomous agents raised by Vicsek et al. in 1995. In their paper, Jadbabaie et al. showed that all agents shall move in the same heading, provided that these agents are periodically linked together. This paper sharpens this result by showing that coordination will be reached under a very weak condition that requires all agents are finally linked together. This condition is also strictly weaker than the one Jadbabaie et al. desired. | cs.MA | cs |
Multi-agent coordination using nearest-neighbor
rules: revisiting the Vicsek model ∗
Sanjiang Li †
State Key Laboratory of Intelligent Technology and Systems
Department of Computer Science and Technology
Tsinghua University, Beijing 100084, China
Huaiqing Wang
Department of Information Systems
City University of Hong Kong, Hong Kong, China
October 28, 2018
Abstract
Recently, Jadbabaie, Lin, and Morse (2003) offered a mathematical
analysis of the discrete time model of groups of mobile autonomous agents
raised by Vicsek et al.
in 1995. In their paper, Jadbabaie et al. showed
that all agents shall move in the same heading, provided that these agents
are periodically linked together. This paper sharpens this result by showing
that coordination will be reached under a very weak condition that requires
all agents are finally linked together. This condition is also strictly weaker
than the one Jadbabaie et al. desired.
Index Terms -- Decentralized control, multi-agent coordination, switched
systems.
1
Introduction
Coordination of groups of mobile autonomous agents (particles [9], or boids [5])
has attracted researchers in a surprisingly wide variety of disciplines ranging
from physics [9, 7, 8], to the biological sciences [10, 1], to computer science and
engineering [5, 3, 6, 4].
This paper is mainly concerned with one particular discrete time model of
groups of mobile autonomous agents, viz., the one proposed by Vicsek et al. [9]
∗This work was partly supported by the National Foundation of Natural Science of China
(60305005, 60321002, 60496321) and by a Hong Kong CERG (Grant No. CityU 1234/03E).
†Email: [email protected] (S. Li), [email protected] (H. Wang)
1
in 1995. In this model, a group of autonomous agents is moving in the plane with
all agents moving at the same speed but with different headings. Each agent's
motion is updated using a local rule based on the average of its own heading and
the heading of its "neighbors." This is known as the nearest-neighbor rule in [3].
Agent i's neighbors at time t are those agents that are either in or on a circle of
pre-specified radius r centered at agent i's current position. Known as the Vicsek
model, this can be viewed as a special version of a model proposed by Reynolds [5]
for simulating animal aggregation for the computer animation industry. Although
the Vicsek model is very simple, simulation results in [9] show that, using the
local update rule, all agents shall eventually move in the same direction despite
the absence of centralized coordination, and that neighborhood of each agent will
change.
Recently, Jadbabaie, Lin, and Morse [3] offered a mathematical analysis of
this model and provided a theoretical explanation for the observed behavior.
They adopt a more conservative approach, which ignores how the neighbor-graphs
depend on the agent positions in the plane. Note that under this assumption,
the Vicsek model is a graphic example of a switched linear system. Their goal in
that paper was to determine for a certain large class of switching signals and for
any initial set of agent headings that the headings of all agents will converge into
the same steady heading.
Jadbabaie et al. [3] established sufficient conditions given in terms of neighbor-
graphs for coordination of agents. One main result of [3] shows that all agents
shall eventually move in the same heading if these graph are periodically jointly
connected, i.e., the union of any T sequential graphs is connected for some fixed
T . This is a nice result, but as Jadbabaie et al. put it [3, p990, below Theorem
2], what one would prefer instead is to show that coordination would be reached
eventually for every switching signal for which there is an infinite sequence of
bounded, non-overlapping (but not necessarily contiguous) intervals across which
the agents are linked together.
This paper will show above condition desired by Jadbabaie et al.
is indeed
a sufficient condition for asymptotic convergence. This, however, follows from a
more general observation: our main result in this paper shows that convergence
will be attained if these neighbor-graphs are finally jointly connected, i.e., the
union of all graphs started from any time is connected.
The structure of this paper is as follows. In Section II we give a formal descrip-
tion of the Vicsek model in terms of switching signals. Section III provides the
major results, for both leaderless coordination and leader-following coordination.
Conclusions and future work are given in the last section.
2 The Vicsek model and the nearest-neighbor
rule
In this section, we review some basic definitions concerning the Vicsek model.
2
The system studied by Vicsek et al.
[9] consists of n autonomous agents,
e.g., particles, robots, etc., labeled 1 through n. All agents move in the plane
with the same speed but with different headings. The system operates at discrete
time t = 0, 1, 2, · · · Let r > 0 and v > 0 be given numbers associated with the
system. The dynamics of agent i is described by the sequence {xi(t), yi(t), θi(t)},
where xi(t), yi(t) ∈ R are the coordinates of the agent in the plane, and θi(t) is
its heading taking value from [0, 2π). At any time t = 0, 1, 2, · · · , each agent's
heading is updated using a simple rule based on the average of its own heading
plus the headings of its neighbors. For any two agents i, j, we say j is a neighbor
of i at time t, written j ∈ Ni(t), if d(i, j) ≤ r,1 where
d(i, j) = q(xi(t) − xj(t))2 + (yi(t) − yj(t))2.
Then, agent i's next heading is defined as
θi(t + 1) =
θi(t) + Σj∈Ni(t)θj(t)
1 + ni(t)
(1)
(2)
where ni(t) is the number of agent i's neighbors at time t. Agent i's next coordi-
nates are defined as
xi(t + 1) = x(t) + vi(t) cos(θi(t))
yi(t + 1) = y(t) + vi(t) sin(θi(t)).
(3)
(4)
For any time t ≥ 0, we define the neighbor-graph of the system described
above as the simple undirected graph G(t) over V = {1, 2, · · · , n} where the
vertex i corresponds to agent i and two vertexes, i, j, are connected by an edge
in the graph if they are neighbors at time t, i.e., if j ∈ Ni(t). Since the neighbor
relation can change over time, so can the graph that describes them. In the sequel,
we write P for the collection of simple undirected graphs over V . A switching
signal is a function σ : N → P that assigns to each time t a neighbor-graph that
specifies the neighbor relation between agents. Clearly, for a Vicsek model, the
function that assigns to each time t the neighbor-graph G(t) is a switching signal.
Note that for the Vicsek model, the neighbor-graph is determined by the
initial positions and headings of all agents as well as the pre-specified r > 0 and
v > 0. A complete description of the model would have to explain explicitly how
σ changes over time. As it is difficult to take this into account in a convergence
analysis, Jadbabaie et al. adopt a more conservative approach, "which ignores
how σ depends on the agent positions in the plane and assumes instead that σ
might be any switching signal in some suitably defined set of interests."[3]
We in this paper follow this basic assumption and formalize the Vicsek model
as follows:
1In certain situation, choosing open neighborhood would give rise to more desirable results,
see [2].
3
Definition 2.1 (Vicsek model). Given n agents, labeled 1, 2, · · · , n, moving
in the plane at discrete time t ∈ N, let P be all simple undirected graphs over
V = {1, 2, · · · , n}. A Vicsek model is a pair (V, σ), where σ : N → P is a
switching signal.
For each agent i, define i's σ-neighborhood at time t, written Ni(t), to be the
set of agents that is connected to i by an edge in graph σ(t). That is, agent j is
a neighbor of agent i if and only if (i, j) is an edge in graph σ(t).
Given an initial heading θ(0) = hθi(0)in
i=1, agent i's heading θi(t) evolves in
discrete time according to Eq. 2. Namely, agent i's heading at time t + 1 is the
average of the headings of agent i and its neighbors at time t.
Remark 2.1. This definition of a multi-agent coordination model is very general
and more flexible. Several dimensions of extension/completion could be incor-
porated in this model: 1) We can choose either closed/open disk, a triangle-like
zone or any subset of V as the neighborhood; 2) The velocity could also change
in discrete time; 3) We could consider other state variables of agents besides
their headings; and 4) The neighbor-graph could also be directed. This flexibility
would be helpful in practical applications.
The goal of this paper is to show for a large class of Vicsek models (or switching
signals) and for any initial set of agent headings that the headings of all n agents
will converge into the same heading. Compared with the results obtained in [3],
ours are more general.
3 A sufficient condition for multi-agent coordi-
nation
3.1 Notations and preliminaries
Suppose (V, σ) is a Vicsek model. Following Savkin [6], we define a graph σ(∞)
over V = {1, 2, · · · , n} as follows: for any two nodes i, j, (i, j) is an edge in σ(∞)
if and only if for any K > 0, there exists some k ≥ K such that (i, j) is an edge in
graph σ(k). For convenience, given a collection of graphs {Gx : x ∈ X}, we write
Ux∈X Gx for the union of these graphs, i.e., any pair (i, j) is an edge in Ux∈X Gx
if and only if it is an edge in some Gx. Then it is easy to show that there exists
some K > 0 such that σ(∞) = Ut≥k σ(t) holds for all k ≥ K.
In this paper
we will show that all agents shall eventually move in the same heading provided
that σ(∞) is connected. This condition is more general than the one given in
[3], where the authors require that the σ(t)'s are periodically jointly connected.
In what follows, a switching signal σ is called finally jointly connected if σ(∞)
is connected. Clearly this is equivalent to saying that Ut≥k σ(t) is connected for
any k ∈ N.
For a sequence {f (k)} and a number u in R, we say u is an accumulation
point of {f (k)} if there is a subsequence of {f (k)} that converges to u. We write
4
Accu({f (k)}) for the set of accumulation points of {f (k)}.
Given a Vicsek model (V, σ) and an initial headings θ(0) = hθi(0)in
i=1, we now
fix some notations concerning the model.
For i = 1, 2, · · · , n, define
Θi = {θi(t) : t ∈ N}
mi = min AccuΘi
Mi = max AccuΘi
m =
M =
n
min
i=1
n
max
i=1
mi
Mi.
(5)
(6)
(7)
(8)
(9)
Note that Θi is a bounded set and, therefore, has minimum and maximum ele-
ments.
For any t ∈ N, define
θ(t) =
θ(t) =
n
min
i=1
n
max
i=1
θi(t)
θi(t).
(10)
(11)
The following lemma shows θ(t) ≤ m ≤ M ≤ θ(t).
Lemma 3.1. For any t ∈ N, we have θ(t) ≤ θ(t + 1) ≤ m ≤ M ≤ θ(t + 1) ≤ θ(t).
Consequently, we have limt→∞ θ(t) = m and limt→∞ θ(t) = M .
Proof. For any non-negative t, note that by Vicsek's nearest-neighbor rule (Eq. 2),
we have θ(t) ≤ θi(t+ 1) ≤ θ(t). In particular, we have θ(t) ≤ θ(t+ 1) ≤ θ(t+ 1) ≤
θ(t). Now since {θ(t)} ({θ(t)}, resp.) is a bounded ascending (descending, resp.)
sequence, it has a limit. We now show its limit is m (M, resp.). Take {θ(t)}
as an example. Since it is convergent, any subsequence of {θ(t)} also converges
to its limit. Suppose {f (k)} is a sequence such that limk→∞ θi(f (k)) = m for
some agent i. Note that θ(f (k)) ≤ θi(f (k)) for any k, we have limt→∞ θ(t) =
limk→∞ θ(f (k)) ≤ limk→∞ θi(f (k)) = m. On the other hand, since there exists
some agent i such that {t : θi(t) = θ(t)} is infinite, we have a sequence {g(k)}
such that θi(g(k)) = θ(g(k)). This shows that limt→∞ θ(t) = limk→∞ θ(g(k)) =
limk→∞ θi(g(k)) ≥ m since m is the minimum accumulation point. As a result,
we have limt→∞ θ(t) = m. Similarly, we can show limt→∞ θ(t) = M. So we have
θ(t) ≤ m ≤ M ≤ θ(t) for any t.
Note that as shown in the proof of the above lemma, we have a sequence, say
{f (k)}, such that θi(f (k)) = θ(f (k)) and limk→∞ θi(f (k)) = m for some agent i.
Similarly, we have a sequence, say g(k), such that limk→∞ θj(g(k)) = M for some
j.
5
3.2 Leaderless coordination
Theorem 3.1. Given a Vicsek model (V, σ), suppose σ(∞) is connected. Then
for any θ(0) = hθi(0)in
i=1, we have
lim
t→∞
θi(t) = θss (i = 1, 2, · · · , n)
(12)
where θss is a number depending only on θ(0) and σ.
To prove this theorem, we need several lemmas.
Recall V = {1, 2, · · · , n}. For a graph G over V and any two disjoint subsets
A, B of V , we say A and B are connected if there exist a ∈ A, b ∈ B such that
(a, b) is an edge in G. If A happens to be a singleton {a}, we also say node a is
connected to B. In this case, we say alternatively a has a neighbor in B.
The following lemma suggests that, if the agents are divided into two parts
such that the maximum heading of the first part is sufficiently smaller than the
minimum of the second part, then, after updating the headings using Eq. 2, the
agents will also form two parts such that one part is still sufficiently smaller than
the rest.
For a < b in R and any natural number t, we write Vt(a, b) = {i ∈ V : a <
θi(t) < b}.
Lemma 3.2. Given α < β < γ and set δ = β − α, ǫ = δ/nn, suppose Vt(α −
ǫ, α + ǫ) and Vt(β − ǫ, γ + ǫ) are two nonempty disjoint subsets of V such that
their union is V . We have
(1) If Vt(α − ǫ, α + ǫ) and Vt(β − ǫ, γ + ǫ) are disconnected at time t, then Vt+1(α −
ǫ, α + ǫ) = Vt(α − ǫ, α + ǫ) and Vt+1(β − ǫ, γ + ǫ) = Vt(β − ǫ, γ + ǫ).
(2) If Vt(α − ǫ, α + ǫ) and Vt(β − ǫ, γ + ǫ) are connected at time t, then Vt+1(α −
ǫ, α + ǫ) = Vt(α − ǫ, α + ǫ) − {i ∈ V : i has a neighbor in Vt(β − ǫ, γ + ǫ) at time t}
and V − Vt+1(α − ǫ, α + ǫ) = Vt+1(α + δ/n − ǫ, γ + ǫ).
Proof. If Vt(α − ǫ, α + ǫ) and Vt(β − ǫ, γ + ǫ) are disconnected at time t, then for
any i ∈ Vt(α − ǫ, α + ǫ), its neighbors are all in Vt(α − ǫ, α + ǫ). By Eq. 2, we
have α − ǫ < θi(t + 1) < α + ǫ. Similarly, for any j ∈ Vt(β − ǫ, γ + ǫ), we have
β − ǫ < θj(t + 1) < γ + ǫ.
On the other hand, suppose Vt(α − ǫ, α + ǫ) and Vt(β − ǫ, γ + ǫ) are connected
at time t. For i ∈ Vt(α − ǫ, α + ǫ), if all its neighbors are in Vt(α − ǫ, α + ǫ), then
6
i ∈ Vt+1(α − ǫ, α + ǫ); if i has a neighbor, say j0, in Vt(β − ǫ, γ + ǫ), then we have
θi(t + 1) =
θi(t) + Σj∈Ni(t)θj(t)
1 + ni(t)
θi(t) + θj0(t) + Σj∈Ni(t),j6=j0θj(t)
1 + ni(t)
(α − ǫ) + (β − ǫ) + (ni(t) − 1) × (α − ǫ)
1 + ni(t)
β − α + (1 + ni(t)) × (α − ǫ)
=
>
=
= (α − ǫ) +
1 + ni(t)
β − α
1 + ni(t)
≥ α − ǫ + δ/n.
Note that θi(t+1) < γ+ǫ holds for any i ∈ V . This shows that, if i ∈ Vt(α−ǫ, α+ǫ)
has a neighbor in Vt(β − ǫ, γ + ǫ), then i ∈ Vt+1(α + δ/n − ǫ, γ + ǫ). Similarly,
for any j ∈ Vt(β − ǫ, γ + ǫ), we can show θj(t + 1) > α + δ/n − ǫ. In summary,
we have i ∈ Vt+1(α − ǫ, α + ǫ) if and only if i ∈ Vt(α − ǫ, α + ǫ) and it has
a neighbor in Vt(β − ǫ, γ + ǫ) at time t. As for any other agent j, we have
j ∈ Vt+1(α + δ/n − ǫ, γ + ǫ).
Lemma 3.3. Suppose σ(∞) is connected and {f (k)} is a sequence. Then we
have a subsequence {g(k)} of {f (k)} such that all {θi(g(k))} are convergent for
i ∈ V .
Proof. This follows from the compactness of [0, 2π] and that θi(t) ∈ [0, 2π) for
any i, t.
Lemma 3.4. Suppose {g(k)} is a sequence such that {θi(g(k))} converges to li for
i = 1, 2, · · · , n. Then m = minn
i=1 li, where m = limt→∞ θ(t),
M = limt→∞ θ(t) and θ(t) = minn
i=1 li and M = maxn
i=1 θi(t), θ(t) = maxn
i=1 θi(t).
Proof. Take m = minn
i=1 li as an example. Note that there exists some i such
that {k : θi(g(k)) = θ(g(k))} is infinite. We have a subsequence {h(k)} of {g(k)}
such that θi(h(k)) = θ(h(k)) and li = limk→∞ θi(h(k)) = limk→∞ θ(h(k)) = m.
That M = maxn
i=1 li is similar.
Proof of Theorem 3.1. To show that these autonomous agents shall eventually
move into the same heading, we need only to show m = M. We prove this by
reduction to absurdity.
Suppose m < M and {g(k)} is a sequence such that {θi(g(k))} converges to li
for i = 1, 2, · · · , n. Recall by Lemma 3.4 that m = minn
i=1 li.
Set l = min{li : li > m} and take δ = l − m, ǫ = δ/nn. Then there exists K > 0
such that θi(g(k)) ∈ (li−ǫ, li+ǫ) for k ≥ K and i = 1, 2, · · · , n. Moreover, we have
Vg(k)(m − ǫ, m + ǫ) = {i ∈ V : li = m} and Vg(k)(l − ǫ, M + ǫ) = {i ∈ V : li ≥ l}.
Clearly Vg(k)(m−ǫ, m+ǫ) and Vg(k)(l−ǫ, M +ǫ) satisfy the condition of Lemma 3.2.
i=1 li and M = maxn
7
Now since Ut≥p σ(t) is connected for any p ∈ N, we have some k ≥ K such
that Vg(k)(m − ǫ, m + ǫ) and Vg(k)(l − ǫ, M + ǫ) are connected at time g(k) + w for
some 0 ≤ w < g(k + 1) − g(k). Fix one such k and suppose g(k + 1) − g(k) = W .
For each w = 0, 1, · · · , W , we define Aw = Vg(k)+w(m−ǫ, m+ǫ) and Bw = V −Aw.
Note that because AW = Vg(k+1)(m − ǫ, m + ǫ) = Vg(k)(m − ǫ, m + ǫ) = A0, it
is also true that m − ǫ < θ(g(k)) ≤ θ(g(k + 1)) < m + ǫ. Recall that because θ(t)
is an ascending chain (see Lemma 3.1), we also have θ(g(k) + w) ∈ (m − ǫ, m + ǫ)
for any w = 1, 2, · · · , W − 1.
Set C = {w ∈ [0, W ) : Aw and Bw are connected at time g(k) + w}. Clearly
C is not empty since there exists some w such that A0 is connected to B0 at time
g(k) + w. Suppose C = {w1, w2, · · · , wq} and 0 ≤ w1 < w2 < · · · < wq < W . We
claim
A0 ) Aw1+1 ) Aw2+1 ) · · · ) Awq−1+1 ) Awq+1
Bws+1 = Vg(k)+ws+1(m +
δ
ns − ǫ, M + ǫ) (s = 1, 2, · · · , q)
(13)
(14)
As the induction basis, note that A0 = Vg(k)(m − ǫ, m + ǫ) = {i : li = m} and
B0 = {i : li ≥ l} = Vg(k)(l − ǫ, M + ǫ) = Vg(k)(m + δ − ǫ, M + ǫ).
Note that w1 is the first index w such that Aw is connected to Bw; by
Lemma 3.2, we have A0 = Aw and Bw = Vg(k)+w(m + δ − ǫ, M + ǫ) for any
w ≤ w1. Moreover, since Aw1 = A0 is connected to Bw1 = B0 at time g(k) + w1,
by Lemma 3.2, we have
Aw1+1 = Aw1 − {i ∈ Aw1 : i has a neighbor in Bw1 at time g(k) + w1} ( A0 (15)
Bw1+1 = V − Aw1+1 = Vg(k)+w1+1(m + δ/n − ǫ, M + ǫ) (16)
Recall that Aw1+1 6= ∅ since θ(g(k) + w1 + 1) ∈ (m − ǫ, m + ǫ).
Suppose for s < q we have
A0 ) Aw1+1 ) Aw2+1 ) · · · ) Aws−1+1 ) Aws+1
Bwj+1 = Vg(k)+wj +1(m +
δ
nj − ǫ, M + ǫ) (j = 1, 2, · · · , s)
(17)
(18)
Note that s < n − 1 must hold since A0 contains at most n − 1 agents and
A0 ) Aw1+1 ) · · · ) Aws+1 6= ∅.
We now show Aws+1 ) Aws+1+1 and Bws+1+1 = Vg(k)+ws+1+1(m+ δ
ns+1 −ǫ, M +ǫ).
Note that ws+1 is the first index w > ws such that Aw is connected to Bw. By
Lemma 3.2, we have Aw = Aws+1 and Bw = Vg(k)+w(m + δ
ns − ǫ, M + ǫ) = Bws+1
for any w ∈ (ws, ws+1]. Moreover, since Aws+1 = Aws+1 is connected to Bws+1 =
Bws+1 at time g(k) + ws+1, by Lemma 3.2, we have
Aws+1+1 = Aws+1 −
{i ∈ Aws+1 : i has a neighbor in Bws+1 at time g(k) + ws+1} ( Aws+1 (19)
Bws+1+1 = V − Aws+1+1 = Vg(k)+ws+1+1(m +
δ
ns+1 − ǫ, M + ǫ) (20)
8
In summary, we have obtained that A0 = Aw1 ) Awq+1.
Note that if wq < W − 1, then Aw and Bw are disconnected for any w ∈
(wq, W ). By Lemma 3.2 again, we know Aw = AW for w ∈ (wq, W ]. In particular,
we have Awq+1 = AW . On the other hand, if wq = W − 1, we also have Awq+1 =
AW .
This suggests that if m < M, then A0 6= AW . This is a contradiction. So our
assumption that m < M cannot hold. This ends the proof of this theorem.
Remark 3.1. Note that if σ : N → P is a switching signal for which there exists
an infinite sequence of bounded, non-overlapping (but not necessarily contiguous)
intervals across which the n agents are linked together, then σ(∞) is connected.
By the above theorem, we know all agents would eventually move in the same
heading for this σ. Consequently, this theorem shows the desired condition given
in [3, p990, below Theorem 2] is a sufficient condition for asymptotic convergence.
The hypothesis of Theorem 3.1, however, is still not necessary. For example,
if some σ(t) is the complete graph over V , then a coordination could be achieved
at time t + 1. But if it is not connected, σ(∞) will have 1 < p ≤ n connected
components, say G1, G2, · · · , Gp. Similar to the argument given above for Theo-
rem 3.1, we can show for any h = 1, 2, · · · , p, there exists a heading θh such that
limt→∞ θi(t) = θh for any i ∈ Gh.
3.3 Leader-following coordination
In [3], Jadbabaie et al. also consider a modified version of Vicsek's discrete-time
system, which consists of the same group of n agents as before except that one
leader agent, labeled 0, is added. Agent 0 moves at the same constant speed as its
n followers but with a fixed heading θ0. Agent i then updates its heading using
the average of its own heading plus the headings of its neighbors. Note that this
time the leader may be in its neighborhood.
Our abstract Vicsek model with a leader now can be formulated as follows:
Definition 3.1. Suppose V + = {0, 1, · · · , n} and P + is the collection of simple
undirected graphs over V +. A leader-following Vicsek model is just a pair (V +, σ),
where σ : N → P + is a switching signal.
For each agent i > 0, define i's σ-neighborhood at time t, written Ni(t), to be
the set of agents that are connected to i by an edge in the graph σ(t). That is,
agent j is a neighbor of agent i if and only if (i, j) is an edge in the graph σ(t).
i=1 and a fixed heading θ0 in which
agent 0 moves at all times, for i > 0, agent i's heading evolves in discrete time
according to the following equation:
Given an initial heading θ(0) = hθi(0)in
θi(t + 1) =
θi(t) + Σj∈Ni(t)θj(t)
1 + ni(t)
(21)
where ni(t) is the number of agents in Ni(t).
9
For a leader-following Vicsek model, we have the following correspondence of
Theorem 3.1.
Theorem 3.2. Given a leader-following Vicsek model (V +, σ), suppose σ(∞) is
connected. Then for any θ(0) = hθi(0)in
i=1 and θ0, we have limt→∞ θi(t) = θ0 for
all i = 1, 2, · · · , n.
Proof. Note that Lemma 3.2 and Lemma 3.3 still hold for the leader-following
case; this theorem follows from a similar argument as given for Theorem 3.1.
4 Conclusions and further work
In [3], Jadbabaie et al. show that all agents shall move in the same heading if
the neighbor-graphs are periodically jointly connected, i.e., the union of any T
contiguous neighbor-graphs is connected for some fixed T . In the same paper,
they also ask whether this still holds when there exists a sequence of uniformly
bounded intervals over the discrete time such that the union of neighbor-graphs
across each interval is connected?
This paper has shown that all agents shall move in the same heading under a
very weak condition that requires the neighbor-graphs to be finally jointly con-
nected, i.e., the union of all graphs started from any time is connected. This
result gives an affirmative answer to the question raised in [3].
It should be emphasized that results obtained in this paper are valid for
many versions of the Vicsek model (or coordination multi-agent models that
use nearest-neighbor rule to update their state) (see Remark 2.1). As for some
specific versions of the Vicsek model, there have been some impressive results.
Recently, Jadbabaie [2] has shown that, if we choose the neighborhood region to
be open, then a necessary and sufficient condition for all headings to converge to
the same heading is that the neighbor-graph does not change after finite steps
and is connected.2 Jadbabaie also notes that [2, p.8, last paragraph] the problem
would be more complicated if a closed neighborhood region were chosen.
It
seems this method cannot be directly applied to other kinds of neighborhoods.
As a matter of fact, there are often situations when agents do not have disk-like
visibility but rather might have a cone-like field of view.3
Note that our results are based on the assumption that the switching signal is
pre-specified. In our future work, we shall plan to develop a model that can ex-
plain how the neighbor-graphs evolve over discrete time, and determine sufficient
conditions for coordination of multi-agents in terms of these agents' initial states.
Another thing that should be stressed is that coordination results obtained in
ours and in [3] are all asymptotic.
It will be interesting to devise other local
updating rules such that, using these rules, coordination will be reached quickly
and without centralized control. This work is currently being undertaken.
2A similar result was obtained by Savkin [6] for a simple version of Vicsek model where the
headings θi(t)'s take their values from a certain finite set.
3Such a situation has been investigated (though for continuous time) by Lin et al. [4].
10
References
[1] G. Flierl, D. Grunbaum, S. Levin, and D. Olson. From individuals to aggre-
gations: The interplay between behavior and physics. Journal of Theoretical
Biology, 196(4):397 -- 454, 1999.
[2] A. Jadbabaie. On distributed coordination of mobile agents with changing
nearest neighbors. Technical Report, University of Pennsylvania, Philade-
phia, PA, 2003.
[3] A. Jadbabaie, J. Lin, and A.S. Morse. Coordination of groups of mobile
IEEE Transactions on
autonomous agents using nearest neighbor rules.
Automatic Control, 48(6):988 -- 1001, 2003.
[4] Z. Lin, M. Broucke, and B. Francis. Local control strategies for groups
IEEE Transactions on Automatic Control,
of mobile autonomous agents.
49(4):622 -- 628, 2004.
[5] C.W. Reynolds. Flocks, birds, and schools: A distributed behavioral model.
Computer Graphics, 21:25 -- 34, 1987.
[6] A. Savkin. Coordinated collective motion of groups of autonomous mobile
robots: Analysis of vicsek's model. IEEE Transactions on Automatic Con-
trol, 49(6):981 -- 983, 2004.
[7] J. Toner and Y.H. Tu. Long range order in a two dimensional xy model:
How birds fly together? Physical Review Letters, 75:4326 -- 4329, 1995.
[8] J. Toner and Y.H. Tu. Flocks, herds, and schools: A quantitative theory of
flocking. Physical Review E, 58(4):4828 -- 4858, 1998.
[9] T. Vicsek, A. Czirok, E. Ben Jacob, I. Cohen, and O. Schochet. Novel type
of phaze transitions in a system of self-driven particles. Physical Review
Letters, 75:1226 -- 1229, 1995.
[10] K. Warburton and J. Lazarus. Tendency distance models of social cohesion
in animal groups. Journal of Theoretical Biology, 150(4):473 -- 488, 1991.
11
|
1911.06783 | 1 | 1911 | 2019-11-15T17:58:41 | A Turing Test for Crowds | [
"cs.MA"
] | The realism and believability of crowd simulations underpins computational studies of human collective behaviour, with implications for urban design, policing, security and many other areas. Realism concerns the closeness of the fit between a simulation and observed data, and believability concerns the human perception of plausibility. In this paper, we ask two questions, via a so-called "Turing Test" for crowds: (1) Can human observers distinguish between real and simulated crowds, and (2) Can human observers identify real crowds versus simulated crowds? In a study with student volunteers (n=384), we find convincing evidence that non-specialist individuals are able to reliably distinguish between real and simulated crowds. A rather more surprising result is that such individuals are overwhelmingly unable to identify real crowds. That is, they can tell real from simulated crowds, but are unable to say which is which. Our main conclusion is that (to the lay-person, at least) realistic crowds are not believable (and vice versa). | cs.MA | cs | A Turing Test for Crowds
Jamie Webster and Martyn Amos1
Abstract. The realism and believability of crowd simulations un-
derpins computational studies of human collective behaviour, with
implications for urban design, policing, security and many other ar-
eas. Realism concerns the closeness of the fit between a simulation
and observed data, and believability concerns the human perception
of plausibility. In this paper, we ask two questions, via a so-called
"Turing Test" for crowds: (1) Can human observers distinguish be-
tween real and simulated crowds, and (2) Can human observers iden-
tify real crowds versus simulated crowds? In a study with student
volunteers (n=384), we find convincing evidence that non-specialist
individuals are able to reliably distinguish between real and simu-
lated crowds. A rather more surprising result is that such individu-
als are overwhelmingly unable to identify real crowds. That is, they
can tell real from simulated crowds, but are unable to say which is
which. Our main conclusion is that (to the lay-person, at least) real-
istic crowds are not believable (and vice versa).
1
Introduction
The formal study of human crowds dates back to before the French
Revolution [8], but understanding collective behaviour is more ur-
gent than ever before, as populations migrate to high-density urban
centres, protests become more organized (and perhaps more com-
mon), and increasing numbers of individuals pass through large-scale
transportation hubs [9]. A number of computational techniques exist
to study the dynamics of crowd behaviour, but the most commonly-
used is simulation [41].
Crowd simulations (generally, but not exclusively, using an agent-
based approach) are now employed in many different domains, from
events planning and management
[5], to urban design [12], and
incident response and analysis [16, 37]. By studying flows of people
en masse, and their interactions with the environment and with one
another, researchers aim to better understand human collective social
behaviour, design more effective and enjoyable public spaces, and
improve levels of safety, security and well-being [15].
In this paper, we consider two related properties of crowd simula-
tions; (1) realism, and (2) believability. The first property concerns
how well a simulation's output matches the expected or observed
behaviour of a real crowd in the same scenario, under the same con-
ditions. The second property centres on how convincing a simulation
is to a human observer, and how closely it matches their expectations
of how a crowd will behave. The two properties are closely inter-
linked, and "believability" is often used as a synonym for "realistic".
However, as we will see, the two concepts require close examination
and careful handling.
1 Department of Computer and Information Sciences, Northumbria Uni-
versity, Newcastle upon Tyne, NE8 1ST, United Kingdom. Email:
{jamie.webster, martyn.amos}@northumbria.ac.uk
9
1
0
2
v
o
N
5
1
]
A
M
.
s
c
[
1
v
3
8
7
6
0
.
1
1
9
1
:
v
i
X
r
a
The rest of the paper is organized as follows: in Section 2 we
briefly review related work on crowd simulation and collective be-
haviour; in Section 3 we present our "Turing Test" for crowd be-
haviour, and in Section 4 we give the results of experimental trials.
We conclude with a brief discussion of the implications of our find-
ings.
2 Background
The study of human crowd dynamics [1] is motivated by the desire to
understand and predict the behaviour of individuals en masse, and en-
compasses a diverse range of crowd types, from large, mainly static
crowds at sporting events or concerts [44], to transitory and flowing
crowds, such as those found in train stations at rush hour [47], or at
religious events such as Hajj [7]. As urban centres grow in size (the
United Nations predicts that, by 2050, 68% of the global population
will live in cities [31]), we will need to understand and mitigate the
impact of crowds on infrastructure, safety, security, and quality of
life [2].
Early attempts to understand crowd behaviour were rooted in the
physical sciences, using metaphors and mathematical tools from
fluid dynamics [19], and modelled crowds at the macroscopic level
(i.e., without considering individuals) [21]. Subsequent work used
an entity-based approach, which treated crowds as individual "par-
ticles" [4, 42], along with the agent-based methodology, in which
individuals are treated as semi-autonomous actors [33].
As crowd simulations have become used more frequently, atten-
tion has become focused on issues of realism and believability.
Here, we define the realism of a simulation in terms of its validity
[22, 25, 36, 38]; how closely does the output of the model match data
obtained in the real world? It is straightforward to obtain statistical
properties of simulation outputs and compare these to the properties
of real-world crowds, and that is the approach we take in this paper.
The issue of believability is subtly different, and concerns the hu-
man perception of whether or not a crowd's behaviour is plausible.
As computer-generated imagery (CGI) becomes increasingly com-
mon in large-scale cinematic productions, it is being used to replace
human actors in large-scale crowd scenes, for reasons of cost and/or
feasibility (e.g., the 2001 film The Lord of the Rings: The Fellow-
ship of the Ring featured a prologue battle with 100,000 computer-
generated fighters). Many modern video games also feature large
numbers of simulated individuals. In these cases, the main concern
is to "fool" the observer into thinking that they are watching a real
crowd, without necessarily producing patterns that are behaviourily
valid [11, 34].
We seek, therefore, to study whether or not human observers may
be persuaded that a simulated crowd is actually a "real" crowd. This
may be thought of as a limited form of the famous "Turing Test",
named after Alan Turing, and described in his landmark paper on ar-
Figure 2. Distribution of walking speeds for pedestrians observed in Edin-
burgh Informatics Forum.
individuals whose trajectories were captured were actively partici-
pating in movement studies; the trajectories, therefore, are as close
to "natural" as possible (i.e., they have "behavioural ecological va-
lidity" [29]).
In what follows, we use the term "clip" to specifically refer to
a time-limited sequence of trajectory data (whether taken from the
Edinburgh dataset or from the output of a simulation), as opposed
to a movie visualisation. We wrote a utility to search the Edinburgh
dataset and extract clips of a specific duration containing a specific
number of individuals. This allowed us to ensure that the "real" and
"simulated" crowds contained the same number of individuals for
any single comparison.
3.2 Model calibration
In order to calibrate our simulation (and, later, to perform statisti-
cal analysis), we selected 20 clips at random from the Edinburgh
dataset (each of 60s duration), and calculated the average walking
speed of pedestrians observed traversing the Forum. The distribution
of speeds is shown in Figure 2, with a mean value of 1.17m/s. When
we simulated these scenarios (see next Section), the mean speed of
agents was higher (1.63m/s), due to the fact that simulated agents
were rarely impeded, did not encounter bottlenecks, and were free to
accelerate up to their maximum speed. However, as we will see from
our results, this did not affect the perception of the simulated crowds.
For the comparison experiments, we randomly selected six clips
taken from the Edinburgh dataset (the number of clips is the same
as in [20]; each was of 60s duration, and the number of individuals
in a clip ranged from 104 to 194 (with an average of 139). For each
clip, we extracted the route choice distribution and the entry time
distribution for all individuals. This allowed us to initialise our sim-
ulations with the same distributions, ensuring that the runs closely
matched the macroscopic properties of the real-world observations
(while leaving room for the microscopic differences in which we are
interested). We also calculated the average velocity of individuals in
each clip, and used this to scale the clip's length (by modifying the
video playback speed) to account for variability in camera capture
rate, thus normalizing the velocity of individuals relative to expected
walking speed [3].
Figure 1. Diagram of Edinburgh Informatics Forum (ingress and egress
points numbered).
tificial intelligence [43]. Turing proposed that if a human observer
was unable to distinguish between another person and a machine de-
signed to produce human-like responses in a conversational setting,
then the machine would be deemed to have "passed" the test. This
type of test has been proposed for biological modelling [17] and arti-
ficial life [6] as a way of capturing and interrogating life-like proper-
ties of artificial systems, and assessing the completeness and validity
of a model. Recently, a Turing test for collective motion in fish was
described [20], and we base our approach on this. Our overall aim is
to explore how a Turing-like test may be used to examine assump-
tions and preconceptions about the behaviour of human crowds, and
to establish the features of real crowds that must be emulated by a
simulation in order for it to be valid and/or "pass" the test. In the
next Section, we describe our methodology for doing so.
3 Experimental method
Our methodology is based on that of [20], but with in-person (as op-
posed to online) participants. We showed all participants six pairs of
videos, in which one randomly-selected video showed the movement
of a real crowd, and the other showed the movement of a simulated
crowd. Both real and simulated crowd movements were displayed us-
ing the same rendering method, and participants were asked to spec-
ify on a form which of each pair they thought was the real crowd.
3.1 Dataset
We use data on real pedestrians from the University of Edinburgh
School of Informatics [30]. This public dataset, captured in 2010,
contains over 299,000 individual trajectories corresponding to the
movement of individuals through the School Forum, and is one of
the largest open datasets of its type. A diagram of the Forum space is
shown in Figure 1. The Forum is rectangular in shape (measuring ap-
proximately 15.8 × 11.86 metres), has eleven ingress/egress points,
and is generally clear of obstructions. Images were captured (9 per
second) by a camera suspended 23m above the Forum floor, from
which individual trajectories ("tracks") were extracted and made
available (extraction was performed by the author of
[30]). This
dataset has been used in a large number of studies of pedestrian
movement/tracking, including [13, 29, 46], Importantly, none of the
2
3.3 Simulations
In order to produce the simulations to accompany each Edinburgh
clip, we simulated pedestrian movement using the Vadere package
[24]. This package is open-source, which means that (unlike com-
mercial software) its movement models are open to inspection, and
it also allows for easy exporting of simulating pedestrian trajectories
(which is important when we consider that we must use the same
renderer for both real and simulated videos).
A crucial component of the simulation is the crowd motion model.
This defines the rules of interaction between individuals (e.g., avoid-
ance), and between individuals and their environment (e.g., repulsion
from walls and physical obstacles), as well as route choice behaviour
and differential walking speed. Many different crowd motion mod-
els exist [10], but perhaps the most commonly-used type is based on
social forces. Inspired by the fluid flow paradigm of Henderson [19]
and others, Helbing and Molnar's social force model (SFM)
[18]
is a microscopic, continuous model which uses "attractive" and "re-
pulsive" force fields between individuals (and between individuals
and their environment) to guide movement. The SFM provides the
base movement model for a number of pedestrian simulation pack-
ages, including FDS+EVAC [26], PedSim [14], SimWalk [23] and
MassMotion [32], and it has been used extensively in movement re-
search. Additionally, the SFM has been validated using real-world
data [22, 38], and the comprehensive review of [10] recommends its
use in pedestrian movement studies. For all simulations, we used the
pre-supplied Vadere template for Helbing and Molnar's SFM, with
default attributes and parameters (listed in Table 1).
Table 1. Vadere simulation model parameters.
Parameter
Value
ODE Solver
Pedestrian body potential
Pedestrian recognition distance
Obstacle body potential
Obstacle repulsion strength
Pedestrian radius (m)
Pedestrian speed distribution mean (m/s)
Pedestrian minimum speed (m/s)
Pedestrian maximum speed (m/s)
Pedestrian acceleration (m/s)
Pedestrian search radius (m)
Dormand-Prince method
2.72
0.3
20.1
0.25
0.2
1.4
0.4
3.2
2.0
2.0
We added small amounts of noise to the simulated trajectories in
order to replicate noise in the real crowd data. As the Edinburgh
individuals were detected by an overhead camera running at 9fps,
occasional faulty detections caused very short-term errors in the ex-
tracted trajectories. Once rendered, this cause individuals to appear
to rapidly "flick" between two headings. As we had no reliable way
to quantify the (by inspection, small) amount of noise in the trajecto-
ries, we adjusted this by eye until the apparent noise in the simulated
data matched the noise level observed in the real data. At any time-
step, a simulated agent had a 15% chance of temporarily "flicking"
their heading by a randomly selected value up to 45 degrees (with-
out changing their trajectory). Importantly, as we will see from the
results, the addition of this noise had no effect on how the simulated
crowds were perceived.
A second artefact of inaccurate detections was that some trajec-
tories had missing sections for several time steps; once rendered,
these individuals would temporarily disappear from the frame and
then reappear. To fix this, we automatically detected such situations
and interpolated coordinates for the missing time-steps when parsing
the Edinburgh dataset. We also increased the number of frames per
second of both sets of trajectories (real and simulated), from 9 to 72,
by interpolating coordinates. This enabled smooth video playback
for the purpose of comparisons.
3.4 Comparisons
The trajectories of both the simulated and real individuals in each
pair of clips were then rendered in a uniform fashion, using a tool
coded in Java. This allowed us to produce "top down" visualisations
of both real and simulated clips that were uniform in appearance,
with individuals represented as filled circles, and headings depicted
by an arrow (see Figure 3).
Figure 3. Single frame render of an example crowd.
For each pair, the real and simulated videos were randomly as-
signed to position A (left) or B (right), and these were combined
side-by-side into a single video. Individual videos did not "loop",
and were made up of the first 30 seconds of the real and simulated
crowd clips in each pair. The total duration of the video, showing a
total of six comparisons, was 3m 18s (including a 3s pause between
each pair). The video is available at http://drives.media/google857,
and the real crowds are A, A, B, A, B and B.
3.5 Statistical properties
The first question we asked was whether or not participants could
distinguish between real and simulated crowds, even when their sta-
tistical properties were very similar. That is, are there features of real
(or simulated) crowds that somehow act as an discriminator, even
when there is no significant statistical difference between the two?
We used two metrics (as in [20]); polarization and nearest neigh-
bour distance (NND). Polarization measures the level of "order" in
a crowd, in terms of the heading alignment of members. Polarization
is zero when the crowd is completely disordered (everyone is point-
ing in a different direction), and has a maximum value of 1 when all
members of the crowd have the same heading:
(cid:42)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) i=1(cid:88)
N
(cid:43)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
ϕ =
1
N
exp(ιθi)
,
(1)
where N is the number of individuals in the frame, ι is the imagi-
nary unit, and θi is the heading of each individual.
3
the order of 2%, and we do not believe that this is significant enough
to introduce any perceptible difference.
4 Experiments
We recruited 384 undergraduate students from Northumbria Univer-
sity, distributed over 9 groups taken from a mixture of computer sci-
ence and engineering courses. Of the participants who supplied their
details, the gender distribution was 78.83% male, 18.66% female,
2.5% non-binary/other, and the average age was 20.7 (we exclude
one outlier age value of 71, corresponding to a student's reader). All
trials took place at the beginning of a class, for which prior permis-
sion was obtained from the tutor. Students were informed about the
nature of the experiment, and told that they were under no obligation
to participate. Answer sheets were distributed, which consisted of a
simple numbered list of tickboxes (for each line, the choice was A or
B). Participants were asked to optionally specify their age and gen-
der. At the end of the trial, participants were also asked to provide
some optional narrative notes on any distinguishing features they
noticed that allowed them to tell the real crowd from the simulated
crowd. Each trial (from initial set-up to collection of answer sheets)
took around ten minutes. The experimental protocol was approved by
the Northumbria University Faculty of Engineering and Environment
Ethics Board, application number 16433.
4.1 Results
We define "score" in terms of correct identification of the real crowd;
so a score of zero means that a participant failed to identify any of
the real crowds, and a score of 6 means that the participant identified
the real crowd on every occasion. The average score for participants,
across all comparisons, was 1.6. That is, participants performed less
well than if they had guessed at random. The overall distribution of
scores is shown in Figure 5, overlaid with the expected binomial
distribution (as each comparison is a binary choice, we show this to
illustrate the expected distribution of scores if selections were made
at random)2.
If the real and simulated crowds were genuinely indistinguishable
(that is, the best strategy would be no better than random guessing),
then we would expect roughly 3% of participants (around 12 people)
to either guess none correctly, or to guess all six correctly. What we
actually found was that over 40% of participants (154 individuals)
obtained a score of either zero or six. That is, those individuals were
able to correctly partition all six pairs of videos into two sets. This
answers, in the affirmative, the first research question: can individu-
als distinguish between real and simulated crowds, even when they
have very similar statistical properties?
A highly striking result is that the most common score, by far,
was zero. That is, a significant proportion of participants (36.46%)
failed to identify a single real crowd. Only 3.65% of participants ob-
tained a perfect score of 6. The important implication of this is that
participants were reliably able to partition videos along the lines of
"real"/"artificial", but most of them were unable to say which was
which. This is a much stronger version of the result obtained in [20],
where participants were able to tell real fish from simulated fish, but
were not necessarily able to identify the real fish.
We conclude, therefore, that the second research question (can in-
dividuals identify real crowds versus simulated crowds, even when
they have very similar statistical properties?) must be answered in
2 Full results are available at https://doi.org/10.6084/m9.figshare.10308407
Figure 4. Crowd simulations/real crowd comparisons: Nearest Neighbour
Distance (NND) (top) and polarization (bottom) as a function of crowd size.
The outputs of both simulations have statistical properties that are close to
those of the real crowds.
Nearest-neighbour distance (NND) measures the level of "cluster-
ing in a crowd. The average NND for a single "frame" (derived from
either the real dataset or the simulation) is calculated from the sum
of nearest-neighbour distances of all N individuals:
i=1(cid:88)
N
ν =
1
N
di,
(2)
where di is the nearest neighbor distance between point i and the
closest individual in the frame, as calculated by the standard distance
formula,
di =(cid:112)(x2 − x1)2 + (y2 − y1)2
(3)
In order to confirm that we did not introduce implementation-
specific bias by choosing a specific software platform, we compared
the outputs of Vadere and JuPedSim [45], an alternative open-source
simulation package. We used each package to simulate the 20 real
crowd clips mentioned in the previous Section, and calculated aver-
age NND and polarization over 20 runs for each. The same statistics
were then calculated for the real clips (Figure 4).
These results confirmed that crowd simulations in Vadere and
JuPedSim display similar properties in terms of both NND and polar-
ization, so we selected Vadere as a representative example of crowd
simulation packages in general.
Importantly,
the statistical properties of the simulations also
matched the general properties of the real crowds, which confirmed
that they are essentially indistinguishable in those terms. In Figure 4
we notice a slight difference between the real and simulated crowds
in terms of polarization; the real crowds are generally slightly more
closely-aligned than the simulated crowds, but this difference is on
4
identifications, with an average score of 2.46. Group 9 (first year
computer science students) had the fewest correct identifications,
with an average score of 1.08.
The first
4.2 Narrative findings
In this Section, we analyse the free text supplied by participants. We
focus, in particular, on the large number of participants who scored
zero, as they consistently misidentified the real crowd. We highlight
themes and specific comments that may shed light on the assump-
tions and preconceptions held by these individuals, that led them to
consistently "flip" the real and simulated crowds in their perception.
theme that emerged concerned rapid or "random"
changes of movement in the real crowd, which many participants in-
correctly attributed to the simulated ("fake") crowd. Versions of this
included "Fake changed direction too quickly", "Fast change sug-
gests fake", "Generated crowd had too much random movement",
"Real seemed to change direction gently". Although the average
speed of the simulated agents was higher than that of the real people,
participants singled out rapid movement in the Edinburgh videos as
indicative of artificiality (when, in fact, the real people moved more
slowly). Overall, 72 participants mentioned a variant of this type of
observation. The underlying assumption here is that real people move
smoothly, at a uniform speed, and do not tend to deviate much from
their chosen path.
A second common theme concerned avoidance; many participants
incorrectly assumed that real people would avoid close contact with
one another, whereas the simulated individuals would "overlap" or
collide. Representative quotes included "Simulated people collided,
real crowds avoided each other", and "People overlapping". In re-
ality, the opposite is true, as the real dataset contains multiple in-
stances of individuals coming into close proximity. Moreover, the
social forces model explicitly tries to keep individuals apart unless
close proximity is unavoidable, so the behaviour (distance keeping)
that participants attributed to real people was actually an in-built fea-
ture of the simulation. This theme was mentioned by 22 participants.
Perhaps the most profound observations concerned perceived in-
tentionality and group-level behaviour; many participants believed
that "On the whole, people have relatively smooth and intentional
paths" (this was actually a feature of the simulation), "Real crowds
don't really stand around" (stationary groups were only present in the
real dataset), and "The real ones knew where they were going" (this
was actually a function of the simulation's path choice algorithm).
Variations on this theme were mentioned by 7 participants. The inter-
esting thing here is that participants (incorrectly) ascribed clear hu-
man intentionality and purpose to the simulated agents ("Real crowds
move more purposefully"), and failed to acknowledge it in the actual
humans that were observed.
Overall, we found that participants believed that individuals in
crowds are orderly, purposeful, respectful of personal space, and
consistent and uniform in their speed and direction. In fact, all of
these characteristics were features of the simulation. Participants also
failed to recognize features of real crowds such as rapid changes
in speed or direction, close proximity of individuals, and stationary
groups/individuals, all of which were discounted by participants as
being "glitchy" or "unrealistic". Our findings would, therefore, ap-
pear to contradict [28], in which the authors state that "However,
people do more than just walk. They talk to one another, they look
around, they scratch their heads or perform various other actions...
The absence of these mundane actions diminishes the credibility of
the simulated crowd." Such arguments about "diminished credibil-
Figure 5. Distribution of participant scores (the line represents the expected
binomial distribution).
the negative for this population. In the next Section, we analyse the
narrative text supplied by participants, in order to explore the under-
lying rationale for their decisions.
We now briefly explore secondary features of our findings. The
results for each comparison are shown in Figure 6, which we present
in terms of the proportion of participants who correctly selected the
real crowd. These results show that pair 6 presented the strongest
challenge to participants, and pair 2 was considered the least chal-
lenging. Overall, no clear trend emerged in terms of differential chal-
lenge across comparisons.
Figure 6. Success rate across individual pairwise comparisons.
Figure 7. Distribution of scores across participant groups.
In terms of variation across groups (Figure 7), Group 1 (second
year Engineering Mathematics students) obtained the most correct
5
ity" would seem to have little empirical basis in fact, and even when
attempts are made to integrate "realistic" behaviours into crowd sim-
ulations, no rigorous test is performed to assess whether or not they
have had any impact on perceived plausibility in human observers.
5 Conclusions
In this paper, we presented a Turing test for crowds that allowed us
to investigate issues of realism and believability in crowd simula-
tions by comparing them with visualisations representing data ob-
tained from real pedestrians. We performed trials with nearly 400
university students, and found that, while the students were gener-
ally able to discriminate between "real" and "artificial" crowds, they
were unable to say which was which. On the surface, this was a rather
surprising result, but it serves to emphasise that a simulation model
that is realistic (that is, accurately reflects reality) might be useful
for planning an evacuation scenario, where fidelity is paramount, but
it might be less useful where "believability" is more important (in a
video game, for example). Conversely, this serves as a warning that
software development platforms aimed primarily at entertainment ti-
tles should perhaps not be relied upon for safety-critical or poten-
tially expensive infrastructure studies without careful modification.
We acknowledge several potential limitations of our study; the use
of students as test subjects is the subject of ongoing debate [35], and
the computer science background of many of the students (and the
gender imbalance) may have biased our results. It may be the case
that our students have become conditioned to make certain assump-
tions about how crowds behave from playing games that use a rela-
tively unrealistic crowd model. However, this is merely speculation
on our part. Nonetheless, an important future development of this
work will be to rerun the trials using experts in crowd dynamics, to
find out whether they are better placed to identify the real crowd.
This is entirely consistent with Harel's expectation of how a bio-
logical modelling Turing test might work; "...our interrogators can't
simply be any humans of average intelligence. Both they and the ....
people responsible for 'running' the real organism and providing its
responses to probes, would have to be experts on the subject matter
of the model, appropriately knowledgeable about its coverage and
levels of detail." [17]
If (as we might expect) the experts are able to reliably identify the
real crowd, then this immediately suggests a mechanism for ascer-
taining the minimal set of crowd features that are necessary to "pass"
the test. If, for example we identified that "group-level movement"
was a "flag" for the experts, we might include such a behaviour in the
simulation and rerun the trial with a second group of experts. If the
success rate falls, and the experts are less able to tell the difference
between real and simulated crowds, then we might conclude that
group-level behaviour constitutes an important feature that should be
included in simulation packages. This would represent a formalised
methodology for implementing a number of recommendations that
have been recently made by a number of crowd scientists, who call
for the integration into software of a wider range of psychological
and inter-personal processes [27, 39, 40]. These recommendations
reflect a pressing need to revisit physics-based models of crowd be-
haviour which, though they may generate macroscopic behaviour
that is reasonably realistic, fail to capture the inherent "messiness"
and unpredictability of real human crowds.
ACKNOWLEDGEMENTS
We thank Jeremy Ellman for advice on statistical analysis.
6
REFERENCES
[1]
J. Adrian, M. Amos, M. Baratchi, et al., 'A glossary for research on
human crowd dynamics', Collective Dynamics, 4(A19), 1 -- 13, (2019).
[2] G.D.P.A. Aschwanden, S. Haegler, F. Bosch´e, L. Van Gool, and
G. Schmitt, 'Empiric design evaluation in urban planning', Automation
in Construction, 20(3), 299 -- 310, (2011).
[3] R.W. Bohannon, 'Comfortable and maximum walking speed of adults
aged 2079 years: reference values and determinants', Age and Ageing,
26(1), 15 -- 19, (1997).
[4] E. Bouvier, E. Cohen, and L. Najman, 'From crowd simulation to airbag
deployment: particle systems, a new paradigm of simulation', Journal
of Electronic Imaging, 6(1), 94 -- 108, (1997).
[5] L. Crociani, G. Lammel, and G. Vizzari, 'Multi-scale simulation for
crowd management: a case study in an urban scenario', in International
Conference on Autonomous Agents and Multiagent Systems (AAMAS),
pp. 147 -- 162. Springer, (2016).
[6] L. Cronin, N. Krasnogor, B.G. Davis, C. Alexander, N. Robertson,
J.H.G. Steinke, S.L.M. Schroeder, A.N. Khlobystov, G. Cooper, P.M.
Gardner, et al., 'The imitation gamea computational chemical approach
to recognizing life', Nature Biotechnology, 24(10), 1203, (2006).
[7] S. Curtis, S.J. Guy, B. Zafar, and D. Manocha, 'Virtual Tawaf: A case
study in simulating the behavior of dense, heterogeneous crowds', in
2011 IEEE International Conference on Computer Vision Workshops
(ICCV Workshops), pp. 128 -- 135. IEEE, (2011).
J. Drury and C. Stott, 'Contextualising the crowd in contemporary so-
cial science', Contemporary Social Science, 6(3), 275 -- 288, (2011).
J. Drury and C. Stott, Crowds in the 21st Century: Perspectives from
Contemporary Social Science, Routledge, 2015.
[8]
[9]
[10] D.C. Duives, W. Daamen, and S.P. Hoogendoorn, 'State-of-the-art
crowd motion simulation models', Transportation Research Part C:
Emerging Technologies, 37, 193 -- 209, (2013).
[11] F. Durupinar, N. Pelechano, J. Allbeck, U. Gudukbay, and N.I. Badler,
'How the ocean personality model affects the perception of crowds',
IEEE Computer Graphics and Applications, 31(3), 22 -- 31, (2009).
[12] T. Feng, L-F. Yu, S-K Yeung, K. Yin, and K. Zhou, 'Crowd-driven mid-
scale layout design.', ACM Transactions on Graphics, 35(4), 132 -- 1,
(2016).
[13] T. Fernando, S. Denman, S. Sridharan, and C. Fookes, 'Tracking by
prediction: A deep generative model for multi-person localisation and
tracking', in 2018 IEEE Winter Conference on Applications of Com-
puter Vision (WACV), pp. 1122 -- 1132. IEEE, (2018).
[14] C. Gloor.
PedSim: Pedestrian
crowd
simulation,
2016.
http://pedsim.silmaril.org.
J. Halatsch, A. Kunze, and G. Schmitt, 'Value Lab: A collabora-
tive environment for the planning of Future Cities', in Proceedings of
eCAADe, volume 27, (2009).
[15]
[16] P. Harding, S. Gwynne, and M. Amos, 'Mutual information for the de-
tection of crush', PloS ONE, 6(12), e28747, (2011).
[17] D. Harel, 'A Turing-like test for biological modeling', Nature Biotech-
nology, 23(4), 495, (2005).
[18] D. Helbing and P. Molnar, 'Social force model for pedestrian dynam-
ics', Physical Review E, 51(5), 4282, (1995).
[19] L.F. Henderson, 'On the fluid mechanics of human crowd motion',
Transportation research, 8(6), 509 -- 515, (1974).
J.E. Herbert-Read, M. Romenskyy, and D.J. Sumpter, 'A Turing test for
collective motion', Biology Letters, 11, 20150674, (2015).
[21] R.L. Hughes, 'The flow of human crowds', Annual Review of Fluid
[20]
Mechanics, 35(1), 169 -- 182, (2003).
[22] A. Johansson, D. Helbing, and P.K. Shukla, 'Specification of the social
force pedestrian model by evolutionary adjustment to video tracking
data', Advances in Complex Systems, 10(supp02), 271 -- 288, (2007).
[23] T. Kimura, H. Sekine, T. Sano, N. Takeichi, Y. Yoshida, and H. Watan-
abe, 'Pedestrian simulation system SimWalk', in Summaries of Techni-
cal Papers of Annual Meeting Architectural Institute of Japan, E-1, pp.
915 -- 916, (2003).
[24] B. Kleinmeier, B. Zonnchen, M. Godel, and G. Koster, 'Vadere: An
open-source simulation framework to promote interdisciplinary under-
standing', arXiv preprint arXiv:1907.09520, (2019).
[25] H. Klupfel, 'The simulation of crowd dynamics at very large events -
calibration, empirical data, and validation', in Pedestrian and Evacua-
tion Dynamics (PED) 2005, 285 -- 296, Springer, (2007).
[26] T. Korhonen, S. Hostikka, S. Heliovaara, and H. Ehtamo, 'FDS+Evac:
an agent based fire evacuation model', in Pedestrian and Evacuation
Dynamics (PED) 2008, 109 -- 120, Springer, (2010).
[27] S. Lemercier and J.M. Auberlet, 'Towards more behaviors in crowd
simulation', Computer Animation And Virtual Worlds, (2016).
[28] A. Lerner, E. Fitusi, Y. Chrysanthou, and D. Cohen-Or, 'Fitting behav-
iors to pedestrian simulations', in Proceedings of the 2009 ACM SIG-
GRAPH/Eurographics Symposium on Computer Animation, pp. 199 --
208. ACM, (2009).
[29] R. Lovreglio, C. Dias, X. Song, and L. Ballerini, 'Towards micro-
scopic calibration of pedestrian simulation models using open trajec-
tory datasets: the case study of the Edinburgh Informatics Forum',
in Conference on Traffic and Granular Flow, Washington DC, USA,
(2017).
[30] B. Majecka, Statistical models of pedestrian behaviour in the forum,
Master's thesis, School of Informatics, University of Edinburgh, 2009.
[31] United Nations. 2018 Revision of World Urbanization Prospects, 2018.
[32] Oasys. Mass motion product page, 2019.
https://www.oasys-
software.com/products/pedestrian-simulation/massmotion/.
[36]
[33] X. Pan, C.S. Han, K. Dauber, and K.H. Law, 'A multi-agent based
framework for the simulation of human and social behaviors during
emergency evacuations', AI & Society, 22(2), 113 -- 132, (2007).
[34] C. Peters and C. Ennis, 'Modeling groups of plausible virtual pedestri-
ans', IEEE Computer Graphics and Applications, 29(4), 54 -- 63, (2009).
[35] R.A. Peterson, 'On the use of college students in social science re-
search: Insights from a second-order meta-analysis', Journal of Con-
sumer Research, 28(3), 450 -- 461, (2001).
J. Pettr´e, J. Ondrej, A-H. Olivier, A. Cretual, and S. Donikian,
'Experiment-based modeling, simulation and validation of interac-
tions between virtual walkers', in Proceedings of the 2009 ACM SIG-
GRAPH/Eurographics Symposium on Computer Animation, pp. 189 --
198. ACM, (2009).
[37] M. Pretorius, S. Gwynne, and E.R. Galea, 'Large crowd modelling:
an analysis of the Duisburg Love Parade disaster', Fire and Materials,
39(4), 301 -- 322, (2015).
[38] S. Seer, C. Rudloff, T. Matyus, and N. Brandle, 'Validating social force
based models with comprehensive real world motion data', Transporta-
tion Research Procedia, 2, 724 -- 732, (2014).
[39] M.J. Seitz, A. Templeton, J. Drury, G. Koster, and A. Philippides, 'Par-
simony versus reductionism: How can crowd psychology be introduced
into computer simulation?', Review of General Psychology, 21(1), 95 --
102, (2017).
[40] A. Templeton, J. Drury, and A. Philippides, 'From mindless masses to
small groups : conceptualizing collective behavior in crowd modeling',
Review of General Psychology, 19(3), 215 -- 229, (2015).
[41] S. Thalmann and S.R. Musse, Crowd Simulation, Springer, 2013.
[42] A. Treuille, S. Cooper, and Z. Popovi´c, 'Continuum crowds', in ACM
Transactions on Graphics (TOG), volume 25, pp. 1160 -- 1168. ACM,
(2006).
[43] A.M. Turing, 'Computing machinery and intelligence', Mind, 59(236),
433, (1950).
[44] N. Wagner and V. Agrawal, 'An agent-based simulation system for con-
cert venue crowd evacuation modeling in the presence of a fire disaster',
Expert Systems with Applications, 41(6), 2807 -- 2815, (2014).
[45] A.K. Wagoum, M. Chraibi, J. Zhang, and G. Lammel, 'JuPedSim: an
open framework for simulating and analyzing the dynamics of pedes-
trians', in 3rd Conference of Transportation Research Group of India,
(2015).
[46] H. Wang and C. OSullivan, 'Globally continuous and non-Markovian
crowd activity analysis from videos', in European Conference on Com-
puter Vision, pp. 527 -- 544. Springer, (2016).
[47] Q. Zhang, B. Han, and D. Li, 'Modeling and simulation of passenger
alighting and boarding movement in Beijing metro stations', Trans-
portation Research Part C: Emerging Technologies, 16(5), 635 -- 649,
(2008).
7
|
1606.05837 | 1 | 1606 | 2016-06-19T07:16:28 | Acyclic Games and Iterative Voting | [
"cs.MA",
"cs.GT"
] | We consider iterative voting models and position them within the general framework of acyclic games and game forms. More specifically, we classify convergence results based on the underlying assumptions on the agent scheduler (the order of players) and the action scheduler (which better-reply is played).
Our main technical result is providing a complete picture of conditions for acyclicity in several variations of Plurality voting. In particular, we show that (a) under the traditional lexicographic tie-breaking, the game converges for any order of players under a weak restriction on voters' actions; and (b) Plurality with randomized tie-breaking is not guaranteed to converge under arbitrary agent schedulers, but from any initial state there is \emph{some} path of better-replies to a Nash equilibrium. We thus show a first separation between restricted-acyclicity and weak-acyclicity of game forms, thereby settling an open question from [Kukushkin, IJGT 2011]. In addition, we refute another conjecture regarding strongly-acyclic voting rules. | cs.MA | cs |
Acyclic Games and Iterative Voting ∗
Reshef Meir1
Maria Polukarov2
Jeffrey S. Rosenschein3
Nicholas R. Jennings4
1Technion-Israel Institute of Technology [email protected]
2University of Southampton, United Kingdom [email protected]
3The Hebrew University of Jerusalem, Israel [email protected]
4Imperial College, United Kingdom [email protected]
Abstract
We consider iterative voting models and position them within the general framework of acyclic games and
game forms. More specifically, we classify convergence results based on the underlying assumptions on the agent
scheduler (the order of players) and the action scheduler (which better-reply is played).
Our main technical result is providing a complete picture of conditions for acyclicity in several variations
of Plurality voting. In particular, we show that (a) under the traditional lexicographic tie-breaking, the game
converges for any order of players under a weak restriction on voters' actions; and (b) Plurality with randomized
tie-breaking is not guaranteed to converge under arbitrary agent schedulers, but from any initial state there is
some path of better-replies to a Nash equilibrium. We thus show a first separation between restricted-acyclicity
and weak-acyclicity of game forms, thereby settling an open question from [Kukushkin, 2011]. In addition, we
refute another conjecture regarding strongly-acyclic voting rules.
1
Introduction
Researchers in economics and game theory since Cournot [1838] had been developing a formal framework to study
questions about acyclicity and convergence of local improvement dynamics in games.
Intuitively put, strong-acyclicity means that the game will converge regardless of the order of players/voters
and how they select their action (as long as the moving agents are improving their utility in every step), i.e. that
there are no cycles of better-replies whatsoever; Weak-acyclicity means that while cycles may occur, from any
initial state (voting profile) there is at least one path of better-replies that leads to a Nash equilibrium; Restricted-
acyclicity is a middle ground, requiring convergence for any order of players (agent scheduler), but allowing the
action scheduler to restrict the way they choose among several available replies (e.g., only allowing best-replies).
Most relevant to us is the work of Kukushkin [1999; 2002; 2011], who studied general characterizations of game
forms that guarantee various notions of acyclicity.
A more recent field is iterative voting. In the iterative voting model, voters have fixed preferences and start
from some announcement (e.g., sincerely report their preferences). Votes are aggregated via some predefined rule
(e.g. Plurality), but can change their votes after observing the current announcements and outcome. The game
proceeds in turns, where a single voter changes his vote at each turn, until no voter has objections and the final
outcome is announced. This process is similar to online polls via Doodle or Facebook, where users can log-in at
any time and change their vote. Similarly, in offline committees the participants can sometimes ask to change their
vote, seeing the current outcome.
The formal study of iterative voting rules was initiated about 6 years ago in a AAAI paper that was a pre-
liminary version of this one [Meir et al., 2010]. Iterative voting papers typically focus on common voting rules
∗A preliminary version of this paper has been presented at AAAI-2010 [Meir et al., 2010].
1
such as Plurality and Borda, and study the conditions under which convergence of the iterative process to a Nash
equilibrium is guaranteed. Most results in the field consider best-reply dynamics [Lev and Rosenschein, 2012;
Reyhani and Wilson, 2012; Obraztsova et al., 2015].
While voting rules and game forms are essentially the same thing, the iterative voting literature has remained
largely detached from the more general literature on acyclicity in games. Bridging this gap is the main conceptual
contribution of this work, for two reasons. First, understanding the conditions that entail acyclicity of games and
game forms is crucial to the understanding of iterative voting scenarios, and to properly compare convergence
results (e.g. convergence of best-reply dynamics is a special case of restricted acyclicity). Likewise, convergence
results for specific voting rules under best/better-reply dynamics may shed light on more general questions re-
garding acyclicity. Building on the formalism of Kukushkin [2011] for strong/ restricted/ weak-acyclicity of game
forms, we re-interpret in this paper both known and new results on convergence of better- and best-reply in voting
games, and answer some open questions.
1.1 Related work
Kukushkin [2011] provided several partial characterizations for game forms with strong acyclicity. In particular, he
showed that if we further strengthen the acyclicity requirement to demand an ordinal potential, then this is attained
if and only if the game form is dictatorial, i.e., there is at most one voter that can affect the outcome. He further
characterized game forms that are strongly acyclic under coalitional improvements, and provided broad classes
of game forms that are "almost unrestricted acyclic," i.e.
restricted-acyclic under mild restrictions on voters'
actions. Other partial characterizations have been provided for acyclicity in complete information extensive-form
games [Boros et al., 2008; Andersson et al., 2010]. Some of this work is explained in more detail in the following
sections.
The study of classes of games (i.e. game forms with utilities) that are guaranteed to be acyclic or weakly acyclic
attracted much attention, in particular regarding the existence and properties of potential functions [Monderer and Shapley,
1996; Milchtaich, 1996; Fabrikant et al., 2010; Apt and Simon, 2012].
Strategic voting The notion of strategic voting has been highlighted in research on Social Choice as crucial to
understanding the relationship between preferences of a population and the final outcome of elections. In various
applications (ranging from political domains to artificial intelligence [AI]), the most widely used voting rule is
Plurality, in which each voter has one vote and the winner is the candidate who received the highest number of
votes. While it is known that no reasonable voting rule is completely immune to strategic behavior [Gibbard,
1973; Satterthwaite, 1975], Plurality has been shown to be particularly susceptible, both in theory [Saari, 1990;
Friedgut et al., 2011] and in practice [Forsythe et al., 1996]. This makes the analysis of any election campaign-
even one where the simple Plurality rule is used-a challenging task. As voters may speculate and counter-
speculate, it would be beneficial to have formal tools that would help us understand (and perhaps predict) the final
outcome.
In particular, natural tools for this task include the well-studied solution concepts developed for normal form
games, such as better/best responses, dominant strategies or different variants of equilibrium. Now, while vot-
ing settings are not commonly presented in this way, several natural formulations have been proposed in the
past [Dhillon and Lockwood, 2004; Chopra et al., 2004; Sertel and Sanver, 2004; Falik et al., 2012; Messner and Polborn,
2002]. These formulations are extremely simple for Plurality voting games, where voters have only a few available
ways to vote. Specifically, some of this previous work has been devoted to the analysis of solution concepts such
as elimination of dominated strategies [Dhillon and Lockwood, 2004] and strong equilibria [Sertel and Sanver,
2004]. There has been other multi-step voting procedures that have been proposed in the literature, such as iterated
majority vote [Airiau and Endriss, 2009] and extensive form games where voters vote one by one [Desmedt and Elkind,
2010].
In contrast to iterative voting, these models are inconsistent with the better-reply dynamics in normal
form games, and are analyzed via different techniques. A model more similar to ours was recently studied in
[Elkind et al., 2015], where voters can choose between voting truthfully, and manipulating under the assumption
that everyone else are truthful.
2
Convergence of better-reply dynamics in iterative voting for particular voting rules has been studied extensively
in the computational social choice literature. We summarize and compare these findings with ours in the concluding
section, and in particular in Table 1.
An important question in every model of strategic voting, including iterative voting, is whether the reached
equilibrium is good for the society according to various metrics. Branzei et al.[2013] showed bounds on the
dynamic price of anarchy, i.e. how far can the final outcome be from the initial truthful outcome. Other work used
simulations to show that iterative voting may improve the social welfare or Condorcet efficiency [Grandi et al.,
2013; Meir et al., 2014; Koolyk et al., 2016], but typically under the assumptions that voters use various heuristics.
Biased and sophisticated voting Some recent work on iterative voting deals with voters who are uncertain, truth-
biased, lazy-biased, bounded-rational, non-myopic, or apply some other restrictions and/or heuristics that diverge
from the standard notion of better-reply in games [Reijngoud and Endriss, 2012; Gohar, 2012; Grandi et al., 2013;
Obraztsova et al., 2013; Meir et al., 2014; Rabinovich et al., 2015; Obraztsova et al., 2015; Meir, 2015]. Although
the framework is suitable for studying such iterative dynamics as well, this paper deals exclusively with myopic
better-reply dynamics.1
1.2 Contribution and structure
The paper unfolds as follows. In Section 2, we define the iterative voting model within the more general framework
of game forms and acyclicity properties. In Section 3 we consider strong acyclicity, and settle an open question
regarding the existence of acyclic non-separable game forms. Section 4 focuses on order-free acyclicity of the
Plurality rule. Our main result in this section shows that to guarantee convergence, it is necessary and sufficient
that voters restrict their actions in a natural way that we term direct reply-meaning that a voter will only reassign
his vote to a candidate that will become a winner as a result. In Section 5, we use variations of Plurality to show
a strict separation between restricted acyclicity and weak acyclicity, thereby settling another open question. We
conclude in Section 6.
2 Preliminaries
We usually denote sets by uppercase letters (e.g., A, B, . . .), and vectors by bold letters (e.g., a = (a1, . . . , an)).
2.1 Voting rules and game forms
There is a set C of m alternatives (or candidates), and a set N of n strategic agents, or voters. A game form (also
called a voting rule) f allows each agent i ∈ N to select an action ai from a set of messages Ai. Thus the input to
f is a vector a = (a1, . . . , an) called an action profile. We also refer to ai as the vote of agent i in profile a. Then,
f chooses a winning alternative-i.e., it is a function f : A → C, where A = ×i∈N Ai. See Fig. 1 for examples.
A voting rule f is standard if Ai = A for all i, and A is either π(C) (the set of permutations over C)
or a coarsening of π(C). Thus most common voting rules except Approval are standard. Mixed strategies are
not allowed. The definitions in this section apply to all voting rules unless stated otherwise. For a permutation
P ∈ π(C), We denote by top(P ) the first element in P .
Plurality In the Plurality voting rule we have that A = C, and the winner is the candidate with the most votes.
We allow for a broader set of "Plurality game forms" by considering both weighted and fixed voters, and varying
the tie-breaking method. Each of the strategic voters i ∈ N has an integer weight wi ∈ N. In addition, there are n
"fixed voters" who do not play strategically or change their vote. The vector s ∈ Nm (called "initial score vector")
specifies the number of fixed votes for each candidate. Weights and initial scores are part of the game form.2
1We do consider however two standard ways to handle ties that slightly relax the better-reply definition. See Section 4.4.
2All of our results still hold if there are no fixed voters, but allowing fixed voters enables the introduction of simpler examples, and facilitates
some of the proofs, see Remark 4.1. For further discussion on fixed voters see [Elkind et al., 2015].
3
f1
a
b
c
a b
c
a a a
b
b
c
c
b
c
f2
a
b
c
a b
c
a a a
a b
b
c
a b
f3 x y
b
a
b
c
a
c
a
b
c
f4
a
b
c
z
y
x
w
ax ay az aw
bx by
bw
cw
cx cy
bz
cz
Figure 1: Four examples of game forms with two agents. f1 is a dictatorial game form with 3 candidates (the row
agent is the dictator). f2 is the Plurality voting rule with 3 candidates and lexicographic tie-breaking. f3 and f4
are non-standard game forms. In f3, A1 = C = {a, b, c}, A2 = {x, y}. Note that f4 is completely general (there
are 3 × 4 possible outcomes in C, one for each voting profile) and can represent any 3-by-4 game.
f P L
w,s
a
b
c
a
b
c
(14, 9, 3) {a}
(11, 12, 3) {b}
(11, 9, 6) {a}
(10, 13, 3) {b}
(7, 16, 3) {b}
(7, 13, 6) {b}
(10, 9, 7) {a}
(7, 12, 7) {b}
(7, 9, 10) {c}
Figure 2: A game form f P L
w,s, where N = {1, 2}, A1 = A2 = C = {a, b, c}, s = (7, 9, 3) and w = (3, 4) (i.e.,
voter 1 has weight 3 and voter 2 has weight 4). The table shows the final score vector s(a1,a2) for every joint action
of the two voters, and the respective winning candidate f P L
w,s(a1, a2) in curly brackets.
The final score of c for a given profile a ∈ An in the Plurality game form fw,s is the total weight of voters that
vote c. We denote the final score vector by ss,w,a (often just sa or s when the other parameters are clear from the
context), where s(c) = s(c) +Pi∈N :ai=c wi.
Thus the Plurality rule selects some candidate from W = argmaxc∈C ss,w,a(c), breaking ties according to
some specified method. The two primary variations we consider are f P L
s,w which breaks ties lexicographically, and
s,w which selects a winner from W uniformly at random. As with s, we omit the scripts w and s when they are
f P R
clear from the context.
For illustration, consider an example in Fig. 2, demonstrating a specific weighted Plurality game form with two
agents.
2.2 Incentives
Games are attained by adding either cardinal or ordinal utility to a game form. The linear order relation Qi ∈ π(C)
reflects the preferences of agent i. That is, i prefers c over c′ (denoted c ≻i c′) if (c, c′) ∈ Qi. The vector containing
the preferences of all n agents is called a preference profile, and is denoted by Q = (Q1, . . . , Qn). The game form
f , coupled with a preference profile Q, defines an ordinal utility normal form game G = hf, Qi with n agents,
where agent i prefers outcome f (a) over outcome f (a′) if f (a) ≻i f (a′). In standard game forms the action ai
may indicate the agent's preferences, hence their common identification with voting rules.
Improvement steps and equilibria Having defined a normal form game, we can now apply standard solution
concepts. Let G = hf, Qi be a game, and let a = (a−i, ai) be a joint action in G.
f (a−i, a′
context, only writing ai
We denote by a i→ a′ an individual improvement step, if (1) a, a′ differ only by the action of player i; and (2)
i) ≻i f (a−i, ai). We sometimes omit the actions of the other voters a−i when they are clear from the
i is an improvement
i is i's most preferred
i→ a′
i is called a best reply if a′
i. We denote by Ii(a) ⊆ Ai the set of actions a′
i). a i→ a′
i s.t. ai
i→ a′
step of agent i in a, and I(a) = Si∈NSa′
candidate in Ii(a).
i∈Ii(a)(a−i, a′
A joint action a is a (pure) Nash equilibrium (NE) in G if I(a) = ∅. That is, no agent can gain by changing
his vote, provided that others keep their strategies unchanged. A priori, a game with pure strategies does not have
to admit any NE.
4
(cid:10)f, Q1(cid:11)
* a
b
c
a
b
* c
{a} 3, 2
{b} 2, 1
{a} 3, 2
{b} 2, 1
{b} 2, 1
{b} 2, 1
* {a} 3, 2
{b} 2, 1
{c} 1, 3
Figure 3: A game G = (cid:10)f, Q1(cid:11), where f = f P L
w,s is as in Fig. 2, and Q1 is defined by a ≻1 b ≻1 c and
c ≻2 a ≻2 b. The table shows the ordinal utility of the outcome to each agent, where 3 means the best candidate.
Bold outcomes are the NE points. Here the truthful vote (marked with *) is also a NE.
(cid:10)f, Q2(cid:11)
* a
b
c
a
b
{a} 3, 1
{b} 1, 2
{a} 3, 1
{b} 1, 2
{b} 1, 2
{b} 1, 2
* c
* {a} 3, 1
{b} 1, 2
{c} 2, 3
Figure 4: This game has the same game form as in Fig. 2, and the preference profile Q2 is a ≻1 c ≻1 b and
c ≻2 b ≻2 a. In this case, the truthful vote a∗(Q2) is not a NE.
Now, observe that when f is a standard voting rule the preference profile Q induces a special joint action
i = top(Qi).
i equals (the coarsening of) Qi. E.g. in Plurality a∗
a∗ = a∗(Q), termed the truthful state, where a∗
We refer to f (a∗) as the truthful outcome of the game hf, Qi.
The truthful state may or may not be included in the NE points of the game, as can be seen from Tables 3 and 4
that demonstrate games that are induced by adding incentives to the game form shown in Fig. 2, and indicate the
truthful states and the NE points in these games.
2.3 Iterative Games
We consider natural dynamics in iterative games. Assume that agents start by announcing some initial profile a0,
and then proceed as follows: at each step t a single agent i may change his vote to a′
i ∈ Ii(at−1), resulting in a
new state (joint action) at = (at−1
i). The process ends when no agent has objections, and the outcome is set by
the last state.
−i , a′
Local improvement graphs and schedulers Any game G induces a directed graph whose vertices are all action
profiles (states) A, and edges are all local improvement steps [Young, 1993; Andersson et al., 2010]. The pure Nash
equilibria of G are all states with no outgoing edges. Since a state may have multiple outgoing edges (I(a) > 1),
we need to specify which one is selected in a given play.
A scheduler φ selects which edge is followed at state a at any step of the game [Apt and Simon, 2012]. The
scheduler can be decomposed into two parts, namely selecting an agent i to play (agent scheduler φN ), and se-
lecting an action in Ii(a) (action scheduler φA), where φ = (φN , φA). We note that a scheduler may or may not
depend on the history or other factors, but this does not affect any of our results.
Convergence and acyclicity Given a game G, an initial action profile a0 and a scheduler φ, we get a unique
(possibly infinite) path of steps.3 Also, it is immediate to see that the path is finite if and only if it reaches a Nash
finite.
Following [Monderer and Shapley, 1996; Milchtaich, 1996], a game G has the finite individual improvement
equilibrium (which is the last state in the path). We say that the triple(cid:10)G, a0, φ(cid:11) converges if the induced path is
property (we say that G is FIP), if(cid:10)G, a0, φ(cid:11) converges for any a0 and scheduler φ. Games that are FIP are also
known as acyclic games and as generalized ordinal potential games [Monderer and Shapley, 1996].
It is quite easy to see that not all Plurality games are FIP (see examples in Section 4). However, there are
alternative, weaker notions of acyclicity and convergence.
3By "step" we mean an individual improvement step, unless specified otherwise.
5
are known as weakly acyclic, or as φ-potential games [Apt and Simon, 2012].
• A game G is weakly-FIP if there is some scheduler φ such that(cid:10)G, a0, φ(cid:11) converges for any a0. Such games
• A game G is restricted-FIP if there is some action scheduler φA such that(cid:10)G, a0, (φN , φA)(cid:11) converges for
any a0 and φN [Kukushkin, 2011]. We term such games as order-free acyclic.
Intuitively, restricted FIP means that there is some restriction players can adopt s.t. convergence is guaranteed re-
gardless of the order in which they play. Kukushkin identifies a particular restriction of interest, namely restriction
to best-reply improvements, and defines the finite best-reply property (FBRP) and its weak and restricted analogs.
We emphasize that an action scheduler must select an action in Ii(a), if one exists. Thus restricted dynamics that
may disallow all available actions (as in [Gohar, 2012; Grandi et al., 2013]) do not fall under the definition of
restricted-FIP (but can be considered as separate dynamics).
We identify a different restriction, namely direct reply, that is well defined under the Plurality rule. For-
mally, a step a i→ a′ is a direct reply if f (a′) = a′
i, i.e., if i votes for the new winner (see labeled examples
in Section 4). Another rule where a natural direct reply exists is Veto, where a voter can veto the current win-
ner [Lev and Rosenschein, 2012].
φA is direct if it always selects a direct reply. We get the following definitions for a Plurality game G, where
FDRP stands for finite direct reply property:
• G is FDRP if(cid:10)G, a0, φ(cid:11) converges for any a0 and any direct φ.
• G is weakly-FDRP if there is a direct φ such that(cid:10)G, a0, φ(cid:11) converges for any a0.
• G is restricted-FDRP if there is a direct φA such that(cid:10)G, a0, (φN , φA)(cid:11) converges for any a0 and φN .
• FDBRP means that replies are both best and direct. Note that it is unique and thus cannot be further restricted.
Finally, a game form f has the X property (where X is any of the above versions of finite improvement) if hf, Qi
is X for all preference profiles Q ∈ (π(C))n. We have the following entailments, both for games and for game
forms. The third row is only relevant for Plurality/Veto.
FBRP
⇑
restricted-FBRP ⇒ weak-FBRP
⇓
⇓
ordinal potential ⇒ FIP ⇛ FDBRP ⇛ restricted-FIP ⇒ weak-FIP ⇒ pure Nash
exists
⇓
FDRP
⇑
⇑
exists
restricted-FDRP ⇒ weak-FDRP
Kukushkin notes that there are no known examples of game forms that are weak-FIP, but not restricted-FIP. We
settle this question later in Section 5.2.
Convergence from the truth We say that a game G is FIP from state a if hG, a, φi converges for any φ. Clearly
a game is FIP iff it is FIP from a for any a ∈ An. The definitions for other all other notions of finite improvement
properties are analogous.
We are particularly interested in convergence from the truthful state a∗. This is since: a. it is rather plausible to
assume that agents will start by voting truthfully, especially when not sure about others' preferences; and b. even
with complete information, they may be inclined to start truthfully, as they can always later change their vote.
Heuristic voting Much work on iterative voting deals with heuristics, rather than best- or better-replies. Strong,
Restricted, and Weak convergence properties can be defined the same way, where the only difference is the
way we define Ii(a) (i.e., all steps that are allowed for agent i at state a by the considered heuristics). For
example, truth-bias assumes that if a voter does not have any local improvement step, she reverts to her truth-
ful vote [Obraztsova et al., 2013]. Some heuristics are already restricted to a single action (for example, "k-
pragmatist" [Grandi et al., 2013]). In these cases the only meaningful distinction is between FIP and weak-FIP. In
this paper we do not consider heuristic voting.
6
3 Strong Acyclicity
An ordinal potential is a function that strictly increases if and only if some agent plays a better-reply [Monderer and Shapley,
1996]. A generalized ordinal potential is a function that strictly increases with every better-reply, but may also
increase with other steps. Clearly, a game is FIP if and only if it has a generalized potential (by a topological sort
of the better-reply graph).
Theorem 1 (Kukushkin [2011]). A game form f guarantees an ordinal potential (i.e. every derived game has an
ordinal potential function) if and only if f is a dictatorship.
We emphasize that this result does not preclude the existence of other game forms with FIP (generalized ordinal
potential). Indeed, Kukushkin provides a partial characterization of FIP game forms. For example, a rule where
there is a linear order L over C, and the winner is the first candidate according to L that is top-ranked by at least
one voter.
A game form f is called "separable" [Kukushkin, 2011] if there are mappings gi : Ai → C for i ∈ N s.t. for
all a ∈ A, f (a) ∈ {g1(a1), g2(a2), . . . , gn(an)}. That is, the vote of each voter is mapped to a single candidate
via some function gi, and the outcome is always one of the candidates in the range. Examples of separable rules
include Plurality and dictatorial rules, in both of which gi are the identity functions.
Conjecture 2 (Kukushkin [2011]). Any FIP game form is separable.
Some weaker variations of this conjecture have been proved. In particular, for game forms with finite coali-
tional improvement property [Kukushkin, 2011], and for FIP game forms with n = 2 voters [Boros et al., 2010]
(separable game forms are called "assignable" there). We next show that for sufficiently large n, there are non-
separable FIP game forms, thereby refuting the conjecture. Our proof uses the probabilistic method: we sample a
game form from some space, and prove that with positive probability it must be non-separable and FIP.
Theorem 3. For any n ≥ 20, there is a non-separable game form fn s.t. fn is FIP.
Proof. Let C = {a1, . . . , a2n}∪{z}. Let Ai = {x, y} for each voter. Thus fn is a function from the n dimensional
binary cube B = {x, y}n to C. We select 2n profiles a1, . . . , a2n uniformly at random, i.i.d. from B (allowing
repetitions), and define fn(aj ) = aj for all j ∈ {1, . . . , 2n}. For all other 2n − 2n profiles we define fn(a) = z.
For any two profiles a, a′, let d(a, a′) be the number of voters that disagree in a, a′ (the Manhattan distance
on the cube). Let B ⊆ B be all 2n profiles whose outcome is not z. For j, j′ ≤ 2n, denote by pj,j ′ the probability
) ≤ 2, and by Xj,j ′ the corresponding indicator random variable. Since both of aj, aj ′ were sampled
that d(aj , aj ′
uniformly i.i.d., and there are less than n2 profiles within distance 2 from aj, we get that pj,j ′ ≤ n2
2n .
Next, by the union bound,
P r(∃Xj,j ′ = 1) ≤ Xj≤2n,j ′≤2n
P r(Xj,j ′ ) = Xj≤2n,j ′≤2n
pj,j ′ ≤ (2n)2 n2
2n =
4n2
2n ,
which is strictly less than 1 for n ≥ 20. Thus w.p. > 0 we get Xj,j ′ = 0 for all j, j′. In particular there is at least
one such game form f ∗
n where Xj,j ′ = 0 for all j, j′. We argue that f ∗
n is both FIP and non-separable.4
Assume towards a contradiction that there is some cycle of better-replies in f ∗
n. Then there must be a path
containing at least 3 distinct outcomes, and thus at least 2 profiles from B. Denote these profiles by a, b. Since
Xj,j ′ = 0 for all j, j′, we have that any path between a and b is of length at least 3, and that the path must contain
at least two consequent states whose outcome is z. This path cannot be a better-reply path, since a better reply
must change the outcome. Hence we get a contradiction and f ∗
n is FIP.
Finally, note that since Xj,j ′ = 0 for all j, j′, in particular aj are all distinct profiles, and thus f ∗
n has 2n + 1 >
Pi≤n Ai possible outcomes. In contrast, for any separable rule f the size of the range of f is at mostPi≤n Ai,
since f (a) = gi(b) for some i ∈ N and b ∈ Ai. This means that f ∗
n is non-separable.
4Using the Hamming error-correcting code [Hamming, 1950], it is in fact possible to explicitly construct f ∗
n for as few as n = 7 voters.
The rest of the proof remains the same.
7
For most common voting rules, separable or not, it is easy to find examples where some cycles occur. Thus one
should focus on the weaker notions of convergence discussed in Section 1, which is what we do in the remainder
of the paper.
4 Order-Free Acyclicity: Plurality
Improvement steps in Plurality Recall that along a given path, at ∈ An = C n denotes the voting profile at
time t. We denote by st = sat the score vector at time t; by cwt = f P L(at) the candidate that wins at time t; and
by swt = st(cwt) the highest score at time t (including tie-breaking if it applies).
i→ at
steps into the following types (an example of such a step appears in parentheses):
Suppose that agent i has an improvement step (a.k.a. better reply) at−1
i at time t. We classify all possible
i
Type 1. from at−1
i
6= cwt−1 to at
i = cwt ; (step 1 in Ex.6a.)
Type 2. from at−1
i = cwt−1 to at
i = cwt ; (step 1 in Ex.6b.),
Type 3. from at−1
i = cwt−1 to at
i 6= cwt ; (step 2 in Ex.6a.)
Note that steps of type 1 and 2 are direct, whereas type 3 steps are indirect.
4.1 Lexicographic Tie-Breaking
In this section we assume that ties are broken lexicographically. Given some score vector s, we denote by s(c) ∈ R
the score of c ∈ C that includes the lexicographic tie-breaking component. One way to formally define it is by
setting s(c) = s(c) + 1
m+1 (m − L(c)), where L(c) is the lexicographic index of candidate c. However the only
important property of s is that s(c) > s(c′) if either s(c) > s(c′) or the score is equal and c has a higher priority
(lower index) than c′.
Thus for Plurality with lexicographic tie-breaking, a given weight vector w and a given initial score vector s,
we denote the outcome by
As with s, we omit the scripts w, s and P L when they are clear from the context.
f P L
s,w(a) = argmaxc∈C ss,w,a(c).
Lemma 4. Consider a gameDf P L
a direct best reply at state at−1.
w,s, QE. If there exists a better reply for a given agent i at state at−1, then i has
The proof is trivial under lexicographic tie-breaking, by letting i vote for her most preferred candidate among
all better replies. In this case the direct best reply is also unique.
One implication of the lemma is that it is justified and natural to restrict our discussion to direct replies and
focus on FDRP, as w.l.o.g. a voter always has a direct reply that is at least as good as any other reply.
Unweighted Voters Suppose all voters have unit weight. We start with our main result for this section.
Theorem 5. f P L
particular, Plurality is order-free acyclic.
s
is FDRP. Moreover, any path of direct replies will converge after at most m2n2 steps.
In
This extends a weaker version of the theorem that appeared in the preliminary version of this paper [Meir et al.,
2010], which only showed FDBRP. The bound on the number of direct-best-reply steps was recently improved to
O(mn) in [Reyhani and Wilson, 2012, Theorem 5.4].
Proof. By our restriction to direct replies, there can only be moves of types 1 and 2. We first consider moves of
type 1, and inductively prove two invariants that yield a bound on the total number of such moves. Next, we bound
the number of moves of type 2 by a given voter between any of his moves of type 1, which completes the proof.
8
i
a
b
cwt−1
st(b)
i
s
s
st(a)
b = cwt
a
Figure 5: An illustration of a type 1 move. Tie-breaking is in favor of the left most candidate.
Consider time t − 1 and denote the score of the current winner (including tie-breaking) by ¯s = swt−1. Suppose
that a move a i→ b of type 1 occurs at time t: that is, a 6= cwt−1 and b = cwt. We then have (see Fig. 5):
st(b) = swt ≥ swt−1 = ¯s ≥ st−1(a) = st(a) + 1.
(1)
We claim that at any later time t′ ≥ t the following two invariants hold:
I. Either there is a candidate c 6= a whose score is at least ¯s + 1, or there are at least two candidates c, c′ 6= a
whose score is at least ¯s. In particular it holds in either case that swt′
≥ ¯s.
II. The score of a does not increase: st′
(a) ≤ st(a).
Note that this, coupled with Eq. (1), implies that candidate a will never win again, as its score will stay strictly
below ¯s, and there will always be a candidate with a score of at least ¯s.
We now prove both invariants by induction on time t′. In the base case t′ = t, (I) holds since both cwt−1 and b
have a score of at least ¯s, and (II) holds trivially.
Assume by induction that both invariants hold until time t′ − 1, and consider step t′ by voter j. Due to (I), we
either have at least two candidates whose score is at least ¯s, or a candidate with a score of at least ¯s + 1. Due to
(II) and Eq. (1) we have that st′ (a) ≤ st(a) < ¯s − 1.
Let d j→ d′ be the step at time t′ by voter j (that is, d = at′−1
j ). We first argue that d′ 6= a: by adding
the vote of j to a its score will still be strictly less than ¯s, whereas by removing a vote from any other candidate d,
we still have at least one candidate c with score at least ¯s. Thus a cannot be a direct reply for any voter j, and (II)
still holds after step t′.
, d′ = at′
j
It remains to show that (I) holds. If d is not one of the candidates in (I) with the score of at least ¯s at time t′ − 1,
then their score does not decrease after step t′, and we are done. Otherwise, we divide into the following cases:
1. At t′ − 1, d is the (only) candidate with a score of at least ¯s + 1.
2. At t′ − 1, candidates c, c′ have scores of at least ¯s, and d is one of them (w.l.o.g. d = c).
In the first case, st′
(d) = st−1(d) − 1 ≥ ¯s + 1 − 1 = ¯s, whereas st′
(d′) > st′
(d) ≥ ¯s. Thus both d, d′ have
scores of at least ¯s at time t′, as required. In the second case, since only c = d can lose votes, then if d′ 6= c′,
st′
(d′) = swt′
≥ st′
(c′) = st′−1(c′) ≥ ¯s,
and thus both c′, d′ have scores of at least ¯s at time t, as required. If d′ = c′, then and thus both c′, d′ have scores
of at least ¯s at time t, as required. If d′ = c′, then
st′
(d′) = st′−1(d′) + 1 = st′−1(c′) + 1 ≥ ¯s + 1,
that is, d′ has a score of at least ¯s + 1, as required.
9
Next, we demonstrate that invariants (I) and (II) supply us with a polynomial bound on the rate of convergence.
Indeed, as we mentioned before, at every step of type 1, at least one candidate is ruled out permanently, and there
are at most n times that a vote can be withdrawn from a given candidate. Also note that, since a type 2 move by a
, each voter can make at most m − 1 type 2 moves before making a
given voter i implies that he prefers at
move of type 1. Hence, there are in total at most m2n2 steps until convergence.
i to at−1
i
Furthermore, it is easy to show that if all voters start from the truthful state then type 2 moves never occur.
Thus, the score of the winner never decreases, and the game converges in at most mn steps.
Next, we show that the restriction to direct replies is necessary to guarantee convergence, whereas a restriction
to best replies is insufficient.
Proposition 6. f P L is not FBRP, even from the truthful state. Moreover, there are: (a) a counterexample with
two strategic agents and an arbitrary initial state; (b) a counterexample with three strategic agents and a truthful
initial vote.
Remark 4.1. In this example and in others throughout the paper we use an initial score vector s. However, this is
w.l.o.g. since we could replace s with additional voters that do not participate in the cycle. Initial scores are only
useful to construct examples that are simpler and/or with fewer strategic agents. This holds for all negative results
in the paper.5 For positive results, we have to show convergence for every initial scores s.
Example 6a. C = {a, b, c}. We have a single fixed voter voting for a, thus s = (1, 0, 0). The preference profile is
defined as a ≻1 b ≻1 c, c ≻2 b ≻2 a. The following cycle consists of better replies (the vector denotes the votes
(a1, a2) at time t, the winner appears in curly brackets):
(b, c){a} 2→ (b, b){b} 1→ (c, b){a} 2→ (c, c){c} 1→ (b, c).
Note that all steps are best-replies, but the steps of agent 1 are indirect.
♦
Example 6b. C = {a, b, c, d}. Candidates a, b, and c have 2 fixed voters each, thus s = (2, 2, 2, 0). We use
3 agents with the following preferences: d ≻1 a ≻1 b ≻1 c, c ≻2 b ≻2 a ≻2 d and d ≻3 a ≻3 b ≻3 c.
Starting from the truthful state (d, c, d) the agents can make the following two improvement steps, which are direct
best-replies (showing only the outcome s and the winner): (2, 2, 3, 2){c} 1→ (2, 3, 3, 1){b} 3→ (3, 3, 3, 0){a},
after which agents 1 and 2 repeat the cycle shown in (6a).
♦
Thus for the non-weighted lexicographic case Theorem 5 and Proposition 6 provide a clear-cut rule: direct
replies guarantee convergence, whereas convergence is not guaranteed under other restrictions such as best reply
or initial truthful vote. However, as the following section demonstrates, in the presence of weighted agents even
direct replies may no longer converge.
Weighted Voters Next, we show that if the voters may have non-identical weights, then convergence to equilib-
rium is not guaranteed even if they start from the truthful state and use direct best replies.
Proposition 7. There is f P L
w that is not restricted-FDRP, even from the truthful state.
Example 7. The initial fixed score of candidates {a, b, c, d} is s = (0, 1, 2, 3). The weight of each voter i ∈ {1, 2, 3}
is i. The preference profile is as follows: c ≻1 d ≻1 b ≻1 a, b ≻2 c ≻2 a ≻2 d, and a ≻3 b ≻3 c ≻3 d. We
omit the rest of the proof. The initial truthful profile is thus a0 = (c, b, a), which results in the score vector
s0 = (3, 3, 3, 3) where a is the winner.
votes:
scores:
(c, b, a)
(3, 3, 3, 3){a}
↑ 3
(c, b, b)
1→
2←
(d, b, a)
(3, 3, 2, 4){d}
(c, c, b)
2→
1←
(d, c, a)
(3, 1, 4, 4){c}
↓ 3
(d, c, b)
(0, 6, 3, 3){b}
(0, 4, 5, 3){c}
(0, 4, 4, 4){b}
5Note that the remark does no longer hold if s is used to construct a counter example for weak-FIP. However we use no such examples in
this paper.
10
Our example shows a cycle of direct responses. Note that at every step there is only one direct reply available to
the agent, thus it is not possible to eliminate the cycle by further restricting the action scheduler.
♦
If there are only two weighted voters (and possibly other fixed voters), either restriction to direct reply or to a
truthful initial state is sufficient to guarantee convergence.
Theorem 8. f P L
s,w is FDRP for n = 2.
Proof. Clearly, in one of the two first states, the agents vote for distinct candidates. At any later state, they must
continue voting for distinct candidates, as every step must change the winner, and the other voter is always voting
for the current winner. This means that the score of the winner strictly increases with every step (possibly except
the first one).
Theorem 9. f P L
s,w is FIP from the truth for n = 2.
Proof. We show that the score of the winner can only increase. This clearly holds in the first step, which must be
of type 1. Once again, we have that the two agents always vote for different candidates, and thus only steps that
increase the score can change the identity of the winner.
Thus in either case convergence is guaranteed after at most 2m steps.
It remains an open question whether there is any restriction on better replies that guarantees order-free acyclic-
ity in weighted games, i.e.
w is restricted-FIP for n > 2. However Prop. 7 shows that if such restricted
dynamic exists, it must make use of indirect replies, which is rather unnatural. We thus conjecture that such
restricted dynamics does not exist.
if f P L
4.2 Arbitrary tie-breaking
Lev and Rosenschein [2012] showed that for any positional scoring rule (including Plurality), we can assign some
(deterministic) tie breaking rule, so that the resulting voting rule may contains cycles. For any positional scoring
rule fα with score vector α, denote by f LR
α the same rule with the Lev-Rosenschein tie-breaking.
Proposition 10 (Theorem 1 in [Lev and Rosenschein, 2012]). f LR
even from the truth. In particular, Plurality with the Lev-Rosenschein tie-breaking (f P LR) is not FBRP.
is not FBRP for any α, even for n = 2, and
α
In fact, a slight modification of their example (switching a and b in voter 2's preferences) yields the following:
Proposition 11. f P LR is not restricted-FIP, even for n = 2, and even from the truth.
4.3 Randomized tie-breaking
Compared to the previously considered deterministic rule, randomized tie-breaking has the advantage of being
neutral-no specific candidate or voter is preferred over another. Formally, the game form f P R
s,w maps any state
a ∈ An to the set argmaxc∈C ss,w,a(c). Since under randomized tie-breaking there are multiple winners, let
W t = f P R(at) ⊆ C denote the set of winners at time t.6 We define a direct reply at−1
i as one where
i ∈ W t.
at
i→ at
i
If ties are broken randomly, ≻i does not induce a complete order over outcomes. For instance, the order
a ≻i b ≻i c does not determine if i will prefer {b} over {a, c}. However, we can naturally extend Qi to a partial
preference order over subsets. There are several standard extensions, using the following axioms:7
K (Kelly [Kelly, 1977]): (1) (∀a ∈ X, b ∈ W, a ≻i b) ⇒ X ≻i W ; (2) (∀a ∈ X, b ∈ W, a (cid:23)i b) ⇒ X (cid:23)i W ;
G (Gardenfors [Gardenfors, 1976]): (∀b ∈ W, a ≻i b) ⇒ {a} ≻i ({a} ∪ W ) ≻i W ;
6This is a slight abuse of the notation we introduce in the beginning, where we defined the set of possible outcomes of f to be C. Here we
allow any W ∈ 2C \ {∅} as a possible outcome.
7We thank an anonymous reviewer for the references.
11
R (Responsiveness [Roth, 1985]): a ≻i b ⇐⇒ ∀W ⊆ C \ {a, b}, ({a} ∪ W ) ≻i ({b} ∪ W ) .
The axioms reflect various beliefs a rational voter may have on the tie-breaking procedure: the K axiom reflects
no assumptions whatsoever; The K+G axioms are consistent with tie-breaking according to a fixed and unknown
order [Geist and Endriss, 2011]; and K+G+R axioms are consistent with random tie-breaking with equal probabil-
ities (see Lemma 15 and Prop. 20). In this section we assume all axioms hold, however our results do not depend
on these interpretations, and we do not specify the voter's preferences in cases not covered by the above axioms.
Under strict preferences, it also holds that G entails K [Endriss, 2013]. We can also define "weak" variants G2 and
R2 for axioms G and R, by replacing all strict relations with weak ones, however as long as we restrict attention to
strict preferences over elements the weak variants are not required.
For the following lemma we only need Axiom K, i.e. it does not depend on the voter's tie-breaking assumptions.
Lemma 12. If there exists a better-reply in f P R
s,w for agent i at state at−1, then i has a direct best-reply.
i
i
Proof. Suppose there is a better reply at−1
arbitrary best reply. Let W = f RP
that at−1
reply (for the lexicographic case this follows immediately from W = {a′} and f P L(at−1
i→ b at time t − 1. As some best reply always exists, denote by b′ an
−i , b′), and let a′ be the most preferred candidate of i in W . Then we argue
i→ a′ is a direct best reply of i. Since a′ is a direct reply by definition, it is left to show that a′ is a best
s,w (at−1
−i , a′) = W = {a′}).
If b′ is a direct reply then b′ = a′ and we are done. Thus assume that b′ is not a direct reply from at−1
i→.
Then b′ /∈ W . By voting for a′ ∈ W , we get that f RP
−i , a′) = {a′}, i.e., a′ remains the unique winner. If
W = 1 then we are done as in the lexicographic case. Otherwise we apply Axiom K2 with X = {a′}, and get
that a′ (cid:23)i W . That is,
s,w (at−1
i
s,w (at−1
f RP
−i , a′) = {a′} (cid:23)i W = f RP
s,w (at−1
−i , b′),
which means that a′ is also a best-reply.
With weighted votes and and random tie-breaking, there may not be any pure Nash equilibrium at all [Meir et al.,
2010]. We therefore restrict attention in the rest of this section to unweighted votes.
Proposition 13. f P R is not FIP.
Example 13. C = {a, b, c} with initial score s = (0, 1, 0). The initial state is a0 = (a, a, b)-that is, s(a0) =
(2, 2, 0) and the outcome is the winner set {a, b}. The preferences are a ≻1 c ≻1 b, b ≻2 a ≻2 c and c ≻3 b ≻3 a.
We get the following cyclic sequence:
(2, 2, 0){a, b}
2→ (1, 2, 1){b}
1→ (0, 2, 2){b, c}
↑ 3
↓ 3
(1, 2, 1){b}
1← (2, 1, 1){a}
2← (1, 1, 2){c}
We emphasize that each step is justified as a better reply by either Axiom K or Axiom G. E.g, in the step of agent 2
in the top row, agent 2 prefers b ≻2 a, and thus b ≻2 {a, b} by Axiom G. This will be used later in Section 4.4. ♦
Theorem 14. f P R
s
is FBRP from the truth.
Proof. We denote the sets of winners and runnerups at time t as W t = f RP (at); Rt = {c : st(c) = swt − 1}. We
will show by induction that at any step at−1 i→ at:
1. W t ∪ Rt ⊆ W t−1 ∪ Rt−1 (i.e., candidates not in W t ∪ Rt will not be selected by any agent at a later time).
2. at
i is the most preferred candidate for i in W t ∪ Rt (in particular, a best reply is a direct reply).
3. at−1
i ≻i at
i (in the terminology of [Meir et al., 2014], this is a compromise step).
12
Since each voter can make at most m − 1 compromise steps, convergence is guaranteed within nm steps.
Assume that for some t ≥ 1, all of the above holds for any t′ < t (so we prove the base case together with the
other cases). Since a0 is truthful, the first step of any voter is always a compromise move. If i had already moved
at some previous time t′ < t, then at′
i
is most preferred in W t′
∪ Rt′.
i
By induction, a = at−1
is the most preferred candidate in some C′ that contains W t−1 ∪ Rt−1 (C′ = C
∪ Rt′ at any other step). Let x and y be i's most preferred candidates in W t−1
in i's first step, and C′ = W t′
i. Each of a or a′ may belong to W t−1, to Rt−1,
and in Rt−1, respectively, and denote the best reply by a′ = at
or to neither set. This means there are 3X3=9 cases to check. Fortunately, we can show that some of this cases
immediately lead to a contradiction, and in the other cases all invariants 1-3 will hold after step t.
Consider first the case a ∈ W t−1. Since a is most preferred in C′, it is strictly more preferred than any other
candidate in W t−1 or in Rt−1 (i.e., a = x). Thus if a′ ∈ W t−1 we get W t = {a′} ≺i W t−1 by Axiom G. If
a′ ∈ Rt−1 we get W t = (W t−1 \ {a}) ∪ {a′} ≺i W t−1 by Axiom R. In either case this is not an improvement
step for voter i.
Next, suppose a /∈ W t−1. We further split to subcases based on a′.
• If a′ ∈ W t−1 then f (a−i, a′) = {a′}. Then a′ = x, as otherwise f (a−i, x) = {x} ≻i {a′}, and i is
strictly better off by voting for x. This entails W t = {x}, Rt = W t−1 \ {x} so all invariants 1-3 hold: (1)
W t−1 = W t ∪ Rt; (2) follows from (1) since a′ = x is the most preferred in W t−1; and (3) follows from
(1) since a = at−1
is the most preferred in C′, and a′ ∈ C′.
i
• If a′ ∈ Rt−1 then f (a−i, a′) = {a′} ∪ W t−1. Then a′ = y, as otherwise f (a−i, y) = {y} ∪ W t−1 ≻i
{a′}∪W t−1 by Axiom R, which means i is strictly better off by voting for y. This entails W t = {y}∪W t−1,
Rt = Rt−1 \ {y}. We also get that a′ = y ≻i x or else x would have been a strictly better reply. Thus all
invariants 1-3 hold: (1) W t = W t−1 ∪ {y} ⊆ W t−1 ∪ Rt−1 and Rt = Rt \ {y}; (2) follows from (1) since
i = y is most preferred in Rt−1 and strictly preferred to x; (3) follows from (1) as in the previous
a′ = at
case.
• If a′ /∈ W t−1 ∪ Rt−1, then W t = f (a−i, a′) = W t−1. The outcome does not change so this cannot be an
improvement step for i.
Cardinal utilities A (cardinal) utility function is a mapping of candidates to real numbers u : C → R, where
ui(c) ∈ R is the utility of candidate c to agent i. We say that u is consistent with a preference relation Qi if
u(c) > u(c′) ⇔ c ≻i c′. The definition of cardinal utility naturally extends to multiple winners by setting
ui(W ) = 1
Lemma 15. Consider any cardinal utility function u and the partial preference order Q it induces on subsets by
random tie-breaking. Q holds Axioms K+G+R.
W Pc∈W ui(c) for any subset W ⊆ C.8
The proof is rather straight-forward, and is deferred to the appendix.
Proposition 16. f P R is not FIP from the truth.
Example 16. We use 5 candidates with initial score s = (1, 1, 2, 0, 0), and 2 agents with utilities u1 = (5, 3, 2, 8, 0)
and u2 = (4, 2, 5, 0, 8). In particular, {b, c} ≻1 c, {a, c} ≻1 {a, b, c}, and {a, b, c} ≻2 {b, c}, c ≻2 {a, c}, and the
following cycle occurs: (1, 1, 2, 1, 1){c} 1→ (1, 2, 2, 0, 1){b, c} 2→ (2, 2, 2, 0, 0){a, b, c} 1→ (2, 1, 2, 1, 0){a, c} 2→
(1, 1, 2, 1, 1){c}.
♦
Finally, in contrast to the lexicographic case, convergence is no longer guaranteed if agents start from an
arbitrary profile of votes, or are allowed to use direct-replies that are not best-replies. The following example
shows that in the randomized tie-breaking setting even direct best reply dynamics may have cycles, albeit for
specific utility scales.
8One interpretation is that we randomize the final winner from the set W , and hence the term randomized tie-breaking. For a thorough
discussion of cardinal and ordinal utilities in normal form games, see [Borgers, 1993].
13
Proposition 17. f P R is not restricted-FIP.
Example 17. There are 4 candidates {a, b, c, x} and 3 agents with utilities u1 = (7, 3, 0, 4), u2 = (0, 7, 3, 4)
and u3 = (3, 0, 7, 4).
In particular, the following preference relations hold: a ≻1 {a, b} ≻1 x ≻1 {a, c};
b ≻2 {b, c} ≻2 x ≻2 {a, b}; and c ≻3 {a, c} ≻3 x ≻3 {b, c}.
Consider the initial state a0 = (a, b, x) with s(a0) = (1, 1, 0, 1) and the outcome {a, b, x}. We have the
following cycle where every step is the unique reply of the playing agent.
(1, 1, 0, 1){a, b, x}
2→ (1, 0, 0, 2){x}
3→ (1, 0, 1, 1){a, x, c}
↑ 1
↓ 1
(0, 1, 0, 2){x}
3← (0, 1, 1, 1){x, b, c}
2← (0, 0, 1, 2){x}
♦
Proposition 18. f P R is not FDRP even from the truth.
Example 18. We take the game from Ex. 17, and add for each voter i ∈ {1, 2, 3} a candidate di, s.t. ui(di) =
8, ui(dj) = j for j 6= i. We also add an initial score of 3 to each of the candidates {a, b, c, x}. Voter 3 moves first
to a1
3 = x, which is a direct reply. Then voters 1 and 2 move to their best replies a, b, respectively. Now the cycle
continues as in Ex. 17.
♦
4.4 Stochastic Dominance and Local Dominance
While assigning cardinal utilities is one way to deal with ties, it is sometimes preferable not to assume a particular
cardinal utility scale. Denote by f P (a) ⊆ C the subset of candidates with maximal Plurality score, before any tie-
breaking takes place. We can still derive a well-defined dynamics from any partial order over subsets of candidates,
by assuming that a voter performs a better-response step if she strictly prefer the new outcome, and otherwise (if
the new outcome is same, worse, or incomparable) she does not move.
One example of such a partial order is stochastic dominance (SD), which was applied to tie-breaking by
[Reyhani and Wilson, 2012]. A different partial order is implied by local dominance (LD) which was defined for
voting with uncertainty about the outcome [Conitzer et al., 2011; Meir et al., 2014], when uncertainty is regarding
the tie breaking. We show how convergence results for LD/SD dynamics fit with other results.
Stochastic dominance Reyhani and Wilson assume that ties are broken uniformly at random, and that a voter
will only perform a step that stochastically dominates the current winner(s), if such exists.
Theorem 19 (Theorem 5.7 in [Reyhani and Wilson, 2012]). Plurality with stochastic dominance tie-breaking is
FDBRP.
We can show the following (see appendix):
Proposition 20. A step a i→ a′ is a better-response under random tie-breaking and stochastic dominance, if and
only if f P (a′) ≻i f P (a) is entailed by Qi, Axioms K+G+R, and transitivity.
In other words, while Theorem 14 allowed any moves consistent with the axioms, SD allows only moves that
follow from the axioms, and explicitly forbid any other step. Thus it is more restricted than expected-utility based
randomized tie-breaking.
Since any SD step is also a better-reply under any cardinal utility scale, any strong or restricted convergence
result for the latter applies to the former, but not vice-versa.
14
Local dominance Suppose that there are several candidates with maximal score. A voter may consider all of
them as "perhaps winners," without specifying how the actual winner is selected. If the voter is concerned about
making a move that will leave her worse off, she will only make moves that will improve her utility with certainty,
i.e.
that dominates her current action (where possible worlds are all strict tie-breaking orders) [Conitzer et al.,
2011; Meir et al., 2014; Meir, 2015].9
Theorem 21 (Theorem 11 in the full version of [Meir, 2015]). Plurality with Local-Dominance tie-breaking is
FDRP.
To see how this compares with other convergence results, we need the following proposition (see appendix).
Proposition 22. A step a i→ a′ is a better-response under unknown tie-breaking and local dominance, if and only
if f P (a′) ≻i f P (a) is entailed by Qi, Axioms K+G, and transitivity.
Note that since Axioms K+G+R include K+G, any LD step is also an SD step, so a restriction to LD can only
eliminate cycles. Thus FBDRP follows from Theorem 19. We note that with either SD or LD tie-breaking there
may be new stable states that are not Nash-equilibria. Even so, an analysis of Ex. 13 shows that all steps are
entailed by Axioms K+G (and thus by Axioms K+G+R). Thus neither game form is FIP.
What if we assume that voters are even more risk-averse and only follow steps that are better-replies by Ax-
iom K? Then it is easy to see that only moves to a more-preferred candidate can be better-replies (any move to or
from a tie cannot follow from Axiom K and is thus forbidden), which means there are trivially no cycles.
5 Weak Acyclicity
Except for Plurality and Veto, convergence is not guaranteed even under restrictions on the action scheduler and the
initial state. In contrast, simulations [Grandi et al., 2013; Meir et al., 2014; Koolyk et al., 2016] show that iterative
voting almost always converges even when this is not guaranteed by theory. We believe that weak acyclicity is an
important part of the explanation to this gap.
5.1 Plurality with Random tie-breaking
We have seen in Section 4 that while f P R is FDRP from the truthful initial state, this is no longer true from
arbitrary states, and in fact f P R is not restricted-FIP under any action scheduler. Our main theorem in this section
shows that under a certain scheduler (of agents+actions), convergence is guaranteed from any state. Further, this
still holds if actions are restricted to direct-replies.
Lemma 23. Consider any game G = (cid:10)f P R
s
x, y s.t. s0(x) ≥ s0(y) ≥ s0(a∗) + 2. Then for any sequence of direct replies, a∗ /∈ f (at).
, Q(cid:11). Consider some candidate a∗, and suppose that in a0, there are
Proof. We show that at any time t ≥ 0 there are xt, yt s.t. s0(x), s0(y) ≥ s0(a∗) + 2. For t = 0 this holds for
xt = x, yt = y. Assume by induction that the premise holds for at−1. Then there are two cases:
1. f (at−1) ≥ 2. Then since step t must be a direct reply, it must be to some candidate z with st−1(z) ≥
swt−1 − 1. Also, either xt−1 or yt−1 did not lose votes (w.l.o.g. xt−1). Thus st(x), st(z) ≥ swt−1 ≥
st−1(a∗) + 2 ≥ st(a∗) + 2.
2. f (at−1) = 1. Then suppose f (at−1) = {xt−1}, and we have that swt−1 ≥ st−1(a∗) + 3. The next step is
z where either st−1(z) = swt−1 − 1 (and then we conclude as in case 1), or st−1(z) = swt−1 − 2 and xt−1
loses 1 vote. In the latter case, st(xt−1) = st(z) = swt−1 − 1 ≥ st−1(a∗) + 2 ≥ st(a∗) + 2.
Theorem 24. f P R
s
is weak-FDRP.
9[Meir et al., 2014; Meir, 2015] consider more general uncertainty over candidates' score, and [Conitzer et al., 2011] considers arbitrary
information sets.
15
Proof. Consider a game G = (cid:10)f P R
reachable from a via paths of direct replies. Let B = B(a0), and assume towards a contradiction that B does not
contain a Nash equilibrium. For every b ∈ B, let C(b) = {c ∈ C : ∃a ∈ B(b) ∧ c ∈ f (a)}, i.e. all candidates
that are winners in some state reachable from b.
, Q(cid:11), and an initial state a0. For a state a, denote by B(a) ⊆ An all states
s
For any b ∈ B(a0), define a game Gb by taking G and eliminating all candidates not in C(b). Since we only
consider direct replies, for any a ∈ B(b), the set of outgoing edges I(a) is the same in G and in Gb (as any direct
reply must be to candidate in C(b)). Thus by our assumption, the set B(b) in game Gb does not contain an NE.
For any b ∈ B(a0), let b∗ be the truthful state of game Gb, and let T (b) ⊆ N be the set of agents who are
i .
truthful in b. That is, i ∈ T (b) if bi = b∗
Let b0 be some state b ∈ B(a0) s.t. T (b) is maximal, and let T 0 = T (b0). If T 0 = n then b0 is the truthful
state of Gb0, and thus by Theorem 14 all best-reply paths from b0 in Gb0 lead to an NE, in contradiction to B(b0)
not containing any NE. Thus T 0 < n. We will prove that there is a path from b0 to a state b′ s.t. T (b′) > T 0.
i at state b0. We
Let i /∈ T (b0) (must exist by the previous paragraph). Consider the score of candidate b∗
divide into 5 cases. All scores specified below are in the game Gb0.
Case 1. f (b0) > 1 and b∗
i is one of several winners). Then consider the step b0
i the unique winner, and thus it is a direct best-reply for i. In the new state b′ = (b0
i ∈ f (b0) (i.e b∗
i→ b∗
i . This
i ) we have
−i, b∗
make b∗
T (b′) = T (b0) ∪ {i}.
Case 2. s0(b∗
i ) = sw0 − 1 (i.e., b∗
i needs one more vote to become a winner). By Axioms G+R, i prefers f (b0
−i, b∗
i )
i , which results in a "more truthful" state b′.
over f (b0). Then similarly to case 1, i has a direct step b0 i→ b∗
Case 3. b∗
i is the unique winner). Then the next step b0
i = f (b0) (i.e b∗
previous cases. Moreover, it must hold that j /∈ T (b0) since otherwise b0
Ij(b0) = ∅. Thus T (b′) = T (b1) + 1 ≥ T (b0) + 1.
j→ b1 will bring us to one of the two
j = f (b0) which means
j = b∗
Case 4. f (b0) = x 6= b∗
i , and s0(x) = s0(b∗
i ) + 2. We further divide into:
Case 4.1. s0(b∗
i ) ≥ s0(y) for all y 6= x. Then the next step by j must be from x, which brings us to one of the
two first cases (as in Case 3).
Case 4.2. There is y 6= x s.t. s0(x) = s0(y) + 1 = s0(b∗
i ) + 2. Then we continue the sequence of steps until
the winner's score decreases. Since all steps that maintain swt select a more preferred candidate, this
most occur at some time t, and T (b0) ⊆ T (bt). Then at bt we are again in Case 1 or 2.
Case 4.3. There is y 6= x s.t. s0(x) = s0(y) = s0(b∗
i ) + 2. Then by Lemma 23 b∗
i can never be selected, in
contradiction to b∗
i ∈ C(b0).
Case 5. f (b0) = x 6= b∗
i , and s0(x) ≥ s0(b∗
i ) + 3. We further divide into:
Case 5.1. For all y 6= x, s0(y) ≤ s0(x) − 3. In this case no reply is possible.
Case 5.2. There is some y 6= x s.t. s0(y) ≥ s0(b∗
i ) + 2. Then by Lemma 23 b∗
i can never be selected, in
contradiction to b∗
i ∈ C(b0).
Case 5.3. There is some y 6= x s.t. s0(y) ≥ s0(b∗
means s1(x) = s1(y) = sw0 − 1 ≥ s0(b∗
contradiction.
i ) + 1 Then the next step must be from x to such y. Which
i ) + 2. Thus again by Lemma 23 we reach a
i ) + 2 = s1(b∗
Therefore we either construct a path of direct replies to b′ ∈ B(b0) with T (b′) > T (b0) in contradiction to
our maximality assumption, or we reach another contradiction. Thus B(b0) must contain some NE (both in Gb0
and in G), which means by construction that G is weakly-FDRP from b0. However since b0 ∈ B(a0), we get that
G is weakly-FDRP from a0 as well.
16
Remark 5.1. Theorem 24 and Ex. 17 provide a partial answer to an open question regarding whether there are
game forms that admit weak FIP but not restricted FIP [Kukushkin, 2011].
Indeed, the game form f P R for
m = 4, n = 3 is such an example, but one that uses randomization. However if we think of f P R as a deterministic
game form with 2m − 1 possible outcomes (all nonempty subsets of candidates), where players are restricted to m
actions each, then the allowed utility profiles are constrained (by Axioms G and R) and thus this result does not
settle Kukushkin's question completely.
5.2 Weighted Plurality
When voters are weighted, cycles of direct responses can emerge [Meir et al., 2010; Meir, 2016]. We conjecture
that such cycles must depend on the order of agents, and that certain orders will break such cycles and reach an
equilibrium, at least from the truthful state.
Conjecture 25. f P L
s,w is weak-FDRP (in particular weak-FIP).
Similar techniques to those used so far appear to be insufficient to prove the conjecture. For example, in
contrast to the unweighted case, a voter might return to a candidate she deserted in any scheduler, even if only two
weight levels are present. We thus leave the proof of the general conjecture for future work.
Yet, we want to demonstrate the power of weak acyclicity over restricted acyclicity, even when there are
no randomness or restrictions on the utility space. That is, to provide a definite (negative) answer to Kukushkin's
question of whether weak acyclicity entails restricted acyclicity. To do so, we will use a slight variation of Plurality
with weighted voters and lexicographic tie-breaking.
Theorem 26. There exist a game form f ∗ s.t. f ∗ is weak-FIP but not restricted-FIP.
Proof. Consider the following game G: The initial fixed score of candidates {a, b, c, d} is s = (0, 1, 2, 3). The
weight of each voter i ∈ {1, 2, 3} is i. The preference profile is as follows: c ≻1 d ≻1 b ≻1 a, b ≻2 c ≻2 a ≻2 d,
and a ≻3 b ≻3 c ≻3 d. This game was used in [Meir et al., 2010] to demonstrate that Plurality with weighted
voters is not FDRP, however it can be verified that G is restricted-FIP so it is not good enough for our use.
If we ignore agents' preferences, we get a particular game form f P L
s,w where N = {1, 2, 3}, M = {a, b, c, d},
s = (0, 1, 2, 3) and w = (1, 2, 3).
We define f ∗ by modifying f P L
s,w with the following restrictions on agents' actions: A1 = {c, d}, A2 =
{b, c}, A3 = {a, b, d}. Thus f ∗ is a 2 × 2 × 3 game form, presented in Figure 6(a).
We first show that f ∗ is not restricted-FIP. Indeed, consider the game G∗ accepted from f ∗ with the same
preferences from game G (Figure 6(b)). We can see that there is a cycle of length 6 (in bold). An agent scheduler
that always selects the agent with the bold reply guarantees that convergence does not occur, since in all 6 relevant
states the selected agent has no alternative replies.
Next, we show that f ∗ is weak-FIP. That is, for any preference profile there is some scheduler that guarantees
convergence. We thus divide into cases according to the preferences of agent 3. In each case, we specify a state
where the scheduler selects agent 3, the action of the agent, and the new state.
We note that since all thick edges must be oriented in the same direction, a ≻3 b if and only if b ≻3 c. Thus
the following three cases are exhaustive.
Q3
b ≻ d
d ≻ b & d ≻ a
a ≻ d ≻ b ≻ c
1
2
3
state
action
(d, b, a)
(c, b, b)
(d, c, b)
b
d
d
new state
(d, b, b)
(c, b, d)
(d, c, d)
In either case, agent 3 moves from a state on the cycle to a Nash equilibrium.
6 Conclusions and Future Work
The main conceptual contribution of this work was to provide a joint rigorous framework for the study of iterative
voting, as part of the broader literature on acyclicity of games and game forms.
17
(a) The game form f ∗
(c b d){d}
3
3
(c b b){b}
3
(c b a){a}
2
2
(c c a){c}
(c c b){c}
3
(c c d){d}
(c b d){d}
(d b a){d}
2
(d c a){c}
3
3
1
1
(b) The game G∗
(d b d){d}
3
(d b b){b}
3
(d c b){b}
3
(d c d){d}
(d b d){d}
(c b b){b}
(d b b){b}
(c b a){a}
(d b a){d}
(c c a){c}
(d c a){c}
(c c b){c}
(d c b){b}
(c c d){d}
(d c d){d}
Figure 6: In each state we specify the actions of all 3 agents, and the outcome in curly brackets. Agent 1 controls
the horizontal axis, agent 2 the vertical axis, and agent 3 the in/out axis. We omit edges between states with
identical outcomes, since such moves are impossible for any transitive preferences. A directed edge in (b) is a
better-reply in G∗.
On the technical level, this unified presentation enabled us to construct examples of voting rules that settle at
two open questions on acyclicity of game forms: first, showing that there may be non-separable game forms that
are FIP (Theorem 3); and second, that there are game forms that are weakly acyclic but not order-free acyclic
(Theorem 26).
In addition, we provide an extensive study of convergence properties of the common Plurality rule and its
variations. We summarize all known results on iterative voting that we are aware of in Table 1. Note that in
some cases we get positive results if we restrict the initial state or the number of voters (not shown in the table).
For Plurality we provide a more detailed picture in Figs. 7,8. Previous papers whose results are covered in the
Table 1 often use different terminology and thus theorems and examples need to be rephrased (and sometimes
slightly modified) to be directly comparable. These rephrasing and necessary modifications are explained in detail
in [Meir, 2016]. The only paper not covered in [Meir, 2016] is by Koolyk et al. [2016], which provided non-
convergence examples for a variety of common voting rules including Maximin, Copeland, Bucklin, STV, Second-
Order Copeland, and Ranked Pairs. All results demonstrate cycles under best-reply (and under several other
restrictions) from the truthful state, thereby proving that neither of these rules is FBRP (even from the truth).
Beyond the direct implication of various acyclicity properties on convergence in an interactive setting where
agents vote one-by-one, [strong/weak] acyclicity is tightly linked to the convergence properties of more sophis-
ticated learning strategies in repeated games [Bowling, 2005; Marden et al., 2007], which is another reason to
understand them.
Fabrikant et al. [2010] provide a sufficient condition for weak-acyclicity, namely that any subgame contains
a unique Nash equilibrium. Unfortunately, this criterion is not very useful for most voting rules, where typically
18
Voting rule
Dictator
Plurality (lex.)
Plurality (LD)
Plurality (SD)
Plurality (rand.)
Weighted Plurality (lex.)
Veto
k-approval (k ≥ 2)
Borda
PSRs (except k-approval)
Approval
Other common rules
FIP
V
X
X (Ex. 13)
X (Ex. 13)
X (Ex. 13)
X
X
X
X
X
X
X
FBRP
V
X (Ex. 6)
?
?
X
X
-
V (Thm. 5)
V [M15]
V [RW12]
X
X (Ex. 7)
X [M16]
V [RW12,LR12]
X [LR12,L15]
X [RW12,LR12]
X [LR12,L15]
X [M16]
X [KLR16]
-
-
-
-
-
FDBRP
restricted-FIP Weak-FIP
V
V
V
V
V
V
V
V
X (Ex. 17)
V (Thm. 24)
?
V
X
X
?
V [M16]
?
?
V
X [M16]
X [RW12]
?
V
?
Positive results carry to the right side, negative to the left side. We assume lexicographic tie
Table 1:
breaking in all rules except Plurality. FDBRP is only well-defined for Plurality and Veto. Reference codes:
RW12 [Reyhani and Wilson, 2012], LR12 [Lev and Rosenschein, 2012], M15 [Meir, 2015], L15 [Lev, 2015],
M16 [Meir, 2016], KLR16 [Koolyk et al., 2016].
FBRP (Ex. 6)
⇑
FIP
⇓
restricted-FBRP ⇒ weak-FBRP
⇓
⇓
restricted-FIP ⇒ weak-FIP
⇑
⇑
FDRP (Thm. 5) ⇛ FDBRP ⇛ restricted-FDRP ⇒ weak-FDRP
Figure 7: Convergence results for Plurality under lexicographic tie-breaking. Positive results (in light green) carry
with the direction of the arrows, whereas negative results (dark gray) carry in the opposite direction.
(at least) all unanimous votes form equilibria. Another sufficient condition due to Apt and Simon [2012] is by
eliminating never-best-reply strategies, and the prospects of applying it to common voting rules is not yet clear.
We can see that in the "standard" lexicographic domain, convergence is guaranteed from any initial state
provided that voters restrict themselves to direct replies. With randomized tie-breaking, we must also require
a truthful initial vote. On the other hand, we can also allow indirect best-replies, so the results are essentially
incomparable. However, we see the result in the lexicographic case as stronger, since it only requires a very mild
and natural behavioral restriction in the context of Plurality voting, whereas it is harder to justify assumptions on
the initial state.
Implications on social choice
Importantly, best-reply dynamics is a natural and straightforward process, and
requires little information. As such, and due to the convergence properties demonstrated in this work, it is an
attractive "baseline" candidate for predicting human voter behavior in elections and designing artificial agents
with strategic voting capabilities-two of the most important, and also the hardest, goals of social choice research.
However, the clear disadvantage of this approach is that in the vast majority of cases (especially when there
are more than a handful of voters), almost every voting profile (including the truthful one) is already a Nash
equilibrium. Given this, our analysis is particularly suitable when the number of voters is small, for two main
reasons. First, it is more practical to perform an iterative voting procedure with few participants. Second, the
question of convergence is only relevant when cases of tie or near-tie are common. In more complex situations
with many active voters who may change their vote, it is likely that a more elaborate game-theoretic model is
required, which takes into account voters' uncertainty and heuristic behavior (see Section 1.1).
19
FBRP from truth (Thm. 14) ⇐ FBRP
restricted-FBRP
⇒
weak-FBRP ?
⇑
⇑
⇓
FIP from truth
⇐ FIP ⇛ restricted-FIP (Ex. 17) ⇒
⇓
⇓
⇑
⇓
weak-FIP
⇑
FDRP from truth (Ex. 18) ⇐ FDRP
restricted-FDRP
⇒ weak-FDRP (Thm. 24)
Figure 8: Convergence results for Plurality under random tie-breaking.
Promising future directions Based on the progress made in this paper and the other results published since the
introduction of iterative voting in [Meir et al., 2010], we believe that research in this area should focus on three
primary directions:
1. Weak-acyclicity seems more indicative than order-free acyclicity to determine convergence in practice. Thus
theorists should study which voting rules are weak-FIP, perhaps under reasonable restrictions (as we demon-
strated, this property is distinct from restricted-FIP). We highlight that even in rules where there are counter
examples for weak acyclicity (k-approval, Borda), these examples use two voters and games with more
voters may well be weakly acyclic.
2. It is important to experimentally study how people really vote in iterative settings (both in and out of the
lab), so that this behavior can be formalized and behavioral models can be improved. The work of [Tal et al.,
2015] is a preliminary step in this direction, but there is much more to learn. Ideally, we would like to
identify a few types of voters, such that for each type we can relatively accurately predict the next action in a
particular state. It would be even better if these types are not specific to a particular voting rule or contextual
details.
3. We would like to know not only if a voting rule converges under a particular dynamics (always or often), but
also what are the properties of the attained outcome-in particular, whether the iterative process improves
welfare or fairness, avoids "voting paradoxes" [Xia et al., 2007] and so on. Towards this end, several re-
searchers (e.g., [Reijngoud and Endriss, 2012; Branzei et al., 2013; Meir et al., 2014; Bowman et al., 2014;
Koolyk et al., 2016]) have started to explore these questions via theory and simulations. However, a good un-
derstanding of how iterative voting shapes the outcome, whether the population of voters consists of humans
or artificial agents, is still under way.
References
St`ephane Airiau and Ulle Endriss. Iterated majority voting. In Proceedings of the 1st International Conference on
Algorithmic Decision Theory (ADT-2009), pages 38–49. Springer Verlag, 2009.
Daniel Andersson, Vladimir Gurvich, and Thomas Dueholm Hansen. On acyclicity of games with cycles. Discrete
Applied Mathematics, 158(10):1049–1063, 2010.
Krzysztof R. Apt and Sunil Simon. A classification of weakly acyclic games. In SAGT'12, pages 1–12. 2012.
Tilman Borgers. Pure strategy dominance. Econometrica, 61(2):423–430, 1993.
Endre Boros, Vladimir Gurvich, Kazuhisa Makino, and Wei Shao. Nash-solvable bidirected cyclic two-person
game forms. Technical report, Rutcor Research Report 26-2007 and DIMACS Technical Report 2008-13, Rut-
gers University, 2008.
Endre Boros, Vladimir Gurvich, Kazuhisa Makino, and D´avid Papp. Acyclic, or totally tight, two-person game
forms: Characterization and main properties. Discrete Mathematics, 310(6):1135–1151, 2010.
20
Michael Bowling. Convergence and no-regret in multiagent learning. Advances in neural information processing
systems, 17:209–216, 2005.
Clark Bowman, Jonathan K. Hodge, and Ada Yu. The potential of iterative voting to solve the separability problem
in referendum elections. Theory and decision, 77(1):111–124, 2014.
Simina Branzei, Ioannis Caragiannis, Jamie Morgenstern, and Ariel D. Procaccia. How bad is selfish voting? In
Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013.
Samir Chopra, Eric Pacuit, and Rohit Parikh. Knowledge-theoretic properties of strategic voting. In Logics in
Artificial Intelligence, pages 18–30. Springer, 2004.
Vincent Conitzer, Toby Walsh, and Lirong Xia. Dominating manipulations in voting with partial information. In
AAAI, volume 11, pages 638–643, 2011.
Antoine-Augustin Cournot. Recherches sur les principes math´ematiques de la th´eorie des richesses par Augustin
Cournot. chez L. Hachette, 1838.
Yvo Desmedt and Edith Elkind. Equilibria of plurality voting with abstentions. In Proc. of 11th ACM-EC, pages
347–356, 2010.
Amrita Dhillon and Ben Lockwood. When are plurality rule voting games dominance-solvable? Games and
Economic Behavior, 46:55–75, 2004.
Edith Elkind, Umberto Grandi, Francesca Rossi, and Arkadii Slinko. Gibbard–satterthwaite games. In Proceedings
of the 24th International Joint Conference on Artificial Intelligence (IJCAI-15), 2015.
Ulle Endriss. Sincerity and manipulation under approval voting. Theory and Decision, 74(3):335–355, 2013.
Alex Fabrikant, Aaron D Jaggard, and Michael Schapira. On the structure of weakly acyclic games. In Algorithmic
Game Theory, pages 126–137. Springer, 2010.
Dvir Falik, Reshef Meir, and Moshe Tennenholtz. On coalitions and stable winners in plurality. In WINE'12, pages
256–269. 2012.
Robert Forsythe, Thomas Rietz, Roger Myerson, and Robert Weber. An experimental study of voting rules and
polls in three-candidate elections. International Journal of Game Theory, 25(3):355–83, 1996.
Ehud Friedgut, Gil Kalai, Nathan Keller, and Noam Nisan. A quantitative version of the gibbard-satterthwaite
theorem for three alternatives. SIAM Journal on Computing, 40(3):934–952, 2011.
Peter Gardenfors. Manipulation of social choice functions. Journal of Economic Theory, 13(2):217–228, 1976.
Christian Geist and Ulle Endriss. Automated search for impossibility theorems in social choice theory: Ranking
sets of objects. Journal of Artificial Intelligence Research, 40(1):143–174, 2011.
A. Gibbard. Manipulation of voting schemes. Econometrica, 41:587–602, 1973.
Neelam Gohar. Manipulative Voting Dynamics. PhD thesis, University of Liverpool, 2012.
Umberto Grandi, Andrea Loreggia, Francesca Rossi, Kristen Brent Venable, and Toby Walsh. Restricted manipula-
tion in iterative voting: Condorcet efficiency and Borda score. In Algorithmic Decision Theory, pages 181–192.
Springer, 2013.
Richard W Hamming. Error detecting and error correcting codes. Bell System technical journal, 29(2):147–160,
1950.
21
Jerry S Kelly. Strategy-proofness and social choice functions without singlevaluedness. Econometrica: Journal of
the Econometric Society, pages 439–446, 1977.
Aaron Koolyk, Omer Lev, and Jeffrey S Rosenschein. Convergence and quality of iterative voting under non-
scoring rules. In Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Sys-
tems, pages 1329–1330. International Foundation for Autonomous Agents and Multiagent Systems, 2016.
Nikolai S. Kukushkin. Congestion games: a purely ordinal approach. Economics Letters, 64:279–283, 1999.
Nikolai S. Kukushkin. Perfect information and congestion games. Games and Economic Behavior, 38:306–317,
2002.
Nikolai S. Kukushkin. Acyclicity of improvements in finite game forms. International Journal of Game Theory,
40(1):147–177, 2011.
Omer Lev and Jeffrey S. Rosenschein. Convergence of iterative voting. In Proc. of 11th AAMAS, pages 611–618,
2012.
Omer Lev. Agent Modeling of Human Interaction: Stability, Dynamics and Cooperation. PhD thesis, The Hebrew
University of Jerusalem, 2015.
Jason R Marden, Gurdal Arslan, and Jeff S Shamma. Regret based dynamics: convergence in weakly acyclic
games. In Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems,
page 42. ACM, 2007.
Reshef Meir, Maria Polukarov, Jeffrey S. Rosenschein, and Nick Jennings. Convergence to equilibria of plurality
voting. In Proc. of 24th AAAI, pages 823–828, 2010.
Reshef Meir, Omer Lev, and Jeffrey S. Rosenschein. A local-dominance theory of voting equilibria. In EC'14,
2014.
Reshef Meir. Plurality voting under uncertainty. In AAAI'15, pages 2103–2109, 2015.
Reshef Meir. Strong and weak acyclicity in iterative voting. In COMSOC'16. 2016.
Matthias Messner and Mattias K. Polborn. Robust political equilibria under plurality and runoff rule, 2002. Mimeo,
Bocconi University.
Igal Milchtaich. Congestion games with player-specific payoff functions. Games and economic behavior,
13(1):111–124, 1996.
Dov Monderer and Lloyd S. Shapley. Potential games. Games and Economic Behavior, 14(1):124–143, 1996.
Svetlana Obraztsova, Evangelos Markakis, and David R. M. Thompson. Plurality voting with truth-biased agents.
In Algorithmic Game Theory, pages 26–37. Springer, 2013.
Svetlana Obraztsova, Evangelos Markakis, Maria Polukarov, Zinovi Rabinovich, and Nicholas R Jennings. On
In Twenty-Ninth AAAI
the convergence of iterative voting: How restrictive should restricted dynamics be?
Conference on Artificial Intelligence, 2015.
Zinovi Rabinovich, Svetlana Obraztsova, Omer Lev, Evangelos Markakis, and Jeffrey S. Rosenschein. Analysis
of equilibria in iterative voting schemes. In 29th National Conference on AI (AAAI), 2015.
Annemieke Reijngoud and Ulle Endriss. Voter response to iterated poll information. In Proc. of 11th AAMAS,
pages 635–644, 2012.
Reyhaneh Reyhani and Mark C Wilson. Best-reply dynamics for scoring rules. In 20th European Conference on
Artificial Intelligence. IOS Press, 2012.
22
Alvin E Roth. The college admissions problem is not equivalent to the marriage problem. Journal of economic
Theory, 36(2):277–288, 1985.
Donald G. Saari. Susceptibility to manipulation. Public Choice, 64:21–41, 1990.
M. Satterthwaite. Strategy-proofness and Arrow's conditions: Existence and correspondence theorems for voting
procedures and social welfare functions. Journal of Economic Theory, 10:187–217, 1975.
Murat R. Sertel and M. Remzi Sanver. Strong equilibrium outcomes of voting games are the generalized condorcet
winners. Social Choice and Welfare, 22:331–347, 2004.
Maor Tal, Reshef Meir, and Ya'acov Gal. A study of human behavior in voting systems. In AAMAS 15, pages
665–673, 2015.
Lirong Xia, J´erome Lang, and Mingsheng Ying. Sequential voting rules and multiple elections paradoxes. In
TARK'07, pages 279–288, 2007.
H Peyton Young. The evolution of conventions. Econometrica: Journal of the Econometric Society, pages 57–84,
1993.
23
A Proofs
Lemma 15. Consider any cardinal utility function u and the partial preference order Q it induces on subsets by
random tie-breaking. Q holds Axioms K+G+R.
Proof. Let u be any utility scale, we will show that all axioms hold. Let a, b ∈ C and W ⊆ C \ {a, b}.
u({a} ∪ W ) =
1
W + 1 u(a) + Xc∈W
u(c)! , u({b} ∪ W ) =
1
W + 1 u(b) + Xc∈W
u(c)! = u({b} ∪ W ),
thus {a} ∪ W ≻Q {b} ∪ W , and Axiom R holds.
Let a ∈ C, W ⊆ C s.t. ∀b ∈ W, a ≻b. Then
u(a) =
>
1
W + 1 u(a) + Xb∈W
W + 1 u(W ) + Xb∈W
1
u(a)! >
u(a)! =
1
W + 1 u(a) + Xb∈W
u(b)! = u({a} ∪ W )
1
W + 1
u(W ) +
W
W + 1
u(W ) = u(W ),
thus a ≻Q {a} ∪ W ≻Q W and Axiom G holds.
Axiom K1 follows immediately from G. K2 also follows if preferences are strict. Even if there are ties, and
a (cid:23) w for all a ∈ A, w ∈ W then:
i.e., A (cid:23)Q W .
u(A) ≥ min
a∈A
u(a) ≥ max
w∈W
u(w) ≥ u(W ),
Definition A.1. Suppose that X, Y ⊆ C, k = X ≤ Y = K. Sort X, Y in increasing order by Q. Let
rj =(cid:6) j
Y is partitioned into Y1 = {y1, y2, y3}, Y2 = {y4, y5}, Y3 = {y6, y7}).
k K(cid:7). Partition Y into sets Y1, . . . , Yk s.t. for j < K, Yj = {yrj−1+1, . . . , yrj } (e.g., if k = 3, K = 7, then
X match-dominates Y according to Q if:
• (I) ∀j ≤ k∀y ∈ Yj, xj (cid:23) y; and
• either (IIa) at least one relation is strict, or (IIb) K mod k 6= 0.
If X > Y , then X match-dominates Y if Y match-dominates X according to the reverse of Q.
Intuitively, match-domination means that for any q ∈ [0, 1], there is a fraction q of the set X that dominates a
fraction of 1 − q from the set Y : at least one x ∈ X dominates all of Y , at least 20% of X dominate at least 80%
of Y , and so on.
Lemma 27. Let a, a′ be two profiles that differ by a single vote, and define X = f (a), Y = f (a′).10
The following conditions are equivalent for any strict order Q over C:
1. X stochastically dominates Y under preferences Q and uniform lottery.
2. The relation X ≻ Y is entailed by Q and the Axioms K+G+R and transitivity.
3. u(X) > u(Y ) for every u that is consistent with Q.
4. X match-dominates Y according to Q.
10Without some restriction on X, Y , the lemma is incorrect. E.g. if x1 ≻ y1 ≻ y2 ≻ x2 ≻ y3 ≻ y4, then X stochastically dominates Y
but there is no way to derive X ≻ Y from the axioms K+G+R.
24
Proof. The equivalence of (1) and (3) is immediate, and used e.g. in [Reyhani and Wilson, 2012].
(2) ⇒ (3). If X ≻ Y follows from the axioms, then there is a sequence of sets X = X0 ≻ X1 ≻ · · · ≻ Xk = Y
such that each Xj ≻ Xj+1 follows from a single axiom K,G, or R. Thus it is sufficient to show for X ≻ Y that
follows from a single axiom.
If X ≻ Y follows from Axiom R, then X = {a} ∪ W, Y = {b} ∪ W for some W ⊆ C \ {a, b} and a ≻ b.
Thus
u(X) = u({a}∪W ) =
1
W + 1 u(a) + Xc∈W
u(c)! >
1
W + 1 u(b) + Xc∈W
u(c)! = u({b}∪W ) = u(Y ).
If X ≻ Y follows from Axiom G, then either X = Y ∪ {a} and a ≻ b for all b ∈ Y , or X = {x} and
Y = {x} ∪ W where x ≻ w for all w ∈ W . For the first case
u(X) =
1
Y + 1
u(a) +
1
Y + 1 Xy∈Y
u(y) =
1
Y + 1
1
Y Xy∈Y
u(a) +
1
Y + 1 Xy∈Y
u(y)
1
1
>
Y + 1
=(cid:18)1 +
u(y) +
Y Xy∈Y
Y (cid:19)
Y + 1 Xy∈Y
1
1
u(y)
1
1
u(y) =
Y + 1 Xy∈Y
Y Xy∈Y
Y u(x) + Xw∈W
1
For the second case,
u(X) = u(x) =
1
Y Xy∈Y
u(x) =
u(y) = u(Y ).
u(x)! >
1
Y u(x) + Xw∈W
u(w)! = u(Y ).
If X ≻ Y follows from Axiom K, then u(x) > u(y) for any x ∈ X, y ∈ Y which is a trivial case.
(3) ⇒ (4). Suppose that u(X) > u(Y ) for all u. Suppose first X ≤ Y . If X does not match-dominate
Y then either (I) there is an element xj ′ that is less preferred than some element y′ ∈ Yj ′ ; or (II) for all j and all
y ∈ Yj, xj =Q y and Yj = K
k = q for all j. We will derive a contradiction to (3) in either case. In the latter case,
we have u(xj ) = u(Yj) for all j and thus
u(Y ) =
In contradiction to (3).
1
K
Xj≤k
Yju(Yj)
= Pj≤k qu(xj)
K
= Pj≤k qu(xj)
kq
= u(X),
Thus we are left with case (I). That is, there are j′ ≤ k and y′ ∈ Yj ′ s.t. xj ′ ≺ y′. We define the (possibly
empty) set X ′ ⊆ X as all elements {x : x ≻ xj ′ }. We define Y ′ ⊆ Y as {y : y (cid:23) y′}. By construction, for any
j > j′, Yj ⊆ Y ′. Thus
k
k
Y ′ ≥ 1 +
Yj = 1 +
Xj=j ′+1
Xj=j ′+1
(rj − rj−1) = (K − rj ′ ) + 1 = (K −(cid:24) j′
k
K(cid:25)) + 1 > K −
j′
k
K = K(1 −
j′
k
),
whereas X ′ ≤ k − j′. We define u as follows: u(x) = 1, u(y) = 1 for all x ∈ X ′, y ∈ Y , and u(z) = 0 for
all other elements. Note that X ′, Y ′ contain the top elements of X, Y , respectively. In addition, y′ is the minimal
element in Y ′ and by transitivity y′ ≻ x for all x ∈ X \ X ′. Thus u is consistent with Q.
We argue that u(Y ) > u(X) in contradiction to (3). Indeed, u(X) = X ′
X ≤ k−j ′
k = 1 − j ′
k .
u(Y ) =
Y ′
Y
>
k )K
(1 − j ′
K
= 1 −
=
j′
k
k − j′
≥
X ′
X
= u(X),
k
so we get a contradiction to (3) again. Thus X matching-dominate Y .
(4) ⇒ (2). This is the only part of the proof where we use the profiles from which X, Y are obtained. When
a single voter moves, either the winner set changes by a single candidate (added, removed, or swapped), or X is a
single candidate, or Y is a single candidate. We prove case by case.
25
• The case where X = Y = 1 is immediate.
• Suppose X = 1 (i.e. X = {x}) and Y = K > 1. Then X match-dominates Y means that x (cid:23)
y for all y ∈ Y , with at least one relation being strict, w.l.o.g. yK (least preferred in Y ). Then X (cid:23)
{y1, . . . , yK−1} ≻ Y , where the first transition is by Axiom K2 and the second is by Axiom G.
• The case of Y = 1 is symmetric.
• Suppose X = Y = k. Then X match-dominates Y means that xi (cid:23) yi for all i. For all t ∈ {0, 1, . . . , k},
let X t = {x1, . . . , xt, yt+1, . . . , yk}. Then X t−1 = X t if xt = yt, and X t−1 ≻ X t otherwise from
Axiom R. In addition, X = X 0, Y = X k thus X ≻ Y from transitivity.
• Suppose X = k, Y = k + 1. Then X match-dominates Y means that Y1 = (cid:6) k+1
sets Yj are singletons Yj = yj. Consider the set Y ′ that includes the top k elements of Y . Since x1 is
(weakly) preferred to both candidates in Y1, Y ′ is match-dominated by X. By the previous bullet X (cid:23) Y ′
follows from Axiom R and transitivity. Finally, Y ′ ≻ Y = Y ′ ∪ {min Y } by Axiom G.
k (cid:7) = 2, and all other
The following is an immediate corollary:
Proposition 20. A step a i→ a′ is a better-response under random tie-breaking and stochastic dominance, if and
only if f (a′) ≻i f (a) is entailed by Qi, the Axioms K+G+R, and transitivity.
Proposition 22. A step a i→ a′ is a better-response under unknown tie-breaking and local dominance, if and only
if f (a′) ≻i f (a) is entailed by Qi, Axioms K+G, and transitivity.
Proof. Suppose that X = f (a′) locally-dominates Y = f (a). Let Z = X ∩ Y , and X ′ = X \ Z, Y ′ = Y \ Z.
We must have x ≻i y for any x ∈ X, y ∈ Y ′, otherwise, a tie-breaking order that selects y first and x second
would make i strictly lose when moving from Y to X. Similarly, x ≻i y for any x ∈ X ′, y ∈ Y . If Z = ∅ then
X = X ′ ≻i Y ′ = Y follows from Axiom K. Otherwise, by repeatedly applying Axiom G we get X (cid:23)i Z (cid:23)i Y
with at least one relation being strict.
In the other direction, since Axiom G can only be used to add elements lower (or higher) than all existing
elements, it may only induce relations of the form Z ≻ Z ∪ Y ′ where z ≻ y for all z ∈ Z, y ∈ Y ′; or relations of
the form Z ∪ X ′ ≻ Z where x ≻ z for all z ∈ Z, x ∈ X ′. Thus if X ≻ Y follows from Axiom G, they must have
the form X = Z ∪ X ′, Y = Z ∪ Y ′ where x ≻ z ≻ y for all x ∈ X ′, z ∈ Z, y ∈ Y ′. To see that this entails local
dominance, let xL = L(X) be the first element in X according to order L ∈ π(C), and likewise for Y . For any L,
xL (cid:23) yL (with equality iff L(X) = L(Y ) ∈ Z). Further, either X ′ or Y ′ are non-empty (w.l.o.g. X ′). Consider
an order L′ such that L′(X) ∈ X ′, then xL′ ≻ y for all y ∈ Y and in particular xL′ ≻ yL′.
26
|
1907.10782 | 2 | 1907 | 2019-07-26T20:57:47 | A Framework for Monitoring Human Physiological Response during Human Robot Collaborative Task | [
"cs.MA",
"cs.RO"
] | In this paper, a framework for monitoring human physiological response during Human-Robot Collaborative (HRC) task is presented. The framework highlights the importance of generation of event markers related to both human and robot, and also synchronization of data collected. This framework enables continuous data collection during an HRC task when changing robot movements as a form of stimuli to invoke a human physiological response. It also presents two case studies based on this framework and a data visualization tool for representation and easy analysis of the collected data during an HRC experiment. | cs.MA | cs | A Framework for Monitoring Human Physiological Response during
Human Robot Collaborative Task
Celal Savur1
Ferat Sahin3
Department of Electrical and Microelectronic Engineering
Shitij Kumar2
Rochester Institute of Technology
{cs13231, spk44222, feseee3}@rit.edu
Rochester, NY, 14623, USA
9
1
0
2
l
u
J
6
2
]
A
M
.
s
c
[
2
v
2
8
7
0
1
.
7
0
9
1
:
v
i
X
r
a
the use of 'psycophsiological' 1 methods to evaluate human
response and behavior during human robot
interaction. In
our opinion, continuous monitoring of physiological signals
during human-robot task is the first step in quantifying human
trust in automation. The inferences from these signals and
incorporating them in real-time to affect robot motion can
help in enhancing the human-robot interaction. Such a system
capable of 'physiological computing' 2 will result in a closed
human-in-the-loop system where both human and robot in
an HRC setup are monitored and information is shared. This
could result into better communication which would improve
trust in automation and increase productivity.
Abstract -- In this paper, a framework for monitoring hu-
man physiological response during Human-Robot Collaborative
(HRC) task is presented. The framework highlights the impor-
tance of generation of event markers related to both human
and robot, and also synchronization of data collected. This
framework enables continuous data collection during an HRC
task when changing robot movements as a form of stimuli to
invoke a human physiological response. It also presents two case
studies based on this framework and a data visualization tool for
representation and easy analysis of the collected data during an
HRC experiment.
Index Terms -- Physiological Signals, Psycophisiology, Human-
Robot Interaction, Collaborative Robots, Safety, Awareness,
Digital-Twin, Physiological Computing
I. INTRODUCTION
AcceptedinS M C 2019
The major challenges of any Human Robot Collaboration
(HRC) in industry are human safety, human trust in automa-
tion, and productivity [1]. Human safety has always been the
primary concern in robotics. One main aspect that concerns
safety is injuries due to human-robot collision. Different
strategies have been introduced to ensure human safety, one
is implementing physical and electronic safeguards according
to industrial standards [2]. However, new strategies and ap-
proaches are needed with human robot collaboration where
less standards are available to implement complex protection
schemes. Hence a new category of robots called collaborative
robots or cobots have been introduced in the market (e.g.
Universal Robots, Kuka lbr-iiwa, Rethink Robotics Sawyer;
to name a few). These robots are purposely designed to work
in direct cooperation with humans in a defined workspace by
lowering the severity and risks of injury due to collision.
Hence, in this work we propose a framework for a 'phys-
iological computing' system to monitor human physiological
responses during a human-robot collaboration task. This paper
highlights the aspects and challenges of collecting human-
physiological signals during a human-robot experiment. It
underscores the importance of a controlled HRC experiment
design, event marker generation related to both human and
robot, and the synchronization of data collected. In order
to verify this framework, a prototype implementation of the
system is shown as case studies of two HRC experiments.
The first case study is an experiment to monitor the effect
of change in robot acceleration and trajectory of motion on
human physiological signals and determine a human comfort
index. In this experiment the human is sitting and sharing
the workspace with a UR 5e robot. The second experiment is
monitoring the human-behavior for different safety algorithms
during human-robot collaborative task. This task is implemen-
tation of a speed and separation monitoring setup where a
human and a UR10 robot perform two separate tasks while
sharing a workspace [7]. Here, the human is not stationary
and moves in the workspace, which requires wireless data
acquisition of human physiological signals and representation
of human-robot shared workspace. The final objective of this
work is to generate a database that can be used to further the
1Psychophysiology is a branch of neuroscience that seeks to understand
how a persons mental state and physiological responses interact to affect one
another.
2Physiological computing represents a category of 'affective computing'
incorporates real-time software adaption to the psychophysiological
that
activity of the user.
Human trust in automation is about managing human ex-
pectations and how comfortable the human is sharing the
robot workspace. Even though cobots decrease the risk of
injury, any form of physical collision decreases the human
trust in automation. Thus, collision avoidance strategies such
as stopping or reducing speeds while human is in the operating
workspace of the robot have been implemented [3] [2]. How-
ever, the question arises how do we quantify human's trust in
automation?
In a human robot interaction setup, change in robot motion
can affect the human behavior. This was shown in experiments
done in [4] and [5]. The literature review in [6] highlights
The Intelligence represents the control of robot actions
during an HRC experiment. Programming experiment is part
of the Intelligence since it controls speed, acceleration, and
trajectory of the robot. The Intelligence module processes the
data from the Awareness module to generate event markers
as well as robot actions that can be used as stimuli to elicit
human response. In addition to Awareness it also receives input
from Compliance module, which is a form of interpretation
of human expectation. The Intelligence module interprets this
human command/feedback into actionable robot commands.
Using human physiological signal as feedback to the robot
or form of actionable control will help achieve a complete
human-in-the-loop closed loop system. Here, the Compliance
sub-module is responsible for inference from the physiological
signals or any form of commands from the human, that can
be used to modify the robot behavior. Thus achieving a higher
level of Compliance for the robot and managing the human
expectation by interpreting the human physiological state can
be a gateway for a more interactive human robot collaboration.
Intelligence, and Compliance are the main
parts of the framework [9], however to integrate these three
modules a communication layer for data transformation and
synchronization is required. This is critical as many sensor
devices and other systems do not have the same frequency
and timing clock. The communication layer is responsible
to transfer data in real time and also synchronize the data
from different sources such as physiological signal collection
devices, cameras, the representation of human-robot state in
the digital twin and robot state information.
Awareness,
AcceptedinS M C 2019
understanding of how human physiological responses can be
inferred to result in adaptive robot motion behavior.
The remainder of the paper is organized as follows: Section
II describes the proposed framework for creating a 'physi-
ological computing' system to monitor human physiological
responses during a human-robot collaborative task. Based on
this framework two case studies are implemented in Section
III and discussed in Section IV . Conclusions are drawn and
the future work mentioned in Section V.
II. PROPOSED APPROACH
In this section the key aspects and challenges of monitoring
human physiological response in Human Robot Collaboration
are presented. Asking questions to human subject during or af-
ter the experiment is common practice in human robot collab-
oration and interaction experiment [6], [8]. These response of
the subject allow researchers to quantify the subjective data of
the experiment. However, such methods that interrupt subject
during experiment may not be desirable for maintaining the
integrity of the desired physiological signals. In our opinion,
an alternative approach would be a system which is able to
generate event markers automatically during experiment and
enable the subject or the principle investigator to generate
markers as the experiment is being performed. Then these
event markers can be used during post processing by field
expert to identify response of the given input. In this way, it
could act as an alternative method to asking questions during
the experiment.
The block diagram of the proposed framework is shown in
Figure 1. The proposed framework is a solution for concur-
rently and continuously monitoring the state of human and
robot during an HRC task. The framework from a systems
perspective can be conceptually categorized further into three
sub modules: Awareness, Intelligence and Compliance [9]. The
communication layer between these sub-modules is equally
important as it
is responsible for data transformation and
synchronization.
The sub-module Awareness is the perception of system
which is generated from the physical world sensors and
digital represented in the virtual world. The physical world
is responsible to sense the environment through the sensor
information such as PPG sensor, GSR sensor, camera, motion
capture system etc. On the other hand virtual word is a digital-
twin representation of the physical world that mimics the
environment of the HRC task as well as the movements and
behavior of the robot and human agents [10]. The digital
twin can be used to calculate metrics such as human-robot
minimum distance, directed human-robot speeds, possible
collisions and changes in trajectory [7] [11]. The virtual world
updates its state constantly based on the sensory data received
from the physical world to update itself and generate new
data for the framework. Overall Awareness is responsible for
sensing physical and virtual world and provide this data to
rest of the system. Such a setup helps digitally represent a
combined human-robot state, which can then be associated
with the human physiological state.
Figure 1. An overview block diagram of the proposed framework for mon-
itoring Human Physiological Response during a Human Robot Collaborative
Task.
When designing human physiological signals related exper-
iment the following aspects are critical.
• Experiment design
• Event markers generation
• Synchronization
The importance of these is elaborated in the following Sec-
tions.
1) Experiment design: When designing an experiment, the
experiment and its parameters need to well defined. The task
need to be real or as realistic as possible to maintain the
integrity of the robot motion to act as stimuli to elicit the
human physiological response. For example, an industrial tasks
StorageSignal Transportation and SynchronizationRecorderFeedbackCompliance IntelligenceEvents Gen.ExperimentAwarenessSensorsPhysical WorldCameraRobot InfoRobot TwinVirtual WorldHuman TwinEnvironmentPrametersModel LearningCompliance systemis good option for the experiment. Hence the industrial task
may improves the involvement of the subject sharing human
robot collaboration workspace. In addition the task need to be
simple and controlled to increase the repeatability of a human-
robot interaction scenario. A complex task may result into
more uncertainty.
2) Event Marker generation: The event markers generation
is part of experiment design. In the experiment, important
event need to be investigated and generated by the experiment.
Having markers during experiment gives more intuition about
experiment, such as Experiment Start/End, Task Start/End,
Robot Coming towards Human, etc. The event markers help
to synchronize signal across different channels. For example,
extracting Galvanic Skin Response and Heart Rate signal
between "Experiment Start" and "Experiment End" is trivial
when the event markers are present during signal recording.
Thus, the markers can be used during post-processing for
efficient data segmentation and epoching.
Figure 2. A picture of an subject that preparing for experiment, and device
placement
THE TABLE SHOWS THE PARAMETERS OF THE EACH TASK
Table I
3) Synchronization: Synchronization of signal from differ-
ent sensors is crucial for the human physiological response.
All the signal from human and robot need to be synchronized
with event markers. Thus a central synchronization system is
necessary. In proposed framework for the physiological com-
puting system, Lab Stream Layer (LSL) is used the interface
the subsystems, which integrates data from all different devices
being used. The Lab Stream Layer is a system for collection
of time series data over a local network with built-in time
synchronization [12]. The LSL stream is nearly real-time and
it is commonly used in biological signal collection system
such as OpenBCI, Pupil Lab, etc. Therefore, the LSL layer
is selected as the central core of the data acquisition system
in proposed framework. In the framework, each device has an
application node that is responsible to acquire signal from the
device in real-time and pushing it to the LSL stream. A node
is responsible to record all-time series data from LSL stream
into a local file for post-processing and analysis. Along with
LSL, Robot Operating System (ROS) and ZeroMQ is used to
monitor data in real time during the experiment [9].
AcceptedinS M C 2019
III. CASE STUDIES
Task 1
Task 2
Task 3
Task 4
A. Case Study I
Acceleration
Normal
High
Normal
High
Trajectory
Fixed
Fixed
Random
Random
will be minimized. Since the maximum speed is fixed, the
experiment is designed to have different accelerations and
trajectories. In the experiment acceleration has two modes:
fixed and random. The fixed mode indicates that robot has
fixed acceleration and random mode means the acceleration is
random.
The trajectory has two modes: simple and random. The
simple trajectory indicates there is no waypoint between pick
and place waypoints and the motion is fluent and predictable.
The random trajectory indicates multiple waypoints randomly
selected between pick and place waypoints. The Figure 3
shows an example of the trajectory in random mode in which
robot may take between Pick waypoint to Place waypoint or
vice-versa. The trajectory planner will generate a trajectory
from randomly selected waypoints from each plane.
Four type of tasks are performed by subjects. Each tasks
consists of two parts: loading inserts and unloading inserts.
The subject is responsible for loading inserts on plate shown
in Figure 2(top-left). There are two possible actions which
the human can take during tasks. The first one is load the
plate and wait for robot to unload all of the inserts from plate
then re-load the plate. The second action is, to increase the
productivity, while robot is unloading inserts, load inserts that
are taken by the robot. The subject has freedom to choose
whichever action is comfortable.
The robot is responsible for unloading i.e. picking all inserts
from the plate and placing them into the container. In order
to control the start the unloading, the robot checks master
The objective of the experiment is to monitor the effect
of acceleration and trajectory of the robot on human phys-
iological signals during collaborative task. The experiment
was performed using UR5e (Universal Robot) six degree of
freedom (DoF) arm robot, as shown in Figure 2. The UR5e is
a common collaborative robot with payload of 5 kg, which
is suitable for manufacturing environment and laboratories.
The experiment is a simplfied version of an industrial task for
loading inserts and unloading parts on at a plastic injection
molding plant. This experiment represents a scenario where
the human robot shared workspace is on a table and the human
is stationary.
The experiment consists of four sub tasks which are tab-
ulated in table I. In the experiment the max speed set 100
degree/seconds so in case of collusion any injury or pain
tracked using Pupil Labs and human physiological responses
such as pupil dilation, PPG, GSR, EEG & ECG recorded.
A system diagram showing the data collection and monitor-
ing is shown in Figure 5. The experiment setup is represented
as a digital-twin in order to represent human and robot state
during the experiment. This helps in generating the human-
robot interaction state data such as human-robot separation
distance (minimum distance), human head orientation, human
pose and velocity and action representation. This data is
monitored and collected along with the human-physiological
responses. It is used to represent a combined human-robot
state of the 'physiological computing' system and analyse the
stimulus and effect of human behavior during the experiment.
In this system, the event markers used for case studies I
and II, the physiological signals that can be used and the
communication and synchronization of data are discussed in
the following section.
Figure 4. A motion capture is used to monitor human motion, a camera is
used to record the experiment, the human-gaze is tracked using Pupil Labs
and human physiological responses such as pupil dilation, PPG, GSR, EEG
& ECG recorded.
IV. DISCUSSION
The auto generation of event markers during an HRC
experiment is critical. The choice of event markers depends
on the experiment setup and the objective of the experiment.
The biggest advantage of auto generation of event markers is
the experiment can be performed uninterrupted. These event
markers can be used to effectively post-process and analyse
the data as data segmentation and epoching of the collected
signals becomes easier. A list of events that are automatically
generated during the HRC task for Case Studies I and II are
listed in Table II.
B. Physiological Signals
In this Section, we list some of the human physiological
signals that have been used during human-robot experiments.
The devices for collecting these signals have been success-
fully interfaced in the implemented prototype system of the
proposed framework.
• Electroencephalogram (EEG) is the method to record the
brain's electrical activity via non-invasive electrode placed
Figure 3. Figure shows how the robot selects the waypoint between pick and
place positions. Solid line shows a possible random trajectory and striped line
shows fixed trajectory for the robot.
B. Case Study II
pin on plate every five seconds. This is helpful in generating
event-marker representing the start of the task. If the master
pin has inserts then the plate is full and the robot starts the
unloading process. It picks each item in order and place it
into a container. If there are no inserts on master pin, the
robot goes to its home position wait for five seconds. The
experiment setup and sensor placement can be seen in Figure
2.
AcceptedinS M C 2019
A. Event Marker
This experiment
is monitoring the human-behavior for
different safety algorithms during human-robot collaborative
task. This task is implementation of a speed and separation
monitoring setup where a human and a UR10 robot perform
two separate but related tasks while sharing a workspace [7].
Here, the human is not stationary and moves in the workspace,
which requires wireless acquisition of human physiological
signals and representation of human-robot shared workspace.
The experiment setup is a generic robot pick and place task
of placing 10 products in a box. The robot movement involves
moving the base joint 180◦ degrees between the pick and place
positions on the tables. The human has an assembly task for
threading a nut and a screw that are placed on the picking and
placing area. After threading the bolts and screws the human
puts the finished part on a table outside the robot workspace.
This human task was setup to control the human movement
and overlap of human-robot workspace. For more information
our previous work [3] and [7] can be referred. In order to
avoid collision, safety algorithms are implemented to detect
and anticipate the human motion, resulting into the robot
stopping, reducing speed or moving normally i.e. maximum
allowed speed for the task. The safety algorithms vary in terms
of parameters such as critical human-robot separation distance
and what sensors are used to calculate the separation distance.
This results into different robot motion behavior.
The objective of this experiment is to monitor human phys-
iological response and also see the overall task productivity
during this shared workspace task. During the experiment the
sensors used to monitor the human are shown in Figure 4.
Here the motion capture is used to monitor human motion, a
camera is used to record the experiment, the human-gaze is
Place waypointPick waypointSide ViewGalvanic SkinResponsePPG for HR andHRVMotion CaptureSystemCamera recordingSubjectPupil Dilation andGazeEEG&ECG G.tecNatilusFigure 5. A system diagram representing the data collection and monitoring during the experiment as described in Case Study II
THE TABLE SHOWS THE EVENT-MARKERS USED IN CASE STUDY I & II
Table II
AcceptedinS M C 2019
Experiment started
nth task initialized but subject has not
complete loading yet
nth task started robot unloading all the parts
nth task unloading is done
Each time robot comes toward human will
generate a event
Master pin is loaded
Master pin is not loaded
Experiment is complete
Experiment
When robot change state between Normal,
Reduced, and Stop
When robot going to complete stop
When robot is going to normal speed
Definition
activity. ECG can be used as a psychophysiological indicator
for physical stress, mental stress and fatigue. In an industrial
setup, robot behavior can be adjusted based on the state of
health of the operator. This can help in avoiding injuries that
may result from work exhaustion. [13].
• Electromyography (EMG) is method to record electrical
activity generated by muscles. EMG have been used as a
control input for basic robot interaction. A sense of control
is very important for building the trust of human. Another
example of EMG is using facial muscles to give information
about sudden emotional change or reaction. Placement of
these can be in safety glasses worn by the operator [8], [14],
[15] [16].
• Galvanic Skin Response (GSR) also known as Skin Con-
ductivity (SC) or Electro Dermal Activity (EDA), measures
skin conductivity which is triggered by the central nervous
system. This signal has been used in for emotion recognition,
lie detector and detecting physical and mental stress [8], [13],
[17], [18] [19].
• Heart Rate (HR) and Heart Rate Variability (HRV)
is a signal that can be extracted from the ECG and also
photoplethysmogram (PPG) signal. This information can give
the state of the person i.e. Resting or Active. HRV has been
used as a psychophysiological indicator.
• Pupil Dilation is a measurement of pupil diameter change.
The pupil dilation can be caused by ambient light change in
environment and emotional change. [20].
Event Marker
I
y
d
u
t
S
Experiment start
Task [n] init
Task [n] start
Task [n] end
Robot approaching
Pick up successful
Pick up failed
Experiment end
I Experiment start
e
s
a
C
I
y
d
u
t
S
e
s
a
C
Robot state change
Robot is stopping
Robot is speeding up
Robot is slowing down When robot is slowing down.
Experiment end
Experiment is complete
on the human head. EEG has been used for error related
potentials, emotional valence scale and evoked potentials. It
has also been used to detect alpha activity, which determines
attentiveness, stress, and other emotions. It can be questioned
that wearing an EEG cap while working can be uncomfort-
able. However, it must be noted that in industry, workers
can wear helmets or hats. With the advent of advance, IoT
systems wireless communication and small size factor of
EEG equipment make it plausible to get such data. e.g., g.Tec,
BioRadio, and openBCI.
• Electrocardiogram (ECG) measures the heart's electrical
Virtual World (Digital-Twin)Physical WorldRobot informationExperimentEvent generationGSR signal streamPPG signal streamECG signal streamPupil signal and Gaze streamMinimum distanceHead orientationHuman pose and velocityHuman Action representationLab Stream Layer (LSL)Camera Stream *notusing LSL layerData Visualization Tool for Real-Time Monitoring and AnalysisXDF File & ROS BagMonitoring CameraGaze Tracking CameraRight EyeLeft EyeDigital TwinLeft Eye Pupil DilationLeft Eye Pupil ConfidenceRight Eye Pupil DilationRight Eye Pupil ConfidenceGSR SignalPPG and Heart Beat SignalRobot Tool MomentumHuman-Robot Separation DistanceC. Data Transfer and Signal Synchronization
REFERENCES
[1] S. Kumar and F. Sahin, "A framework for an adaptive human-robot
collaboration approach through perception-based real-time adjustments
of robot behavior in industry," in System of Systems Engineering
Conference (SoSE), 2017 12th.
IEEE, 2017, pp. 1 -- 6.
[2] ISO, "ISO/TS 15066:2016 - robots and robotic devices -- collaborative
robots." [Online]. Available: http://www.iso.org/
[3] S. Kumar, C. Savur, and F. Sahin, "Dynamic Awareness of an Industrial
Robotic Arm Using Time-of-Flight Laser-Ranging Sensors," in 2018
IEEE International Conference on Systems, Man, and Cybernetics
(SMC), Oct. 2018, pp. 2850 -- 2857.
[4] D. Kulic and E. Croft, "Anxiety detection during human-robot inter-
action," 2005 IEEE/RSJ International Conference on Intelligent Robots
and Systems, IROS, pp. 389 -- 394, 2005.
[5] D. Kul´ıc and E. Croft, "Affective state estimation for human-robot
interaction," in IEEE Transactions on Robotics, vol. 23, no. 5, 2007,
pp. 991 -- 1000. [Online]. Available: http://ieeexplore.ieee.org/document/
4339537/
[6] L. Tiberio, A. Cesta, and M. Belardinelli, "Psychophysiological
Methods to Evaluate User's Response in Human Robot Interaction: A
Review and Feasibility Study," Robotics, vol. 2, no. 2, pp. 92 -- 121,
2013. [Online]. Available: http://www.mdpi.com/2218-6581/2/2/92/
[7] S. Kumar, S. Arora, and F. Sahin, "Speed and separation mon-
laser -- ranging sensor arrays."
time -- of -- flight
[8] D. Kuli´c and E. Croft, "Physiological and subjective responses to
articulated robot motion," Robotica, vol. 25, no. 1, pp. 13 -- 27, 2007.
[9] C. Savur, S. Kumar, S. Arora, T. Hazbar, and F. Sahin, "HRC-SoS:
Human robot collaboration experimentation platform as system of sys-
tems," in 2019 14th Annual Conference System of Systems Engineering
(SoSE), May 2019, pp. 206 -- 211.
itoring using on-robot
arXiv:1904.07379v1, Apr. 2019.
AcceptedinS M C 2019
[16] R. Chalapathy and S. Chawla,
[10] T. Cichon and J. Rossmann, "Simulation-based user interfaces for digital
twins: Pre-, in-, or post-operational analysis and exploration of virtual
testbeds," 31st Annual European Simulation and Modelling Conference
2017, ESM 2017, pp. 365 -- 372, 2017.
[11] M. Safeea and P. Neto, "Minimum distance calculation using laser
interaction," Robotics and
scanner and IMUs for safe human-robot
Computer-Integrated Manufacturing, vol. 58, pp. 33 -- 42, Aug. 2019.
[12] SCCN, "Lab Stream Layer (LSL)," 2018.
[13] M. Ali, F. Al Machot, A. H. Mosa, M. Jdeed, E. Al Machot, and
K. Kyamakya, "A globally generalized emotion recognition system
involving different physiological signals," Sensors (Switzerland), vol. 18,
no. 6, pp. 1 -- 20, 2018.
[14] K. Gouizi, F. Bereksi Reguig, and C. Maaoui, "Emotion recognition from
physiological signals," Journal of Medical Engineering and Technology,
vol. 35, no. 6-7, pp. 300 -- 307, 2011.
[15] C. Savur and F. Sahin, "American Sign Language Recognition system
by using surface EMG signal," 2016 IEEE International Conference on
Systems, Man, and Cybernetics, SMC 2016 - Conference Proceedings,
pp. 2872 -- 2877, 2017.
Detection: A Survey," pp. 1 -- 50, 2019.
//arxiv.org/abs/1901.03407
"Deep Learning for Anomaly
[Online]. Available: http:
[17] S. Rohrmann, J. Hennig, and P. Netter, "Changing psychobiological
stress reactions by manipulating cognitive processes," International
Journal of Psychophysiology, vol. 33, no. 2, pp. 149 -- 161, 1999.
[18] K. H. Kim, S. W. Bang, and S. R. Kim, "Emotion recognition system
using short-term monitoring of physiological signals," Medical and
Biological Engineering and Computing, vol. 42, no. 3, pp. 419 -- 427,
2004.
[19] M. van Dooren, J. J. J. de Vries, and J. H. Janssen, "Emotional sweating
across the body: Comparing 16 different skin conductance measurement
locations," Physiology and Behavior, vol. 106, no. 2, pp. 298 -- 304, 2012.
[Online]. Available: http://dx.doi.org/10.1016/j.physbeh.2012.01.020
[20] P. Bonifacci, L. Desideri, and C. Ottaviani, "Familiarity of faces: Sense
or feeling? An exploratory investigation with eye movements and skin
conductance," Journal of Psychophysiology, vol. 29, no. 1, pp. 20 -- 25,
2015.
The proposed framework in Figure 1 for monitoring human
response during Human Robot Collaborative task uses LSL
layer as the core for transportation and synchronization. Using
LSL layer as the core brings many advantages. The first and
most important reason is that it has built in time synchro-
nization. In addition to synchronization, it allows developer
to use external timer as well. The second most important
feature is the LSL layer is operating system agnostic. This
bring flexibility to the proposed framework, since there are
sensor manufacturers have device drivers that supports only
certain operating systems.
Although LSL layer has the ability to record signal from the
stream as an XDF file, the proposed framework uses ROSbag
as an alternative for recording. Rosbag is a popular tool in
robotic application to record time-series data and replaying
data from collected bags. In addition, it has tools helps plotting
the stream from the bags. Hence it is selected as parallel
recording with LSL layer.
Figure 5 shows proposed framework. In the Figure each
device has an application node which push data to LSL layer.
Then LSL layer deliver data to two receivers, LabRecorder and
LSL2Bag application which are responsible to record data in
to a file.
V. CONCLUSION AND FUTURE WORK
In this research, a framework for monitoring and collecting
human physiological response during human robot collabora-
tive task is presented and a prototype implementation is shown.
The challenges of data communication, signal synchroniza-
tion and event markers are addressed and solution proposed.
The implementation shows the synchronized and continuous
collection of human-robot states and human physiological
responses. This system is expandable for additional sensors.
Although the framework designed for human robot collabora-
tion task, it is not limited to this setup. Similar approach can
be taken for other 'physiological computing' systems.
Future research will focus on developing a complete user
interface application of the 'physiological computing' system
for processing of recording signals, extracting information and
applying machine-learning algorithm to provide feedback to
the robot. The final objective of this work is to generate a
database that can be used to further the understanding of how
human physiological responses can be inferred to result in
adaptive robot motion behavior.
ACKNOWLEDGMENT
The authors would like to thank the Electrical Engineering
to the staff
Department at RIT. The authors are grateful
of Multi Agent Bio-Robotics Laboratory (MABL) and the
CM Collaborative Robotics Research (CMCR) Lab for their
valuable inputs.
|
1602.02032 | 1 | 1602 | 2016-02-05T14:19:34 | Track selection in Multifunction Radars for Multi-target tracking: an Anti-Coordination game | [
"cs.MA",
"cs.IT",
"cs.IT"
] | In this paper, a track selection problem for multi-target tracking in a multifunction radar network is studied using the concepts from game theory. The problem is formulated as a non-cooperative game, and specifically as an anti-coordination game, where each player aims to differ from what other players do. The players' utilities are modeled using a proper tracking accuracy criterion and, under different assumptions on the structure of these utilities, the corresponding Nash equilibria are characterized. To find an equilibrium, a distributed algorithm based on the best-response dynamics is proposed. Finally, computer simulations are carried out to verify the effectiveness of the proposed algorithm in a multi-target tracking scenario. | cs.MA | cs | TRACK SELECTION IN MULTIFUNCTION RADARS FOR MULTI-TARGET
TRACKING: AN ANTI-COORDINATION GAME
Nikola Bogdanovi´c, Hans Driessen, Alexander Yarovoy
Microwave Sensing, Signals and Systems
Delft University of Technology, The Nederlands
E-mails: {N.Bogdanovic, J.N.Driessen, A.Yarovoy}@tudelft.nl
6
1
0
2
b
e
F
5
]
A
M
.
s
c
[
1
v
2
3
0
2
0
.
2
0
6
1
:
v
i
X
r
a
ABSTRACT
In this paper, a track selection problem for multi-target tracking
in a multifunction radar network is studied using the concepts from
game theory. The problem is formulated as a non-cooperative game,
and specifically as an anti-coordination game, where each player
aims to differ from what other players do. The players' utilities are
modeled using a proper tracking accuracy criterion and, under dif-
ferent assumptions on the structure of these utilities, the correspond-
ing Nash equilibria are characterized. To find an equilibrium, a dis-
tributed algorithm based on the best-response dynamics is proposed.
Finally, computer simulations are carried out to verify the effective-
ness of the proposed algorithm in a multi-target tracking scenario.
Index Terms -- Multiple target tracking, track selection, non-
cooperative games, coordination, Nash equilibrium.
1. INTRODUCTION
Radar networks that employ multiple, distributed stations offer sig-
nificant advantages over standalone radars, in terms of providing di-
versities and enhancing tracking and detection performance. Fur-
thermore, recent advances in sensor technologies enabled a large
number of controllable degrees of freedom in modern radars. One
such system is the Multifunction Radar (MFR), which employs an
electronically scanned phased array composed of individually con-
trolled radiating elements [1]-[3]. Due to its beam and waveform
agility, the MFR is capable to track multiple targets and perform
new target search in the sector. Thus, the MFR is much more flexible
than conventional, dedicated radars by being capable of performing
different functions - volume surveillance, weapon control, and mul-
tiple target tracking to name a few. In this paper, we focus on the
latter function [4]-[5]; specifically, each MFR radar aims at tracking
several targets.
Even for a standalone MFR, the radar resource management
plays a crucial role so as to efficiently allocate resources to achieve
specified objectives while conforming to operational and techni-
cal constraints [6], [7]. Most of the existing approaches to MFR
radar resource management roughly fit into the following two cat-
egories [8], [9]. The first category consists of the rule-based tech-
niques [10]-[12], which control the resource allocation parameters
indirectly, under low computational burden. However, it is hard to
say what performance can be achieved since it highly depends on
The work reported in this paper has been conducted as part of the Sen-
sor Technology Applied in Reconfigurable systems for sustainable Security
(STARS) project, see the website www.starsproject.nl; the multi-site tracking
algorithm that is used in this paper has been developed under the SOS project
funded by the European Commission (FP7 GA no. 286105).
the application scenario and on the sensors being deployed. The
other category is related to the methods that formulate the problem
as an optimization one; and thus, they may achieve the optimal
performance, see [13]-[15], [1], [5] and the references therein.
Note that, in the network setting, the first category of approaches
is difficult to be extended, while the second one may involve ex-
cessive complexity due to the network dimension. To reduce such
complexity, in this work we propose a distributed approach based on
game theory so as to model track selection for multi-target tracking
in an MFR network.
Game theory is the mathematical study of conflict and cooper-
ation between intelligent rational decision-makers [16]. In addition
to its traditional research areas such as economics and political sci-
ences, over the last decade game theory (GT) is being applied to
signal processing and wireless communications. This is mainly due
to the issues dealing with (distributed) networking [17], [18], such as
power control [19], antennas' beamforming [20], multiple input mul-
tiple output (MIMO) communications [21], channel allocation [22],
adaptive estimation [23], [24], to name a few. More recently, GT
has been applied to solve certain radar problems, mostly related to
the MIMO radar networks. For instance, the problem of waveform
design has been tackled; in [25] by formulating a two player zero-
sum (TPZS) game between the radar design engineer and an oppo-
nent, and in [26] by a potential game in which the radars choose
among the pre-fixed transmit codes. Next, the interaction between
a smart target and a MIMO radar is modeled as a TPZS game [27],
where the mutual information criterion was used in the utility func-
tions. Also, the problem of transmission power management was
addressed in [28], [29]. Initially, the power control problem was for-
mulated in [28] assuming the presence of some interference due to
the other radars' transmissions. A non-cooperative game was used
for modeling and a distributed algorithm converging to a Nash equi-
librium was proposed. On the other hand, in reference [29], a coali-
tional game theoretic solution concept called the Shapley value was
employed to distribute a given power budget among all transmitting
radars. More related to the application scenario in this article, the
work in [30] utilize a market mechanism, called the continuous dou-
ble auction, in order to choose the global optimum parameters for
each individual task given the global (finite) resource constraint.
In contrast to the aforementioned literature, in this paper we
formulate a new problem of track selection for a multi-target track-
ing scenario in a resource-limited MFR network using the non-
cooperative games, the dominant branch of GT [16]. An example
of such a scenario is depicted in Fig. 1. To the best of our knowl-
edge, this is the first non-cooperative GT contribution dealing with
multi-target tracking. Due to its nature, the problem is modeled as a
coordination game which is known to have several Nash equilibria.
measurements {z(i)
j,k} related to the previously selected targets. The
number of transmissions each target j is tracked by at one time slot
is denoted as mt
j. For notational simplicity, in the rest of this section
we drop the index j for targets.
At each radar i and for each target j, the tracking process is per-
formed by an Extended-Kalman Filter (EKF). Firstly, the prediction
step occurs, i.e.,
xkk−1 = F · xk−1k−1
Pkk−1 = F Pk−1k−1F T + Q
(3)
(4)
where xkk−1 and Pkk−1 are the state estimate and the error co-
variance matrix for time step k given all measurements till time step
k − 1. Then, the updating step takes place where each available
measurement for target j of some radar n ∈ N is used in a cyclic
manner. In particular, for each p ∈ {1, . . . , mt
j},
k,n]T(cid:16)
(cid:16)
(cid:17)
k
[H (p)
k = P (p−1)
K (p)
kk
kk = x(p−1)
x(p)
kk + K (p)
I − K (p)
k H (p)
P (p)
kk =
(cid:16)
k,n
k,nP (p−1)
H (p)
k − h(n)(cid:16)
kk
z(n)
P (p−1)
kk
(cid:17)−1
k,n]T + Rn
(cid:17)(cid:17)
[H (p)
x(p−1)
kk
(5)
(6)
(7)
where P (p)
kk denotes the error covariance matrix after p incremental
updates at the same time step k, with P (0)
kk =
xkk−1. The linearized measurement matrix of radar n at time k
is H (p)
. Note that, due to the
fact that the position of each radar is known, the radars do not need
to exchange {Hk,n} matrices in order to implement the algorithm
above.
k,n = ∂h(n)/∂x evaluated at x(p−1)
kk
kk = Pkk−1 and x(0)
In the following, we study a natural game theoretic variant of
this problem. Specifically, we assume that the radars are autonomous
decision-makers interested in optimizing their own tracking perfor-
mance. The fact that each radar autonomously and rationally decides
to track the targets that increase its utility can be modeled as a one-
stage non-cooperative game in normal form.
3. GAME-THEORETIC MODEL
Here, we formulate the track selection problem in multi-target track-
ing as a non-cooperative game in normal form, which is the most
fundamental representation type in game theory [16]. Note that there
are many classes of normal-form games; however, in this work we
focus on coordination games, which do not rest solely upon conflict
among players. Instead, as their name suggests, more emphasis is
put on the coordination issue where players may have an incentive
to conform with or to differ from what others do. In the latter case,
this kind of games are usually called anti-coordination games [16],
[31]-[32].
We assume that the players are rational and their objective is to
maximize their payoff, i.e., the tracking accuracy of all targets. For-
mally, the track selection game (N ,S, u) has the subsequent com-
ponents:
• The players are the radars represented by the set N .
• The strategy of each radar i is represented by a T -tuple
si = (si,1, si,2, . . . , si,T ) where si,j = a if radar i de-
votes a transmission beams to a target j, with a ≤ m. Each
j=1 si,j ≤
i=1 si,j. Each vector s =
strategy-tuple has at most m transmissions, i.e.,(cid:80)T
j = (cid:80)N
m. Also, note that mt
Fig. 1. A track selection problem in multi-target tracking.
Then, the equilibria are characterized in terms of their existence con-
ditions and efficiency. Finally, to find an equilibrium, a distributed
algorithm based on the best-response dynamics is proposed and its
effectiveness for the track selection issue in multi-target tracking is
demonstrated.
2. PROBLEM FORMULATION
Suppose that there are multiple MFR radars and several targets to be
tracked whose number is known exactly and their current positions
approximately, see Fig. 1. We denote the set of radars by N , while
the set of targets is denoted by T . The targets are assumed to be
well-separated; thus there is no data association problem and differ-
ent transmission beams are required so as to illuminate the targets.
Consider that there is no fusion center and that each radar aims at
tracking all targets simultaneously. Next, each target j ∈ T , at each
discrete time k, follows the so-called white noise constant velocity
model [4], [13] given by
xj,k = F · xj,k−1 + wj,k−1
z(i)
j,k = h(i)
j (xj,k) + ν(i)
j,k
(1)
(2)
0 1
(cid:3) ⊗ I2, with ⊗ being the Kronecker
dynamics given as F = (cid:2) 1 tu
w ·(cid:104) t3
where the state vector x for each target j is comprised of the two di-
mensional coordinates and velocity, i.e., xj = [xj, yj, vj,x, vj,y]T ,
while F is a 4 × 4 matrix corresponding to the deterministic target
product, I2 stands for a 2 × 2 identity matrix and tu is the update
time that is fixed. The process noise w is Gaussian with zero mean
w models ma-
and covariance Q = σ2
neuverability. At each radar i ∈ N , the measurement vector z(i)
j,k
consists of range and azimuth, i.e., z(i)
, while the
nonlinear transformation h(i)
(cid:105) ⊗ I2, where σ2
(cid:105)T
(cid:21)
j (xj) is given by
u/3 t2
t2
u/2 tu
r(i)
j,k, a(i)
j,k =
(cid:104)
u/2
j,k
arctan((yj − yi)/(xj − xi))
(cid:20) (cid:112)(xj − xi)2 + (yj − yi)2
(cid:110)
j
.
The coordinates (xi, yi) of each radar i ∈ N are assumed known.
Finally, the measurement noise ν(i)
is zero-mean Gaussian with co-
rj ]2, [σ(i)
variance Rj,i = diag
aj ]2(cid:111)
[σ(i)
.
The radars have limited time budget in sense that they cannot
take measurements of all targets during the same time slot. The num-
ber of measurements per scan that each radar can make is given by
m < T . Since there is no central entity that may coordinate actions
of the radars, a distributed solution is needed. The interaction among
the radars is existing but limited to sharing, e.g., by broadcasting, the
h(i)
j (xj) =
{𝑧𝑧𝑗𝑗,𝑘𝑘(𝑖𝑖)} Target 1 Target 2 Target 3 Radar 1 Radar 2 ? ? (cid:26)
Tr
0,
(cid:27)
(a)
(b)
Fig. 2. An example of a track allocation where T = {a, . . . , e},
and N = m = 3. Each box represents a gain increment due to
a measurement, and the number of measurements per target, mt
j,
varies between 1 and 4 across targets in T . In case (a), the gains are
equal for the same number of measurements, while in case (b) they
differ.
(s1, . . . , sN ) ∈ S is called an action or strategy profile, and
s−i = (s1, . . . , si−1, si+1, . . . , sN ) is defined as a strategy
profile s without player i's strategy.
• The utility for each radar i is given by
(cid:0)gainj(mt
T (cid:88)
j=1
(cid:1) ,
(8)
j) − c · τj
ui(si, s−i) =
where the term gainj(mt
gain for target j ∈ T and it is defined by
j) represents the tracking accuracy
gainj(mt
j) =
Pj,kk−1 − P
(mt
j )
j,kk
,
if mt
j ≥ 1
otherwise
(9)
where all radars are assumed to have the same initial guesses
xj,00 and Pj,00. Finally, the normalization coefficient c in-
dicates delay importance, while τj is the delay function given
as
(cid:40)
τj =
if mt
j ≥ 1
0,
1, otherwise
.
(10)
In other words, the strategy of radar i defines the number of
transmissions per each target, at a given time slot. Due to the fact that
radars share their measurements, their tracking accuracy gains for a
specific target are dependent on all radars' measurements related to
that target. If set to be non-negative, the delay importance coefficient
can serve as a mechanism for punishing radars in case where not all
targets are being tracked. Otherwise, if set negative enough, it gives
incentives to radars to focus all their resources on less targets. In our
study, it is of interest to study the former case.
(cid:0)mt
(cid:1) =(cid:80)mt
p = Tr{P (p−1)
In practice, the gain function in (9) can be assumed to be increas-
ing in the number of measurements, at least in mean sense. Note
p=1 ∆g(j)
that the gain in (9) can be expressed as gainj
p ,
where ∆g(j)
1 = gainj(1). Also,
in a real system it reasonable to assume that an estimation accu-
racy gain increment ∆g(j)
p decreases as the order of measurements
p grows, i.e., ∆g(j)
p+1. For the analysis in the sequel, the
following two cases are distinguished:
j,kk} and ∆g(j)
j,kk − P (p)
p > ∆g(j)
j
j
p = ∆gp, for all j ∈ T and p ∈ {1, . . . , mt
j}
for j
(cid:54)= (cid:96), and minj∈T ∆g(j)
p
>
a) ∆g(j)
b) ∆g(j)
p
(cid:54)= ∆g((cid:96))
p ,
p+1.
maxj∈T ∆g(j)
Case a) represents an idealistic case where all nodes would have very
similar measurements among themselves and related to all targets,
see Fig 2(a). A more realistic scenario, corresponding to case b), is
illustrated in Fig 2(b). In the following section, the track selection
game for both cases will be analyzed.
4. NASH EQUILIBRIA
In general, one can reason about multiplayer games using solution
concepts, i.e., principles according to which interesting outcomes of
a game can be identified. Although there are many solution concepts
in the game-theory literature, a basic and the most widely accepted
one is the Nash equilibrium. Formally, in case in which players make
deterministic choices (pure strategies) the Nash equilibrium is de-
fined as follows [16].
Definition 1. A strategy profile s = (s1, . . . , sN ) is a pure-strategy
i (cid:54)=
Nash equilibrium (NE) if, for all players i and for all strategies s(cid:48)
si, it holds that ui(si, s−i) ≥ ui(s(cid:48)
i, s−i).
In other words, in an NE, no player can unilaterally improve its
utility by taking a different strategy. Also, it is important to define
Pareto domination and Pareto optimality.
Definition 2. Strategy profile s Pareto dominates strategy profile s(cid:48)
if ∀i ∈ N , ui(s) ≥ ui(s(cid:48)), and there exists some n ∈ N for which
un(s) > un(s(cid:48)). Also, strategy profile s is Pareto optimal (PO)
if there does not exist another strategy profile s(cid:48) ∈ S that Pareto
dominates s.
Generally, in a coordination game, there are multiple NE. If the
players have the same payoffs, and the equilibria are equal, the game
is a pure coordination one. In fact, in such a game, all NE are PO.
On the other hand, in a ranked one, the NE differ and usually there
is only one PO equilibrium [33].
Now, the main findings related to the NE for cases (a) and (b)
are provided.
Proposition 1. For case (a), any track assignment is a PO NE, if
c ≥ 0 and(cid:80)T
j=1 si,j = m, and if
j − mt
• mt
j ≤ 1, ∀j ∈ T , for a scenario where N · m ≤ T
• maxj,(cid:96)∈T {mt
N · m > T .
Firstly, let us assume that there is a radar i such that(cid:80)T
(cid:96)} ≤ 1, ∀j, (cid:96) ∈ T , for a scenario where
j=1 si,j <
m and that the corresponding s∗ is an NE. Then, radar i can change
its strategy by taking an additional measurement. Due to the fact
that the radar's gain function in (9) is increasing in the number of
measurements, its utility will be increased. But that contradicts our
initial assumption that s∗ is an NE; thus, as per our intuition, each
radar should make all possible transmissions toward the target(s) at
each time instant. Next, note that if the total number of measure-
ments is less than or equal to the number of targets, the condition
related to c ensures that the radars are punished if more than one
measurement in total is devoted to the same target. Also, due to the
structure of gain function, NE are precisely
(T −N·m)! outcomes
in which each measurement is devoted to a distinct target. On the
other hand, if N · m > T , condition c ≥ 0 promotes all targets
to be covered. Here, each NE corresponds to a balanced allocation.
For instance, the allocation in Fig 2(a) is not an NE since the payoffs
can be increased if some player moves its measurement from target
b to any other target. Finally, since the gain of any target is the same
for the same number of measurements, the game appears to be a
pure anti-coordination one. Thus, every NE is also Pareto optimal.
T !
targets gains a b c d e ∆𝑔𝑔4 𝑔𝑔𝑔𝑔𝑔𝑔𝑔𝑔(1) } targets gains a b c d e Proposition 2. For case (b), any track assignment is an NE, if c ≥ 0
and(cid:80)T
j=1 si,j = m, and if,
• for N · m > T , the first
• for a scenario with N · m ≤ T , each radar chooses its
most accurate target that has not been selected,
(cid:108) N·mT
(cid:109) − 1, ∀j ∈ T , and for the
(cid:109) − 1 levels are filled in,
(cid:109)
(cid:108) N·mT
j ≥ (cid:108) N·mT
i.e., mt
-th
level each radar chooses its most accurate target that has not
been selected by others, where (cid:100)·(cid:101) is the ceiling function.
Similar arguments hold as for Prop. 1. Yet, the game above
seems to be a ranked anti-coordination game. Note that here there
are still multiple NE, but not all NE are necessarily equal, and hence,
not every NE is Pareto optimal (only one is). So, the conditions
above are not sufficient to have also a Pareto optimal NE.
To conclude this section, we provide a simple, distributed algo-
rithm, based on the best response dynamics [16], [17], to achieve an
NE. In the games above where N · m > T , in general, two types
of NE may arise, one where a radar illuminates only different targets
and the other where it chooses the same target more than once. In
practice, it is of interest to exploit the radars' diversity; thus, we fo-
cus on the former type. Let Ti denote the set of targets selected by
radar i. Then, for any initialization, at each time instant each radar
i ∈ N performs the following steps:
• Count mt
j, ∀j ∈ T , and reallocate the measurements for
∀j ∈ Ti satisfying si,j > 1 to a target argmin(cid:96)∈{T /Ti}mt
(cid:96).
• With probability α, reallocate the measurement from target j
to (cid:96)
(cid:108) N·mT
(cid:109)
-- if ∃j ∈ Ti such that mt
and the measure-
ment for (cid:96) is the most accurate one of those satisfying
argminq∈{T /Ti}mt
q, or
j >
-- if mt
j − mt
(cid:96) = 1, where mt
(cid:96) =
q, and if measurement for (cid:96) is more ac-
j = maxq∈Ti mt
q and mt
minq∈{T /Ti}mt
curate than the one for j.
• Transmit/receive measurements, and ∀j ∈ T , execute (3)-(4)
and employ all available measurements in (5)-(7).
To account for time-varying accuracy measures, e.g., range and/or
azimuth variances, or to deal with different model dynamics, algo-
rithm can be reinitialized every K time instants so as to search for
other NE during the tracking process.
5. SIMULATIONS
In this section, we will demonstrate the performance of the proposed
algorithm for track selection in multi-target tracking.
We consider an MFR network of N = 3 radars, each of
them making m = 2 measurements per scan and aiming at track-
ing T = 5 targets. The coordinates of radars are (x1, y1) =
[−10 km, 0 km], (x2, y2) = [3 km, 0 km] and (x3, y3) =
[10 km, 0 km]. The targets follow white noise constant veloc-
ity trajectories with initial x, y-coordinates and velocities x1,0 =
[1 km, 6 km, 0.5 km/s, 0.1 km/s]T , x2,0 = [0.5 km, 7 km,
0.35 km/s, −0.1 km/s]T , x3,0 = [1.5 km, 3.0 km, −0.3 km/s,
0 km/s]T , x4,0 = [2.0 km, 4.0 km, −0.2 km/s, 0.1 km/s]T
and x5,0 = [2.5 km, 5.0 km, 0.3 km/s, 0.2 km/s]T .
Initial
guesses xj,00 are noisy versions of the initial states xj,0 and ini-
tial covariances are equal to Pj,00 = P00 = diag(cid:8)(0.1 km)2,
(0.1 km)2, (0.1 km/s)2, (0.1 km/s)2(cid:9). The update time is tu =
Fig. 3. Sum of traces of error covariance matrices for all targets
during time.
0.25 s, and in order to model moderate maneuverability, σ2
w is set
to 2.5 · 10−5 km2/s3. Also, the standard deviation in azimuth
is σ(i)
aj = σa = 2 mrad, while the range accuracy varies among
rj = bi,j · σr, where σr = 15 m and
the radars and targets as σ(i)
bi,j is taken from the interval [1, 4.5]. Next, a comparison is made
among the following strategies: (a) the standalone radar that does
not send/receive measurements, and sequentially chooses m = 2
different targets at each time instant; (b) distributed strategy where
the radars exchange the measurements while each of them ran-
domly changes its selection at each K = 10 time instants; (c) same
as in (b), except that targets are being randomly chosen at each
time instant; (d) the proposed distributed algorithm seeking NE for
α = 0.4 while being reinitialized with K = 10; and (e) an approx-
imated centralized approach based on exhaustive search for optimal
measurements-to-target allocation every K = 10 time instants.
The results in Fig. 3 are averaged over 100 realizations. Not
surprisingly, due to the high process' dynamics, a standalone, non-
cooperative radar experiences weak performance since it utilizes
only its own measurements which are not sufficient to cover all tar-
gets. However, although approach in (b) uses 3x2=6 measurements,
due to the lack of coordination it performs poorly. Note that the dis-
tributed random strategy can be significantly improved if strategies
are constantly being changed, given that there are no track migration
costs involved. However, the proposed distributed algorithm that
learns underlying NE outperforms aforementioned strategies and
closely approaches to the performance of the centralized one while
being much more efficient in terms of complexity.
6. CONCLUSIONS
We have formulated a track selection problem for multi-target track-
ing in a network of MFR radars. The problem has been tackled using
the non-cooperative game theory. The Nash equilibria of the under-
lying anti-coordination games have been analyzed and a simple yet
effective distributed algorithm that looks for the equilibria points has
been proposed. It introduces a balancing effect in the track selection
which makes it be particularly convenient for the settings with high
dynamics. Also, it closely approximates the centralized performance
while mitigating its inherent complexity. Our future work may con-
sider extending the results for different communication topologies
and for cases where not all radars have the same interests.
0510152025303540455010−310−210−1100Time, kSum of Trace(P) Standalone − no shareDistributed random − K= 10Distributed random − K= 1Proposed distributed − K=10Centralized − K=107. REFERENCES
[1] A. O. Hero and D. Cochran,
"Sensor management: Past,
present, and future," Sensors Journal, IEEE, vol. 11, no. 12,
pp. 3064 -- 3075, 2011.
[2] S. Sabatini and M. Tarantino, Multifunction array radar,
Artech House, 1994.
[3] M. A. Richards, J. Scheer, and W. A. Holm, Principles of
modern radar, SciTech Publishing, 2010.
[4] S. S. Blackman and R. Popoli, Design and Analysis of Modern
Tracking Systems, Artech House radar library. Artech House,
1999.
[5] S. P. Sira, Y. Li, A. Papandreou-Suppappola, D. Morrell,
D. Cochran, and M. Rangaswamy, "Waveform-agile sensing
for tracking," IEEE Signal Processing Magazine, vol. 26, no.
1, pp. 53 -- 64, Jan 2009.
[6] Z. Ding, "A survey of radar resource management algorithms,"
in Proc. Canadian Conference on Electrical and Computer En-
gineering, May 2008, pp. 001559 -- 001564.
[7] F. Katsilieris, Sensor management for surveillance and track-
ing: An operational perspective, Ph.D. thesis, TU Delft, Delft
University of Technology, 2015.
[8] A. Charlish, Autonomous agents for multi-function radar re-
source management, Ph.D. thesis, UCL (University College
London), 2011.
[9] A. S. Narykov, O. A. Krasnov, and A. Yarovoy, "Algorithm
for resource management of multiple phased array radars for
target tracking," in Proc. 16th Int. Conference on Information
Fusion (FUSION 2013). IEEE, 2013, pp. 1258 -- 1264.
[10] G. van Keuk and S. S. Blackman,
tracking and parameter control,"
Aerospace Electronic Systems, vol. 29, pp. 186 -- 194, 1993.
"On phased-array radar
IEEE Transactions on
[11] W. Koch,
"On adaptive parameter control for phased-array
tracking," in Signal and Data Processing of Small Targets,
1999, pp. 444 -- 455.
[12] S. Coetzee, K. Woodbridge, and C. Baker,
"Multifunc-
tion radar resource management using tracking optimisation,"
Tech. Rep., DTIC Document, 2005.
[13] J. H. Zwaga and H. Driessen, "Tracking performance con-
strained mfr parameter control: applying constraints on pre-
diction accuracy," in Proc. 8th International Conference on
Information Fusion, 2005, July 2005, vol. 1, pp. 546 -- 551.
[14] J. Hansen, R. Rajkumar, J. Lehoczky, and S. Ghosh, "Resource
management for radar tracking," in IEEE Conference on Radar,
2006. IEEE, 2006, p. 8.
[15] V. Krishnamurthy and D. V. Djonin, "Optimal threshold poli-
cies for multivariate POMDPs in radar resource management,"
IEEE Transactions on Signal Processing, vol. 57, no. 10, pp.
3954 -- 3969, Oct 2009.
[16] Y. Shoham and K. Leyton-Brown, Multiagent Systems: Al-
gorithmic, Game-Theoretic, and Logical Foundations, Cam-
bridge University Press, 2008.
[17] Z. Han, D. Niyato, W. Saad, T. Baar, and A. Hjørungnes, Game
Theory in Wireless and Communication Networks: Theory,
Models, and Applications, Cambridge University Press, New
York, NY, USA, 1st edition, 2012.
[18] G. Bacci, S. Lasaulce, W. Saad, and L. Sanguinetti, "Game
arXiv preprint
theory for signal processing in networks,"
arXiv:1506.00982, 2015.
[19] C. U. Saraydar, N. B. Mandayam, and D. Goodman, "Efficient
power control via pricing in wireless data networks," IEEE
Transactions on Communications, vol. 50, no. 2, pp. 291 -- 303,
Feb 2002.
[20] E. G. Larsson and E. A. Jorswieck, "Competition versus coop-
eration on the MISO interference channel," IEEE Journal on
Selected Areas in Communications, vol. 26, no. 7, pp. 1059 --
1069, September 2008.
[21] G. Scutari, D. P. Palomar, and S. Barbarossa, "Competitive
design of multiuser mimo systems based on game theory: A
unified view," IEEE Journal on Selected Areas in Communica-
tions, vol. 26, no. 7, pp. 1089 -- 1103, 2008.
[22] M. Felegyhazi, M. Cagalj, and J.-P. Hubaux, "Efficient mac
in cognitive radio systems: A game-theoretic approach," IEEE
Transactions on Wireless Communications, vol. 8, no. 4, pp.
1984 -- 1995, April 2009.
[23] C. Yu, M. van der Schaar, and A.H. Sayed, "Reputation de-
sign for adaptive networks with selfish agents," Proc. 2013
IEEE 14th Workshop on Signal Processing Advances in Wire-
less Communications (SPAWC), pp. 160 -- 164, June 2013.
[24] N. Bogdanovi´c, D. Ampeliotis, and K. Berberidis, "Coalitional
game theoretic approach to distributed adaptive parameter es-
timation," in Proc. 2015 IEEE Int. Conference on Acoustics,
Speech and Signal Processing (ICASSP), April 2015.
[25] S. Gogineni and A. Nehorai, "Game theoretic design for po-
larimetric MIMO radar target detection," Signal Processing,
vol. 92, no. 5, pp. 1281 -- 1289, 2012.
[26] M. Piezzo, A. Aubry, S. Buzzi, A. De Maio, and A. Farina,
"Non-cooperative code design in radar networks: a game-
theoretic approach," EURASIP Journal on Advances in Signal
Processing, vol. 2013, no. 1, pp. 1 -- 17, 2013.
[27] X. Song, P. Willett, S. Zhou, and P. B. Luh, "The MIMO radar
and jammer games," IEEE Transactions on Signal Processing,
vol. 60, no. 2, pp. 687 -- 699, Feb 2012.
[28] G. Bacci, L. Sanguinetti, M.S. Greco, and M. Luise, "A game-
theoretic approach for energy-efficient detection in radar sen-
sor networks," in Proc. 7th Sensor Array and Multichannel
Signal Processing Workshop (SAM), June 2012, pp. 157 -- 160.
[29] H. Chen, S. Ta, and B. Sun, "Cooperative game approach to
power allocation for target tracking in distributed MIMO radar
sensor networks," IEEE Sensors Journal, vol. PP, no. 99, pp.
1 -- 1, 2015.
[30] A. Charlish, K. Woodbridge, and H. Griffiths, "Multi-target
tracking control using continuous double auction parameter se-
lection," in Proc. 15th International Conference on Informa-
tion Fusion (FUSION 2012). IEEE, 2012, pp. 1269 -- 1276.
[31] N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, Al-
gorithmic Game Theory, Cambridge University Press, 2007.
[32] Y. Bramoull´e,
"Anti-coordination and social interactions,"
Games and Economic Behavior, vol. 58, no. 1, pp. 30 -- 49,
2007.
[33] E. Rasmusen, Games and information, Blackwell Publishers,
2001.
|
1912.06880 | 1 | 1912 | 2019-12-14T16:57:56 | Spatial Influence-aware Reinforcement Learning for Intelligent Transportation System | [
"cs.MA",
"cs.AI",
"cs.LG"
] | Intelligent transportation systems (ITSs) are envisioned to be crucial for smart cities, which aims at improving traffic flow to improve the life quality of urban residents and reducing congestion to improve the efficiency of commuting. However, several challenges need to be resolved before such systems can be deployed, for example, conventional solutions for Markov decision process (MDP) and single-agent Reinforcement Learning (RL) algorithms suffer from poor scalability, and multi-agent systems suffer from poor communication and coordination. In this paper, we explore the potential of mutual information sharing, or in other words, spatial influence based communication, to optimize traffic light control policy. First, we mathematically analyze the transportation system. We conclude that the transportation system does not have stationary Nash Equilibrium, thereby reinforcement learning algorithms offer suitable solutions. Secondly, we describe how to build a multi-agent Deep Deterministic Policy Gradient (DDPG) system with spatial influence and social group utility incorporated. Then we utilize the grid topology road network to empirically demonstrate the scalability of the new system. We demonstrate three types of directed communications to show the effect of directions of social influence on the entire network utility and individual utility. Lastly, we define "selfish index" and analyze the effect of it on total group utility. | cs.MA | cs |
Spatial Influence-aware Reinforcement Learning for
Intelligent Transportation System
Wenhang Bao+, Xiao-Yang Liu∗
∗Electrical Engineering, Columbia University,
+Department of Statistics, Columbia University,
Emails: {WB2304, XL2427}@columbia.edu
Abstract
Intelligent transportation systems (ITSs) are envisioned to be crucial for smart
cities, which aims at improving traffic flow to improve the life quality of urban res-
idents and reducing congestion to improve the efficiency of commuting. However,
several challenges need to be resolved before such systems can be deployed, for
example, conventional solutions for Markov decision process (MDP) and single-
agent Reinforcement Learning (RL) algorithms suffer from poor scalability, and
multi-agent systems suffer from poor communication and coordination. In this
paper, we explore the potential of mutual information sharing, or in other words,
spatial influence based communication, to optimize traffic light control policy.
First, we mathematically analyze the transportation system. We conclude that
the transportation system does not have stationary Nash Equilibrium, thereby re-
inforcement learning algorithms offer suitable solutions. Secondly, we describe
how to build a multi-agent Deep Deterministic Policy Gradient (DDPG) system
with spatial influence and social group utility incorporated. Then we utilize the
grid topology road network to empirically demonstrate the scalability of the new
system. We demonstrate three types of directed communications to show the effect
of directions of social influence on the entire network utility and individual utility.
Lastly, we define "selfish index" and analyze the effect of it on total group utility.
1
Introduction
Emerging intelligent transportation systems (ITSs) [1 -- 4] are expected to play an instrumental role in
improving traffic flow, thus optimizing fuel efficiency, reducing delays and enhancing the general
driving experience. ITSs are designed to resolve traffic congestion, which is an exceedingly complex
and important issue faced by metropolitan areas around the world, as a result of global urbanization.
The urbanization process makes traffic a serious problem in the urban area, as there are so many
commuting objects and vehicles. Street interactions in dense urban areas can be critical bottlenecks
in urban road networks, which affect commuters' efficiency. The competing nature of different
intelligent routing applications is not aiming at improving the efficiency of the city as a whole. They
optimize the routing paradigm for their customers locally, which might not be the global optimal
solution.
ITSs are expected to resolve these issues, as advanced communication and computing technologies are
developed to allow efficient information sharing [5, 6] among commuting objects, making intelligent
routing and traffic light control possible [7, 8]. Current traffic light systems are typically hard-coded
based on investigation results or pure experience. The light control policy is optimized based on
historical data and adapted according to daily patterns or drivers' feedback. The opportunity of using
Artificial Intelligence (AI) for adaptation to real-time conditions, e.g. through detection wires in the
Machine Learning for Autonomous Driving Workshop at the 33rd Conference on Neural Information Processing
Systems (NeurIPS 2019), Vancouver, Canada.
pavement, tends to be fairly rudimentary. Evolving technologies offer the option of using information
collected by cameras, including fine-grained knowledge of the positions and speeds of the vehicles.
Such comprehensive real-time information can be leveraged to improve traffic flow through more
agile traffic light control systems. While the potential benefits are immense, so are the technical
challenges that arise in solving such real-time actuation problems on an unprecedented scale in terms
of intrinsic complexity, geographic range, and number of objects involved.
Under suitable assumptions, the problem of optimal dynamic traffic control may be formulated
as a Markov decision process (MDP) [9 -- 11]. The MDP framework provides a rigorous notion of
optimally along the basis for computational techniques such as value iteration, policy iteration or
dynamic programming. However, an MDP formulation may not always be satisfied in reality. The
knowledge of relevant environmental parameters may not be available. Also, the environment is not
stationary. Moreover, in terms of computational cost, an MDP approach suffers from the curse of
dimensionality, resulting in excessively large state spaces in the realistic traffic system. RL algorithms
overcome some of these limitations and have been previously considered in the context of optimal
dynamic traffic light control. Researchers tried to use single-agent algorithms, for example, DDPG
[12], to resolve this issue, but these methods are still prone to prohibitively large state spaces and
action spaces, implying poor scalability beyond a single-interaction scenario.
In this paper, we explore the potential of using multi-agent reinforcement learning algorithms,
particularly Multi-agent Deep Deterministic Policy Gradients (MADDPG) [13], to optimize real-time
traffic light control policies in large-scale systems [14]. First, we formulate the ITSs environment
and the optimization goal. Then we analyze the properties of the Transportation system. We
provide mathematical proof that stationary Nash Equilibrium can not be achieved in this case.
Therefore, Reinforcement Learning algorithms are needed to resolve it. Thirdly, we consider a grid
network topology with multiple rows and columns to examine the scalability properties of MADDPG
algorithms and their performance in the presence of highly complex interactions created by the flow
of vehicles along the main artery. Under this scenario, the influencing network would have complexity
similar to a real city. We develop inward, outward and fully connected spacial influencing flows, to
verify the effect of influencing directions in optimizing traffic signal control. We conclude that the
directions of the spatial influence would not affect total network utility but affect individual utility.
Finally, we define and investigate the "selfish index" of agents to check its influence on group utility.
The remainder of the paper is organized as follows. We first present a detailed traffic environment
description and problem statement. Then we provide a specification of our customized deep rein-
forcement learning algorithm MADDPG for grid topology road network with border interactions.
The properties of the Intelligent Transportation System are also discussed. Also, we empirically
evaluate the performance of the proposed spatial influence based MADDPG algorithms and illustrate
the scalability of this algorithm. Social group utility optimization through reward function adjustment
is also investigated. Finally, we conclude this paper and point out some future directions.
2 Problem Description
We model the road intersections and formulate our problem similar to [15]. We consider a multi-
agent reinforcement learning environment where each agent is responsible for one intersection.
Our central aim here is to design a system and explore the performance and scalability of multi-
agent reinforcement learning algorithms in optimizing real-time traffic light control policies, rather
than design a productive level policy for a specific location. We adopt a discrete time formulation
to simplify the description and allow the direct application of conventional MDP techniques for
comparison. The methods can be easily converted to continuous time operation as well.
2.1 Traffic Model
We consider the simplest meaningful intersection setup with bidirectional traffic flows. Regardless of
the number of intersections, all intersections follow the same settings. Vehicles are coming from 4
directions as 4 queues. We use Xni(t), i = 1, 2, 3, 4, to denote the number of vehicles of traffic flow
i waiting to pass the intersection n at time t and Yn(t) ∈ {0, 1, 2, 3} to indicate the configuration of
the traffic lights for intersection n at time t. The traffic light L has four configurations:
• "0": green light for flow 1 and hence red light for flow 2;
2
(a) Traffic Light Configuration
(b) Traffic Flow
Figure 1: The state transition diagram (left) and the traffic flows of a grid topology road network
(right).
• "1": yellow light for flow 1 and hence red light for flow 2;
• "2": green light for flow 2 and hence red light for flow 1;
• "3": yellow light for flow 2 and hence red light for flow 1.
Each configuration Yn(t) can either simply be continued in the next time slot or must otherwise be
switched to the natural subsequent configuration (Yn(t) + 1) mod 4. This is determined by the
action A(t) ∈ {0, 1} selected at the end of time slot t, which is represented by a binary variable as
follows:"0" for continue, and "1" for switch; then we have
Y (t + 1) = (Y (t) + A(t)) mod 4.
These rules give rise to a strictly cyclic control sequence. And the evolution of the queue state over
time is governed by the recursion
Xni(t + 1) = Xni(t) + Cni(t) − Dni(t),
with Ci(t) denoting the number of vehicles of traffic flow i appearing at the intersection during time
slot t and Di(t) denoting the number of departing vehicles of traffic flow i crossing the intersection
during time slot t and D1(t) = 0 if Y (t) (cid:54)= 0 and D2(t) = 0 if Y (t) (cid:54)= 2.
Traffic flows can either come from outside of the network or from neighbouring intersections
belonging to the system. Vehicles coming from outside of the system follow a stochastic process and
those from neighbouring intersections are controlled by the states and actions of those intersections.
2.2 MDP Formulation
The target Intelligent Transportation System is a Markov Decision Process (MDP). Under the MDP
frame work, the state space S, action space A, reward r, policy π, and state transition probability P
of our problem are defined as follows:
• State S = (Xni(t), Yn(t)) where n = 1, 2, . . . , N and N is the number of intersections,
i = 1, 2, 3, 4 are queue length at west, north, east and south directions, respectively. The
environment return the full state to the network. However, each agent would only receive
local observation, which is sn(t) = (Xni(t), Yn(t) for agent n.
• Action A ∈ {0, 1} where 0 denotes continue and 1 denotes switch, as described in traffic
• Reward r(st, at) = −F (Xni(t)), i = 1, 2, 3, 4, where F (Xni(t)) = (cid:80)4
model.
ni(t). The
negative sign means that the queue should be penalized. In this paper we use quadratic norm
because we want to encourage short queue length. Long queue length would be penalized
by the quadratic term of the reward function.
• Policy π is the signal controlling command from the ITS, which maps a state to a probability
distribution over the actions π : S → P(A), where P(·) denotes probability distribution.
i=1 X 2
3
• State transition probability P is the probability of the network entering the new state st+1,
after taking the action at at the current state st. At the current state, by taking action at,
vehicles are transmitted to neighbouring intersections or to outside of the system, while
stochastic traffic flow from outside of the system during time t to t + 1 would come into the
system.
3 Deep Reinforcement Learning Algorithms
In this section, we first present an overview of the DDPG algorithm, then analyze the transportation
system. We propose the way to apply spatial influence and reward adjustment [16] in multi-agent
DDPG algorithm in solving signal control problem, and finally describe how they are implemented.
3.1 Deep Deterministic Policy Gradient Algorithm
Deep deterministic policy gradient (DDPG) [12] uses deep neural networks to approximate both
action policies and value functions (state value or action-value). This method has two advantages. 1)
This reduces the dimension of the state space and action space, since it only uses a limited number of
parameters to approximate them. 2) Gradient descent can be used to get the optimum, which greatly
speeds up the convergence and reduces the computational time.
While traditional DDPG algorithms have a continuous action space, the traffic control signals in our
model are discrete, i.e., A(t) ∈ {0, 1}. We will apply the discretization process to transform the
continuous outputs of the actor network in DDPG to discrete ones. The output layer of actor network
has a modified sigmoid function as activation:
y = sigmoid(tx),
where x, y are inputs and outputs of the final layer, and t is the ratio for steepening the sigmoid
function, which is 1000 in our experiment settings. Combined the modified sigmoid activation
function with a node-wise binarization process, our discrete DDPG algorithm can reduce the errors
caused by the continuous-to-discrete transformation to a great degree.
3.2
Intelligent Transportation System Analysis
Theorem 1. Consider a road network that has N intersections thus controlled by N agents, the total
group network utility can not be improved by single agent changing its action unilaterally. i.e.,
a∗
n = argmax
an∈An
Sn(an, a−n),∀n ∈ N,
where a−n = (x1, . . . , xn−1, xn+1, . . . , xN ) is the set of actions chosen by other agents except agent
n, Sn is the network group utility, or total traffic congestion cost in our case, and an is the action
taken by agent n.
It is worth noting that a traffic system always follows a cooperative game formulation. Also, it is
always a total network maximization problem. Optimizing one intersection is of course of great value
to the local community. However, to resolve the urban traffic issue in general, that is far from enough.
The ITSs need to optimize the road network as a whole to reduce traffic congestion and improve
commuting efficiency.
If we assume that one agent can improve total group utility by changing its action unilaterally in
a dynamically stationary road network, that means the vehicles' coming rate and leaving rate are
equal for each intersection in a full state transition cycle. If one agent simply changes its strategy, the
balance would be broken, queue length at certain directions would increase, thus increasing the total
road network utility.
Theorem 2. There is no stationary Nash Equilibrium for Transportation System.
Proof. Here we prove by contradicting the following two steps.
• If there is Nash Equilibrium, it must be a = (1, 1, . . . , 1), if traffic flow from outside of the
system is not 0;
4
• a = (1, 1, . . . , 1) is not a Nash Equilibrium.
To prove Step 1, we only need to assume that there is a 0 in a. Similar to the proof of Theorem 1, if
there is a 0 in a as the solution of Nash Equilibrium, that means for such intersections, the traffic
signal never changes. However, if the traffic signal never changes, the length of 2 queues at that
intersection would be strictly increasing, thus the expected reward would increase for that intersection
as well as the traffic network. Therefore, if there is Nash Equilibrium, it must be a = (1, 1, . . . , 1).
To prove Step 2, we first introduce the conclusion of Step 1. Consider a linear road topology with 2
intersections. So (X1i(t), Y1(t)) and (X2i(t), Y2(t)), i = 1, 2, 3, 4 would be the queue length and
light states for agent 1 and 2, respectively. And the evolution of the queue state over time is governed
by the recursion
Xni(t + 1) = Xni(t) + Cni(t) − Dni(t),
where n = 1, 2, with Ci(t) denoting the number of vehicles of traffic flow i appearing at the
intersection during time slot t and Di(t) denoting the number of departing vehicles of traffic flow i
crossing the intersection during time slot t, as described in traffic model. Here we make a simple
assumption that the number of vehicles appearing at and departing from one intersection at a constant
rate c and d. Note that as Ci(t) from outside of the system is a constant, so we have a stationary
environment. Also note that Di(t) = d only when there is green light. Also, as a1 = a2 = 1 for all t,
we conclude that 4 actions complete one cycle. If there is Nash Equilibrium, following equation must
hold:
Xni(t + 4) ≤ Xni(t).
Therefore,
Xni(t + 4) ≤ Xni(t + 3) + Cni(t + 3) − Dni(t + 3)
. . .
= Xni(t) + 4c − d ⇒ c ≤ 1
4
d.
If c = 1
transportation network.
2 d > 1
4 d, the above inequality doesn't hold. So a = (1, 1, . . . , 1) is not Nash Equilibrium for
2 d, we only need to have 5 actions in a cycle, to make sure
However, we can easily infer that if c = 1
that there are 2 green light slot in a cycle, thus Xni(t + 5) ≤ Xni(t).
Note that we used two assumptions in the proof of no Nash Equilibrium: 1. Constant appearing rate
of vehicles from outside of the transportation system; 2. Constant departing rate of vehicles at the
intersection. These two assumptions are too naive and too strong to be satisfied in real traffic flow.
In real life, it is more reasonable to assume that the appearing rate of vehicles is stochastic and the
departing rate of vehicles obeys certain probability distribution.
It is counter-intuitive but reasonable to find out that there is no stationary Nash Equilibrium solution
for the transportation system. However, it supports the fact that reinforcement Learning algorithm is
necessary to learn optimal signal control policy. Otherwise, the hard-coded policy would be enough.
3.3 Spatial Influence Based Solution
We propose a unified method for achieving both coordination and communication in Multi-agent
reinforcement learning (MARL). For road networks with multiple intersections, we apply multi-agent
DDPG in our system. Opposed to the single-agent DDPG method, multi-agent methods do not have
computational issues when there are huge observation space and action space. As one agent is only
responsible for optimizing traffic signal control for one intersection, it significantly improves the
scalability of the system. Also, MADDPG methods would make no assumption about the shape of
the network, make modeling mixed direction and shape road networks possible.
The MADDPG method needs a way to communicate with other agents to compliment the lack of
global view for more advanced control like "greenwave". Prior work often resorts to centralized
training to ensure that agents learn to coordinate. However, centralized training is not feasible in
this case, as intersections are not identical. Some intersections are at the border of the network and
others are in the middle of the network. Border intersections observe stochastic traffic flows, which
5
means that they need to learn to adapt. Central intersections observe traffic flows coming from other
intersections within the network, so they need to cooperate. Inspired by [17], we propose to use social
influence as the way to accomplish it. In our work, we make no assumption that agents could view
one anothers rewards, as that is often not practical in real life. We relying only on agents viewing
each other's actions. We model neighboring agents' actions into the target agent's observation space.
The observation space for agent n now changes to (Xni, Yn, a), where a is the actions taken by
neighbouring agents at the last time step. The intuition behind this is that, by observing neighboring
agents' actions and the observation space of itself, the agent would be able to learn the policy of
traffic signal control and balance between optimizing the reward of itself, its neighbourhood and
indirectly the whole system.
3.4 Rewards Adjustment
As we have shown in the previous option, total group network utility can not be improved by a single
agent changing its action unilaterally. Therefore, we propose to adjust the reward function of the
agent to make sure that each agent would not only consider its own reward, but also the rewards of its
neighbouring agents. We change the reward function from:
rn(st, at) = −F (Xn(t))
rn(st, at) = −F (Xn(t)) − (cid:88)
m∈Mn
to
(cid:80)
(1)
where Mn is the neighbouring agents of agent n, wnm is the social tie weight. We define
m∈M wnm as "Selfish Index" as it determines the importance of neighbouring agents to the
target agent. Based on this definition, the agent would not only take its own reward into account,
but its neighbourhood as well. By directly linking agent with its neighbourhood and thus indirectly
with agents far away, the agent is expected to learn to cooperate and communicate with each other to
optimize the social group total utility.
wnmF (Xm(t)),
3.5 DDPG for Grid Road Networks
For road networks with multiple intersections, we apply the multi-agent DDPG algorithm in the
network. We have one agent for each intersection. The number of cars and lights states at all
intersections are inputs to the MADDPG system. To ensure that the MADDPG can possess a non-
local view regarding the total network utility, spatial influence and social group utility methods are
considered, as we have specified in the previous sections. The algorithm is defined in Algorithm 1:
4 Performance Evaluation
In this section, we discuss the numerical experiments implemented to evaluate the performance of
the social influence based MADDPG algorithms as detailed above. In the experiments, we apply
a 4-layer fully-connected neural network for both actor and critic in both the linear topology and
grid scenario, with 400 neurons for the first 2 layers, following with two layers with 600 and 200
neurons, respectively. All agents share the same architecture, while they have difference observation
space, as spatial influence is applied to them. Noting that the actor needs to output near-binary values
as action values as mentioned above, the actor neural network has one modified sigmoid activation
function for the output layer. As usual, a copy of the actor and critic neural network are taken as the
target networks with "soft" updates. The outputs of the actor network are clipped to binary values
0 and 1 indicating light state changing and remaining the same. We take an episode length of 150
steps of simulation for collecting the learning samples, and train both actor and critic networks with a
batch size of 64 and discount factor γ = 0.99. The OrnsteinUhlenbeck noise [18] is applied for the
explorations, with a variance of 0.3.
As for the traffic environment settings in the experiments, the vehicle coming and passing rates are set
differently for main roads and branch roads. the vehicle coming rate indicates the number of vehicles
coming from outside of the road networks into the networks on each road per time step, which is set
to be a random value with upper bound Cm for main roads or Cb for branch roads; and the vehicle
passing rates indicate the number of vehicles passing one intersection within one time step, set to be
the fixed numbers of 16 and 4 for main road and branch road, respectively.
6
Algorithm 1 Multi-agent DDPG for ITSs
Input: number of episodes M, time frame T , minibatch size N, learning rate λ, and number of
1: for j = 1, J do
2:
agents or intersections J
Randomly initialize critic network Qj(Oj, aθQ
weight θQ
Initialize target network Q(cid:48)
Initialize replay buffer Bj for each agent j;
j for agent j;
j and µ(cid:48)
j and θµ
j ) and actor network µj(Ojθµ
j ) with random
j with weights θQ(cid:48)
j ← θQ
j , θµ(cid:48)
j ← θµ
j for each agent j;
3:
4:
5: end for
6: for episode = 1, M do
7:
8:
9:
10:
11:
for j = 1, J do
Initialize a random process N for action exploration;
Receive initial observation state s0;
for t = 1, T do
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
j ) + Nt according to the current policy and exploration
Select action aj,t = µj(Oj,tθµ
noise;
end for
Each agent executes action aj,t, market state changes to st+1;
Each agent observes reward rj,t and observation Oj,t+1, where observation Oj,t+1 is
adjusted according to spatial influence;
Each agent adjust reward according to Equation 1
for j = 1, J do
Store transition (Oj,t, aj,t, rj,t, Oj,t+1) in Bj;
Sample a random minibatch of N transitions (Oj,i , aj,i , rj,i , Oj,i+1) from Bj;
j θQ(cid:48)
Set yj,i = rj,i + γQ(cid:48)
Update the critic by minimizing the loss: L = 1
N
Update the actor policy by using the sampled policy gradient:
(cid:80)
i(yj,i − Qj(Oj,i, aj,iθQ
j )) for i = 1, . . . , N;
j(Oj,i+1θµ(cid:48)
j(st+1, µ(cid:48)
j ))2;
∇θµπ
≈
1
N
∇aQj(O, aθQ
j )O=Oj,i,a=µj (Oj,i) × ∇θµµj(Ojθµ)si;
(cid:88)
i
Update the target networks: θQ(cid:48)
j ← τ θQ
j + (1 − τ )θQ(cid:48)
j ,
22:
23:
24:
25: end for
end for
end for
θµ(cid:48)
j ← τ θµ
j + (1 − τ )θµ(cid:48)
j .
4.1 Grid Road Topology
We assume the numbers of arriving vehicles in eastern and western direction to the arterial road
in each time step to be independent and Bernoulli distributed with parameter p1. The numbers of
arriving vehicles in southern and northern directions in each time step are also independent and
Bernoulli distributed with parameter p2. We extend the road network to be a grid topology. The
intersection setting is described in Section 2 and the road network has more than one intersections
in south-north and east-west directions. The quadratic congestion cost function is of the form
ni. In our experiments, we design a road network with three columns and
three rows, therefore 9 intersections in total. Fig. 2 shows that the algorithm with spatial influence
and reward adjustment integrated performs the best, no matter the directions of the influencing flow.
F (X) =(cid:80)N
(cid:80)4
i=1 X 2
n=1
4.1.1 Spatial Influence
As we have described in Section 3, we design spatial influence flow to affect the behavior of
neighbouring agents.
In inward and outward scenarios, for any two agents that are physically
connected, there will be only one influencer and one influencee. For a fully connected influence
scenario, all agents can observe the last actions from all its neighbours.
• Inward Influence: agents at the four corners are independent.
7
(a) Fully Connected
(b) Outward
(c) Inward
Figure 2: Different influencing flow. We can see for all of the influencing direction flow, by adding
spatial influence and reward adjustment functions, the traffic system would have higher return.
(a) Directions
(b) Selfish index
Figure 3: The influencing directions do not affect the performance level at the convergence (left).
The "Selfish Index" affects the system performance (right). If agents are cooperative, the total group
utility would be better.
• Outward Influence: agent at the center is independent.
• Fully Connected Influence: all agents are not independent.
As we can see from Fig. 3, the total utility converges to the same level. So all the methods can
optimize total network utility. However, we can see from the detailed analysis of individual utility
that in inward influence flow, agents at the corners have less congestion compared to other scenarios,
while in outward flow scenario, the agent at the center has relatively less congestion. Therefore,
in a city where the importance of interactions varies, the direction of influencing flow should be
considered. Thus the city traffic flow can be optimized both globally and locally.
4.1.2 Social Group Utility
We adjust the reward function of each agent according to Equation (1). As we can see from Fig. 3,
the total network utility increases as the social tie weights of neighbouring agents increases. This
confirms our anticipation that as neighbouring agents' rewards become more important to the target
agent, it will learn to cooperate with its neighbours to increase the road network utility.
5 Conclusion
We have explored the scope of using social influence based Multi-agent Deep Deterministic Policy
Gradient (MADDPG) to optimize real-time traffic signal control policies in emerging large-scale
Intelligent Transportation Systems. We compared the performance between social influence based
MADDPG and naive MADDPG, and demonstrated that social influence based algorithm has the
maximum potential in scaling without the issue of large observation space and action space and would
help communication between agents. We verified it the scalability properties of DDPG algorithms in
both a linear topology and a grid topology, and demonstrated the emergence of intelligent behavior
such as "green wave" patterns, confirming that the agents learned to cooperate through social influence
communication.
8
References
[1] Mohammed M Vazifeh, P Santi, G Resta, SH Strogatz, and C Ratti. Addressing the minimum
fleet problem in on-demand urban mobility. Nature, 557(7706):534, 2018.
[2] Ming Zhu, Xiao-Yang Liu, and Xiaodong Wang. An online ride-sharing path-planning strategy
for public vehicle systems. IEEE Transactions on Intelligent Transportation Systems, 2018.
[3] Ming Zhu, Xiao-Yang Liu, Feilong Tang, Meikang Qiu, Ruimin Shen, Wei Wennie Shu, and
Min-You Wu. Public vehicles for future urban transportation. IEEE Transactions on Intelligent
Transportation Systems, 17(12):3344 -- 3353, 2016.
[4] Ming Zhu, Xiao-Yang Liu, and Xiaodong Wang. Joint transportation and charging scheduling
IEEE Transactions on Intelligent
in public vehicle systems -- a game theoretic approach.
Transportation Systems, 19(8):2407 -- 2419, 2018.
[5] Ardi Tampuu, Tambet Matiisen, Dorian Kodelja, Ilya Kuzovkin, Kristjan Korjus, Juhan Aru,
Jaan Aru, and Raul Vicente. Multiagent cooperation and competition with deep reinforcement
learning. PloS One, 12(4):e0172395, 2017.
[6] Jakob N Foerster, Christian A Schroeder de Witt, Gregory Farquhar, Philip HS Torr, Wendelin
Boehmer, and Shimon Whiteson. Multi-agent common knowledge reinforcement learning.
arXiv preprint arXiv:1810.11702, 2018.
[7] Muhammad Alam, Joaquim Ferreira, and José Fonseca. Introduction to intelligent transportation
systems. In Intelligent Transportation Systems, pages 1 -- 17. Springer, 2016.
[8] Yisheng Lv, Yanjie Duan, Wenwen Kang, Zhengxi Li, Fei-Yue Wang, et al. Traffic flow predic-
tion with big data: A deep learning approach. IEEE Transactions on Intelligent Transportation
Systems, 16(2):865 -- 873, 2015.
[9] Simona Onori, Lorenzo Serrao, and Giorgio Rizzoni. Dynamic programming. In Hybrid
Electric Vehicles, pages 41 -- 49. Springer, 2016.
[10] Martin L Puterman. Markov decision processes: discrete stochastic dynamic programming.
John Wiley & Sons, 2014.
[11] Sheldon M Ross. Introduction to stochastic dynamic programming. Academic press, 2014.
[12] Timothy P Lillicrap, Jonathan J Hunt, Alexander Pritzel, Nicolas Heess, Tom Erez, Yuval Tassa,
David Silver, and Daan Wierstra. Continuous control with deep reinforcement learning. ICLR,
2016.
[13] Ryan Lowe, Yi Wu, Aviv Tamar, Jean Harb, OpenAI Pieter Abbeel, and Igor Mordatch. Multi-
agent actor-critic for mixed cooperative-competitive environments. In Advances in Neural
Information Processing Systems, pages 6379 -- 6390, 2017.
[14] Tianshu Chu, Jie Wang, Lara Codecà, and Zhaojian Li. Multi-agent deep reinforcement learning
for large-scale traffic signal control. IEEE Transactions on Intelligent Transportation Systems,
2019.
[15] Xiao-Yang Liu, Zihan Ding, Sem Borst, and Anwar Walid. Deep reinforcement learning for
intelligent transportation systems. NeurIPS Workshop on Machine Learning for Intelligent
Transportation Systems, 2018.
[16] Xu Chen, Xiaowen Gong, Lei Yang, and Junshan Zhang. Exploiting social tie structure for
cooperative wireless networking: A social group utility maximization framework. IEEE/ACM
Transactions on Networking (ToN), 24(6):3593 -- 3606, 2016.
[17] Natasha Jaques, Angeliki Lazaridou, Edward Hughes, Caglar Gulcehre, Pedro Ortega,
Dj Strouse, Joel Z Leibo, and Nando De Freitas. Social influence as intrinsic motivation
for multi-agent deep reinforcement learning. In International Conference on Machine Learning,
pages 3040 -- 3049, 2019.
[18] Werner Horsthemke and René Lefever. A perturbation expansion for external wide band
markovian noise: Application to transitions induced by ornstein-uhlenbeck noise. Zeitschrift
für Physik B Condensed Matter, 40(3):241 -- 247, 1980.
9
|
1803.08867 | 1 | 1803 | 2018-03-23T16:25:05 | Testing demand responsive shared transport services via agent-based simulations | [
"cs.MA",
"physics.soc-ph"
] | Demand Responsive Shared Transport DRST services take advantage of Information and Communication Technologies ICT, to provide on demand transport services booking in real time a ride on a shared vehicle. In this paper, an agent-based model ABM is presented to test different the feasibility of different service configurations in a real context. First results show the impact of route choice strategy on the system performance. | cs.MA | cs | TESTING DEMAND RESPONSIVE SHARED TRANSPORT
SERVICES VIA AGENT-BASED SIMULATIONS
Giuseppe Inturri, Nadia Giuffrida, Matteo Ignaccolo, Michela Le
Pira, Alessandro Pluchino, Andrea Rapisarda
University of Catania
Abstract
Demand Responsive Shared Transport (DRST) services take advantage of
Information and Communication Technologies (ICT), to provide "on demand"
transport services booking in real time a ride on a shared vehicle. In this paper, an
agent-based model (ABM) is presented to test different the feasibility of different
service configurations in a real context. First results show the impact of route choice
strategy on the system performance.
Keywords: shared mobility, flexible transit, dynamic ride sharing, demand
responsive transport, agent-based model
Introduction
This paper focuses on the potential contribution of innovative Demand Re-
sponsive Shared Transport (DRST) services provided by a fleet of vehicles, booked
by users via mobile device applications and scheduled in real-time to pick up and
drop off passengers in accordance with their needs [1]. The system stands between
an expensive conventional exclusive-ride door-to-door service (like a conventional
taxi) and a flexible system where a dynamic sharing of trips makes users experiment
longer travel distances and times while the vehicles drop off and pick up other pas-
sengers (like a conventional transit).
From the operator's point of view, it is important to select the optimal strat-
egy to assign vehicles to passengers' requests, so to perform high load factor and
low driven distance (to reduce operation costs), while minimizing the additional
time and distances travelers have to experience (to assure the expected level of ser-
vice).
2
The city of Ragusa (Italy) is chosen as case study, where an innovative
DRST has already been tested. The model is used as a realistic environment where
to simulate different scenarios, with simple rules assigned to agents' behavior, in
order to explore the transport demand and supply variables that make the DRST
service feasible and convenient. The aim is to understand, starting from the micro-
interaction between demand and supply agents (i.e. passengers and vehicles), the
macroscopic behavior of the system so to monitor, via appropriate indicators, its
performance and give suggestions on its planning, management and optimization.
In the last years an increasing attention has been paid on shared transport
services. Optimization models have been proposed to solve a dial-a-ride (Stein,
1978) or multiple depot vehicle scheduling problems (Bodin and Golden, 1981).
More recently, simulation models have been developed to study the usability and
profitability of dial-a-ride with fixed-route problems (Shinoda et al, 2004), the effi-
cient scheduling of dynamic DRT services (Diana, 2006), the dynamics of a taxi-
sharing system (D'Orey and Fernandes, 2012), the effects of using a zoning vs. a
no-zoning strategy and time-window settings (Quadrifoglio et al, 2008).
Agent-based simulations has proved to be a good technique in this context,
also to overcome some limitations linked to a top-down approach. They are suitable
to reproduce the interaction among stakeholders involved in transport decision-
making (Le Pira et al, 2018; Marcucci et al, 2017). They have been proposed to
study taxi fleet operations (Cheng and Nguyen, 2011), car sharing (Lopes et al,
2014) and to investigate DRT services, and developing an open-source simulation
testbed (Čertický et al, 2016).
Main benefits of ABM are (1) possibility to capture emergent phenomena,
(2) providing of a natural description of a system, (3) flexibility, for the easiness to
add more entities to the model, to modify behavior, degree of rationality, ability to
learn and evolve, and rules of interactions of agents (Bonabeau, 2002).
In this paper a new ABM is presented to test the operation of a DRST
service under different dispatching configurations. The interaction among vehicles
traveling along a semi-flexible route and users walking from their origins to stop
nodes to get a transport service to their destinations is simulated. The main novelty
of the model relies on the implementation of a GIS-based demand model implying
an easy transferability to other contexts. The ABM allows exploring the emergence
of optimal operation configuration by identifying ad-hoc indicators to monitor the
system's performance.
Description of the model
An ABM has been built within NetLogo (Wilensky, 1999) to test the im-
pact of different vehicle dispatching strategies on the service efficiency and effec-
tiveness.
The model can be described according to its main features, i.e. (i) transport
network, (ii) demand model, (iii) agent (user and vehicle) dynamics, (iv) route
choice strategies, (v) performance indicators.
3
Transport network. The network consists of a fixed route and three op-
tional routes, composed of network nodes and links, stop nodes and diversion nodes.
The network follows the actual road network and a GIS map, reproducing census
tracts, is used to implement in the model georeferenced socio-economic data about
population, through the GIS extension of NetLogo.
Demand model. A user group's (with a maximum prefixed size) trip re-
quest is randomly generated with a negative exponential distribution with an aver-
age trip rate from an origin i with trip rate proportional to density population, to a
destination j with a gravitationally distributed probability.
Agent (user and vehicle) dynamics.
If the origin or destination of the trip request is more distant than a prefixed
threshold, it assumes the status "rejected". Otherwise, the user group moves to the
nearest stop and assumes the status "waiting", until a vehicle (with an appropriate
number of available seats) reaches the stop; in this case each user boards and alights
at the nearest stop to its required destination, assumes the status of "satisfied" pas-
senger; if the maximum waiting time is overcome, each user gives up and assumes
the status of "unsatisfied".
A given number of vehicles, with prefixed seat capacity, generated at ran-
dom stops, starts traveling along the fixed route at constant speed. At each stop,
waiting users are loaded following the First-Come-First-Served queue rule, if the
group size is not greater than the available seats. At each diversion node a vehicle
can shift to an optional route if waiting users or on-board passengers' destinations
are present. The available vehicle seats are updated at each event of passenger load-
ing/unloading.
Route choice strategies. All vehicles drive on the fixed route. At diversion
nodes a vehicle may drive on a flexible route according with the Route Choice Strat-
egy (RCS) it is assigned to.
In this first version of the model, there are three RCSs:
"Fully at Random" (FR);
"All Vehicles drive on All flexible Routes" (AVAR); a prefixed percentage of
vehicles can be assigned at random;
"Each Vehicle is Assigned to a flexible Route" (EVAR); a prefixed percentage
of vehicles can be assigned at random.
The randomness component has been considered to add some "noise" to
the system, since it has been shown that random strategies can have a beneficial role
in increasing the efficiency of social and economic complex systems (Pluchino et
al, 2010).
Performance indicators. The local strategies determining interaction be-
tween passengers and vehicles give raise to global patterns that can be monitored
via appropriate performance indicators: total number of passengers transported NP,
total driven distance TDD (km), average passenger travel distance APTD (km), av-
erage vehicle load factor ALF, passenger travel time in terms of average waiting
time AWT (min), average on-board time AoBT (min), average total travel time
APTT (min), average vehicle speed AVS (km/h), transport intensity CI (km/pax) as
ratio of total driven distance and number of passengers, total user travel time TPTT
4
(h) (including a penalty of 60 min for each unsatisfied user), vehicle operation cost
OC (€) and total unit cost TUC (€/pax), evaluated according to equation (1):
(1)
Case study
The case study is located at Ragusa, a small-medium city (70,000 inh.) in
the south-eastern part of Sicily (Italy), where an innovative DRST service, called
MVMANT (http://www.mvmant.com/portfolio-view/ragusa/) has already been ex-
perimented in 2016. The city of Ragusa is characterized by two distinct areas, the
upper town and the lower and older town of Ragusa Ibla, with a high touristic vo-
cation. MVMANT has connected several park-and-ride facilities with the main
destinations in Ragusa Ibla, which is scarcely connected to the center, offering a
continuous service with midsize passenger vans.
Fig. 1. shows the fixed (blue) and flexible (orange) routes and census
zones colored according to population (from light to dark green).
Fig. 1. Virtual map (left) and satellite map (right).
The main input variables of the system are:
service variables, i.e. total simulation time (h), number of vehicles, vehicle max-
imum capacity (seats), vehicle average speed (km/h);
demand variables, i.e. demand rate (request/hour), maximum number of passen-
gers per demand, maximum waiting time (min)
route choice strategy, i.e. FR, EVAR, AVAR, with a variable percentage of ran-
domness.
Preliminary Results and Conclusions
For a first test of the model, simulations were performed by considering
different route choice strategies (i.e. FR, EVAR, AVAR) with increasing levels of
randomness, so to test the overall system performance.
Fig. 2. shows on the left the total hours spent by all passengers (in yellow),
while waiting (in light blue), on board (orange) plus a penalty of 60 minutes for
€()(€)€()TPTThVOTOChTUCpaxNPpax5
each users that waited more than a prefixed threshold at the stop (grey). In dark blue
the total number of passengers transported. They decrease with 15 and 30 vehicles
because group requests with 3 passengers cannot be satisfied by vehicles with low
capacity. On the right, Fig. 2. shows the total unit cost TUC (€/pax) by the number
of vehicles. It is calculated by attributing a monetary value to each hour spent by
the passengers in the system (10 €/h), adding the operation cost of vehicles (in the
range of 0.5-1.0 €/km according with the vehicle size) and drivers' cost (20 €/h) and
dividing the sum by the number of passengers. It can be considered a measure of
the total cost sustained by the society (demand and supply) for the mobility of one
person. In this case an optimal range of shared services can be identified within a
range between 5 and 10 vehicles.
Fig. 2. Passenger travel time and number of passengers (on the left) and total unit cost
TUC (on the right) (route choice strategy EVAR with 30% randomness; maximum group size=3;
total seat capacity=30).
Comparing TUC for EVAR and AVAR strategies with variable random-
ness (Fig. 3. ), best results are found with EVAR and no randomness, while AVAR
is the worst. This is because the assignment of vehicles to specific routes (EVAR)
reduces the empty driven distances. By increasing randomness, it can be seen that
the two strategies get closer in terms of TUC. With randomness more than 40% the
two strategies are the same with intermediate and almost constant performance. It
can be concluded that a certain rate of randomness is beneficial for the AVAR strat-
egy, since it implies that not all vehicles will simultaneously explore all the routes
if demand is present (thus reducing the empty driven distance). Vice versa, EVAR
strategy works better without randomness.
6
Fig. 3. Total unit cost by randomness (number of vehicles= 5; seat capacity=8; maxi-
mum group size= 1)
This paper presented an agent-based model able to simulate flexible de-
mand responsive shared transport (DRST) services. Different strategies can be
tested by changing the service variables and assigning simple rules to the agents so
to explore, starting from the microinteraction between passengers and vehicles, the
macroscopic behavior of the system. For a first test, the city of Ragusa (Italy) was
chosen as case study, where an innovative DRST has already been experimented
and different scenarios have been reproduced by changing fleet composition and
vehicle dispatching strategy.
Simulation results show that the service quality and performance consid-
erably vary in relation to the number and capacity of vehicles. In particular, given a
fixed supply (in terms of total seat capacity), many vehicles with low capacity de-
crease the passenger travel time (and cost) and increase the operator costs, while
few high-capacity vehicles perform better from an operator's point of view. An op-
timal range can be found by considering a total unit cost accounting both for pas-
senger travel time and vehicle operation cost.
Besides, different vehicle dispatching strategies have been simulated to
test different system configurations (from more flexible to more fixed route strate-
gies). Results show that assigning vehicles to specific routes (i.e. avoiding that all
vehicles drive on all routes) reduces travelled distances by empty vehicles and im-
proves the overall system performance. If all vehicles are allowed to drive on all the
routes, then a certain level of randomness in agent's choice is found to be beneficial
for the system performance.
The first results show that the model is able to reproduce different system
configurations and to monitor, via appropriate indicators, its performance.
Further research will focus on: (a) comparing DRST with pure taxi and
pure bus services; (b) testing other strategies to optimize the service (i.e. increase
7
load factor, reduce vehicle-km), e.g. re-balancing/idle strategies; (c) testing reac-
tive/adaptive agent behaviors for route choice strategies based on system states; (d)
testing pricing strategies and public subsidies to increase the service effectiveness
(in terms of satisfied demand); (e) testing the performance of the system with au-
tonomous vehicles; (f) including elasticity of demand to price; (g) improving the
demand model (e.g. including socio-demographics characteristics, data from sur-
veys).
The final aim is to have a reliable decision-support tool for planning, man-
agement and optimization of DRST services, which can help to reduce the burden
of transport in our cities and contribute to sustainable mobility.
REFERENCES
1. Ambrosino, G., Nelson, J.D., and Romanazzo, M. Demand Responsive Transport Services:
Towards the Flexible Mobility Agency. ENEA. Italian National Agency for New Tech-
nologies, Energy and the Environment, ISBN 88-8286-043-4, 2003
Bodin, L. and Golden, B. Classication in vehicle routing and scheduling. Networks, 11(2):97-
108, 1981
Bonabeau, E. Agent-based modeling: Methods and techniques for simulating human systems.
PNAS May Vol 99 Suppl 3 7280-7287, 2002.
Čertický, M., Jakob, M., Píbil, R. Simulation Testbed for Autonomic Demand-Responsive
Mobility Systems. Autonomic Road Transport Support Systems, 147-164, 2016
Cheng, S. F. and Nguyen, T. D. Taxisim: A multiagent simulation platform for evaluating
taxi fleet operations. In Proceedings of the 2011 IEEE/WIC/ACM International Confer-
ences on Web Intelligence and Intelligent Agent Technology- Volume 02, pages 14-21,
2011.
Diana, M. The importance of information flows temporal attributes for the efficient schedul-
ing of dynamic demand responsive transport services. Journal of advanced Transporta-
tion, 40(1):23-46, 2006.
D'Orey, P. M., Fernandes, R. and Ferreira, M. Empirical evaluation of a dynamic and distrib-
uted taxi-sharing system. In Proceedings of ITSC 2012, pages 140-146. IEEE, 2012.
Le Pira, M., Inturri, G., Ignaccolo, M., Pluchino, A. Dealing with the Complexity of Stake-
holder Interaction in Participatory Transport Planning. In Zak, J., Hadas, Y., Rossi, R.
(eds.) "Advanced Concepts, Methodologies and Technologies for Transportation and Lo-
gistics". Advances in Intelligent Systems and Computing 572. Springer International Pub-
lishing. DOI 10.1007/978-3-319-57105-8_3, 2018.
Lopes, M. M., Martineza, L. M., de Almeida Correia, G. H. Simulating carsharing operations
through agent-based modelling: an application to the city of Lisbon, Portugal. Transpor-
tation Research Procedia, 3, 2014
Marcucci, E., Le Pira, M., Gatta, V., Ignaccolo, M., Inturri, G. & Pluchino, A. Simulating
participatory urban freight transport policy-making: Accounting for heterogeneous stake-
holders' preferences and interaction effects. Transportation Research Part E 103, 69-86,
2017
Pluchino, A., Rapisarda, A., Garofalo, C. The Peter Principle revisited: a computational
study. Physica A, 389 (3): 467-472, 2010.
Quadrifoglio, L., Dessouky, M., Ordonez, F. A simulation study of demand responsive transit
system design. Transportation Research Part A, 42, 718–737, 2008.
8
Shinoda, K., Noda, I., Ohta, M., Kumada, Y. and Nakashima, H. Is dial-a-ride bus reasonable
in large scale towns? evaluation of usability of dial-a-ride systems by simulation. In Multi-
agent for mass user support, pages 105-119. Springer, 2004.
Stein, D. M. Scheduling dial-a-ride transportation systems. Transportation Science,
12(3):232-249, 1978
Wilensky, U. NetLogo. Center for Connected Learning and Computer Based Modeling.
Northwestern University, Evanston, IL, 1999. In: http://ccl.northwestern.edu/netlogo/.
|
1805.05631 | 2 | 1805 | 2018-05-17T17:00:18 | Complexity Reduction in the Negotiation of New Lexical Conventions | [
"cs.MA",
"cs.CL",
"cs.SI"
] | In the process of collectively inventing new words for new concepts in a population, conflicts can quickly become numerous, in the form of synonymy and homonymy. Remembering all of them could cost too much memory, and remembering too few may slow down the overall process. Is there an efficient behavior that could help balance the two? The Naming Game is a multi-agent computational model for the emergence of language, focusing on the negotiation of new lexical conventions, where a common lexicon self-organizes but going through a phase of high complexity. Previous work has been done on the control of complexity growth in this particular model, by allowing agents to actively choose what they talk about. However, those strategies were relying on ad hoc heuristics highly dependent on fine-tuning of parameters. We define here a new principled measure and a new strategy, based on the beliefs of each agent on the global state of the population. The measure does not rely on heavy computation, and is cognitively plausible. The new strategy yields an efficient control of complexity growth, along with a faster agreement process. Also, we show that short-term memory is enough to build relevant beliefs about the global lexicon. | cs.MA | cs | Complexity Reduction in the Negotiation of New Lexical Conventions
William Schueller ([email protected])1, 2, Vittorio Loreto3, 4, 5, and Pierre-Yves Oudeyer2
2INRIA Bordeaux Sud-Ouest/ Ensta ParisTech : Flowers Project-team, Bordeaux, France
1University of Bordeaux, Bordeaux, France
3SONY Computer Science Lab, Paris, France
4Physics Dpt., Sapienza University of Rome, Rome, Italy
5Complexity Science Hub Vienna (CSHV), Vienna, Austria
8
1
0
2
y
a
M
7
1
]
A
M
.
s
c
[
2
v
1
3
6
5
0
.
5
0
8
1
:
v
i
X
r
a
Abstract
In the process of collectively inventing new words for new con-
cepts in a population, conflicts can quickly become numerous,
in the form of synonymy and homonymy. Remembering all of
them could cost too much memory, and remembering too few
may slow down the overall process. Is there an efficient be-
havior that could help balance the two? The Naming Game is
a multi-agent computational model for the emergence of lan-
guage, focusing on the negotiation of new lexical conventions,
where a common lexicon self-organizes but going through a
phase of high complexity. Previous work has been done on
the control of complexity growth in this particular model, by
allowing agents to actively choose what they talk about. How-
ever, those strategies were relying on ad hoc heuristics highly
dependent on fine-tuning of parameters. We define here a new
principled measure and a new strategy, based on the beliefs
of each agent on the global state of the population. The mea-
sure does not rely on heavy computation, and is cognitively
plausible. The new strategy yields an efficient control of com-
plexity growth, along with a faster agreement process. Also,
we show that short-term memory is enough to build relevant
beliefs about the global lexicon.
Keywords: language emergence, active learning, multi-agent
model, control of complexity growth
Motivations
Lexical conventions constitute an important element of social
interactions. They can emerge, evolve, or be learnt within a
population, without necessarily having a centralized control.
In other words, they can be negotiated through local inter-
actions between individuals. In practice, this happens con-
tinuously in human societies, being the spread of new words
and conventions, the acquisition of those conventions by in-
fants or other learners, or even the emergence of new forms of
communication. Despite the high complexity of the processes
involved, humans deal with these issues quite efficiently.
Learning of high complexity tasks in individuals can in
general be facilitated by an active control of the complexity of
learning situations , often driven by intrinsic motivation, like
for example maximization of the learning progress (Gottlieb,
Oudeyer, Lopes, & Baranes, 2013; Baldassarre & Mirolli,
2013; Barto, 2013; Oudeyer, Kaplan, & Hafner, 2007). This
type of mechanism is also argued to be an evolutionary ad-
vantage for cognitive abilities (Oudeyer & Smith, 2014), and
can also be found in lexicon acquisition at the individual level
(Partridge, McGovern, Yung, & Kidd, 2015). But does it have
a significant impact on population-wide learning and conven-
tions negotiation dynamics?
The Naming Game (Steels & Kaplan, 1998; Wellens, 2012;
Loreto, Baronchelli, Mukherjee, Puglisi, & Tria, 2011; Ke,
Minett, Au, & Wang, 2002) is an adapted framework to test
this hypothesis.
It is a class of multi-agent models of lan-
guage emergence and evolution, where pairs of randomly se-
lected individuals try to communicate by referring to some
pre-defined meanings using words. At the beginning, they do
not share any convention about word-meaning associations.
Through repeated decentralized interactions, a common lex-
icon self-organizes. However, the process can be slow and
pass through a high-complexity phase where agents memo-
rize a lot of conflictual information, in the form of synonyms
and homonyms.
It has already been shown that active learning mecha-
nisms can increase convergence speed towards a shared lex-
icon in different language emergence models (Cornudella,
Van Eecke, & Van Trijp, 2015; Schueller & Oudeyer, 2016).
The main idea behind those mechanisms is to allow agents
to actively choose the topic of their communication, based
on information collected during their past interactions and
driven by control of complexity growth. However, the algo-
rithms used so far are based on ad hoc heuristics, constrained
interaction scenarios and can depend heavily on fine-tuning
of parameters themselves depending on population size and
number of words and meanings.
In previous work, an approximation of the global state is
built by each agent using the information of past interac-
tions, in the form of an average vocabulary of the population
(Oliphant & Batali, 1997; De Vylder, 2007). Is it possible to
design a new principled algorithm for an active topic choice
based on such a representation? Could decisions be driven by
both the compatibility of an agent's own lexicon with this av-
erage vocabulary, and a reduction of both their complexities?
Such an algorithm should rely on a time scale for the mem-
ory of past interactions: Indeed, in the case of uncentralized
negotiation of a lexicon, conflictual conventions will neces-
sarily appear and have to be forgotten in order to converge
to a functional global vocabulary. Remembering them could
slow down the self-organization process.
In this work, we define a principled measure of correlation
between an agent's lexicon and a local approximation of the
average lexicon of the population. We build a strategy driven
by the maximization of this value without being computation-
ally hard, to be cognitively plausible. We study and discuss
the impact of this strategy on convergence time and complex-
ity growth, depending on a time scale used for memory.
Methods
The Naming Game
We define here precisely the Naming Game model that we
used (see fig.1 for an overview). We need to explicit:
- The interaction scenario itself
- How agents represent their lexicon
- How they update their lexicon at the end of each interaction
It is a simple modification of the standard Naming Game sce-
nario (Loreto et al., 2011; Wellens, 2012).
Figure 1: Illustration of the Naming Game model. Out of a popu-
lation of simulated agents, two are picked and try to communicate,
using/inventing words to refer to meanings. After repeated such in-
teractions, a common lexicon self-organizes. In this example, there
are M=2 possible meanings, W =4 possible words and N=12 agents.
Interaction process We re-use a previously defined in-
teraction process called Speaker's Choice (Schueller &
Oudeyer, 2016). It allows one of the interacting agents, called
the speaker, choose actively the topic of the interaction.
Each interaction involves two agents, that are picked ran-
domly from the population. One of them is assigned the role
speaker, and the other the role hearer. The speaker chooses
a topic and picks up a word for this topic. If it does not have
a word associated so far to the meaning used as topic, it just
invents a new meaning-word association. It utters this word,
which is interpreted by the hearer as a meaning, if it knows
this word. If the interpreted meaning is the same as the topic,
i.e. the meaning intended by the speaker, the communication
is considered successful. Otherwise, it is considered a failure.
See fig.2 for a detailed illustration of the interaction process.
Vocabulary Representation Vocabularies, or lexicons, are
a set of associations between meanings and words. In this
work, we consider only a finite set of meanings M and a finite
set of words W . In this context, vocabularies can be repre-
sented as associations matrices, where each row corresponds
to a meaning, and each column to a word. This representa-
tion has been extensively used in related work (Oliphant &
Batali, 1997; Steels & Kaplan, 1998; Ke et al., 2002). Two
parts of the lexicon are distinguished, the coding or produc-
tion part, which maps a meaning to a set of words weighted by
Figure 2: Interaction process: Beforehand, 2 individuals have been
randomly selected among a population, an designated as speaker (S)
and hearer (H). 1. S chooses a topic, 2. S checks its vocabulary to
find or invent an associated word, 3. S utters the word, 4. H guesses
the intended meaning, 5. S indicates the intended meaning.
probabilities of usage, and a decoding or interpretation part,
mapping a word to a set of meanings that can be interpretated
from this word, also weighted by probabilities.
We represent the vocabulary of an agent A as a matrix V (A)
of size M×W , with values of 1 for each word-meaning asso-
ciation used by the agent. Each agent starts with an empty vo-
cabulary, a matrix filled with zeros. The coding matrix V c(A)
and decoding matrix V d(A) are derived from V (A) by nor-
malizing respectively over rows and columns:
V c(A)mw =
V (A)mw
∑
V (A)mw(cid:48)
w(cid:48)
V d(A)mw =
V (A)mw
∑
V (A)m(cid:48)w
m(cid:48)
(1)
(cid:1)
(cid:0)V d(A)mw
Normalization factors are used only if V (A)mw (cid:54)= 0. In prac-
tice, when coding a meaning m, a word wi is sampled using
the distribution (V c(A)mw)w∈W . When decoding a word w,
a meaning m j is interpreted, sampled from the distribution
m∈M. In our case, these distributions are uniform
either on the set of words associated to m for coding, or on
the set of meanings associated to w for decoding. Those 2
sets change over time, during the vocabulary update.
Vocabulary Update Policy At the end of each interaction,
each agent takes into account the result of the interaction by
modifying its lexicon. There exists various policies that have
been described and studied in previous work (Wellens, 2012).
We are using the one called Minimal Naming Game.
In this policy, updates work this way: when the communi-
cation fails, both agents add the used word-meaning associa-
tion (meaning used as a topic by the speaker, and word uttered
by the speaker) to their lexicon, and do nothing if they already
had it. If the communication is successful, not only do they
add this association to their respective lexicons, they also re-
move any conflicting synonyms and homonyms. See fig.3 for
an illustration of the update policy in both cases.
Typically, among existing policies, Minimal NG and an-
other one called Basic Lateral Inhibition are used: they are
more realistic as they allow synonymy/homonymy and yield
faster agreement. Moreover, Minimal NG has been shown to
yield similar dynamics as Basic Lateral Inhibition, yet being
simple and not depending on any parameter, while the latter
depends on 3. This is the reason why we are using the Mini-
mal NG as vocabulary update policy.
Figure 3: Vocabulary update (Minimal NG). Failure (when the
hearer interpreted the word as another meaning than the topic):
the word-meaning association used by the speaker is added to the
hearer's vocabulary. The speaker adds it as well if it was just in-
vented. Success (when the hearer interpreted correctly the word as
the topic): both hearer and speaker remove synonyms/homonyms in
conflict with the word-meaning association used during the interac-
tion. In both examples the topic is the apple, and the word rimi.
Measures
The self-organization process happening while simulating the
Naming Game has complex dynamics, and goes through
various states before reaching global consensus. We talk
about those dynamics as a convergence process, towards the
state where all agents share the exact same lexicon, with
exactly one word for each meaning without synonymy and
homonymy. This state is stable, lexicons will not change any-
more whatever are the modalities of the interaction – which
agent is the speaker, which is the hearer, and which mean-
ings and words are used. Convergence and stability for dif-
ferent types of Naming Games has been proved analytically
(De Vylder, 2007). In this paper, we do not focus on whether
the model converges or not, but on the speed and complex-
ity properties of the dynamics before convergence. Measures
for each of those aspects, used to describe the system while in
this intermediate state, were defined in previous work (Loreto
et al., 2011). We distinguish local measures –accessible to
each agent– from global measures, computed on the whole
population.
TCS: Theoretical Communicative Success The Theoret-
ical Communicative Success is a measure of distance to the
fully converged state. First, for each meaning, we can con-
sider the probability of having a successful communication
when using this meaning as a topic, given a state of the pop-
ulation. The TCS is the average of those probabilities, over
all possible meanings. In the case of Random Topic Choice,
this measure coincides with the general probability of having
a successful interaction. By definition, it is a global measure,
not accessible to individual agents. To retrieve its value, we
can either estimate it using a snapshot of the population and
a Monte Carlo method with random topic choice, or compute
it. To detail the exact computation formula, we need to first
define the probability of success between two given vocabu-
laries of agents A and B. As detailed in the previous section,
a vocabulary has 2 components: a coding part, used to find
words associated to a meaning, and a decoding part, used to
find meanings associated to a word. For vocabulary V (A),
we would then have the 2 matrices V c(A) and V d(A). If A
is the speaker and B the hearer, A is coding and B decoding,
hence the formula of the probability of success in this case,
averaged over all possible meanings:
TCSs(A,B) =
1
M ∑
m
∑
w
V c(A)m,w ·V d(B)m,w
(2)
Because before an interaction we do not necessarily know
which agent will be the speaker and which will be the hearer,
the 2 situations (A speaker and B hearer / B speaker and A
hearer) are to be considered, as equiprobable. The final value
TCS(A,B) is the mean of TCSs(A,B) and TCSs(B,A).
To scale up to population level, one can compute an aver-
age vocabulary for the whole population V (P), and then the
probability of success for an interaction between this lexicon
and itself. For a large enough population, this value is indeed
a good approximation of the probability of success. V (P) is
an element-wise average of the lexicon matrices of all agents.
When using random topic choice, this value abruptly goes
from 0 to 1 after a certain number of interactions. These dy-
namics can be seen on fig.4, where the random topic choice
is represented – among active strategies that are explained in
a following section. In practice, we use Monte Carlo estima-
tion for the values at population level over time, and the exact
computation for the active topic choice strategy (see follow-
ing section), as it requires more precision and the population
vocabulary is already built.
Local Complexity The starting state of an agent's vocabu-
lary is empty (all-zero matrices), and the end state is identical
coding and decoding matrices, with exactly one distinct word
per meaning. But between those 2 situations, through which
states goes the vocabulary? How much conflictual informa-
tion (synonymy and homonymy) has to be considered?
For each agent, we can define a local complexity measure,
by counting the number of distinct associations present in the
vocabulary.
In our case, this is exactly the sum of all ele-
ments of the matrix V (A). At the beginning of a simulation,
while the vocabulary is empty, this measure equals 0. At the
end, its value is the number of meanings M. When using ran-
dom topic choice, there is a fast growth to a maximum, before
a slow decrease to the final value M (can be seen in fig.4).
This measure is nearly proportional to the minimal memory
needed to represent the lexicon (as a sparse matrix or a list
of word-meaning associations), and therefore should remain
low in a cognitively plausible situation.
Active Topic Choice Strategy
The main contribution of this work is the definition of an ac-
tive strategy for the choice of the topic in each interaction,
by comparison to the usual choice of picking meanings ran-
domly (with a uniform distribution over the space of mean-
ings). The strategy has to be local, i.e. use only information
available to the agent, namely its own vocabulary and results
of past interactions it was involved in.
To both converge quickly and control complexity, behav-
ior should be driven by maximization at each interaction of
the Theoretical Communicative Success. However, this value
is a global measure, therefore not accessible at agent level.
Agents only sample information about the global state of the
population, or the average vocabulary V (P), through their in-
teractions as hearer or speaker.
The strategies for active topic choice found in previous
work are separated in two levels of decision (Schueller &
Oudeyer, 2016). First, a decision between exploring a new
meaning (that is associated to no words in the vocabulary
so far) and choosing (exploiting) a meaning among those al-
ready used before. Then, if exploiting, deciding which known
meaning to use depending on past interaction results.
The strategy introduced in this work keeps those two levels,
while basing both decisions on a new measure called Local
Approximated Probability of Success (LAPS), using a local
representation of V (P).
LAPS: Local Approximated Probability of Success
Here, we define an approximation of V (P), (cid:101)V (P), using in-
construct independently the coding and decoding parts(cid:101)V c(P)
and(cid:101)V d(P). For every meaning m (and every word w), we use
formation sampled by agents during their interactions. We
a sliding window over the recent past interactions – of maxi-
mal length τ, the time scale parameter– and count the number
of times it is associated to each word w(cid:48) (or meaning m(cid:48)). This
value divided by τ is the local estimation of the probability of
an other agent coding m using w(cid:48) (or decoding w as m(cid:48)). With
this, we retrieve the values of both matrices(cid:101)V c(P) and(cid:101)V d(P).
using the meaning m. We can now build(cid:101)V c(P):
Let Mc(m) be the memory of the past interactions where
m was the topic, if there has been Tm such interactions. wt
denotes the word used during the tth interaction of the agent
Mc(m) = (wt )1≤t≤Tm
(cid:101)V c(P)mw =
Tm
∑
t=Tm−τ+1
τ
δw,wt
(3)
Similarly, by defining Md(w) be the memory of the past
interactions where w was the topic, with Tw such interactions,
we can build(cid:101)V d(P):
Md(w) = (mt )1≤t≤Tw
Until τ interactions have been done with a given meaning
(cid:101)V d(P)mw =
(cid:101)V d(P)mw do not sum to 1. The re-
(cid:101)V c(P)mw and ∑
t=Tw−τ+1
τ
δm,mt
Tw
∑
(4)
or word, ∑
w
m
maining probability weight is assumed to be associated with
failure. If we would normalize to 1, with a single interaction
an agent would already estimate as 100% sure that the same
word-meaning association would be used again with the same
topic for example. Without the normalization, this happens
only after τ interactions. In other words, this reflects lack of
information due to small sample size. We define a Local Ap-
proximated Probability of Success, or a local equivalent of
the Theoretical Communicative Success for an agent A with
vocabulary V (A):
LAPSA = TCS(V (A),(cid:101)V (P)A)
(5)
For some vocabulary update policies called lateral inhibition,
similar matrices are computed, but used directly as an agent's
own representation of the lexicon. This usage does not pre-
vent the complexity burst (Wellens, 2012).
Exploration vs. Exploitation The first choice of our new
strategy is between exploring new meanings or exploiting al-
ready known ones. Exploration should happen when agents
are confident enough about their agreement with the rest
of the population over their known meanings (Schueller &
Oudeyer, 2016). The LAPS measure in itself is a measure of
confidence, and the simplest way to take this into account is
to only explore when reaching the maximum value K
M where
K is the number of known meanings and M the total number
of meanings in the world. This value can actually be reached,
thanks to the sliding window of parameter τ.
Multi-Armed Bandit The second decision process con-
cerns the exploitation part, when picking the topic among the
known meanings. We designed a behavior driven by the in-
crease of the LAPS measure.
In other words, agents seek
the meaning that would yield the greatest increase of LAPS.
However, computing the expectancy of this value ∆LAPS is
hard computationally speaking, and therefore not suitable for
a model of a cognitive process. We can only consider the pro-
cess a black box, where following a decision between a finite
set of options, a reward value is obtained. This is exactly the
definition of the Multi-Armed Bandit problem, associated to
a class of reinforcement learning algorithms that have been
extensively studied (Bubeck, Cesa-Bianchi, et al., 2012). The
name comes from an analogy with a person trying to maxi-
mize their gain while facing a set of slot-machines (also called
one armed bandit), and being able to use only one at a time.
The probability distribution of the reward of each machine
is unknown, and the player has to both collect information
by playing and exploit the highest rewarding machine – with
limited knowledge of its reward distribution – hence keep bal-
ance between exploration and exploitation. In our problem,
we can see known meanings as the possible arms, and the re-
ward ∆LAPS. Our case is quite specific, as: 1) distributions
are non stationary, 2) they depend on past choices, 3) and the
number of arms grows over time (and starts at 0). This spe-
cific situation led us to choose an algorithm, where weights
associated to each arm undergo a decay over time, which let
them stay at the same order of magnitude of the initial weights
of new arms (Clement, Roy, Oudeyer, & Lopes, 2015). Our
algorithm depends on 2 parameters: integrated balance be-
tween reward-driven exploitation and random exploration be-
tween arms through the parameter γ, and time scale n for the
decay of weights. As a reward, we consider the increase of
LAPS yielded by the interaction, ∆LAPS, or 0 if the latter is
negative in order to avoid negative weights. See algorithm 1.
Algorithm 1 LAPSmax Bandit Multi-Armed Bandit algo-
rithm used as a topic choice strategy maximizing the LAPS
measure. New arms are created with weights wa equal to the
reward ri obtained at the end of an interaction with a new
meaning.
Require: γ rate of exploration for bandit
Require: n time scale for weights decay
Require: vocabularies V and(cid:101)V , #meanings M
K ← V.known meanings()
if LAPSA = K
M then
m ← random (V.unknown meanings())
for a ∈ Arms do
else
wa = wa
∑ j w j
pa = (1− γ)· wa + γ
K
end for
Sample m ∈ Arms using distribution (pa)a∈Arms
end if
return m
{Interact using topic m and compute reward r}
if m ∈ Arms then
wm ← n
n+1 · wm + r
Add m to Arms with wm = r
else
end if
Results
For all simulations, we set N=M=W =40, compute up to
80,000 interactions and take the mean over 8 trials. The situ-
ation M=W is the most constrained and complex to solve, as
synonymy and homonymy are more probable. We ran simu-
lations for 1 ≤ τ ≤ 50, and set n=τ. For the exploration rate,
if the condition 0 < γ (cid:28) 1 is respected, the actual value of
γ does not matter much, as its only function is to avoid rare
cases where some weights reach a value of 0 and cannot be
selected anymore. We set γ=0.01. However, we also ran sim-
ulations with pure random choices at the bandit level, to be
able to study the influence of each level of our algorithm. This
case identifies as γ=1.
The evolution of the TCS and complexity over time is rep-
resented on fig.4, for several values of the time scale τ. They
are compared on the same plots with Random Topic Choice.
We can see that convergence is faster for low values of τ, the
fastest being for τ=2, which is 4 times faster than Random
Topic Choice. As for complexity, for all configurations ex-
Figure 4: Theoretical success rate over time and Local Com-
plexity for Random Topic Choice and Active Topic Choice
with several values of the time scale τ used in the LAPS mea-
sure. N=M=W =40, γ=0.01, mean over 8 trials.
cepted τ=1 values stay below the final level 40. After reach-
ing a first threshold, they increase linearly with time, the slope
being smaller for higher values of τ. For τ=1, the maximum
value is only half of the maximum reached by Random Topic
Choice.
in this
case LAPS is an autocorrelation with the current interaction,
by definition older interactions are not taken into account.
It is understandable that τ=1 is an outlier:
On fig.5, we can see the dependency of convergence time
on the parameter τ, plotted for configurations γ=0.01, γ=1 and
the value for Random Topic Choice as a reference. Both have
dynamics consistently faster than Random Topic Choice for
low values of τ, however γ=0.01 performs better. Excepted
for τ=1, convergence time increases linearly with τ for both,
with a minimum at τ=2, and a smaller slope for γ=0.01.
Discussion
Results show that the new strategy presented in this paper
1) allows fast convergence, 2) controls efficiently complexity
growth, 3) its dynamics are consistent and highly correlated
with parameter change, 4) the 2 levels of the algorithm each
contribute to the increased performance.
Barto, A. G. (2013). Intrinsic motivation and reinforcement
learning. In Intrinsically motivated learning in natural and
artificial systems (pp. 17–47). Springer.
Bubeck, S., Cesa-Bianchi, N., et al. (2012). Regret analysis of
stochastic and nonstochastic multi-armed bandit problems.
Foundations and Trends R(cid:13) in Machine Learning, 5(1), 1–
122.
Clement, B., Roy, D., Oudeyer, P.-Y., & Lopes, M. (2015).
Multi-Armed Bandits for Intelligent Tutoring Systems.
Journal of Educational Data Mining (JEDM), 7(2), 20–48.
Cornudella, M., Van Eecke, P., & Van Trijp, R. (2015). How
intrinsic motivation can speed up language emergence. In
Proceedings of the european conference on artificial life
(pp. 571–578).
De Vylder, B. (2007). The evolution of conventions in multi-
agent systems. Unpublished doctoral dissertation, Vrije
Universiteit Brussel, Brussels.
Gottlieb, J., Oudeyer, P.-Y., Lopes, M., & Baranes, A. (2013).
Information-seeking, curiosity, and attention: computa-
tional and neural mechanisms. Trends in cognitive sciences,
17(11), 585–593.
Ke, J., Minett, J. W., Au, C.-P., & Wang, W. S.-Y. (2002).
Self-organization and selection in the emergence of vocab-
ulary. Complexity, 7(3), 41–54.
Loreto, V., Baronchelli, A., Mukherjee, A., Puglisi, A., &
Tria, F. (2011). Statistical physics of language dynamics
(Vol. 2011) (No. 04).
Oliphant, M., & Batali, J. (1997). Learning and the emer-
gence of coordinated communication. Center for research
on language newsletter, 11(1), 1–46.
Oudeyer, P.-Y., Kaplan, F., & Hafner, V. V. (2007). Intrinsic
motivation systems for autonomous mental development.
Evolutionary Computation, IEEE Transactions on, 11(2),
265–286.
Oudeyer, P.-Y., & Smith, L.
(2014). How evolution may
work through curiosity-driven developmental process. Top-
ics Cogn. Sci.
Partridge, E., McGovern, M., Yung, A., & Kidd, C. (2015).
Young Childrens Self-Directed Information Gathering on
Touchscreens. In Proceedings of the 37th annual meeting
of the cognitive science society.
Schueller, W., & Oudeyer, P.-Y. (2016). Active control of
complexity growth in naming games: Hearer's choice. In
The evolution of language: Proceedings of the 11th inter-
national conference (evolangx11).
Steels, L., & Kaplan, F. (1998). Stochasticity as a source of
innovation in language games. In Proceedings of artificial
life vi (pp. 368–376).
Wellens, P. (2012). Adaptive Strategies in the Emergence of
Lexical Systems. Unpublished doctoral dissertation, Vrije
Universiteit Brussel, Brussels.
Figure 5: Convergence time depending on time scale τ used
in LAPS measure, for both γ=0.01 and γ=1, compared with
Random Topic Choice. N=M=W =40, mean over 8 trials.
With τ=2, each agent on average only speaks 15 times
about each meaning before convergence (i.e.
less than half
the population), and information has already been both con-
veyed between all agents and disambiguated. The linearity of
the evolution of TCS and complexity lets think that this algo-
rithm may as well scale efficiently to other values of N, M and
W . Compared to previous work, this topic choice algorithm
is more robust, and optimal parameters are easier to find. It
generalized well to Minimal Naming Game and can be used
for all other Naming Game models.
LAPS is coherent from a cognitive point of view, and cor-
responds to an actual internal confidence about quality of
communication with the rest of the population. As stated in
the results section, the case τ=1 is an outlier, being a sim-
ple autocorrelation with the current interaction. The optimal
value τ=2 is then the lowest possible value taking into account
past interactions, i.e.(cid:101)V (P) takes the lowest possible memory,
which is therefore credible for humans. Further work will be
needed to determine for which values of N, M and W τ=2
stays the optimal value.
Acknowledgments
The IdEx program (Univ. de Bordeaux) allowed W. Schueller
to visit V. Loreto. We thank Miguel Ibanez Berganza and
Benjamin Cl´ement for the fruitful discussions.
Source code The Python code used for
the simula-
tions of this paper is available as open source software:
https://github.com/wschuell/notebooks cogsci2018
References
Baldassarre, G., & Mirolli, M.
Intrinsically moti-
vated learning systems: an overview. In Intrinsically moti-
vated learning in natural and artificial systems (pp. 1–14).
Springer.
(2013).
|
1208.2503 | 1 | 1208 | 2012-08-13T06:05:01 | Distributed Pareto Optimization via Diffusion Strategies | [
"cs.MA",
"math.OC"
] | We consider solving multi-objective optimization problems in a distributed manner by a network of cooperating and learning agents. The problem is equivalent to optimizing a global cost that is the sum of individual components. The optimizers of the individual components do not necessarily coincide and the network therefore needs to seek Pareto optimal solutions. We develop a distributed solution that relies on a general class of adaptive diffusion strategies. We show how the diffusion process can be represented as the cascade composition of three operators: two combination operators and a gradient descent operator. Using the Banach fixed-point theorem, we establish the existence of a unique fixed point for the composite cascade. We then study how close each agent converges towards this fixed point, and also examine how close the Pareto solution is to the fixed point. We perform a detailed mean-square error analysis and establish that all agents are able to converge to the same Pareto optimal solution within a sufficiently small mean-square-error (MSE) bound even for constant step-sizes. We illustrate one application of the theory to collaborative decision making in finance by a network of agents. | cs.MA | cs |
Distributed Pareto Optimization via Diffusion
1
Strategies
Jianshu Chen, Student Member, IEEE, and Ali H. Sayed, Fellow, IEEE
Abstract
We consider solving multi-objective optimization problems in a distributed manner by a network
of cooperating and learning agents. The problem is equivalent to optimizing a global cost that is the
sum of individual components. The optimizers of the individual components do not necessarily coincide
and the network therefore needs to seek Pareto optimal solutions. We develop a distributed solution that
relies on a general class of adaptive diffusion strategies. We show how the diffusion process can be
represented as the cascade composition of three operators: two combination operators and a gradient
descent operator. Using the Banach fixed-point theorem, we establish the existence of a unique fixed
point for the composite cascade. We then study how close each agent converges towards this fixed point,
and also examine how close the Pareto solution is to the fixed point. We perform a detailed mean-square
error analysis and establish that all agents are able to converge to the same Pareto optimal solution
within a sufficiently small mean-square-error (MSE) bound even for constant step-sizes. We illustrate
one application of the theory to collaborative decision making in finance by a network of agents.
Index Terms
Distributed optimization, network optimization, diffusion adaptation, Pareto optimality, mean-square
performance, convergence, stability, fixed point, collaborative decision making.
I. INTRODUCTION
We consider solving a multi-objective optimization problem in a distributed manner over a network of
k (w);
N cooperative learners (see Fig. 1). Each agent k is associated with an individual cost function J o
The authors are with Department of Electrical Engineering, University of California, Los Angeles, CA 90095. Email: {jshchen,
sayed}@ee.ucla.edu.
This work was supported in part by NSF grants CCF-1011918 and CCF-0942936. A preliminary short version of this work
is reported in the conference publication [1].
August 21, 2018
DRAFT
and each of these costs may not be minimized at the same vector wo. As such, we need to seek a solution
that is "optimal" in some sense for the entire network. In these cases, a general concept of optimality
known as Pareto optimality is useful to characterize how good a solution is. A solution wo is said to be
2
Pareto optimal if there does not exist another vector w that is able to improve (i.e., reduce) any particular
l (w)}l(cid:54)=k. To illustrate the
k (w), without degrading (increasing) some of the other costs {J o
cost, say, J o
idea of Pareto optimality, let
O (cid:44) {(J o
1 (w), . . . , J o
(1)
denote the set of achievable cost values, where W denotes the feasible set. Each point P ∈ O represents
attained values for the cost functions {J o
l (w)} at a certain w ∈ W. Let us consider the two-node case
(N = 2) shown in Fig. 2, where the shaded areas represent the set O for two situations of interest. In Fig.
N (w)) : w ∈ W} ⊆ RN
Fig. 1. A network of N cooperating agents; a cost function J o
node k is denoted by Nk (including node k itself); this set consists of all nodes with which node k can share information.
k (w) is associated with each node k. The set of neighbors of
2(a), both J o
1 (w) and J o
1 (wo), J o
1 (w) attains its minimum at point P1, while J o
2 (w) achieve their minima at the same point P = (J o
2 (wo)), where wo is
the common minimizer. In comparison, in Fig. 2(b), J o
2 (w)
attains its minimum at point P2, so that they do not have a common minimizer. Instead, all the points
on the heavy red curve between points P1 and P2 are Pareto optimal solutions. For example, starting at
point A on the curve, if we want to reduce the value of J o
2 (w),
then we will need to move out of the achievable set O. The alternative choice that would keep us on the
curve is to move to another Pareto optimal point B, which would however increase the value of J o
2 (w).
1 (w). For this reason, the curve from P1 to
In other words, we need to trade the value of J o
P2 is called the optimal tradeoff curve (or optimal tradeoff surface if N > 2) [2, p.183].
1 (w) without increasing the value of J o
2 (w) for J o
August 21, 2018
DRAFT
12487k5936NkNkak;1ck;1Jok(w)Jo1(w)Jo2(w)Jo3(w)Jo5(w)Jo6(w)Jo4(w)Jo7(w)Jo9(w)Jo8(w)a1;kc1;k3
(a)
(b)
Fig. 2. Optimal and Pareto optimal points for the case N = 2: (Left) P denotes the optimal point where both cost functions
are minimized simultaneously and (Right) Pareto optimal points lie on the red boundary curve.
To solve for Pareto optimal solutions, a useful scalarization technique is often used to form an aggregate
cost function that is the weighted sum of the component costs as follows:
N(cid:88)
J glob(w) =
πlJ o
l (w)
(2)
l=1
where πl is a positive weight attached with the lth cost. It was shown in [2, pp.178 -- 180] that the minimizer
of (2) is Pareto optimal for the multi-objective optimization problem. Moreover, by varying the values
of {πl}, we are able to get different Pareto optimal points on the tradeoff curve. Observing that we can
always define a new cost Jl(w) by incorporating the weighting scalar πl,
Jl(w) (cid:44) πlJ o
l (w)
it is sufficient for our future discussions to focus on aggregate costs of the following form:
N(cid:88)
J glob(w) =
Jl(w)
(3)
(4)
l=1
constraint of the form pT
If desired, we can also add constraints to problem (4). For example, suppose there is additionally some
k w < bk at node k, where pk is M × 1 and bk is a scalar. Then, we can consider
using barrier functions to convert the constrained optimization problem to an unconstrained problem [2],
[3]. For example, we can redefine each cost Jk(w) to be Jk(w) ← Jk(w) + φ(pT
k w − bk), where φ(x)
is a barrier function that penalizes values of w that violate the constraint. Therefore, without loss of
generality, we shall assume W = RM and only consider unconstrained optimization problems. Moreover,
l (w)} are differentiable and, for each given set of positive weights {πl}, the cost
we shall assume the {J o
August 21, 2018
DRAFT
Jo2(w)Jo2(w)Jo1(w)Jo1(w)OOPPJo2(w)Jo2(w)Jo1(w)Jo1(w)OOP1P1P2P2AABBCC4
J glob(w) in (2) or (4) is strongly convex so that the minimizer wo is unique [4]. Note that the new cost
Jl(w) in (3) depends on πl so that the wo that minimizes J glob(w) in (4) also depends on {πl}.
One of the most studied approaches to the distributed solution of such optimization problems is the
incremental approach -- see, e.g., [5] -- [12]. In this approach, a cyclic path is defined over the nodes
and data are processed in a cyclic manner through the network until optimization is achieved. However,
determining a cyclic path that covers all nodes is generally an NP-hard problem [13] and, in addition,
cyclic trajectories are vulnerable to link and node failures. Another useful distributed optimization
approach relies on the use of consensus strategies [5], [14] -- [20]. In this approach, vanishing step-size
sequences are used to ensure that agents reach consensus and agree about the optimizer in steady-state.
However, in time-varying environments, diminishing step-sizes prevent the network from continuous
learning; when the step-sizes die out, the network stops learning.
In [21], we generalized our earlier work on adaptation and learning over networks [22], [23] and
developed diffusion strategies that enable the decentralized optimization of global cost functions of the
form (4). In the diffusion approach, information is processed locally at the nodes and then diffused
through a real-time sharing mechanism. In this manner, the approach is scalable, robust to node and
link failures, and avoids the need for cyclic trajectories. In addition, compared to the aforementioned
consensus solutions (such as those in [16], [19], [24]), the diffusion strategies we consider here employ
constant (rather than vanishing) step-sizes in order to endow the resulting networks with continuous
learning and tracking abilities. By keeping the step-sizes constant, the agents are able to track drifts in
the underlying costs and in the location of the Pareto optimal solutions. One of the main challenges in
the ensuing analysis becomes that of showing that the agents are still able to approach the Pareto optimal
solution even with constant step-sizes; in this way, the resulting diffusion strategies are able to combine
the two useful properties of optimality and adaptation.
In [21], we focused on the important case where all costs {Jl(w)} share the same optimal solution
wo (as was the case with Fig. 2(a)); this situation arises when the agents in the network have a common
objective and they cooperate to solve the problem of mutual interest in a distributed manner. Examples
abound in biological networks where agents work together, for example, to locate food sources or
evade predators [25], and in collaborative spectrum sensing [26], system identification [27], and learning
applications [28]. In this paper, we develop the necessary theory to show that the same diffusion approach
(described by (9) -- (10) below) can be used to solve the more challenging multi-objective optimization
problem, where the agents need to converge instead to a Pareto optimal solution. Such situations are
common in the context of multi-agent decision making (see, e.g., [3] and also Sec. IV where we discuss
August 21, 2018
DRAFT
5
one application in the context of collaborative decision in finance). To study this more demanding scenario,
we first show that the proposed diffusion process can be represented as the cascade composition of three
operators: two combination (aggregation) operators and one gradient-descent operator. Using the Banach
fixed-point theorem [29, pp.299 -- 303], we establish the existence of a unique fixed point for the composite
cascade. We then study how close each agent in the network converges towards this fixed point, and also
examine how close the Pareto solution is to the fixed point. We perform a detailed mean-square error
analysis and establish that all agents are able to converge to the same Pareto optimal solution within a
sufficiently small mean-square-error (MSE) bound. We illustrate the results by considering an example
involving collaborative decision in financial applications.
Notation. Throughout the paper, all vectors are column vectors. We use boldface letters to denote random
quantities (such as uk,i) and regular font to denote their realizations or deterministic variables (such as
uk,i). We use diag{x1, . . . , xN} to denote a (block) diagonal matrix consisting of diagonal entries (blocks)
x1, . . . , xN , and use col{x1, . . . , xN} to denote a column vector formed by stacking x1, . . . , xN on top of
each other. The notation x (cid:22) y means each entry of the vector x is less than or equal to the corresponding
entry of the vector y.
II. DIFFUSION ADAPTATION STRATEGIES
In [21], we motivated and derived diffusion strategies for distributed optimization, which are captured
by the following general description:
φk,i−1 =
N(cid:88)
N(cid:88)
l=1
l=1
a1,lkwl,i−1
N(cid:88)
ψk,i = φk,i−1 − µk
wk,i =
l=1
a2,lkψl,i
clk∇wJl(φk,i−1)
(5)
(6)
(7)
where wk,i is the local estimate for wo at node k and time i, µk is the step-size parameter used by node k,
and {φk,i−1, ψk,i} are intermediate estimates for wo. Moreover, ∇wJl(·) is the (column) gradient vector
of Jl(·) relative to w. The non-negative coefficients {a1,lk}, {clk}, and {a2,lk} are the (l, k)-th entries of
matrices A1, C, and A2, respectively, and they are required to satisfy:
AT
1
1 = 1, AT
2
1 = 1, C1 = 1
a1,lk = 0, a2,lk = 0, clk = 0 if l /∈ Nk
(8)
DRAFT
August 21, 2018
6
where 1 denotes a vector with all entries equal to one. Note from (8) that the combination coefficients
{a1,lk, a2,lk, clk} are nonzero only for those l ∈ Nk. Therefore, the sums in (5) -- (7) are confined within the
neighborhood of node k. Condition (8) requires the combination matrices {A1, A2} to be left-stochastic,
while C is right-stochastic. We therefore note that each node k first aggregates the existing estimates
from its neighbors through (5) and generates the intermediate estimate φk,i−1. Then, node k aggregates
gradient information from its neighborhood and updates φk,i−1 to φk,i through (6). All other nodes in the
network are performing these same steps simultaneously. Finally, node k aggregates the estimates {φl,i}
through step (7) to update its weight estimate to wk,i.
Algorithm (5) -- (7) can be simplified to several special cases for different choices of the matrices
{A1, A2, C}. For example, the choice A1 = I, A2 = A and C = I reduces to the adapt-then-combine
(ATC) strategy that has no exchange of gradient information [21] -- [23], [30]:
ψk,i = wk,i−1 − µk∇wJk(wk,i−1)
wk,i =
alkψl,i
(ATC, C = I)
(9)
while the choice A1 = A, A2 = I and C = I reduces to the combine-then-adapt (CTA) strategy, where
the order of the combination and adaptation steps are reversed relative to (9) [22], [23], [30]:
(cid:88)
l∈Nk
(cid:88)
alkwl,i−1
ψk,i−1 =
wk,i = ψk,i−1 − µk∇wJk(ψk,i−1)
l∈Nk
(CTA, C = I)
(10)
Furthermore, if in the CTA implementation (10) we enforce A to be doubly stochastic, replace ∇wJk(·) by
a subgradient, and use a time-decaying step-size parameter (µk(i) → 0), then we obtain the unconstrained
version used by [24]. In the sequel, we continue with the general recursions (5) -- (7), which allow us
to examine the convergence properties of several algorithms in a unified manner. The challenge we
encounter now is to show that this same class of algorithms can still optimize the cost (4) in a distributed
manner when the individual costs {Jl(w)} do not necessarily have the same minimizer. This is actually a
demanding task, as the analysis in the coming sections reveals, and we need to introduce novel analysis
techniques to be able to handle this general case.
August 21, 2018
DRAFT
7
A. Modeling Assumptions
III. PERFORMANCE ANALYSIS
In most situations in practice, the true gradient vectors needed in (6) are not available. Instead, perturbed
versions are available, which we model as
(cid:91)∇wJl(w) = ∇wJl(w) + vl,i(w)
(11)
where the random noise term, vl,i(w), may depend on w and will be required to satisfy certain conditions
given by (16) -- (17). We refer to the perturbation in (11) as gradient noise. Using (11), the diffusion
algorithm (5) -- (7) becomes the following, where we are using boldface letters for various quantities to
highlight the fact that they are now stochastic in nature due to the randomness in the noise component:
N(cid:88)
N(cid:88)
l=1
N(cid:88)
(cid:104)∇wJl(φk,i−1) + vl,i(φk,i−1)
(cid:105)
clk
(12)
(13)
(14)
φk,i−1 =
a1,lkwl,i−1
ψk,i = φk,i−1 − µk
wk,i =
l=1
a2,lkψl,i
l=1
Using (12) -- (14), we now proceed to examine the mean-square performance of the diffusion strategies.
Specifically, in the sequel, we study: (i) how fast and (ii) how close the estimator wk,i at each node k
approaches the Pareto-optimal solution wo in the mean-square-error sense. We establish the convergence
of all nodes towards the same Pareto-optimal solution within a small MSE bound. Since we are dealing
with individual costs that may not have a common minimizer, the approach we employ to examine the
convergence properties of the diffusion strategy is fundamentally different from [21]; we follow a system-
theoretic approach and call upon the fixed-point theorem for contractive mappings [29, pp.299 -- 303].
To proceed with the analysis, we introduce the following assumptions on the cost functions and gradient
noise. As explained in [21], these conditions are weaker than similar conditions in the literature of
distributed optimization; in this way, our convergence and performance results hold under more relaxed
conditions than usually considered in the literature.
Assumption 1 (Bounded Hessian). Each component cost function Jl(w) has a bounded Hessian matrix,
i.e., there exist nonnegative real numbers λl,min and λl,max such that, for each k = 1, . . . , N:
λl,minIM ≤ ∇2
wJl(w) ≤ λl,maxIM
with(cid:80)N
l=1 clkλl,min > 0.
August 21, 2018
(15)
(cid:4)
DRAFT
Assumption 2 (Gradient noise). There exist α ≥ 0 and σ2
v ≥ 0 such that, for all w ∈ Fi−1:
E{vl,i(w) Fi−1} = 0
E(cid:8)(cid:107)vl,i(w)(cid:107)2(cid:9) ≤ α · E(cid:107)∇wJl(w)(cid:107)2 + σ2
v
for all i, l, where Fi−1 denotes the past history of estimators {wk,j} for j ≤ i − 1 and all k.
8
(16)
(17)
(cid:4)
If we choose C = I, then Assumption 1 implies that the cost functions {Jl(w)} are strongly convex1.
This condition can be guaranteed by adding small regularization terms. For example, we can convert a non-
l (w) to a strongly convex one by redefining Jl(w) as Jl(w) ← Jl(w) + (cid:107)w(cid:107)2,
strongly convex function J(cid:48)
where > 0 is a small regularization factor. We further note that, assumption (17) is a mix of the
"relative random noise" and "absolute random noise" model usually assumed in stochastic approximation
[4]. Condition (17) implies that the gradient noise grows when the estimate is away from the optimum
(large gradient). Condition (17) also states that even when the gradient vector is zero, there is still some
residual noise variance σ2
v.
B. Diffusion Adaptation Operators
To analyze the performance of the diffusion adaptation strategies, we first represent the mappings
performed by (12) -- (14) in terms of useful operators.
Definition 1 (Combination Operator). Suppose x = col{x1, . . . , xN} is an arbitrary N × 1 block column
vector that is formed by stacking M × 1 vectors x1, . . . , xN on top of each other. The combination
operator TA : RM N → RM N is defined as the linear mapping:
TA(x) (cid:44) (AT ⊗ IM ) x
(18)
where A is an N × N left stochastic matrix, and ⊗ denotes the Kronecker product operation.
(cid:4)
Definition 2 (Gradient-Descent Operator). Consider the same N × 1 block column vector x. Then, the
1A differentiable function f (x) on Rn is said to be strongly convex if there exists a λmin > 0 such that f (x + y) ≥
f (x)+yT∇f (x)+λmin(cid:107)y(cid:107)2/2 for any x, y ∈ Rn. And if f (x) is twice-differentiable, this is also equivalent to ∇2f (x) ≥ λminI
[4, pp.9-10]. Strong convexity implies that the function f (x) can be lower bounded by some quadratic function.
August 21, 2018
DRAFT
gradient-descent operator TG : RM N → RM N is the nonlinear mapping defined by:
x1 − µ1
xN − µN
(cid:80)N
l=1 cl1∇wJl(x1)
...
(cid:80)N
l=1 clN∇wJl(xN )
TG(x) (cid:44)
9
(19)
(cid:4)
Definition 3 (Power Operator). Consider the same N × 1 block vector x. The power operator P :
RM N → RN is defined as the mapping:
where (cid:107) · (cid:107) denotes the Euclidean norm of a vector.
P [x] (cid:44) col{(cid:107)x1(cid:107)2, . . . ,(cid:107)xN(cid:107)2}
(20)
(cid:4)
We will use the power operator to study how error variances propagate after a specific operator TA(·)
or TG(·) is applied to a random vector. We remark that we are using the notation "P [·]" rather than "P (·)"
to highlight the fact that P is a mapping from RM N to a lower dimensional space RN . In addition to
the above three operators, we define the following aggregate vector of gradient noise that depends on the
(cid:40)
N(cid:88)
l=1
cl1vl(x1), . . . , µN
N(cid:88)
l=1
v(x) (cid:44)−col
µ1
(cid:41)
clN vl(xN )
(21)
state x:
With these definitions, we can now represent the two combination steps (12) and (14) as two combination
operators TA1(·) and TA2(·). We can also represent the adaptation step (13) by a gradient-descent operator
perturbed by the noise operator (21):
We can view (cid:98)TG(x) as a random operator that maps each input x ∈ RM N into an RM N random vector,
(22)
and we use boldface letter to highlight this random nature. Let
wi (cid:44) col{w1,i, w2,i, . . . , wN,i}
(23)
denote the vector that collects the estimators across all nodes. Then, the overall diffusion adaptation steps
(12) -- (14) that update wi−1 to wi can be represented as a cascade composition of three operators:
(cid:98)TG(x) (cid:44) TG(x) + v(x)
(cid:98)Td(·) (cid:44) TA2 ◦ (cid:98)TG ◦ TA1(·)
August 21, 2018
(24)
DRAFT
10
(a) TA1 (·), TA2 (·) and TG(·).
(b) Cascade representation of diffusion adaptation.
Fig. 3. Representation of the diffusion adaptation strategy (12) -- (14) in terms of operators. Each diffusion adaptation step can
then (cid:98)Td(·) becomes Td(·).
be viewed as a cascade composition of three operators: TA1 (·), TG(·), and TA2 (·) with gradient perturbation v(·). If v(·) = 0,
where we use ◦ to denote the composition of any two operators, i.e., T1 ◦ T2(x) (cid:44) T1(T2(x)). If there
is no gradient noise, then the diffusion adaptation operator (24) reduces to
Td(·) (cid:44) TA2 ◦ TG ◦ TA1(·)
(25)
In other words, the diffusion adaptation over the entire network with and without gradient noise can be
described in the following compact forms:
wi = (cid:98)Td(wi−1)
(26)
wi = Td(wi−1)
(27)
Fig. 3(a) illustrates the role of the combination operator TA(·) (combination steps) and the gradient-
descent operator TG(·) (adaptation step). The combination operator TA(·) aggregates the estimates from
the neighborhood (social learning), while the gradient-descent operator TG(·) incorporates information
from the local gradient vector (self-learning). In Fig. 3(b), we show that each diffusion adaptation step
can be represented as the cascade composition of three operators, with perturbation from the gradient
noise operator. Next, in Lemma 1, we examine some of the properties of the operators {TA1, TA2, TG},
which are proved in Appendix A.
Lemma 1 (Useful Properties). Consider N×1 block vectors x = col{x1, . . . , xN} and y = col{y1, . . . , yN}
with M × 1 entries {xk, yk}. Then, the operators TA(·), TG(·) and P [·] satisfy the following properties:
1) (Linearity): TA(·) is a linear operator.
2) (Nonnegativity): P [x] (cid:23) 0.
August 21, 2018
DRAFT
26664377752666437775+ + + (¢)26664377752666437775(¢)26664377752666437775+ + + (¢)wi¡1wi¡1Ái¡1Ái¡1Ái¡1Ái¡1Ãi¡1Ãi¡1Ãi¡1Ãi¡1wiwi(¢)(¢)(¢)+ v(¢)bT(¢)bT(¢)w¡wbT(¢)ww…… bT(¢)ww¡bT(¢)w11
3) (Scaling): For any scalar a ∈ R, we have
(28)
4) (Convexity): suppose x(1), . . . , x(K) are N × 1 block vectors formed in the same manner as x, and
P [ax] = a2P [x]
let a1, . . . , aK be non-negative real scalars that add up to one. Then,
(29)
5) (Additivity): Suppose x = col{x1, . . . , xN} and y = col{y1, . . . , yN} are N × 1 block random
P [a1x(1) + ··· + aKx(K)] (cid:22) a1P [x(1)] + ··· + aKP [x(K)]
vectors that satisfy ExT
k yk = 0 for k = 1, . . . , N. Then,
EP [x + y] = EP [x] + EP [y]
P [TA(x)] (cid:22) AT P [x]
P [TG(x) − TG(y)] (cid:22) Γ2P [x − y]
6) (Variance relations):
where
Γ (cid:44) diag{γ1, . . . , γN}
γk (cid:44) max{1 − µkσk,max, 1 − µkσk,min}
σk,min (cid:44)
clkλl,min, σk,max (cid:44)
N(cid:88)
l=1
7) (Block Maximum Norm): The ∞−norm of P [x] is the squared block maximum norm of x:
clkλl,max
N(cid:88)
(cid:107)xk(cid:107)(cid:17)2
l=1
(cid:107)P [x](cid:107)∞ = (cid:107)x(cid:107)2
b,∞ (cid:44)(cid:16)
max
1≤k≤N
(30)
(31)
(32)
(33)
(34)
(35)
(36)
8) (Preservation of Inequality): Suppose vectors x, y and matrix F have nonnegative entries, then
(cid:4)
x (cid:22) y implies F x (cid:22) F y.
C. Transient Analysis
Using the operator representation developed above, we now analyze the transient behavior of the
diffusion algorithm (12) -- (14). From Fig. 3(b) and the previous discussion, we know that the stochastic
recursion wi = (cid:98)Td(wi−1) is a perturbed version of the noise-free recursion wi = Td(wi−1). Therefore, we
first study the convergence of the noise free recursion, and then analyze the effect of gradient perturbation
on the stochastic recursion.
August 21, 2018
DRAFT
12
Intuitively, if recursion wi = Td(wi−1) converges, then it should converge to a vector w∞ that satisfies
w∞ = Td(w∞)
(37)
In other words, the vector w∞ should be a fixed point of the operator Td(·) [29, p.299]. We need to
answer four questions pertaining to the fixed point. First, does the fixed point exist? Second, is it unique?
Third, under which condition does the recursion wi = Td(wi−1) converge to the fixed point? Fourth, how
far is the fixed point w∞ away from the minimizer wo of (4)? We answer the first two questions using
the Banach Fixed Point Theorem (Contraction Theorem) [29, pp.2 -- 9, pp.299 -- 300]. Afterwards, we study
convergence under gradient perturbation. The last question will be considered in the next subsection.
Definition 4 (Metric Space). A set X, whose elements we shall call points, is said to be a metric space
if we can associate a real number d(p, q) with any two points p and q of X, such that
(a) d(p, q) > 0 if p (cid:54)= q; d(p, p) = 0;
(b) d(p, q) = d(q, p);
(c) d(p, q) ≤ d(p, r) + d(r, q), for any r ∈ X.
Any function d(p, q) with these three properties is called a distance function, or a metric, and we denote
a metric space X with distance d(·,·) as (X, d).
(cid:4)
Definition 5 (Contraction). Let (X, d) be a metric space. A mapping T : X −→ X is called a contraction
on X if there is a positive real number δ < 1 such that d(T (x), T (y)) ≤ δ · d(x, y) for all x, y ∈ X
Lemma 2 (Banach Fixed Point Theorem [29]). Consider a metric space (X, d), where X (cid:54)= ∅. Suppose
that X is complete2 and let T : X → X be a contraction. Then, T has precisely one fixed point.
(cid:4)
As long as we can prove that the diffusion operator Td(·) is a contraction, i.e., for any two points
x, y ∈ RM N , after we apply the operator Td(·), the distance between Td(x) and Td(y) scales down by a
scalar that is uniformly bounded away from one, then the fixed point w∞ defined in (37) exists and is
unique. We now proceed to show that Td(·) is a contraction operator in X = RM N when the step-size
parameters {µk} satisfy certain conditions.
Theorem 1 (Fixed Point). Suppose the step-size parameters {µk} satisfy the following conditions
0 < µk <
2
σk,max
,
k = 1, 2, . . . , N
(38)
2A metric space (X, d) is complete if any of its Cauchy sequences converges to a point in the space; a sequence {xn} is
Cauchy in (X, d) if ∀ > 0, there exists N such that d(xn, xm) < for all n, m > N.
August 21, 2018
DRAFT
Then, there exists a unique fixed point w∞ for the unperturbed diffusion operator Td(·) in (25).
13
Proof: Let x = col{x1, . . . , xN} ∈ RM N×1 be formed by stacking M × 1 vectors x1, . . . , xN on
top of each other. Similarly, let y = col{y1, . . . , yN}. The distance function d(x, y) that we will use is
induced from the block maximum norm (36): d(x, y) = (cid:107)x − y(cid:107)b,∞ = max1≤k≤N (cid:107)xk − yk(cid:107). From the
definition of the diffusion operator Td(·) in (25), we have
P [Td(x) − Td(y)]
(cid:104)
(cid:16)
(cid:17)(cid:105)
(cid:105)
TG ◦ TA1(x) − TG ◦ TA1(y)
TG ◦ TA1(x) − TG ◦ TA1(y)
TA2
(a)
= P
(cid:104)
(b)(cid:22) AT
2 P
2 Γ2P [TA1(x) − TA1(y)]
(c)(cid:22) AT
2 Γ2P [TA1(x − y)]
(d)
= AT
(e)(cid:22) AT
(39)
where steps (a) and (d) are because of the linearity of TA1(·) and TA2(·), steps (b) and (e) are because
of the variance relation property (31), and step (c) is due to the variance relation property (32). Taking
the ∞−norm of both sides of (39), we have
2 Γ2AT
1 P [x − y]
(cid:107)P [Td(x) − Td(y)](cid:107)∞ ≤ (cid:107)AT
2 Γ2AT
1 (cid:107)∞ · (cid:107)P [x − y](cid:107)∞
≤ (cid:107)Γ(cid:107)2∞ · (cid:107)P [x − y](cid:107)∞
1 (cid:107)∞ = (cid:107)AT
(40)
where, in the second inequality, we used the fact that (cid:107)AT
2 are
right-stochastic matrices. Using property (36), we can conclude from (40) that: (cid:107)Td(x) − Td(y)(cid:107)b,∞ ≤
(cid:107)Γ(cid:107)∞ · (cid:107)x − y(cid:107)b,∞. Therefore, the operator Td(·) is a contraction if (cid:107)Γ(cid:107)∞ < 1, which, by substituting
(33) -- (34), becomes
2 (cid:107)∞ = 1 since AT
1 and AT
1 − µkσk,max < 1,
1 − µkσk,min < 1,
k = 1, . . . , N
and we arrive at the condition (38) on the step-sizes In other words, if condition (38) holds for each
k = 1, . . . , N, then Td(·) is a contraction operator. By Lemma 2, the operator Td(·) will have a unique
fixed point w∞ that satisfies equation (37).
Given the existence and uniqueness of the fixed point, the third question to answer is if recursion
wi = Td(wi−1) converges to this fixed point. The answer is affimative under (38). However, we are not
going to study this question separately. Instead, we will analyze the convergence of the more demanding
noisy recursion (26). Therefore, we now study how fast and how close the successive estimators {wi}
August 21, 2018
DRAFT
TA2
(cid:104)
(cid:105)
TA2 ◦ (cid:98)TG ◦ TA1(wi−1) − TA2 ◦ TG ◦ TA1(w∞)
(cid:17)(cid:105)
(cid:104)
(cid:16)(cid:98)TG ◦ TA1(wi−1) − TG ◦ TA1(w∞)
(cid:104)(cid:98)TG ◦ TA1(wi−1) − TG ◦ TA1(w∞)
(cid:105)
(cid:16)
(cid:17)
(cid:104)
(cid:104)
(cid:110)EP
(cid:17) − TG
(cid:16)
(cid:17) − TG
TA1(wi−1)
TA1(wi−1)
TA1(w∞)
TA1(w∞)
(cid:17)(cid:105)
(cid:16)
(cid:16)
(cid:16)
EP
EP
TG
TG
+ EP
(cid:17)(cid:105)
+ v
TA1(wi−1)
(cid:104)
(cid:16)
(cid:17)(cid:105)(cid:111)
v
TA1(wi−1)
2 Γ2EP [TA1(wi−1) − TA1(w∞)] + AT
2
EP [v(TA1(wi−1))]
= EP
(a)
= EP
(b)(cid:22) AT
2
(c)
= AT
2
(d)
= AT
2
(e)(cid:22) AT
(f )(cid:22) AT
14
generated by recursion (26) approach w∞. Once this issue is addressed, we will then examine how close
w∞ is to the desired wo. Introduce the following mean-square-perturbation (MSP) vector at time i:
MSPi (cid:44) EP [wi − w∞]
(41)
The k-th entry of MSPi characterizes how far away the estimate wk,i at node k and time i is from wk,∞
in the mean-square sense. To study the closeness of wi to w∞, we shall study how the quantity MSPi
evolves over time. By (26), (37) and the definitions of (cid:98)Td(·) and Td(·) in (24) and (25), we obtain
MSPi = EP [wi − w∞]
2 Γ2AT
1 · EP [wi−1 − w∞] + AT
1 · MSPi−1 + AT
2
2
EP [v(TA1(wi−1))]
= AT
2 Γ2AT
(42)
where step (a) is by the linearity of TA1(·), steps (b) and (f) are by property (31), step (c) is by the
substitution of (22), step (d) is by Property 5 in Lemma 1 and assumption (16), and step (e) is by (32).
EP [v(TA1(wi−1))]
To proceed with the analysis, we establish the following lemma to bound the second term in (42).
Lemma 3 (Bound on Gradient Perturbation). It holds that
1·Ω2AT
EP [v(TA1(wi−1))] (cid:22) 4αλ2
max(cid:107)C(cid:107)2
1 ·EP [wi−1−w∞]+(cid:107)C(cid:107)2
1Ω2bv
where
August 21, 2018
λmax (cid:44) max
1≤k≤N
bv (cid:44) 4αλ2
maxAT
λk,max
1 P [w∞ − 1N ⊗ wo]
{2α(cid:107)∇wJk(wo)(cid:107)2 + σ2
v}
+ max
1≤k≤N
Ω (cid:44) diag{µ1, . . . , µN}
(43)
(44)
(45)
(46)
DRAFT
Proof: By the definition of v(x) in (21) with x = TA1(wi−1) being a random vector, we get
For each block in (47), using Jensen's inequality, we have
µ2
1
l=1 cl1vl(x1),
EP [v(x)] =
µ2
N
l=1 clN vl(xN )
E(cid:13)(cid:13)(cid:13)(cid:80)N
E(cid:13)(cid:13)(cid:13)(cid:80)N
...
(cid:13)(cid:13)(cid:13)2
(cid:13)(cid:13)(cid:13)2
(cid:13)(cid:13)(cid:13)2
E(cid:13)(cid:13)(cid:13) N(cid:88)
l=1
clkvl(xk)
=
(cid:16) N(cid:88)
≤(cid:16) N(cid:88)
l=1
l=1
≤ (cid:107)C(cid:107)1
l=1
clk
clk
(cid:17)2 · E(cid:13)(cid:13)(cid:13) N(cid:88)
clk(cid:80)N
(cid:17)2 · N(cid:88)
clk(cid:80)N
(cid:104)
N(cid:88)
(cid:104)(cid:90) 1
l=1 clk
(cid:16)
clk
l=1
l=1
vl(xk)
l=1 clk
E(cid:107)vl(xk)(cid:107)2
αE(cid:107)∇wJl(xk)(cid:107)2 + σ2
(cid:13)(cid:13)(cid:13)2
(cid:105)
(cid:17)
v
(cid:105)
15
(47)
(48)
(49)
(50)
(51)
where (cid:107)·(cid:107)1 denotes the maximum absolute column sum, and in the last step, we used (17). Using (123),
∇wJl(xk) = ∇wJl(wo) +
dt
From (124) and the norm inequality (cid:107)x + y(cid:107)2 ≤ 2(cid:107)x(cid:107)2 + 2(cid:107)y(cid:107)2, we obtain
0
∇2
wJl
wo + t(xk − wo)
(xk − wo)
(cid:107)∇wJl(xk)(cid:107)2 ≤ 2(cid:107)∇wJl(wo)(cid:107)2 +2λ2
≤ 2(cid:107)∇wJl(wo)(cid:107)2 +2λ2
l,max·(cid:107)xk − wo(cid:107)2
max·(cid:107)xk − wo(cid:107)2
Substituting (50) into (48), we obtain
E(cid:13)(cid:13)(cid:13) N(cid:88)
l=1
(cid:13)(cid:13)(cid:13)2 ≤ (cid:107)C(cid:107)1
(cid:104)
N(cid:88)
clk
l=1
2αλ2
max
E(cid:107)xk−wo(cid:107)2 +2α(cid:107)∇wJl(wo)(cid:107)2 +σ2
v
(cid:105)
clkvl(xk)
≤ 2αλ2
max(cid:107)C(cid:107)2
1 · E(cid:107)xk − wo(cid:107)2 + (cid:107)C(cid:107)2
1 · σ2
v
where σ2
v
(cid:44) max
1≤l≤N
EP [v(TA1(wi−1))] (cid:22) Ω2(cid:110)
= Ω2(cid:110)
= Ω2(cid:110)
(c)(cid:22) Ω2(cid:110)
(a)
(b)
{2α(cid:107)∇wJl(wo)(cid:107)2 + σ2
v}. Substituting (51) and x = TA1(wi−1) into (47) leads to
(cid:111)
2α(cid:107)C(cid:107)2
1λ2
2α(cid:107)C(cid:107)2
2α(cid:107)C(cid:107)2
(cid:105)
max · EP [TA1(wi−1) − 1N ⊗ wo] + (cid:107)C(cid:107)2
(cid:16)
TA1(wi−1) − TA1(1N ⊗ wo)
max · EP
1λ2
max · EP
(cid:104)
(cid:104)
1 · EP [wi−1 − 1N ⊗ wo] + (cid:107)C(cid:107)2
wi−1 − 1N ⊗ wo(cid:17)(cid:105)
maxAT
TA1
1λ2
1λ2
1σ2
v
2α(cid:107)C(cid:107)2
+ (cid:107)C(cid:107)2
1σ2
v
1N
(cid:111)
1N
1σ2
1N
v
+ (cid:107)C(cid:107)2
1σ2
v
1N
(cid:111)
(cid:111)
August 21, 2018
DRAFT
(cid:40)
(e)(cid:22) Ω2(cid:110)
(d)
= Ω2
1 ·4EP
1 ·(cid:16)
2α(cid:107)C(cid:107)2
1λ2
maxAT
2α(cid:107)C(cid:107)2
1λ2
maxAT
max·Ω2AT
(cid:34)
wi−1−w∞
2
+
(cid:35)
w∞−1N ⊗ wo
2
(cid:41)
1N
16
(cid:111)
+ (cid:107)C(cid:107)2
1σ2
v
(cid:17)
2EP [wi−1−w∞]+2P [w∞−1N ⊗ wo]
+(cid:107)C(cid:107)2
1σ2
v
1N
= 4α(cid:107)C(cid:107)2
1 ·EP [wi−1−w∞]+(cid:107)C(cid:107)2
1Ω2·bv
1λ2
(52)
1 is right-stochastic so that TA1(1N ⊗ wo) = 1N ⊗ wo, step (b) is
where step (a) is due to the fact that AT
because of the linearity of TA1(·), step (c) is due to property (31), step (d) is a consequence of Property
3 of Lemma 1, and step (e) is due to the convexity property (29).
Substituting (43) into (42), we obtain
MSPi (cid:22) AT
2 ΓdAT
1 · MSPi−1 + (cid:107)C(cid:107)2
1 · AT
2 Ω2bv
where
Γd (cid:44) Γ2 + 4αλ2
max(cid:107)C(cid:107)2
1 · Ω2
(53)
(54)
The following theorem gives the stability conditions on the inequality recursion (53) and derives both
asymptotic and non-asymptotic bounds for MSP.
Theorem 2 (Mean-Square Stability and Bounds). Suppose AT
2 ΓdAT
1. Then, the following non-asymptotic bound holds for all i ≥ 0:
1 is a stable matrix, i.e., ρ(AT
2 ΓdAT
1 ) <
MSPi (cid:22) (AT
2 ΓdAT
1 )i[MSP0 − MSPub∞ ] + MSPub∞
where MSPub∞ is the asymptotic upper bound on MSP defined as
1(IN − AT
And, as i → ∞, we have the following asymptotic bound
MSPub∞ (cid:44) (cid:107)C(cid:107)2
2 ΓdAT
1 )−1AT
2 Ω2bv
MSPi (cid:22) MSPub∞
lim sup
i→∞
(cid:40)
(cid:41)
Furthermore, a sufficient condition that guarantees the stability of the matrix AT
2 ΓdAT
1 is that
0 < µk < min
σk,max
σ2
k,max+4αλ2
max(cid:107)C(cid:107)2
1
,
σk,min
σ2
k,min+4αλ2
max(cid:107)C(cid:107)2
1
for all k = 1, . . . , N, where σk,max and σk,min were defined earlier in (35).
Proof:
Iterating inequality (53), we obtain
MSPi (cid:22) (AT
2 ΓdAT
1 )iMSP0 + (cid:107)C(cid:107)2
August 21, 2018
j=0
1 ·(cid:104) i−1(cid:88)
1 )j(cid:105)
(AT
2 ΓdAT
AT
2 Ω2bv
(55)
(56)
(57)
(58)
(59)
DRAFT
17
matrix so that (I − X) is invertible, then it leads to(cid:80)i−1
For the second term in (59), we note that (I + X + ··· + X i−1)(I − X) = I − X i. If X is a stable
j=0 X j = (I − X i)(I − X)−1. Using this relation
and given that the matrix AT
1 is stable, we can express (59) as
1 ·(cid:104)
2 ΓdAT
1 )iMSP0 + (cid:107)C(cid:107)2
IN −(AT
1 )i[MSP0 − MSPub∞ ] + MSPub∞
1 )i(cid:105)
MSPi (cid:22) (AT
2 ΓdAT
= (AT
2 ΓdAT
2 ΓdAT
(IN −AT
2 ΓdAT
1 )−1AT
2 Ω2bv
Letting i → ∞ on both sides of the above inequality, we get lim sup
i→∞
we need to show the conditions on the step-sizes {µk} that guarantee stability of the matrix AT
Note that the spectral radius of a matrix is upper bounded by its matrix norms. Therefore,
(60)
MSPi (cid:22) MSPub∞ . In the last step,
1 .
2 ΓdAT
ρ(AT
2 ΓdAT
1 (cid:107)∞
2 ΓdAT
2 (cid:107)∞ · (cid:107)Γd(cid:107)∞ · (cid:107)AT
1 (cid:107)∞
1 ) ≤ (cid:107)AT
≤ (cid:107)AT
= (cid:107)Γd(cid:107)∞
(cid:13)(cid:13)(cid:13)Γ2 + 4αλ2
=
1 · Ω2(cid:13)(cid:13)(cid:13)∞
max(cid:107)C(cid:107)2
If the right-hand side of the above inequality is strictly less than one, then the matrix AT
Using (33) -- (34), this condition is satisfied by the following quadratic inequalities on µk :
2 ΓdAT
2 is stable.
(1 − µkσk,max)2 + µ2
(1 − µkσk,min)2 + µ2
k · 4αλ2
k · 4αλ2
max(cid:107)C(cid:107)2
max(cid:107)C(cid:107)2
1 < 1
1 < 1
(61)
(62)
for all k = 1, . . . , N. Solving the above inequalities, we obtain condition (58).
The non-asymptotic bound (55) characterizes how the MSP at each node evolves over time. It shows that
2 ΓdAT
the MSP converges to steady state at a geometric rate determined by the spectral radius of the matrix
1 . The transient term is determined by the difference between the initial MSP and the steay-state
AT
MSP. At steady state, the MSP is upper bounded by MSPub∞ . We now examine closely how small the
steady-state MSP can be for small step-size parameters {µk}. Taking the ∞−norm of both sides of (57)
and using the relation (IN − AT
1 )j, we obtain
(cid:107)MSPub∞(cid:107)∞ =
2 ΓdAT
1 · (IN − AT
1 )−1 =(cid:80)∞
(cid:32) ∞(cid:88)
(cid:32) ∞(cid:88)
(cid:33)
(cid:107)AT
2 ΓdAT
j=0
(cid:107)Γd(cid:107)j∞
·(cid:16)
j=0
(cid:13)(cid:13)(cid:13)(cid:107)C(cid:107)2
≤ (cid:107)C(cid:107)2
1 ·
(a)≤ (cid:107)C(cid:107)2
1 ·
2 ΓdAT
j=0(AT
1 )−1 · AT
2 Ω2bv
max
1≤k≤N
µk
(cid:13)(cid:13)(cid:13)∞
(cid:33)
(cid:17)2 · (cid:107)bv(cid:107)∞
· (cid:107)AT
2 (cid:107)j∞ · (cid:107)Γd(cid:107)j∞ · (cid:107)AT
1 (cid:107)j∞
2 (cid:107)∞ · (cid:107)Ω(cid:107)2∞ · (cid:107)bv(cid:107)∞
August 21, 2018
DRAFT
·(cid:16)
(cid:107)C(cid:107)2
1 · (cid:107)bv(cid:107)∞
1 − (cid:107)Γd(cid:107)∞
1 and AT
(cid:17)2
=
µk
max
1≤k≤N
(63)
2 are right-stochastic matrices so that their ∞−norms (maximum
where step (a) is because AT
absolute row sum) are one. Let µmax and µmin denote the maximum and minimum values of {µk},
respectively, and let β (cid:44) µmin/µmax. For sufficiently small step-sizes, by the definitions of Γd and Γ in
(54) and (33), we have
18
(cid:107)Γd(cid:107)∞ ≤ (cid:107)Γ(cid:107)2∞ + 4αλmax(cid:107)C(cid:107)2
1 · (cid:107)Ω(cid:107)2∞
{1 − µkσk,min2} + 4αλmaxµ2
max(cid:107)C(cid:107)2
1
(a)
= max
1≤k≤N
≤ 1−2µminσmin +µ2
= 1−2βµmaxσmin +µ2
max(σ2
max +4αλmax(cid:107)C(cid:107)2
1)
max +4αλmax(cid:107)C(cid:107)2
1)
(64)
where σmax and σmin are the maximum and minimum values of {σk,max} and {σk,min}, respectively,
and step (a) holds for sufficiently small step-sizes. Note that (63) is a monotonically increasing function
of (cid:107)Γd(cid:107)∞. Substituting (64) into (63), we get
max(σ2
(cid:107)MSPi(cid:107)∞ ≤ (cid:107)MSPub∞(cid:107)∞ ≤
lim sup
i→∞
(cid:107)C(cid:107)2
1 · (cid:107)bv(cid:107)∞ · µmax
2βσmin−µmax(σ2
max +4αλmax(cid:107)C(cid:107)2
1)
∼ O(µmax)
(65)
Note that, for sufficiently small step-sizes, the right-hand side of (65) is approximately (cid:107)C(cid:107)2
µmax,
which is on the order of O(µmax). In other words, the steady-state MSP can be made be arbitrarily small
for small step-sizes, and the estimators wi = col{w1,i, . . . , wN,i} will be close to the fixed point w∞ (in
the mean-square sense) even under gradient perturbations. To understand how close the estimate wk,i at
each node k is to the Pareto-optimal solution wo, a natural question to consider is how close the fixed
point w∞ is to 1N ⊗ wo, which we study next.
1·(cid:107)bv(cid:107)∞
2βσmin
D. Bias Analysis
Our objective is to examine how large (cid:107)1N ⊗ wo − w∞(cid:107)2 is when the step-sizes are small. We carry
out the analysis in two steps: first, we derive an expression for w∞ (cid:44) 1N ⊗ wo − w∞, and then we
derive the conditions that guarantee small bias.
To begin with, recall that w∞ is the fixed point of Td(·), to which the recursion wi = Td(wi−1)
converges. Also note that Td(·) is an operator representation of the recursions (5) -- (7). We let i → ∞ on
both sides of (5) -- (7) and obtain
August 21, 2018
l=1
a1,lk wl,∞
(66)
DRAFT
N(cid:88)
φk,∞ =
N(cid:88)
clk∇wJl(φk,∞)
ψk,∞ = φk,∞ − µk
wk,∞ =
l=1
a2,lk ψl,∞
N(cid:88)
19
(67)
(68)
where wk,∞, φk,∞ and ψk,∞ denote the limits of wk,i, φk,i and ψk,i as i → ∞, respectively. Introduce
the following bias vectors at node k
l=1
wk,∞ (cid:44) wo−wk,∞, φk,∞ (cid:44) wo−φk,∞, ψk,∞ (cid:44) wo−ψk,∞
(69)
Subtracting each equation of (66) -- (68) from wo and using relation ∇wJl(φk,∞) = ∇wJl(wo)−Hlk,∞ φk,∞
that can be derived from Lemma 4 in Appendix A, we obtain
l=1
N(cid:88)
(cid:34)
N(cid:88)
l=1
φk,∞ =
ψk,∞ =
wk,∞ =
a1,lk wl,∞
N(cid:88)
IM −µk
l=1
a2,lk
ψl,∞
(cid:35)
clkHlk,∞
φk,∞ +µk
N(cid:88)
l=1
clk∇wJl(wo)
(70)
(71)
(72)
(73)
(74)
(75)
(76)
(77)
(78)
(79)
where Hlk,∞ is a positive semi-definite symmetric matrix defined as
(cid:16)
(cid:90) 1
0
N(cid:88)
l=1
Hlk,∞ (cid:44)
∇2
wJl
wo−t
a1,lk wl,∞)
dt
(cid:17)
Introduce the following global vectors and matrices
w∞ (cid:44) 1N ⊗ wo − w∞ = col{ w1,∞, . . . , wN,∞}
A1 (cid:44) A1 ⊗ IM , A2 (cid:44) A2 ⊗ IM ,
M (cid:44) diag{µ1, . . . , µN} ⊗ IM
C (cid:44) C ⊗ IM ,
N(cid:88)
(cid:110)
R∞ (cid:44)
diag
cl1Hl1,∞,··· , clN HlN,∞
l=1
go (cid:44) col{∇wJ1(wo), . . . ,∇wJN (wo)}
(cid:111)
,
Then, expressions (70), (72) and (71) lead to
IM N −AT
w∞ =
(cid:104)
2 (IM N −MR∞)AT
1
(cid:105)−1AT
2 MCT go
Theorem 3 (Bias at Small Step-sizes). Suppose that AT
1 is a regular right-stochastic matrix, so that
its eigenvalue of largest magnitude is one with multiplicity one, and all other eigenvalues are strictly
2 AT
August 21, 2018
DRAFT
20
smaller than one. Let θT denote the left eigenvector of AT
2 AT
1 of eigenvalue one. Furthermore, assume
the following condition holds:
where Ω (cid:44) diag{µ1, . . . , µN} was defined earlier in Lemma 3, and c0 is some constant. Then,
θT AT
2 ΩCT = c01T
(cid:107) w∞(cid:107)2 = (cid:107)1N ⊗ wo − w∞(cid:107)2 ∼ O(µ2
max)
(80)
(81)
Proof: See Appendix B.
Therefore, as long as the network is connected (not necessarily fully connected) and condition (80) holds,
AT
the bias would become arbitrarily small. For condition (80) to hold, one choice is to require the matrices
2 to be doubly stochastic, and all nodes to use the same step-size µ, namely, Ω = µIN . In that
2 is doubly-stochastic so that the left eigenvector of eigenvalue one is θT = 1T
case, the matrix AT
1 and AT
1 AT
and (80) holds.
Finally, we combine the results from Theorems 2 and 3 to bound the mean-square-error (MSE) of the
estimators {wk,i} from the desired Pareto-optimal solution wo. Introduce the N × 1 MSE vector
MSEi (cid:44) EP [ wi]
Using Properties 3 -- 4 in Lemma 1, we obtain
= col
= EP [1N ⊗ wo − wi]
(cid:110)E(cid:107) w1,i(cid:107)2, . . . , E(cid:107) wN,i(cid:107)2(cid:111)
(cid:16) 1N ⊗ wo−w∞
w∞−wi
(cid:104)
(cid:17)(cid:105)
MSEi = EP
2
+
(cid:22) 2P [ w∞]+2 EP [w∞−wi]
2
2
Taking the ∞−norm of both sides of above inequality and using property (36), we obtain
= 2P [ w∞]+2 MSPi
lim sup
i→∞
(cid:107)MSEi(cid:107)∞ ≤ 2(cid:107)P [ w∞](cid:107)∞ + 2 lim sup
i→∞
(cid:107)MSPi(cid:107)∞
(cid:107)MSPi(cid:107)∞
= 2(cid:107) w∞(cid:107)2
∼ O(µ2
b,∞ + 2 lim sup
i→∞
max) + O(µmax)
(82)
(83)
(84)
where in the last step, we used (65) and (81), and the fact that all vector norms are equivalent. Therefore,
as the step-sizes become small, the MSEs become small and the estimates {wk,i} get arbitrarily close
August 21, 2018
DRAFT
R∞ ≈ N(cid:88)
(cid:110)
to the Pareto-optimal solution wo. We also observe that, for small step-sizes, the dominating steady-state
error is MSP, which is caused by the gradient noise and is on the order of O(µmax). On the other hand,
the bias term is a high order component, i.e., O(µ2
max), and can be ignored.
The fact that the bias term w∞ is small also gives us a useful approximation for R∞ in (77). Since
w∞ = col{ w1,∞, . . . , wN,∞} is small for small step-sizes, the matrix Hlk,∞ defined in (73) can be
approximated as Hlk,∞ ≈ ∇2
wJl(wo). Then, by definition (77), we have
diag
cl1∇2
wJl(wo), . . . , clN∇2
wJl(wo)
(85)
Expressing (85) is useful for evaluating closed-form expressions of the steady-state MSE in sequel.
l=1
E. Steady-State Performance
So far, we derived inequalities (84) to bound the steady-state performance, and showed that, for small
step-sizes, the solution at each node k approaches the same Pareto-optimal point wo. In this section,
we derive closed-form expressions (rather than bounds) for the steady-state MSE at small step-sizes.
Introduce the error vectors3
21
(86)
(87)
(88)
(89)
(90)
(91)
(cid:111)
(cid:111)
(cid:111)
φk,i (cid:44) wo−φk,i, ψk,i (cid:44) wo−ψk,i, wk,i (cid:44) wo−wk,i
and the following global random quantities
wi (cid:44)col{ w1,i, . . . , wN,i}
N(cid:88)
(cid:90) 1
N(cid:88)
l=1
0
Ri−1 (cid:44)
Hlk,i−1 (cid:44)
gi (cid:44)
(cid:110)
(cid:32)
(cid:110)
N(cid:88)
l=1
diag
cl1Hl1,i−1,··· , clN HlN,i−1
∇2
wJl
wo−t
a1,lk wl,i−1
dt
(cid:33)
col
cl1vl(φ1,i−1),··· , clN vl(φN,i−1)
l=1
Then, extending the derivation from [21, Sec. IV A], we can establish that
2 MCT go +AT
2 [IM N −MRi−1]AT
1 wi−1 +AT
wi = AT
2 Mgi
According to (84), the error wk,i at each node k would be small for small step-sizes and after long enough
time. In other words, wk,i is close to wo. And recalling from (12) that φk,i−1 is a convex combination
3 In this paper, we always use the notation w = wo − w to denote the error relative to wo. For the error between w and the
fixed point w∞, we do not define a separate notation, but instead write w∞ − w explicitly to avoid confusion.
August 21, 2018
DRAFT
22
of {wl,i}, we conclude that the quantities {φl,i−1} are also close to wo. Therefore, we can approximate
(cid:90) 1
Hlk,i−1, Ri−1 and gi in (88) -- (90) by
wJl(wo)dt =∇2
∇2
(cid:110)
Ri−1≈ N(cid:88)
(cid:111)≈R∞
wJl(wo), . . . , clN∇2
Hlk,i−1≈
wJl(wo)
wJl(wo)
cl1∇2
(92)
(93)
diag
0
Then, the error recursion (91) can be approximated by
l=1
wi = AT
2 [IM N −MR∞]AT
1 wi−1 +AT
2 MCT go +AT
2 Mgi
(94)
First, let us examine the behavior of E wi. Taking expectation of both sides of recursion (94), we obtain
E wi = AT
2 [IM N − MR∞]AT
1
E wi−1 + AT
2 MCT go
(95)
This recursion converges when the matrix AT
(see Appendix C of [21]). Let i → ∞ on both sides of (95) so that
2 [IM N − MR∞]AT
1 is stable, which is guaranteed by (38)
E w∞ (cid:44) lim
E wi
i→∞
IM N −AT
=
(cid:104)
2 (IM N −MR∞)AT
1
(cid:105)−1AT
2 MCT go
(96)
Note that E w∞ coincides with (79). By Theorem 3, we know that the squared norm of this expression
max) at small step-sizes -- see (81). Next, we derive closed-form expressions for
is on the order of O(µ2
the MSEs, i.e., E(cid:107) wk,i(cid:107)2. Let Rv denote the covariance matrix of gi evaluated at wo:
Rv = E
col
cl1vl,i(wo),··· , clN vl,i(wo)
col
cl1vl,i(wo),··· , clN vl,i(wo)
(97)
(cid:111)(cid:35)T(cid:41)
(cid:40)(cid:34) N(cid:88)
l=1
(cid:110)
(cid:111)(cid:35)(cid:34) N(cid:88)
l=1
(cid:110)
In practice, we can evaluate Rv from the expressions of {vl,i(wo)}. Equating the squared weighted
Euclidean "norm" of both sides of (94), applying the expectation operator with assumption (16), and
following the same line of reasoning from [21], we can establish the following approximate variance
relation at small step-sizes:
E(cid:107) wi(cid:107)2
Σ ≈ E(cid:107) wi−1(cid:107)2
Σ(cid:48) + Tr(ΣAT
2 MCT go)T ΣAT
2 MRvMA2) + Tr{ΣAT
2 (IM N −MR∞)AT
1
E wi−1
+ 2(AT
2 MCT go(AT
2 MCT go)T}
Σ(cid:48) ≈ A1 (IM N −MR∞)A2ΣAT
2 (IM N −MR∞)AT
1
(98)
(99)
where Σ is a positive semi-definite weighting matrix that we are free to choose. Let σ = vec(Σ) denote
the vectorization operation that stacks the columns of a matrix Σ on top of each other. We shall use the
August 21, 2018
DRAFT
notation (cid:107)x(cid:107)2
σ and (cid:107)x(cid:107)2
Σ interchangeably. Following the argument from [21], we can rewrite (98) as
23
E(cid:107) wi(cid:107)2
σ ≈ E(cid:107) wi−1(cid:107)2
F σ + rT σ + σT Q E wi−1
where
r (cid:44) vec(cid:0)AT
F (cid:44) A1[IM N −MR∞]A2 ⊗ A1[IM N −MR∞]A2
2 MCTgo
(cid:1)+AT
2 MRvMA2
2 MCT go⊗AT
2 MCT go
1 ⊗ AT
Q (cid:44) 2AT
2 (IM N −MR∞)AT
(100)
(101)
(102)
(103)
We already established that E wi−1 on the right-hand side of (100) converges to its limit E w∞ under
condition (38). And, it was shown in [31, pp.344-346] that such recursion converges to a steady-state
value if the matrix F is stable, i.e., ρ(F ) < 1. This condition is guaranteed when the step-sizes are
sufficiently small (or chosen according to (38)) -- see the proof in Appendix C of [21]. Letting i → ∞
on both sides of expression (100), we obtain:
E(cid:107) wi(cid:107)2
(I−F )σ ≈ (r + Q E w∞)T σ
(104)
lim
i→∞
We can now resort to (104) and use it to evaluate various performance metrics by choosing proper
weighting matrices Σ (or σ). For example, the MSE of any node k can be obtained by computing
limi→∞ E(cid:107) wi(cid:107)2
T with a block weighting matrix T that has an identity matrix at block (k, k) and
T . Denote the vectorized version of this matrix by tk (cid:44)
zeros elsewhere:
vec(diag(ek)⊗ IM ), where ek is a vector whose kth entry is one and zeros elsewhere. Then, if we select
σ in (104) as σ = (I − F )−1tk, the term on the left-hand side becomes the desired limi→∞ E(cid:107) wk,i(cid:107)2
and the MSE for node k is therefore given by:
E(cid:107) wk,i(cid:107)2 = lim
i→∞
E(cid:107) wi(cid:107)2
lim
i→∞
MSEk (cid:44) lim
i→∞
E(cid:107) wk,i(cid:107)2 ≈ (r + Q E w∞)T (I−F )−1tk
If we are interested in the average network MSE, then it is given by
N(cid:88)
k=1
MSE (cid:44) 1
N
MSEk
(105)
(106)
IV. APPLICATION TO COLLABORATIVE DECISION MAKING
We illustrate one application of the framework developed in the previous sections to the problem of
collaborative decision making over a network of N agents. We consider an application in finance where
each entry of the decision vector w denotes the amount of investment in a specific type of asset. Let
the M × 1 vector p represent the return in investment. Each entry of p represents the return for a
August 21, 2018
DRAFT
24
unit investment in the corresponding asset. Let p and Rp denote the mean and covariance matrix of p,
respectively. Then, the overall return by the agents for a decision vector w is pT w. Note that, with decision
w, the return pT w is a (scalar) random variable with mean pT w and variance var(pT w) = wT Rpw, which
are called the expected return and variance of the return in classical Markowitz portfolio optimization [2,
p.155], [32] -- [35]. These two metrics are often used to characterize the quality of the decision w: we want
to maximize the expected return while minimizing the variance. However, solving the problem directly
requires all agents to know the global statistics p and Rp. What is available in practice are observations
that are collected at the various nodes. Suppose a subset U of the agents observes a sequence of return
vectors {uk,i} with Euk,i = p. The subscripts k and i denote that the return is observed by node k at
time i. Then, we can formulate the cost functions for the nodes in set U as follows:
Ju,k(w) = −E[uT
k,iw] = −pT w
k ∈ U ⊂ {1, . . . , N}
(107)
We place a negative sign in (107) so that minimizing Ju,k(w) is equivalent to maximizing the expected
return. Similarly, suppose there is another subset of nodes, exclusive from U and denoted by S, which
observes a sequence of centered return vectors {sk,i}, namely, vectors that have the same distribution as
p − Ep so that E[sk,isT
k,i] = Rp. Then, we can associate with these nodes the cost functions:
= wT Rpw
(108)
Additionally, apart from selecting the decision vector w to maximize the return subject to minimizing
k ∈ S ⊂ {1, . . . , N}
its variance, the investment strategy w needs to satisfy other constraints such as: i) the total amount of
investment should be less than a maximum value that is known only to an agent k0 ∈ K (e.g., agent k0
is from the funding department who knows how much funding is available), ii) the investment on each
asset be nonnegative (known to all agents), and iii) tax requirements and tax deductions4 known to agents
in a set H. We can then formulate the following constrained multi-objective optimization problem:
Js,k(w) = E(cid:104)sT
k,iw2(cid:105)
(cid:40)(cid:88)
k∈U
min
w
(cid:41)
(cid:88)
k∈S
Ju,k(w),
Js,k(w)
(109)
4For example, suppose the first and second entries of the decision vector w denote the investments on charity assets. When the
charity investments exceed a certain amount, say b, there would be a tax deduction. We can represent this situation by writing
hT w ≥ b, where h (cid:44) [1 1 0 ··· 0]T .
August 21, 2018
DRAFT
J glob(w) =
Ju,k(w) +
(cid:35)
(cid:35)
M(cid:88)
M(cid:88)
m=1
φ(−eT
mw)
φ(−eT
mw)
k∈U
(cid:34)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
k∈S
k∈H
k∈K
+
+
+
(cid:34)
(cid:34)
(cid:34)
Js,k(w) +
m=1
φ(bk − hT
k w) +
φ(−eT
mw)
(cid:35)
(cid:35)
M(cid:88)
M(cid:88)
m=1
m=1
φ(1T w − b0) +
φ(−eT
mw)
s.t. 1T w ≤ b0
k w ≥ bk,
hT
w (cid:23) 0
k ∈ H
25
(110)
(111)
(112)
Using the scalarization technique and barrier function method from Sec. I, we convert (109) -- (112) into
the following unconstrained optimization problem (for simplicity, we only consider π1 = ··· = πN = 1):
The term(cid:80)M
where φ(·) is a barrier function to penalize the violation of the constraints -- see [3] for an example, and
the vector em ∈ RM is a basis vector whose entries are all zero except for a value of one at the mth entry.
mw) is added to each cost function to enforce the nonnegativity constraint (112),
which is assumed to be known to all agents. Note that there is a "division of labor" over the network:
the entire set of nodes is divided into four mutually exclusive subsets {1, . . . , N} = U ∪ S ∪ H ∪ K,
and each subset collects one type of information related to the decision. Diffusion adaptation strategies
m=1 φ(−eT
allow the nodes to arrive at a Pareto-optimal decision in a distributed manner over the network, and each
subset of nodes influences the overall investment strategy.
In our simulation, we consider a randomly generated connected network topology. There are a total
of N = 10 nodes in the network, and nodes are assumed connected when they are close enough
geographically. The cardinalities of the subsets U, S, H and K are set to be 3, 4, 2 and 1, respectively. The
nodes are partitioned into these four subsets randomly. The dimension of the decision vector is M = 5.
The random vectors uk,i and sk,i are generated according to the Gaussian distributions N (1, IM ) and
N (0, IM ), respectively. We set b0 = 5 and the parameters {hk, bk} for k ∈ H to
hk1 = [1 2 ··· 5] ,
hk2 = [5 4 ··· 1] ,
bk1 = 2
bk2 = 3
(113)
(114)
DRAFT
August 21, 2018
26
(a) Topology of the network.
(b) Learning curve (µ = 10−2).
(c) MSE for different values of step-sizes.
(d) Error of fixed point for different values of step-
sizes.
Fig. 4. Simulation results for collaborative decision making.
where k1 and k2 are the indices of the two nodes in the subset H. Furthermore, we use the barrier
function given by (15) in [3] in our simulation with t = 10, ρ = 0.1 and τ = 0.1. We set the combination
coefficients {alk} to the Metropolis rule (See Table III in [23]) for both ATC and CTA strategies. The
weights {clk} are set to clk = 1 for l = k and zero otherwise, i.e., there is no exchange of gradient
information among neighbors. According to Theorem 3, such a choice will always guarantee condition
(80) so that the bias can be made arbitrarily small for small step-sizes. In our simulation, we do not
assume the statistics of {uk,i} and {sk,i} are known to the nodes. The only information available is their
realizations and the algorithms have to learn the best decision vector w from them. Therefore, we use
August 21, 2018
DRAFT
02004006008001000−25−20−15−10−50Number of IterationsNetwork MSE (dB) ATCCTAConsensusCentralized10−310−210−1−35−30−25−20−15−10−505Step−Size µNetwork MSE (dB) ATCATC theoryCTACTA theoryConsensusCentralized10−310−210−1−50−40−30−20−100Step−Size µError of Fixed Point (dB) ATCATC theoryCTACTA theoryConsensusthe following stochastic gradient vector5 at each node k:
(cid:92)∇wJk(w) =
∇wφ(bk − hT
m=1 ∇wφ(−eT
m=1 ∇wφ(−eT
−uk,i +(cid:80)M
2sk,i +(cid:80)M
k w) +(cid:80)M
∇wφ(1T w − b0) +(cid:80)M
(cid:88)
mw)
k ∈ U
mw)
m=1 ∇wφ(−eT
m=1 ∇wφ(−eT
k ∈ S
mw) k ∈ H
mw) k ∈ K
alkwl,i−1 − µ(cid:92)∇wJk(wk,i−1)
wk,i =
l∈Nk
27
(115)
(116)
To compare the performance with other algorithms, we also simulate the consensus-based approach from
[16] with the same stochastic gradient6 as (115). The algorithm is listed below:
N(cid:88)
k=1
Furthermore, we also simulate the conventional centralized approach to such optimization problem, which
collects data from all nodes and implements stochstic gradient descent at the central node:
wi = wi−1 − µ
1
N
(cid:92)∇wJk(wi−1)
(117)
where the factor of 1/N is used to make the convergence rate the same as the distributed algorithms.
The simulatin results are shown in Fig. 4(a) -- 4(d). Fig. 4(a) shows the network topology, and Fig.
4(b) shows the learning curves of different algorithms. We see that ATC outperforms CTA and CTA
outperforms consensus. To further compare the steady-state performance, we plot the steady-state MSE
for different values of step-sizes in Fig. 4(c). We also plot the theoretical curves from (105) -- (106) for
ATC and CTA algorithms. We observe that all algorithms approach the performance of the centralized
solution when the step-sizes are small. However, diffusion algorithms always outperform the consensus-
based strategy; the gap between ATC and consensus algorithm is about 8 dB when µ = 0.1. We also see
that the theoretical curves match the simulated ones well. Finally, we recall that Theorem 3 shows that
the error between the fixed point w∞ and 1 ⊗ wo can be made arbitrarily small for small step-sizes, and
the error (cid:107)w∞ − 1 ⊗ wo(cid:107)2 is on the order of O(µ2). To illustrate the result, we simulate the algorithms
using true gradients {∇wJk(w)} so that they converge to their fixed point w∞, and we get different
values of w∞ for different step-sizes. The theoretical values for ATC and CTA can be computed from
(79). The results are shown in Fig. 4(d). We see that the theory matches simulation, and the power of
5For nodes in H an K, the cost functions are known precisely, so their true gradients are used.
6The original algorithm in [16] does not use stochastic gradients but the true gradients {∇wJk(w)}.
August 21, 2018
DRAFT
28
the fixed point error per node7 decays at 20dB per decade, which is O(µ2) and is consistent with (81).
Note that diffusion algorithms outperform the consensus. Also note from (79) and (96) that the bias and
the fixed point error have the same expression. Therefore, diffusion algorithms have smaller bias than
consensus (the gap in Fig. 4(d) is as large as 5dB between ATC and consensus).
V. CONCLUSION
This paper generalized diffusion adaptation strategies to perform multi-objective optimization in a
distributed manner over a network of nodes. We use constant step-sizes to endow the network with
continuous learning and adaptation abilities via local interactions. We analyzed the mean-square-error
performance of the diffusion strategy, and showed that the solution at each node gets arbitrarily close to
the same Pareto-optimal solution for small step-sizes.
APPENDIX A
PROPERTIES OF THE OPERATORS
Properties 1-3 are straightforward from the definitions of TA(·) and P [·]. We therefore omit the proof
for brevity, and start with property 4.
(Property 4: Convexity)
We can express each N × 1 block vector x(k) in the form x(k) = col{x(k)
Then, the convex combination of x(1), . . . , x(N ) can be expressed as
1 , . . . , x(k)
N } for k = 1, . . . , N.
al x(k) = col
alx(k)
1 , . . . ,
alx(k)
N
According to the definition of the operator P [·], and in view of the convexity of (cid:107) · (cid:107)2, we have
K(cid:88)
(cid:34) K(cid:88)
k=1
k=1
(cid:35)
k=1
(cid:40) K(cid:88)
(cid:40)(cid:13)(cid:13)(cid:13) K(cid:88)
(cid:40) K(cid:88)
K(cid:88)
k=1
k=1
=
al P [x(k)]
(cid:41)
k=1
K(cid:88)
(cid:13)(cid:13)(cid:13) K(cid:88)
K(cid:88)
k=1
k=1
(cid:41)
(cid:13)(cid:13)(cid:13)2
(cid:41)
(cid:13)(cid:13)(cid:13)2
P
al x(k)
= col
alx(k)
1
, . . . ,
alx(k)
N
(cid:22) col
al(cid:107)x(k)
1 (cid:107)2, . . . ,
al(cid:107)x(k)
N (cid:107)2
7The power of the fixed point error per node is defined as 1
N (cid:107)w∞ − 1 ⊗ wo(cid:107)2 = 1
N
k=1
(cid:80)N
k=1 (cid:107)wk,∞ − wo(cid:107)2.
August 21, 2018
(118)
(119)
DRAFT
(Property 5: Additivity)
By the definition of P [·] and the assumption that ExT
k yk = 0 for each k = 1, . . . , N, we obtain
EP [x + y] = col{E(cid:107)x1 + y1(cid:107)2, . . . , E(cid:107)xN + yN(cid:107)2}
= col{E(cid:107)x1(cid:107)2 + E(cid:107)y1(cid:107)2, . . . , E(cid:107)xN(cid:107)2 + E(cid:107)yN(cid:107)2}
= EP [x] + EP [y]
29
(120)
(Property 6: Variance Relations)
We first prove (31). From the definition of TA(·) in (18) and the definition of P [·] in (20), we express
P [TA(x)] = col
al1xl
, . . . ,
alN xl
(121)
Since (cid:107)·(cid:107)2 is a convex function and each sum inside the squared norm operator is a convex combination
of x1, . . . , xN (AT is right stochastic), by Jensen's inequality [2, p.77], we have
(cid:13)(cid:13)(cid:13)2
(cid:40)(cid:13)(cid:13)(cid:13) N(cid:88)
(cid:40) N(cid:88)
l=1
(cid:13)(cid:13)(cid:13) N(cid:88)
l=1
N(cid:88)
(cid:41)
(cid:13)(cid:13)(cid:13)2
(cid:41)
P [TA(x)] (cid:22) col
al1(cid:107)xl(cid:107)2, . . . ,
alN(cid:107)xl(cid:107)2
l=1
l=1
= AT col{(cid:107)x1(cid:107)2, . . . , (cid:107)xN(cid:107)2}
= AT P [x]
(122)
Next, we proceed to prove (32). We need to call upon the following useful lemmas from [4, p.24], and
Lemmas 1 -- 2 in [21], respectively.
Lemma 4 (Mean-Value Theorem). For any twice-differentiable function f (·), it holds that
(cid:20)(cid:90) 1
(cid:16)
(cid:21)
(cid:17)
dt
where ∇2f (·) denotes the Hessian of f (·), and is a symmetric matrix.
0
∇f (y) = ∇f (x) +
∇2f
x + t(y − x)
(y − x)
(123)
(cid:4)
Lemma 5 (Bounds on the Integral of Hessian). Under Assumption 1, the following bounds hold for any
vectors x and y:
(cid:90) 1
N(cid:88)
0
clk
λl,minIM ≤
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)I − µk
l=1
wJl(x + ty)dt ≤ λl,maxIM
∇2
(cid:20)(cid:90) 1
∇2
wJl(x + ty)dt
(cid:21)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) ≤ γk
0
where (cid:107) · (cid:107) denotes the 2−induced norm, and γk, σk,min and σk,max were defined in (34) -- (35).
August 21, 2018
(124)
(125)
(cid:4)
DRAFT
By the definition of the operator TG(·) in (19) and the expression (123), we express TG(x)− TG(y) as
TG(x) − TG(y) =
(cid:34)
l=1
(cid:34)
IM −µ1
N(cid:88)
N(cid:88)
P [TG(x) − TG(y)] (cid:22) col(cid:8)γ2
IM −µN
l=1
cl1
(cid:90) 1
(cid:90) 1
(cid:35)
wJl(y1 +t(x1−y1))dt
∇2
(cid:35)
wJl(yN +t(xN −yN ))dt
∇2
...
0
clN
0
(x1−y1)
(xN −yN )
30
(126)
(127)
(128)
Therefore, using (125) and the definition of P [·] in (20), we obtain
1 · (cid:107)x1 − y1(cid:107)2, . . . , γ2
N · (cid:107)xN − yN(cid:107)2(cid:9)
= Γ2P [x − y]
(Property 7: Block Maximum Norm)
According to the definition of P [·] and the definition of block maximum norm [21], we have
(cid:107)P [x](cid:107)∞ =
(cid:13)(cid:13)(cid:13)col{(cid:107)x1(cid:107)2, . . . , (cid:107)xN(cid:107)2}(cid:13)(cid:13)(cid:13)∞
(cid:16)
(cid:107)xk(cid:107)2
(cid:107)xk(cid:107)(cid:17)2
max
1≤k≤N
= max
1≤k≤N
=
= (cid:107)x(cid:107)2
b,∞
(Property 8: Preservation of Inequality)
To prove F x (cid:22) F y, it suffices to prove 0 (cid:22) F (y − x). Since x (cid:22) y, we have 0 (cid:22) y − x, i.e., all entries
of the vector y − x are nonnegative. Furthermore, since all entries of the matrix F are nonnegative, the
entries of the vector F (y − x) are all nonnegative, which means 0 (cid:22) F (y − x).
It suffices to show that
APPENDIX B
BIAS AT SMALL STEP-SIZES
(cid:107)1 ⊗ wo − w∞(cid:107)
µmax
= ξ
lim
µmax→0
(129)
where ξ is a constant independent of µmax. It is known that any matrix is similar to a Jordan canonical
1 = Y JY −1, where J is the Jordan
form [36]. Hence, there exists an invertible matrix Y such that AT
1 , and the columns of the matrix Y are the corresponding right
canonical form of the matrix AT
principal vectors of various degrees [36, pp.82 -- 88]; the right principal vector of degree one is the right
2 AT
2 AT
August 21, 2018
DRAFT
eigenvector. Obviously, the matrices J and Y are independent of µmax. Using the Kronecker product
property [36, p.140]: (A ⊗ B)(C ⊗ D) = AC ⊗ BD, we obtain
31
AT
2 AT
1 ⊗ IM
2 AT
1 = AT
= (Y ⊗ IM )(J ⊗ IM )(Y −1 ⊗ IM )
(130)
Denote µk = βkµmax, where βk is some positive scalar such that 0 < βk ≤ 1. Substituting (130) into
(79), we obtain
1 ⊗ wo − w∞ =(cid:2)IM N − AT
2 AT
1 + AT
2 MR∞AT
1
(cid:3)−1 AT
2 MCT go
−1 (Y −1 ⊗ IM )AT
2 MCT go
= (Y ⊗ IM ) [IM N − J ⊗ IM + µmaxE]
where
E = (Y −1 ⊗ IM )AT
M0 (cid:44) M/µmax = diag{β1, . . . , βN}
2 M0R∞AT
(cid:123)(cid:122)
1 (Y ⊗ IM )
(cid:125)
⊗IM
(cid:124)
(cid:44)Ω0
1 is right-stochastic, and since AT
2 AT
By (8), the matrix AT
1 is regular, it will have an eigenvalue of
one that has multiplicity one and is strictly greater than all other eigenvalues [37]. Furthermore, the
corresponding left and right eigenvectors are θT and 1, with θT (cid:31) 0 (all entries of the row vector θT are
real positive numbers). For this reason, we can partition J, Y −1 and Y in the following block forms:
2 AT
J = diag{1, J0},
Y −1 = col
(134)
where J0 is an (N −1)×(N −1) matrix that contains the Jordan blocks of eigenvalues strictly within unit
circle, i.e., ρ(J0) < 1. The first row of the matrix Y −1 in (134) is normalized by θT 1 so that Y −1Y = I.
(Note that Y −1Y = I requires the product of the first row of Y −1 and the first column of Y to be one:
Y = [1 YL]
, YR
θT 1
,
(cid:26) θT
(cid:27)
θT
θT 1
1 = 1.) Substituting these partitionings into (132), we can express E as
(131)
(132)
(133)
(135)
(136)
(137)
(138)
DRAFT
E21 E22
E11 E12
(cid:17)AT
(cid:17)AT
2 M0R∞AT
2 M0R∞AT
1 (1 ⊗ IM )
1 (YL ⊗ IM )
2 M0R∞AT
1 (1 ⊗ IM )
E =
E11 (cid:44)(cid:16) θT
E12 (cid:44)(cid:16) θT
⊗ IM
⊗ IM
E21 (cid:44) (YR ⊗ IM )AT
θT 1
θT 1
where
August 21, 2018
E22 (cid:44) (YR ⊗ IM )AT
2 M0R∞AT
1 (YL ⊗ IM )
32
(139)
Observe that the matrices E11, E12, E21 and E22 are independent of µmax. Substituting (134) and (135)
into (131), we obtain
1 ⊗ wo−w∞ = (Y ⊗ IM )
Let us denote
−1 1
µmaxE12
I−J0 ⊗ IM +µmaxE22
θT 1 (θT ⊗ IM )AT
(YR ⊗ IM )AT
2 MCT go
2 MCT go
µmaxE11
µmaxE12
µmaxE21 I−J0 ⊗ IM +µmaxE22
−1
µmaxE21
µmaxE11
(cid:44)
G11 G12
N(cid:88)
G21 G22
Furthermore, recalling that wo is the minimizer of the global cost function (4), we have
∇wJl(wo) = 0 ⇔ (1T ⊗ IM ) go = 0
which, together with condition (80), implies that
l=1
(θT ⊗ IM )AT
2 MCT go = (θT AT
2 ΩCT ⊗ IM )go
= c0(1T ⊗ IM )go
where we also used the facts that AT
product property: (A ⊗ B)(C ⊗ D). Substituting (141) and (143) into (140) and using (133) lead to
(143)
2 ⊗ IM , CT = CT ⊗ IM , M = Ω ⊗ IM and the Kronecker
2 = AT
= 0
(140)
(141)
(142)
(144)
(145)
To proceed with analysis, we need to evaluate G12 and G22. We call upon the relation from [36, pp.48]:
(YRAT
G12
G22
1 ⊗ wo − w∞ = µmax · (Y ⊗ IM )
2 Ω0CT ⊗ IM )go
P Q
U V
=
−1
P −1 + P −1QSU P −1 −P −1QS
(cid:16) θT
−SU P −1
(cid:17)R∞(AT
2 Ω0 ⊗ IM
AT
1 ⊗ IM )
S
1
E11 =
θT 1
where S = (V − U P −1Q)−1. To apply the above relation to (141), we first need to verify that E11 is
invertible. By definition (136),
= (zT ⊗ IM )R∞(1 ⊗ IM )
August 21, 2018
DRAFT
N(cid:88)
zk
N(cid:88)
k=1
l=1
=
clkHlk,∞
33
(146)
where zk denotes the kth entry of the vector z (cid:44) Ω0A2θ/θT 1 (note that all entries of z are non-negative,
i.e., zk ≥ 0). Recall from (73) that Hlk,∞ is a symmetric positive semi-definite matrix. Moreover, since
zk and clk are nonnegative, we can conclude from (146) that E11 is a symmetric positive semi-definite
matrix. Next, we show that E11 is actually strictly positive definite. Applying (124) to the expression of
Hlk,∞ in (73), we obtain Hlk,∞ ≥ λl,minIM . Substituting into (146) gives:
N(cid:88)
(cid:33)
l=1
(cid:34) N(cid:88)
(cid:32) N(cid:88)
k=1
k=1
E11 ≥
≥
=
(cid:35)
(cid:40) N(cid:88)
(cid:40) N(cid:88)
l=1
l=1
zk
clkλl,min
· IM
zk
min
1≤k≤N
clkλl,min
· IM
(cid:41)
(cid:41)
1T Ω0A2θ
θT 1
· min
1≤k≤N
clkλl,min
· IM
(147)
Noting that the matrices Ω0 and A0 have nonnegative entries with some entries being positive, and that
all entries of θ are positive, we have (1T Ω0A2θ)/(θT 1) > 0. Furthermore, by Assumption 1, we know
l=1 clkλl,min > 0 for each k = 1, . . . , N. Therefore, we conclude that E11 > 0 and is invertible.
(cid:80)N
Applying (145) to (141), we get
11 ET
11 E12G22
G12 = −E−1
12)(cid:3)−1
G22 =(cid:2)I−J0 ⊗ IM +µmax(E22−E21E−1
G22(YRAT
G22(YRAT
−E−1
−E−1
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(Y ⊗ IM )
= lim
µmax→0
11 E12
11 E12
I
I
(148)
(149)
(150)
(151)
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)
Substituting (149) into (144) leads to
1 ⊗ wo − w∞ = µmax · (Y ⊗ IM )
2 Ω0CT ⊗ IM )go
Substituting expression (150) into the left-hand side of (129), we get
(cid:107)1 ⊗ wo − w∞(cid:107)
lim
µmax→0
µmax
2 Ω0CT ⊗ IM )go
Observe that the only term on the right-hand side of (151) that depends on µmax is G22. From its
expression (149), we observe that, as µmax → 0, the matrix G22 tends to (I − J0 ⊗ IM )−1, which is
independent of µmax. Therefore, the limit on the right-hand side of (151) is independent of µmax.
August 21, 2018
DRAFT
REFERENCES
34
[1] J. Chen and A. H. Sayed, "Distributed Pareto-optimal solutions via diffusion adaptation," in Proc. IEEE Workshop on
Statistical Signal Process. (SSP), Ann Arbor, MI, Aug. 2012, pp. 1 -- 4.
[2] S. P. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, 2004.
[3] Z. J. Towfic, J. Chen, and A. H. Sayed, "Distributed throughput optimization over P2P mesh networks using diffusion
adaptation," in Proc. IEEE International Conf. Commun. (ICC), Ottawa, Canada, June 2012, pp. 1 -- 5.
[4] B. Polyak, Introduction to Optimization, Optimization Software, NY, 1987.
[5] D.P. Bertsekas and J.N. Tsitsiklis, Parallel and Distributed Computation: Numerical Methods, Athena Scientific, Belmont,
1997.
[6] D. P. Bertsekas, "A new class of incremental gradient methods for least squares problems," SIAM J. Optim., vol. 7, no.
4, pp. 913 -- 926, 1997.
[7] A. Nedic and D. P. Bertsekas, "Incremental subgradient methods for nondifferentiable optimization," SIAM J. Optim., vol.
12, no. 1, pp. 109 -- 138, 2001.
[8] A. Nedic and D. P. Bertsekas,
"Convergence rate of incremental subgradient algorithms," Stochastic Optimization:
Algorithms and Applications, S. Uryasev and P. M. Pardalos, Eds., pp. 263 -- 304, 2000.
[9] B. T. Polyak and Y. Z. Tsypkin, "Pseudogradient adaptation and training algorithms," Automation and Remote Control,
vol. 12, pp. 83 -- 94, 1973.
[10] M. G. Rabbat and R. D. Nowak, "Quantized incremental algorithms for distributed optimization," IEEE J. Sel. Areas
Commun., vol. 23, no. 4, pp. 798 -- 808, 2005.
[11] C. G. Lopes and A. H. Sayed, "Incremental adaptive strategies over distributed networks," IEEE Trans. Signal Process.,
vol. 55, no. 8, pp. 4064 -- 4077, Aug. 2007.
[12] L. Li and J. A. Chambers, "A new incremental affine projection-based adaptive algorithm for distributed networks," Signal
Processing, vol. 88, no. 10, pp. 2599 -- 2603, Oct. 2008.
[13] R. M. Karp, "Reducibility among combinational problems," Complexity of Computer Computations, R. E. Miller and J.
W. Thatcher, Eds., pp. 85 -- 104, 1972.
[14] J. N. Tsitsiklis, D. P. Bertsekas, and M. Athans, "Distributed asynchronous deterministic and stochastic gradient optimization
algorithms," IEEE Trans. Autom. Control, vol. 31, no. 9, pp. 803 -- 812, 1986.
[15] S. Barbarossa and G. Scutari, "Bio-inspired sensor network design," IEEE Signal Process. Mag., vol. 24, no. 3, pp. 26 -- 35,
2007.
[16] A. Nedic and A. Ozdaglar, "Distributed subgradient methods for multi-agent optimization," IEEE Trans. Autom. Control,
vol. 54, no. 1, pp. 48 -- 61, 2009.
[17] S. Kar and J. M. F. Moura, "Convergence rate analysis of distributed gossip (linear parameter) estimation: Fundamental
limits and tradeoffs," IEEE J. Sel. Topics. Signal Process., vol. 5, no. 4, pp. 674 -- 690, Aug. 2011.
[18] A. G. Dimakis, S. Kar, J. M. F. Moura, M. G. Rabbat, and A. Scaglione, "Gossip algorithms for distributed signal
processing," Proc. IEEE, vol. 98, no. 11, pp. 1847 -- 1864, 2010.
[19] K. Srivastava and A. Nedic, "Distributed asynchronous constrained stochastic optimization," IEEE J. Sel. Topics Signal
Process., vol. 5, no. 4, pp. 772 -- 790, Aug. 2011.
[20] U. A. Khan and A. Jadbabaie, "Networked estimation under information constraints," Arxiv preprint arXiv:1111.4580,
Nov. 2011.
August 21, 2018
DRAFT
35
[21] J. Chen and A. H. Sayed, "Diffusion adaptation strategies for distributed optimization and learning over networks," IEEE
Trans. Signal Process., vol. 60, no. 8, pp. 4289 -- 4305, Aug. 2012.
[22] C. G. Lopes and A. H. Sayed, "Diffusion least-mean squares over adaptive networks: Formulation and performance
analysis," IEEE Trans. Signal Process., vol. 56, no. 7, pp. 3122 -- 3136, July 2008.
[23] F. S. Cattivelli and A. H. Sayed, "Diffusion LMS strategies for distributed estimation," IEEE Trans. Signal Process., vol.
58, no. 3, pp. 1035 -- 1048, March 2010.
[24] S. S. Ram, A. Nedic, and V. V. Veeravalli,
"Distributed stochastic subgradient projection algorithms for convex
optimization," J. Optim. Theory Appl., vol. 147, no. 3, pp. 516 -- 545, 2010.
[25] S.-Y. Tu and A. H. Sayed, "Mobile adaptive networks," IEEE J. Sel. Topics. Signal Process., vol. 5, no. 4, pp. 649 -- 664,
Aug. 2011.
[26] P. Di Lorenzo and S. Barbarossa, "A bio-inspired swarming algorithm for decentralized access in cognitive radio," IEEE
Trans. Signal Process., vol. 59, no. 12, pp. 6160 -- 6174, Dec. 2011.
[27] S. Chouvardas, K. Slavakis, and S. Theodoridis, "Adaptive robust distributed learning in diffusion sensor networks," IEEE
Trans. Signal Process., vol. 59, no. 10, pp. 4692 -- 4707, Oct. 2011.
[28] S. Theodoridis, K. Slavakis, and I. Yamada, "Adaptive learning in a world of projections," IEEE Signal Process. Mag.,
vol. 28, no. 1, pp. 97 -- 123, Jan. 2011.
[29] E. Kreyszig, Introductory Functional Analysis with Applications, Wiley, NY, 1989.
[30] N. Takahashi and I. Yamada,
"Link probability control for probabilistic diffusion least-mean squares over resource-
constrained networks," in IEEE ICASSP, Dallas, TX, Mar. 2010, pp. 3518 -- 3521.
[31] A. H. Sayed, Adaptive Filters, Wiley, NJ, 2008.
[32] H. Markowitz, "Portfolio selection," The Journal of Finance, vol. 7, no. 1, pp. 77 -- 91, 1952.
[33] M. Rubinstein, "Markowitz's "Portfolio Selection": A Fifty-Year Retrospective," The Journal of Finance, vol. 57, no. 3,
pp. 1041 -- 1045, Jun. 2002.
[34] A. D. Fitt, "Markowitz portfolio theory for soccer spread betting," IMA Journal of Management Mathematics, vol. 20, no.
2, pp. 167 -- 184, Apr. 2009.
[35] E. J. Elton, M. J. Gruber, and C. R. Blake, "Applications of Markowitz portfolio theory to pension fund design," in
Handbook of Portfolio Construction, J. B. Guerard, Ed., pp. 419 -- 438. Springer, US, 2010.
[36] A. J. Laub, Matrix Analysis for Scientists and Engineers, SIAM, PA, 2005.
[37] R. A. Horn and C. R. Johnson, Matrix Analysis, Cambridge University Press, 1990.
August 21, 2018
DRAFT
|
1902.06996 | 1 | 1902 | 2019-02-19T11:13:38 | Agent Madoff: A Heuristic-Based Negotiation Agent For The Diplomacy Strategy Game | [
"cs.MA"
] | In this paper, we present the strategy of Agent Madoff, which is a heuristic-based negotiation agent that won 2nd place at the Automated Negotiating Agents Competition (ANAC 2017). Agent Madoff is implemented to play the game Diplomacy, which is a strategic board game that mimics the situation during World War I. Each player represents a major European power which has to negotiate with other forces and win possession of a majority supply centers on the map. We propose a design architecture which consists of 3 components: heuristic module, acceptance strategy and bidding strategy. The heuristic module, responsible for evaluating which regions on the graph are more worthy, considers the type of region and the number of supply centers adjacent to the region and return a utility value for each region on the map. The acceptance strategy is done on a case-by-case basis according to the type of the order by calculating the acceptance probability using a composite function. The bidding strategy adopts a defensive approach aimed to neutralize attacks and resolve conflict moves with other players to minimize our loss on supply centers. | cs.MA | cs | Agent Madoff: A Heuristic-Based Negotiation Agent For The
Diplomacy Strategy Game
School of Computer Science and Engineering, Nanyang Technological University, Singapore
[email protected]
Tan Hao Hao
Abstract -- In this paper, we present the strategy of Agent
Madoff, which is a heuristic-based negotiation agent
competing in the upcoming Automated Negotiating
Agents Competition (ANAC 2017). Agent Madoff is
implemented to play the game Diplomacy, which is a
strategic board game that mimics the situation during
World War I. Each player represents a major European
power which has to negotiate with other forces and win
possession of a majority supply centers on the map. We
propose a design architecture which consists of 3
components: heuristic module, acceptance strategy and
bidding strategy. The heuristic module, responsible for
evaluating which regions on the graph are more worthy,
considers the type of region and the number of supply
centers adjacent to the region and return a utility value
for each region on the map. The acceptance strategy is
done on a case-by-case basis according to the type of the
order by calculating the acceptance probability using a
composite function. The bidding strategy adopts a
defensive approach aimed to neutralize attacks and
resolve conflict moves with other players to minimize
our loss on supply centers.
Keywords -- Automated Negotiation, Multi-Issue
Negotiation, Multi-Agent System, Diplomacy
1 INTRODUCTION
Negotiation is described as a process of reaching an
agreement between two or more individuals. Technically,
we could also treat negotiation as a distributed search
through a space of possible agreements. This serves as
the fundamental perspective adopted by automated
negotiation, which agents devise algorithms to search for
Pareto optimal deals within a given negotiation
agreement space. Automated negotiation has been a
growing area of research in the recent years with an
increasing number of applications in domains such as e-
commerce, board games and even human-agent
negotiation.
The Automated Negotiation Agents Competition
(ANAC) is one of the competitions which fuels research
interest in developing practical, state-of-the-art agents
that can negotiate under various circumstances. As it
evolves towards a more practical approach, the latest
ANAC 2017 introduces a new negotiation league named
as "Negotiation Strategies for the Diplomacy Strategy
Game", which requires the participating agents to be able
to negotiate over a large agreement space. Under this
league, the Diplomacy game almost simulates how
human individuals interact during a negotiation process.
Hence, this is a much more surreal condition which is
closer to the human negotiation environment, and with
no doubt the complexity should increase significantly.
This paper first gives an introduction of the above stated
league by specifying how the Diplomacy game is played,
and how negotiation is done in Diplomacy under the
BANDANA framework. Then, it would focus on
describing the negotiation strategy used by Agent
Madoff, an agent implemented in accordance with the
regulations proposed in the above stated league. In
addition,
the agent's
evaluation are provided, and further improvements that
could be done on the agent are highlighted.
the experimental results of
2 MAIN CONTENT
2.1 RULES OF ANAC 2017
The
upcoming Automated Negotiating Agents
Competition (ANAC 2017) has implemented some
drastic changes on its rules and regulations compared to
the past few years [1]. The league that we are focusing
on in this paper is called "Negotiation Strategies for the
Diplomacy Strategy Game", which requires participants
to implement a negotiation algorithm on top of a ready-
made strategic module, combining both modules to form
an agent that can play the classical Diplomacy board
game.
Unlike the GENIUS framework used by previous years
of ANAC, the main differences between Diplomacy
Game League are as follow:
There is no explicit formula to determine an
agent's utility function. No graph could be
plotted out explicitly like scenarios in the
GENIUS framework as before.The assumptions
which were made in the study
Only heuristic approach can be used to
estimate the value of a deal proposed and the
value of the agent's current utility.
BANDANA framework does not allow the
agents to learn opponent's strategy by now,
unlike last year's GENIUS framework
Hence, a totally different paradigm is needed to deal with
the BANDANA framework, however common ground
between these two frameworks should also be found so
that research progress in the GENIUS framework can be
further adopted into agents developed in the BANDANA
framework.
2.2 THE DIPLOMACY GAME
Diplomacy is a strategy game published by Avalon Hill
[2] designed for 7 players. Each player represents one of
the 7 "Great Powers in Europe" in the years prior to
World War I, namely England, France, Germany, Italy,
Austria, Turkey and Russia. Each player has a number of
armies and fleets positioned on the map of Europe, and
the goal is to conquer half of the "Supply Centers" across
Europe, (in normal cases, more than 18 supply centers).
Other than conquering more than 18 supply centers to
win the game (in this case called a "solo victory"),
players can also choose to propose draw with other
players existing on board to "share" the victory.
Figure 1 below shows a classical map initial setting of
the Diplomacy game. The black dots on some of the
provinces represents that the province is a supply center.
A "hold" order (implemented as HLDOrder
class) -- where the unit tries to stay where it is
by now
A "support move" order (implemented as
SUPMTOOrder) -- where the unit does not
move, but gives extra strength to another unit
that is moving towards the province adjacent
to the current unit
A "support hold" order (implemented as
SUPOrder) -- where the unit does not move,
but gives extra strength to another unit to hold
its position on the province adjacent to the
current unit
If 2 or more units are to move into the same province, the
unit which gains more support from other units can
successfully move into the intended province. If both
units have the same strength, then both units will bounce
back to their original position and no one gets in.
However, if another unit is moving into the location of
the supporting unit, then the support order is "cut", and
hence unsuccessful.
2.2.2 SUMMER AND AUTUMN PHASES
For Summer and Autumn Phases, there may be some
units that are "kicked out" from their original provinces
as they are conquered by other units. These units are said
to be "dislodged". For such units, they should retreat to
another province which is adjacent to its current location
(this is also done by the "move to" order). If no such
province exists, then the unit must be disbanded, and the
player lost one unit.
Figure 1: Initial game setting for Diplomacy game
2.2.2 WINTER PHASES
At the start of the game, each powers are allocated with
3 units (except Russia is allocated with 4 units). The
game then iterates through 5 types of phases in the
following order, starting from year 1901:
Spring phase
Summer phase
Fall phase
Autumn phase
Winter phase
Hence the game will develop in the manner of "Spring
1901, Summer 1901, Fall 1901, Winter 1901, Spring
1902 …" and so on. In each round, all players should
submit different types of "orders" for all of their units,
depending on which phase they are in.
2.2.1 SPRING AND FALL PHASES
For Spring and Fall phases, each player must choose
among the following 3 orders to be submitted for each of
his unit:
A "move to" order (in BANDANA framework,
it is implemented as an MTOOrder class) --
where the unit tries to move from one province
to another adjacent province.
If a player successfully conquers a new supply center
throughout the year, then the player is the owner of the
supply center. If the player has more supply centers
than units, he can build new units (either army unit or
fleet unit) at this phase until the number of units equal
the number of conquered supply centers. However if the
player has more units than supply centers, then some of
the units would be disbanded. Players who lost all his
units will be eliminated from the game.
Note that army units can only move on inland
provinces, and fleet units can only move on sea
provinces. There are also coastal provinces which allow
to have 1 army unit and 1-2 fleet unit in the province at
the same time.
2.3 NEGOTIATION IN DIPLOMACY
It is extremely hard for one single player to win the
Diplomacy Game without gaining support from the other
players, hence negotiation plays a very important role in
this game to form alliances among players and agree on
certain commitments and promises in order to reach each
player's own objective.
Negotiation is done using the BAsic eNvironment for
Diplomacy playing Automated Negotiating Agents
(BANDANA) framework, which is a Java based
focus on implementing the tactical part of the agent
instead of researching on the negotiation part.
The most relevant literature would be a paper introducing
an automated negotiation agent, the Diplominator, where
in the paper some existing automated agents are
introduced, though a large number of them do not have
negotiating capabilities.
2.4.1 DUMBBOT
Although DumbBot is not a negotiating bot, it provides
reference on deriving heuristics for strategies and tactics.
It first assign values to each province which consider
factors such as the owner of the province, their strength,
the competitiveness of the province and the chances for
own units to move there. Then, it implements an
algorithm that "averages the board" so that the value of
a certain province will also be affected by its adjacent
province. The tactics developed by the bot will be based
on the values of the provinces.
Although DumbBot's heuristic is only used for tactical
purpose, it can still be referenced by negotiation
algorithms because negotiation deals can only be made
after determining a route plan on how to conquer the
supply centers on the board. To determine such route
plan, we may need a similar heuristic like DumbBot's.
2.4.2 DIPLOMAT
Diplomat uses an economic based view of Diplomacy,
which negotiation is used to exchange resources and the
results of the trades are focused. A simulated "meeting"
is also set up and powers that are involved in the deal
undergoes an "auction" to determine the winner that
makes the deal eventually. It also implements a part of
strategy on deceit, but it would not be applicable to our
bot.
Diplomat is said to perform worse than DumbBot,
despite its sophisticated design on the negotiation
algorithm. However, The Market Based approach and
the "auction" approach are still interesting and worth
looking into further in future.
2.4.3 THE ISRAELI DIPLOMAT
The Israeli Diplomat is a sophisticated Diplomacy player
which uses a multi-agent architecture designed based on
real life war-time government structures. The 'Prime
Minister' acts as the representative and opponents only
talk to him. If needed, the Prime Minister will pass the
suggested negotiation to another role to gain opinion
before replying to the opponent. With such architecture,
the task of negotiation could be split up to different
departments, each focusing on different criteria.
framework to allow negotiation capabilities in the
Diplomacy game [3]. Under this framework, the main
types of deals that would be proposed by players among
each other in Diplomacy are:
An order commitment: a proposal to a certain
power to impose a certain order on a certain
phase. For example: you may need France to
support your move from Vienna to Galacia on
Spring 1903.
In BANDANA, it is implemented by a tuple,
oc = (y, ᶲ, o)
where y is "year", ᶲ is either "Spring" or "Fall",
and o is the order object as specified before.
A demilitarized zone (DMZ): an agreement
among a number of powers to not occupy (or
move to) a province on a certain phase. For
example: France, Germany and Italy agreed on
not to occupy the supply centre in Belgium on
Spring 1903.
In BANDANA, it is implemented by a tuple,
dmz = (y, ᶲ, A, B)
where y is "year", ᶲ is either "Spring" or "Fall",
A is a list of powers, B is a list of provinces
intended to be demilitarized.
Hence, a BasicDeal object is implemented to contain a
list of order commitments and a list of demilitarized
zones, as below:
d = {List<oc>, List<dmz>}
which is to be sent by the agents in the end of each phase
to the corresponding powers involved in the deal to
accept or reject it.
In ANAC, we are required to only implement the
negotiation algorithm of the agent and not its tactical
module, as our algorithm will be built on top of another
tactical module (the DBrane tactical module) to play the
game. Moreover, the same tactical module will be used
by other negotiation agents as well. Also in ANAC,
promises cannot be broken. This means that if France
previously agreed to move from Belgium to Holland, it
cannot make another deal to move from Belgium to
Picardy. The DBrane tactical module will always obey
the deals made, which means the unit in Belgium will
indeed move to Holland finally.
As reneging on the deals isn't allowed to be made in this
framework, it greatly affects the strategy of the agent
since now all agents must obey the deals made. This
means that there is no chance for an agent to "cheat" on
another agent to gain benefit from it.
2.4 LITERATURE REVIEW
As the BANDANA framework is still in its early stage,
there are limited existing literatures that fully described
a negotiation model which suits the scenario of the
Diplomacy game stated above, as a large number of them
maximizing the number of supply centers on every phase
may not be an optimal strategy.
2.5 AGENT STRATEGY
We have designed Agent Madoff, which is a negotiating
agent to participate in the upcoming Diplomacy League
in ANAC 2017.
The design architecture of Agent Madoff mainly consists
of 3 components: heuristic module, acceptance strategy
and bidding strategy. The pseudo code of the negotiate()
method
below:
of Agent Madoff
is
as
Figure 2: Israeli Diplomat's multi-agent architecture
while(has message){
while (deadline is not reached){
This multi-agent architecture is claimed to be very
successful in the past, and it is truly interesting to be
looked into further.
2.4.4 DIPLOMINATOR
Diplominator uses a banking protocol as its negotiation
strategy, modelling the same idea of how banks decide
whether or not to lend money to individuals. The key
components of the strategy includes:
Utility of Cooperation - As a currency is needed in
banking protocols, it simply uses DumbBot's heuristic
to calculate the destination values of all provinces, and
uses it as the currency to measure the values of moves
requested by other bots, in order to deduce our utility of
cooperating with them.
should estimate whether the opponent is trustworthy for
negotiation or not. A simple way to implement this is to
count the percentage of times the opponent has assisted
us. Another way will be to calculate the enemy factor,
which is defined by
Creditworthiness of Opposition Players -- A bot
𝑒𝑛𝑒𝑚𝑦 𝑓𝑎𝑐𝑡𝑜𝑟 =
#𝑡𝑟𝑢𝑒 𝑎𝑡𝑡𝑎𝑐𝑘𝑠
#𝑐ℎ𝑎𝑛𝑐𝑒𝑠 𝑡𝑜 𝑎𝑡𝑡𝑎𝑐𝑘
When chances = 0, enemy factor equals the number of
true attacks by the player.
Credit Limit - We should stop assisting opponents
at some point until they pay us back, in case we are being
too kind to be exploited by opponents in the end.
2.4.5 ANACEXAMPLENEGOTIATOR
ANACExampleNegotiator is a random negotiator. It first
checks whether there are incoming messages in the
message queue, and check what type of message it is. If
there are proposed deals coming in, it accepts the deal on
a 50% probability. After handling all messages, it picks
among 10 randomly generated orders that yields the
higher number of supply centers if obeyed by others.
This bot shows a simple two-layered architecture which
focus on the acceptance strategy and the bidding
strategy, where two strategies may be loosely coupled.
However, the framework manual did remind that
handle incoming message;
if (near to deadline) break;
}
bidding strategy;
}
Update hostility and strength;
The algorithm enters a while loop which terminates when
the deadline is reached. Within the loop, we first handle
incoming messages if there are any, and apply the
acceptance strategy here. We break the loop if it is near
to deadline to prevent opponents from flooding us with
incoming messages. Next, we execute our bidding
strategy to propose deals to other powers. Before the turn
ends, we update the hostility and strength of our
opponents to keep track of the game's situation.
In the following discussion, we will further describe our
strategy according to the 3 components specified in the
design architecture.
2.5.1 HEURISTIC MODULE
The heuristic module aids the agent's decision making
by evaluating which provinces/regions on the graph are
more worthy, and hence have a higher utility for the
agent to either move into it or to protect it from
opponent's invasion.
Figure 3: Map representation around Austria (the red
region)
Take an example of Austria, certainly supply centers
(with a black dot) such as Vienna, Budapest and Trieste
have a higher utility for the power itself. However,
although provinces like Bohemia, Galacia and Tyrolia
are not SCs, they are crucial for Austria because they are
adjacent to other SCs which Austria may want to
conquer. Hence, the number of adjacent SCs should also
be a factor of determining the actual utility of a certain
province.
With the idea of adjacent provinces giving influence to
its neighbors to result in the final utility value, we
propose a heuristic calculation as below:
1.
Initialize the utility value for each region: 1 for
non-supply centers and 10 for supply centers.
2. Then, we add a value of the sum of utility values
of adjacent regions, multiplied by a discount
factor of 0.3 to the utility value of each region.
3. We divide the utility value by the maximum
utility value among all regions to normalize the
value between [0, 1]. This is because in the
future calculation of acceptance probability it
needs to yield a result between [0, 1], hence all
parameters need to be normalized.
An example will be like Figure 3 as below:
Figure 4: An example of showing the utility calculation
In Figure 4, assume that the regions in red are supply
centers. Since B itself is a supply center, it has an initial
utility of 10. The sum of the utility value of its adjacent
regions are 1+10+1 = 12. Hence the final utility value of
B is 10 + 0.3 x 12 = 13.6. Assume that utility value of A
= 3, C = 4, D = 15, then the normalized utility value of B
is
13.6
15
= 0.9067.
between [0, 1], and we called it as the acceptance
probability for that particular order.
There are 2 types of parameters that will be frequently
used in the evaluations below:
(1) Hostility
It shows the measure of friendliness of a particular power
towards you (e.g. have they attacked you, have they
support you before, etc.).
Throughout the game, a hostility list is maintained. For
each power, the hostility value is initially set to 0. If a
power supports us, its hostility value increase by 5. If a
power attacks us (steal our provinces), its hostility value
is decreased by 10. The hostility value, h is normalized
linearly:
𝐼𝑓 ℎ < 0, ℎ𝑛𝑜𝑟𝑚𝑎𝑙𝑖𝑠𝑒𝑑 = 0.5 (
)
ℎ − hmin
−ℎmin
ℎ
ℎmax
𝐼𝑓 ℎ ≥ 0, ℎ𝑛𝑜𝑟𝑚𝑎𝑙𝑖𝑠𝑒𝑑 = 0.5 (
) + 0.5
Where ℎmin and ℎmax denotes the minimum and
maximum hostility among the list.
(2) Strength
It means how strong the particular power is, as we argue
that we should team up with the weaker teams to fight
the stronger teams so that they will be a balance of power
among all players.
The strength of a team is determined by the number of
SCs that they have currently conquered. In the beginning
each team is given 3 SCs, and with 18 SCs one can
declare a solo victory. Hence we need a mapping
function to map values from [3, 18] to [0, 1] to represent
its strength. In this case, the mapping function used is
𝑠𝑡𝑟𝑒𝑛𝑔𝑡ℎ𝑛𝑜𝑟𝑚𝑎𝑙𝑖𝑠𝑒𝑑 = 0.5 sin (
𝜋(#𝑆𝐶𝑠 − 9)
18
) + 0.5
Support move order
For our agent, all regions would have a fixed utility value
throughout the game. Hence, it could be pre-computed
once the agent is initialized.
2.5.2 ACCEPTANCE STRATEGY
The acceptance strategy is done on a case-by-case basis
according to the type of the order. For each type of order,
we determine several parameters which are essential to
the acceptance of the order. A composite function that
takes in the parameters is derived to calculate a value
Figure 5: Support move order
We establish 5 parameters: Supportee's hostility,
supportee's strength, unit's neediness, target's hostility,
target's strength. All parameters have a value between [0,
1].
Unit's neediness, in this case, means how much is the
army needed for my team. The higher the unit's
neediness, the more reluctant the unit is to support other
unit's move. With this, we need to know the original plan
of the army which is available in the strategic module of
the BANDANA framework:
If the army is planned to move to some other
places, the unit's neediness depends on the
utility value of the intended region
If the army is planned to support my own team,
unit's neediness = 1
If the army is planned to support other teams, its
neediness is higher if the supporting team is
more friendly towards us
Figure 7: Move-to order
If the army is planned to just hold, unit's
neediness = 0.5
We establish 3 parameters: target's hostility, and whether
the new order is better (called newIsBetter below).
With these 5 parameters, the acceptance probability is
then equal to:
𝑎𝑐𝑐𝑒𝑝𝑡𝑎𝑛𝑐𝑒 𝑝𝑟𝑜𝑏𝑎𝑏𝑖𝑙𝑖𝑡𝑦
newIsBetter is to determine whether moving to the
proposed target is better than its original plan. With this,
we check the original plan of the army.
= 0.2 × ℎ𝑜𝑠𝑡𝑖𝑙𝑖𝑡𝑦𝑠𝑢𝑝𝑝𝑜𝑟𝑡𝑒𝑒 + 0.1
× (1 − 𝑠𝑡𝑟𝑒𝑛𝑔𝑡ℎ𝑠𝑢𝑝𝑝𝑜𝑟𝑡𝑒𝑒) + 0.5
× (1 − 𝑢𝑛𝑖𝑡𝑁𝑒𝑒𝑑𝑖𝑛𝑒𝑠𝑠) + 0.1
× 𝑠𝑡𝑟𝑒𝑛𝑔𝑡ℎ𝑡𝑎𝑟𝑔𝑒𝑡 + 0.1
× ℎ𝑜𝑠𝑡𝑖𝑙𝑖𝑡𝑦𝑡𝑎𝑟𝑔𝑒𝑡
If no unit resides in the target region, then target's
hostility and strength equals to 0, in this case:
𝑎𝑐𝑐𝑒𝑝𝑡𝑎𝑛𝑐𝑒 𝑝𝑟𝑜𝑏𝑎𝑏𝑖𝑙𝑖𝑡𝑦
= 0.3 × ℎ𝑜𝑠𝑡𝑖𝑙𝑖𝑡𝑦𝑠𝑢𝑝𝑝𝑜𝑟𝑡𝑒𝑒 + 0.2
× (1 − 𝑠𝑡𝑟𝑒𝑛𝑔𝑡ℎ𝑠𝑢𝑝𝑝𝑜𝑟𝑡𝑒𝑒) + 0.5
× (1 − 𝑢𝑛𝑖𝑡𝑁𝑒𝑒𝑑𝑖𝑛𝑒𝑠𝑠)
Support hold order
We initialized newIsBetter = 0.2.
If the army is to hold, and the target to move in
has a higher utility value, then newIsBetter =
0.8; or else newIsBetter remains as 0.2.
If the army is planning to move to the other
destination, we compare the utility of the
original destination to the target region. If the
target has a higher utility, newIsBetter = 0.8; or
else newIsBetter remains as 0.2.
Hence,
the acceptance probability
is as below:
𝑎𝑐𝑐𝑒𝑝𝑡𝑎𝑛𝑐𝑒 𝑝𝑟𝑜𝑏𝑎𝑏𝑖𝑙𝑖𝑡𝑦
= 0.3 × ℎ𝑜𝑠𝑡𝑖𝑙𝑖𝑡𝑦𝑡𝑎𝑟𝑔𝑒𝑡 + 0.7
× 𝑛𝑒𝑤𝐼𝑠𝐵𝑒𝑡𝑡𝑒𝑟
If no unit resides in the target region, then target's
hostility equals to 0, in this case the acceptance
probability simply equals to newIsBetter.
Hold order
Figure 6: Support hold order
Support hold order works in a similar way with support
move-to order without target node, only that the
supportee is to hold. Hence,
𝑎𝑐𝑐𝑒𝑝𝑡𝑎𝑛𝑐𝑒 𝑝𝑟𝑜𝑏𝑎𝑏𝑖𝑙𝑖𝑡𝑦
= 0.3 × ℎ𝑜𝑠𝑡𝑖𝑙𝑖𝑡𝑦𝑠𝑢𝑝𝑝𝑜𝑟𝑡𝑒𝑒 + 0.2
× (1 − 𝑠𝑡𝑟𝑒𝑛𝑔𝑡ℎ𝑠𝑢𝑝𝑝𝑜𝑟𝑡𝑒𝑒) + 0.5
× (1 − 𝑢𝑛𝑖𝑡𝑁𝑒𝑒𝑑𝑖𝑛𝑒𝑠𝑠)
Move-to order
Figure 8: Hold order
We first check the unit's original plan.
If its plan is to hold, simply accept the proposal.
If its plan is to move to another region, check
the utility of the intended region. If the province
has a utility greater than 0.7, reject the proposal.
Or else, return a default probability of 0.4. This
shows a slight reluctance to accept a hold order
for our agent.
If its plan is to support other units, it is highly
improbable to accept a hold order. Hence we
return a probability of 0.1.
DMZ order (demilitarized zone order)
DMZ proposal is made between several powers such that
all the powers agree not to invade the specified
provinces.
We establish 2 parameters needed: utility of the region,
and the competitiveness of the DMZ proposal.
The higher the utility of the region, the more reluctant we
would demilitarize it since it is important to us.
Competitiveness is measured by counting the number of
powers involved in the DMZ. It is smoothen by a
logarithm function to map the value between [0, 1]. We
argue that the more number of powers involved, the
harder it is for you to fight for the region if you do not
accept the DMZ, hence the more competitive it is the
more probable we should demilitarize the region.
For DMZs, we check the original plan of each units and
see which provinces we intend to move to.
If the DMZ zone is not within our intended
provinces, simply accept it as it cause no harm
to us
Else, we compute the acceptance probability for
the DMZ proposal as below:
𝑎𝑐𝑐𝑒𝑝𝑡𝑎𝑛𝑐𝑒 𝑝𝑟𝑜𝑏𝑎𝑏𝑖𝑙𝑖𝑡𝑦
= 0.6 × 𝑐𝑜𝑚𝑝𝑒𝑡𝑖𝑡𝑖𝑣𝑒𝑛𝑒𝑠𝑠
+ 0.4 × (1
− 𝑢𝑡𝑖𝑙𝑖𝑡𝑦𝑂𝑓𝑅𝑒𝑔𝑖𝑜𝑛)
COMPOSITE ORDER PROPOSAL
Proposals usually contain more than 1 type of order. For
example, A could send a proposal to B such that A
request B to support his move, and A will DMZ one of
the regions in conflict with B as a return of favor. In this
case, this proposal contains a support order and a DMZ
order.
For our agent, after calculating
the acceptance
probability of each order, we calculate the mean
probability of all orders and treat it as the acceptance
probability of the composite order proposal. Denote
mean probability as x:
If x > 0.8, accept the deal;
If x < 0.4; reject the deal;
If 0.4 ≤ x ≤ 0.8, we flip a coin so that the deal
is accepted with a probability of x.
In addition, our agent only takes in account the proposals
regarding the current phase only. For proposals regarding
the future phases, we would return an acceptance
probability of 0, as we argue that there is no reason for
us to bind to a "virtual" agreement made for the
unpredictable future.
2.5.4 BIDDING STRATEGY
Agent Madoff does not speculate moves further than the
current phase. Hence, each proposal of the agent is done
only according to the current phase and game setting.
This is because binding to deals which happen in the
future may be invalid and hence unnecessary.
The bidding strategy that our agent adopted is a
defensive, de-conflict strategy. It consists of 2 stages:
neutralize the attack regions, and resolve the conflict
regions.
Order Calculator
We first discuss about the "order calculator" which is
used within the bidding strategy. By assuming that for
each type of order, the opponent considers same
parameters as our agent, we could use our acceptance
strategy module to mimic an order calculator which
calculates the acceptance probability of a power for a
given order in its own perspective. With this, we could
propose orders with higher acceptance probability to
achieve a higher chance of agreement.
Neutralizing attack regions
The strategic module within BANDANA is able to return
the opponent's move given its power and the current
game state, before negotiation is made. Hence for each
power, we could speculate the pre-determined move of
each of its unit. If we find that the unit's move is to
invade our supply center, we should neutralize the attack
through negotiation.
The neutralization steps are as below:
We generate all possible orders for the attacking
unit, and calculate all acceptance probability of
the orders.
If there exists orders which has a higher
probability than the attacking order, we pick the
highest one and propose it to the opponent.
If no alternative orders are found, we request for
support from other powers, and propose a
"favor returning" deal (which will be discussed
later) to increase the chance of agreement.
If we have no units to move into / hold our
supply centers, we could only ask for a DMZ
with the attacking unit.
Resolving conflict regions
Since the strategic module is able to anticipate the
opponents move given the opponent's power and the
current game state, we could then see if our agent's
moves are in conflict with other agent's move before
negotiation takes place.
A "conflict" means that there are more than 1 opponent
that want to move to a region that you intend to move
into. If there is, then negotiation proposals are needed to
resolve the conflict.
By supporting it to hold: some units may want
to hold their position to prevent invasion into
their regions by other powers. If we have a unit
which is adjacent to the supporter's unit, we
could support them to hold.
Figure 9: Conflict move
The resolving steps are as below:
Figure 11: Return the favor by support hold order
For each power, we check if we have any in-
conflict moves with them.
We generate all possible orders for
the
opponent's conflicting unit, and calculate all
acceptance probability of the orders.
If there exists orders which has a higher
probability than the conflict order, we pick the
highest one and propose it to the opponent.
If no alternatives are found, we request for
support from other powers, and propose a
"favor returning" deal (which will be discussed
later) to increase the chance of agreement.
We keep a DMZ deal with the opponent's unit
for that region as a "reservation deal" which
will be proposed should the previous deals
failed to be accepted.
Return the favor
Normally within a proposal, we would add a "favor
returning" deal apart from a pure request of support so
that the proposal is more likely to be accepted. In this
case, we specify a "return credit", which is the number
of our units which could return the favor to the powers
which have supported us. This is to prevent most of our
units being used for returning the favor, which further
weakens our strength. We allow 1/3 of the total number
of units that we currently have to be our "return credit".
We propose 2 ways to return the favor to our supporters:
By supporting its move: we search for units
situated adjacent to the power's army's adjacent
neighbors, as shown in the top part of the
diagram above. If there is, and if the neighbor
(region A as in Figure 9) has a very high utility
for the power, we could propose to support the
power to move into A in return.
3 CONCLUSION
In this paper, we first introduce the new Diplomacy
league in ANAC and observe how negotiation is
implemented in the league using the BANDANA
framework. We give a review on existing Diplomacy
agents, which provide useful ideas for us to implement
an efficient agent. We present the design of Agent
Madoff, whose architecture comprises of 3 main
components: the heuristic module, acceptance strategy
and bidding strategy. Our agent is submitted to
participate in ANAC 2017 Diplomacy league, and the
results are forthcoming.
Future work will focus on improving each of the
modules: for the heuristic module, we could adopt a
dynamic model which changes according to the game
situation instead of the current static model; for the
acceptance strategy, the parameters could be adjusted to
further mimic the thought process of a human agent
making negotiation decisions.; for the bidding strategy,
it could be improved to search for tempting bids that are
more likely to be accepted by the opponents. Instead of
adopting a defensive strategy, we could also propose
deals to form attacks and arrange battle plans against our
opponents, acting as a real diplomat during war.
ACKNOWLEDGEMENT
I would like to thank my supervisor, Prof Bo An for
providing detailed guidance and support for this project.
His experienced thoughts in the field of automated
negotiation has spurred exciting discussions between us.
Moreover throughout the year, he has showed me by
himself all the essential qualities of being a dedicated and
successful researcher.
REFERENCES
[1] R. Aydogan, "Eighth International Automated
Negotiation Agents Competition", May 2016;
http://web.tuat.ac.jp/~katfuji/ANAC2017/
[2] Avalon Hills, "The Rules of Diplomacy", 2008;
https://www.wizards.com/avalonhill/rules/diploma
cy_rulebook.pdf
[3] D. D. Jonge, "The BANDANA Framework v1.3"
2016;
December
Figure 10: Return the favor by support move-to order
http://www.iiia.csic.es/~davedejonge/bandana/file
s/Bandana%201.3%20Manual.pdf.
[4] A. Webb, J. Chin and T. Wilkins, J. Payce,
"Automated Negotiation
In The Game Of
Diplomacy", Technical report, Imperial College
London, 2008.
[5] D. D. Jonge, "Negotiations over Large Agreement
Spaces", PhD thesis, Universitat Autonoma de
Barcelona, 2015.
[6] T. Baarslag, K. Hindriks, C. Jonker, S. Kraus, R.
Lin, "The First Automated Negotiating Agents
Competition (ANAC 2010)", New Trends in Agent-
Based Complex Automated Negotiations, SCI, vol.
383, pp. 113-135, Springer, Heidelberg (2010)
|
1909.04615 | 1 | 1909 | 2019-09-10T16:45:16 | On Re-Balancing Self-Interested Agents in Ride-Sourcing Transportation Networks | [
"cs.MA",
"math.OC"
] | This paper focuses on the problem of controlling self-interested drivers in ride-sourcing applications. Each driver has the objective of maximizing its profit, while the ride-sourcing company focuses on customer experience by seeking to minimizing the expected wait time for pick-up. These objectives are not usually aligned, and the company has no direct control on the waiting locations of the drivers. In this paper, we provide two indirect control methods to optimize the set of waiting locations of the drivers, thereby minimizing the expected wait time of the customers: 1) sharing the location of all drivers with a subset of drivers, and 2) paying the drivers to relocate. We show that finding the optimal control for each method is NP-hard and we provide algorithms to find near-optimal control in each case. We evaluate the performance of the proposed control methods on real-world data and show that we can achieve between 20% to 80% improvement in the expected response. | cs.MA | cs | On Re-Balancing Self-Interested Agents in Ride-Sourcing Transportation Networks
Armin Sadeghi
Stephen L. Smith
9
1
0
2
p
e
S
0
1
]
A
M
.
s
c
[
1
v
5
1
6
4
0
.
9
0
9
1
:
v
i
X
r
a
Abstract -- This paper focuses on the problem of controlling
self-interested drivers in ride-sourcing applications. Each driver
has the objective of maximizing its profit, while the ride-
sourcing company focuses on customer experience by seeking to
minimizing the expected wait time for pick-up. These objectives
are not usually aligned, and the company has no direct control
on the waiting locations of the drivers. In this paper, we provide
two indirect control methods to optimize the set of waiting
locations of the drivers, thereby minimizing the expected wait
time of the customers: 1) sharing the location of all drivers with
a subset of drivers, and 2) paying the drivers to relocate. We
show that finding the optimal control for each method is NP-
hard and we provide algorithms to find near-optimal control in
each case. We evaluate the performance of the proposed control
methods on real-world data and show that we can achieve
between 20% to 80% improvement in the expected response.
I. INTRODUCTION
In recent years, ride-sourcing services such as UberX and
Lyft have emerged as an alternative mode of urban trans-
portation. The reduced wait times for pickup of these services
is the compelling feature compared to the conventional taxi
services [1]. A key factor that affects the response time of the
service is where the drivers wait to respond to the next ride
request. Ride-sourcing companies do not have control over
the position of the drivers as they are self-interested units
maximizing their objectives. Therefore, a challenge is to
ensure the drivers are distributed throughout the city in order
to minimize the expected wait time of the customers. This
must be done either by providing information to drivers, or
through incentives (payment) that make relocation attractive.
As a method for both re-balancing and increasing the
supply of drivers, Uber introduced surge pricing in high
demand areas. This reduces the expected response time of
servicing the requests by drawing more drivers to those areas.
However, the surge pricing can draw drivers away from lower
demand areas, resulting in higher wait times in those areas
and more imbalance [2], [3].
The problem of servicing requests in ride-sourcing net-
works can be divided into two major problems: 1) assignment
of the ride request to the drivers; and 2) re-balancing of the
drivers for future ride requests. In this paper, we focus on
the re-balancing problem for a subset of drivers to service
ride requests that arrive sequentially in an environment. The
drivers' motion in the environment is captured as a road-
map (i.e., graph), and each ride request arrives at a node of
the graph according to a known arrival rate (see Figure 1).
The drivers are self-interested units maximizing the expected
profit of their workday. Hence, the ride-sourcing company
This research is partially supported by the Natural Sciences and Engi-
neering Research Council of Canada (NSERC).
The authors are with the Department of Electrical and Computer
Engineering, University of Waterloo, Waterloo ON, N2L 3G1 Canada
([email protected]; [email protected])
Fig. 1: A set of drivers in the ride-sourcing system and a set of
locations with high probability of ride request arrival.
has no direct control over the waiting locations of the drivers.
The objective of the ride-sourcing company is to incentivize
the drivers to relocate to a set of waiting locations that
minimizes the expected wait-time of the customers.
Related Work: The problem of dispatching taxis to service
ride requests arriving sequentially over time has been the
subject of extensive research [4], [5], [6], [7]. These studies
focus on policies to optimally assign the ride requests to
the taxis. In contrast, we focus on the waiting locations
of the drivers that minimize the expected wait time of the
customers. We assume the ride requests are assigned in a
first-come-first-serve fashion to the closest available driver.
Assigning the closest available driver to each request
is
the common method employed by the ride-sourcing com-
panies [8].
The problem of re-balancing service units in the environ-
ment has been studied for various applications. In mobility-
on-demand problem (MOD) [9], [10], [11], a group of
vehicles are located at a set of stations. The customers arrive
at the stations, hire the vehicles for ride, and then drop
the vehicles off at their destination stations. The objective
is to balance the vehicles at the stations to minimize the
expected wait time of the customer. In comparison to MOD,
we consider the customer wait-time as the time between
the request arrival and the pick-up time, which incorporates
the distance of the closest available vehicle to the pick-up
location.
The facility location problem [12], [13] and its extension
to the mobile facility location problem (MFL) [14] is the
problem of distributing facilities in a set of locations to
respond to the demands arriving at different locations. The
objective is to minimize the time to respond to the demands
and the total cost of opening facilities. A special case of
the facility location problem is the k-median problem [13]
where the number of open facilities is limited and the
cost of opening a facility is zero. In [15], we addressed
a multi-stage MFL problem where we relocate a set of
autonomous vehicles to minimize expected response time for
future requests in a receding horizon manner.
In the aforementioned studies, the actions of service units
are controlled by a central unit and the objective of the
service units is aligned with the global objective. However,
we consider self-interested units maximizing their own profit
such that the ride-sourcing companies have no direct control
on their decisions. A closely related problem is that of
Voronoi games on graphs [16] where requests arrive on the
vertices of a graph and the objective of each self-interested
service unit is to maximize the number vertices assigned
to them. They cast the problem as a game between the
service units prove that the problem of finding the pure
Nash equilibrium on general graphs is NP-hard. In [17], the
authors provide the best response strategy for each driver and
they approximate Nash equilibria, which can be utilized by
the ride-sourcing companies to incentivize the drivers in a
way to maximizes a global objective. These studies focus on
the strategies of the self-interested service units, in contrast,
we focus on finding the optimal policy for the ride-sourcing
company to optimally respond to the ride requests.
Contributions: The contributions of this paper are three-
fold. First, we formulate the re-balancing problem of self-
interested service units. Second, we propose two indirect
method to relocate the service units to minimize the expected
response time and provide algorithms with near-optimal
solutions. Third and finally, we evaluate the performance
of the two proposed control methods on real-world ride-
sourcing data.
The paper is organized as follows. In Section II, we for-
mulate the problem of minimizing customer wait-time with
self-interested service units. In Section III, we provide the
first indirect control method based on sharing the information
on the location of the drivers. Section IV.I consists of the
second control method based on incentive pay for the drivers
to relocate to desired waiting locations. Finally in Section V,
we provide an extensive set of experiments, on real-world
ride-sourcing data, characterizing the performance of the two
control methods.
II. PROBLEM FORMULATION
Consider a set of m drivers and a set of pick-up and drop-
off locations V . Let G = (V, E, c) be a metric graph on
vertices V , let E be the set of edges between the locations
and c : E → R+ be the function assigning a travel time to
each edge of the graph. The drivers wait on a subset of the
vertices for the next request, which we call the configuration
of the drivers Q. The set of all configurations of the drivers
is denoted by Q. Each driver i is aware of the position of a
We assume that
subset of the drivers Ii ⊆ Q, for instance, each driver may
be aware of the location of the other drivers in its vicinity.
the requests arrive at each vertex u
according to an independent Poisson process with arrival
rate λu. Upon a request arrival, the closest driver to the
vertex of the request
is assigned to service the request.
Let pa(u) denote the arrival probability, which is the ratio
of number of requests arriving at u to the total number
of requests arriving in a period of time. Let the drop-off
probability pd(dropoff = wpickup = v) be the probability
that a request with pickup location at vertex v has a drop-off
location at vertex w.
Driver i's perception of her expected profit is a function
of her information Ii on the location of other drivers,
environment parameters such as arrival times, her waiting
location qi and the period of working time Bi, denoted by
Vi(u, Bi). For the development of our main control methods
we do not assume any specific form of this function. We do
assume, however, that the ride-sourcing company has access
to this function, obtained through data of driver behavior.
In Section V we present one potential model of Vi(u, Bi),
which is then used for simulating the two control methods.
Drivers' objective: Each driver is a self-interested unit,
therefore, they will wait at a location that maximizes their
expected profit, i.e.,
−σc(qi, u) + Vi(u, Bi − c(qi, u)),
(1)
arg max
u∈V
where σ is the cost per minute of driving.
Global objective: In addition to the objective of each
driver, there is a global objective for the service providers
such as Uber and Lyft to maximize the service quality by
minimizing the expected wait time of the customers until
pick-up, i.e.,
(cid:88)
u∈V
min
Q∈Q D(Q) =
min
qi∈Q
pa(u)c(qi, u),
(2)
The main challenge in optimizing the global objective
is that the drivers are self-interested units and the service
provider does not have any direct control on the configuration
of the vehicles. Therefore, the service provider is not able
to minimize the expected response time to the requests
directly. The two indirect control methods proposed in this
paper incentivize the drivers to relocate to desired waiting
locations. The first control method exploits the dependency
of the expected profit of the drivers on their information
Ii. The service provider can share more information on the
location of drivers with a subset of them to manipulate their
decision towards relocating to a desired waiting location. We
refer to this as the sharing information control method. The
second proposed control method, incentivizes the drivers to
relocate to desired waiting locations with payments, which
we refer to as the pay-to-control method. These control
methods are applicable to various models of driver behaviour
V.
In the following sections, we provide a detailed description
of the two control methods and propose algorithms to find
near optimal controls.
(a) Equal information sharing
(b) Partial information sharing
Fig. 2: Instance of ride-sourcing problem with two vehicles and two
request arrival locations.
III. CONTROL BY SHARING INFORMATION
that
In this section, we provide an indirect control on the
configuration of the drivers exploiting the fact
the
optimal waiting location for each driver in Equation (1) is a
function of the information provided to the driver regarding
the position of the other drivers, i.e., Ii.
Figure 2 demonstrates the importance of information on an
instance of the ride-sourcing problem with two vehicles and
two request locations. The locations are within unit distance
apart and the arrival rate at locations v1 and v2 are 0.1
and 0.2, respectively. The vehicles are initially located at
v1 and will relocate to the best waiting location, namely
optimizing Equation (1). Figure 2a shows the two scenarios
where both vehicles are provided the same information, i.e.,
I1 = I2 = ∅ and I1 = I2 = Q. Note that the configuration
of the vehicles when they are provided the same information
is the worst possible configuration for the global objective.
However, illustrated in Figure 2b, providing the information
to a subset of the vehicles results in the optimal configuration
for the global objective.
Let q(cid:48)
The information sharing problem consists of deciding
the subset of drivers we share information with and the
information shared with each driver. However, for this work,
we consider the binary decision where either full information
or no information is provided.
i,Q (resp. q(cid:48)
i,∅) be the new waiting location selected
by driver i from Equation (1) with information Ii = Q (resp.
i,∅} be the set of candidate waiting
Ii = ∅). Let Fi = {q(cid:48)
i,Q, q(cid:48)
locations for driver i. If there exist i, j ∈ [m] such that q(cid:48)
=
q(cid:48)
, then we create a duplicate vertex u for q(cid:48)
such that
, v) = c(u, v) for all v ∈ V . The formal definition of
c(q(cid:48)
the problem of sharing information with drivers is given as
follows:
Problem III.1. Consider a metric graph G = (∪m
i=1Fi ∪
V, E, c). Find a new configuration Q(cid:48) by picking only one
Q(cid:48) ∩ Fi = 1 for
vertex from each Fi,
each i, while minimizing the global objective D(Q(cid:48)) =
i.e., such that
j,Ij
i,Ii
j,Ij
i,Ij
u∈V minqi∈Q(cid:48) pa(u)c(q, u).
Figure 3 shows an instance of the information sharing
problem. The green vertices are the waiting locations of the
drivers if they have no information on the position of the
other drivers, and the red vertices are the waiting locations
of the drivers if the information is provided to each driver by
(cid:80)
Fig. 3: An instance of Problem III.1. The green vertices represent
the desired waiting location of each driver if Ii = ∅, and the red
vertices represent the waiting location of the drivers if Ii = Q.
the service provider. Let Q(cid:48) be the solution to Problem III.1
in which if qi,Q ∈ Q(cid:48) then the driver i is provided complete
information of the position of the other drivers, and no
information is available for driver i if q(cid:48)
i,∅ ∈ Q(cid:48).
First, we analyze the complexity of Problem III.1, and then
we provide an LP-rounding algorithm to find the controls.
A. Proof of Hardness
We now prove the NP-hardness of Problem III.1 with a
reduction from CNF-SAT [18] as follows:
Consider an instance of CNF-SAT with n Boolean vari-
ables and m clauses. We will reduce this problem to Prob-
lem III.1.
(i) Let ∪m
i , vF
i=1Fi contain 2n vertices, partitioned into n
sets of size two. The set Fi contains two vertices,
i }, where vT
{vT
i will correspond to setting the ith
SAT variable to true (i.e., the positive literal) and vF
i
will correspond to setting it to false (i.e., the negative
literal).
V .
clause in the SAT formula.
(ii) We let V contain m vertices, one representing each
(iii) Let E contain an edge for each v ∈ ∪m
i=1Fi and w ∈
(iv) For each e = (v, w) ∈ E, we set its cost to 1 if the
literal v appears in the clause w, and 2 if the literal
does not. Note that the costs are metric.
(v) Let Pu = 1/m for each u ∈ V .
Now, we solve the instance of Problem III.1. If it returns
a subset of ∪m
i=1Fi with cost exactly 1, then for each clause
c ∈ V , there is literal in ∪m
i=1Fi with edge cost of 1 to c.
This implies that the literal chosen from each subset in the
partition of ∪m
i=1Fi gives a satisfying truth assignment for
the SAT instance. If the subset returned has a cost greater
than 1, then there exists a clause w ∈ V for which every
chosen literal has edge cost of 2. Thus, this clause is not
satisfied and no satisfying instance exists.
B. Linear-Program Rounding Algorithm
Given that Problem III.1 is NP-hard, we turn our focus
to suboptimal algorithms. In particular, we provide a simple
Linear Program (LP)-rounding algorithm for Problem III.1.
Although we do not provide bound on the performance of
the LP-rounding algorithm, we evaluate the performance of
the algorithm on an extensive set of real-world ride sourcing
data in Section V and we show that the proposed algorithm
is on average within 0.014% of the optimal.
First we cast Problem III.1 as an integer linear program
(ILP), then we propose a rounding algorithm based on the
solution to the relaxation of the ILP. Let integer parameter
xu,v ∈ {0, 1} denote the assignment of a request at v to a
driver at vertex u if xu,v = 1, and xu,v = 0 otherwise. Let
the integer parameter yu ∈ {0, 1} for all u ∈ ∪m
i Fi represent
if there is a driver assigned to wait for next request arrival
at u. Then we write the ILP for Problem III.1 as follows:
(cid:88)
minimize (cid:88)
subject to: (cid:88)
v∈V
i Fi
u∈∪m
xu,v ≥ 1,
i Fi
u∈∪m
yu ≥ xu,v,
yu + yv = 1,
yu, xu,v ∈ {0, 1},
(3)
(4)
(5)
(6)
pa(v)c(u, v)xu,v
∀v ∈ V
∀v ∈ V, u ∈ ∪m
i Fi
Fi = {u, v}, i ∈ [m]
∀v ∈ V, u ∪m
i Fi
By constraint (4), a feasible solution assigns each request
location to a driver. Equation (5) ensures that a request is
assigned to u only if there is a driver located at u, and finally
Equation (6) shows that in a feasible solution only one of
the candidate waiting locations is chosen from each subset
Fi, which represent that either the information is provided
to a driver or otherwise.
Now we propose our LP-rounding algorithm for Prob-
lem III.1. Let (x(cid:48), y(cid:48)) be the solution to the LP relaxation of
ILP (3). Without loss of generality for all Fi = {u, v}, i ∈
[m], let yu ≥ 1/2 and yv ≤ 1/2. Given solution (x(cid:48), y(cid:48)) we
construct an integer solution to ILP (3) by setting yu = 1
for each vertex u with y(cid:48)
u > 1/2 and yv = 0. In a case,
Fi = {u, v} and y(cid:48)
u = y(cid:48)
v = 1/2, we set yu = 1 where u is
the optimal waiting location of driver i with Ii = ∅. Then we
assign each vertex v ∈ V to the closest vertex u in ∪m
i=1Fi
with yu = 1 by setting xu,v = 1. Note that the constructed
solution (x, y) satisfies the constraint of ILP (3), therefore,
it is a feasible solution to Problem III.1. Also, observe that
the optimal objective value to the LP relaxation is a lower-
bound on the optimal value of ILP (3) and provides a bound
on the performance of the LP-rounding algorithm.
In the solution to the information sharing problem, if driver
i is selected to receive information on the location of drivers,
a snapshot of the location of drivers is presented to driver
i and the driver can calculate their expected profit based
on complete information. This method employed at each
time step and presents information to a driver if there is
an opportunity to improve the expected response time.
The problem of information sharing indirectly controls
the configuration of the drivers by providing information to
a subset of them, however, the possible configurations are
limited to the candidate waiting locations of the drivers. In
the following section, we provide the details on the pay-
to-control method for the service provider to optimize the
global objective.
IV. PAY TO CONTROL
Each driver as a self-interested unit chooses its waiting lo-
cation by maximizing the profit in Equation (1). To convince
the vehicles to relocate to another configuration, the service
provider needs to compensate for the difference between their
expected profit of the new location and their expected profit
for the waiting location from Equation (1). First, we pose the
problem between the drivers and the service provider as a
game. Then we provide an approximation algorithm to find
the optimal policy for the service provider.
A. Service Provider's Game
Let di be the incentive per unit distance offered to driver
m}) be the
i. Let Q = {q1, . . . , qm} (resp. Q(cid:48) = {q(cid:48)
configuration of the drivers before (resp. after) the incentive
pay. The game between the drivers and service provider
consists of the following:
1, . . . , q(cid:48)
• A set of m players and a service provider,
• An action set Ai for each driver i, which is the waiting
locations in the graph, i.e. Ai = V ∀i ∈ [m]. The action
set of the service provider is Q; and
• The profit function of the service provider is
i) + βD(Q(cid:48)),
diσc(qi, q(cid:48)
h(Q(cid:48)) =
(cid:88)
i∈m
where β ≥ 0 is a user-defined parameter that indicates
the importance of the service quality for the service
provider with respect to the incentive pay. For a small
value of β, the incentive pay is in the priority, thus the
service provider will offer the waiting locations close to
the driver's desired waiting location, however, for large
values of β, the service provider accepts high incentive
pay to relocate the drivers to the configuration with
minimum expected response time.
• The profit of driver i is the maximum of the expected
profit of the offered waiting location with incentive pay
and the expected profit of the waiting location from
Equation (1), i.e.,
max{(di − 1)σc(qi, q(cid:48)
i) + V(q(cid:48)
i)),
−σc(qi, u) + V(u, Bi − c(qi, u))}.
i, Bi − c(qi, q(cid:48)
max
u∈V
This is an instance of a leader-follower game [19]. The
service provider offers an incentive based on its utility and
the drivers as followers either take the offer or reject it.
The service provider is aware of the best action of the
drivers given any action taken by the service provider (i.e.,
incentive pay and the offered waiting location). The objective
is to find the optimal strategy for the service provider to
minimize a linear combination of the incentive pay and
the expected response time by relocating the drivers to the
desired configuration.
Driver i will accept the offer by the service provider to
relocate to q(cid:48)
i only if the offered incentives surpass the best-
expected profit of the driver. Since the profit functions of the
drivers are known to the service provider, then the minimum
di in which the drivers will accept the offer to move to
configuration Q(cid:48) is
maxu∈V −σc(qi, u) + Vi(u, B − c(qi, u))
di =
− Vi(q(cid:48)
c(qi, q(cid:48)
i)
i, Bi − c(qi, q(cid:48)
i))
σc(qi, q(cid:48)
i)
+ 1.
(7)
In the equation above, maxu∈V −σc(qi, u) + Vi(u, B −
c(qi, u)) is the maximum expected profit of the driver i by
i, Bi−c(qi, q(cid:48)
relocating to a new waiting location, and Vi(q(cid:48)
i))
is the expected profit of driver i by waiting at the location
q(cid:48)
i offered by the service provider. Knowing this minimum
di, the objective of the service provider becomes
c(q(cid:48)
h(Q(cid:48)) =
(cid:88)
σc(qi, q(cid:48)
(8)
i) + β
i, u)
pu min
i∈[m]
u∈V
−σc(qi, u) + Vi(u, B − c(qi, u))
i, Bi − c(qi, q(cid:48)
i)).
max
u∈V
Vi(q(cid:48)
i∈m
(cid:88)
(cid:88)
−(cid:88)
Observe that(cid:80)
i∈m
+
i∈m
i∈m maxu∈V −σc(qi, u)+Vi(u, B−c(qi, u))
is independent of the optimization parameters. Therefore, the
problem of minimizing the utility function of the service
provider h has the mobile facility location (MFL) problem
as a special case where Vi(v, Bi − c(u, v)) = 0 for all
u, v ∈ V and i ∈ [m]. The MFL is a well-known NP-hard
problem [20] where given a metric graph G = (F ∪D, E, c),
mapping µ : D → R+ and a subset Q ⊆ F ∪ D of size m.
m} ⊆ F
The objective is to find a subset Q(cid:48) = {q(cid:48)
u∈D µu minq(cid:48)∈Q(cid:48) c(u, q(cid:48)).
Remark IV.1 (Equilibrium). The optimal solution to the prob-
lem minQ(cid:48) h(Q(cid:48)) is the equilibrium of the leader-follower
game between the service provider and the drivers. Since
any other configuration will increase the cost function of the
service provider. In addition, By Equation (7), waiting in a
location other than the one suggested by the service provider
will decrease driver's expected profit.
minimizing(cid:80)
i) +(cid:80)
i∈[m] c(qi, q(cid:48)
1, . . . , q(cid:48)
B. Approximation Algorithm
We now propose a constant factor approximation for
the minimum pay-to-control problem, namely minimizing
σ maxu∈V σc(qi, u) − Vi(u, B −
Equation (8). Let wq(cid:48)
i,Ii = 1
i, Bi − c(qi, q(cid:48)
c(qi, u)) + V (q(cid:48)
i)), then the utility function of
the service provider becomes
i) − wq(cid:48)
h(Q(cid:48)) =
(cid:0)c(qi, q(cid:48)
(cid:1) + β
(cid:88)
(cid:88)
c(q(cid:48)
i,Ii
pa(u) min
i∈[m]
i, u).
u∈V
i∈[m]
The algorithm follows by a reduction from the minimum
pay-to-control problem to MFL.
we construct an MFL instance as follows:
Given an instance of the minimum pay-to-control problem
(i) A graph G = (Q∪ F ∪ V, E, c(cid:48)) where F is the set of
(ii) There is an edge between qi ∈ Q and q(cid:48) ∈ F with cost
(iii) There is an edge between q(cid:48) ∈ F and v ∈ V with cost
possible waiting locations for the drivers
c(cid:48)(qi, q(cid:48)) = c(qi, q(cid:48)) − wq(cid:48),Ii,
c(cid:48)(q(cid:48), v) = c(q(cid:48), v).
Fig. 4: Constructed MFL instance for optimizing the utility of the
service provider. An instance of the edges between the subsets is
shown with their respective costs.
(iv) The objective is to find a set of m vertices in F such
that minimizes
C(Q(cid:48)) =
(cid:88)
i∈m
(cid:88)
u∈V
c(cid:48)(qi, q(cid:48)
i) + β
pa(u) min
i∈[m]
c(cid:48)(q(cid:48)
i, u).
Figure 4 shows a schematic representation of the constructed
MFL instance. Suppose Q(cid:48) is a solution to the MFL instance,
we let Q(cid:48) be the solution of the minimum pay-to-control
problem and provide the following result on the cost of the
solution.
Lemma IV.2. Given an α-approximation algorithm for
the MFL problem,
the reduction above provides an α-
approximation for the minimum pay-to-control problem.
Proof. For any Q(cid:48) ⊆ F , by the construction of the MFL
instance, we have h(Q(cid:48)) = σC(Q(cid:48)). Therefore, given an
α-approximation algorithm for the MFL problem, and Q(cid:48)
obtained from the constructed MFL instance, we select
Q(cid:48) as a solution to the minimum pay-to-control problem.
Therefore,
h(Q(cid:48)) = σC(Q(cid:48)) ≤ ασ min
Q∗⊆F
C(Q∗) = α min
Q∗⊆F
h(Q∗).
By the result of Lemma IV.2, the 3 + o(1)-approximation
algorithm for the MFL problem in [20] applies to the
minimum pay-to-control problem.
V. SIMULATION RESULTS
We evaluate the performance of the two proposed indirect
controls on ride-sourcing data from Uber [21]. The data set
consists of the pick-up time and locations from April to
September 2014 in New York City, primarily Manhattan. The
jammed scenario occurs frequently with high demand in an
area and especially when surge price is applied for the high
demand area [2], [3].
To reduce the complexity of the large data set with 914
pick-up locations, we cluster the close pick-up locations into
125 clusters such that no two pick-up locations in a cluster
are farther than 500 meters apart. The drop-off location for
each ride is selected from the same set of clusters with equal
probability. Figure 5 shows the clustered pick-up locations
and the arrival rates for ride requests at each cluster is
(a) Ired = Q
(b) Ired = ∅
Fig. 6: Environment with three drivers and a pick-up location v. (a)
The red car has full information on the position of the other drivers,
therefore, Sred(v, qred) = 2 , (b) The positions of the other drivers
are not known to the driver of red car, thus, Sred(v, qred) = 0.
then the profit of a ride with pick-off at v and drop-off at w
for driver i located at u is σ(cid:48)c(w, v) − σc(u, v).
Now we define the expected profit of driver i located at
u and working for Bi period of time as follows:
(cid:88)
pd(wv)(cid:2)pi(v, u)(cid:0) max{0, σ(cid:48)c(w, v) (9)
− σc(u, v) + Vi(w, Bi − c(u, v) − c(v, w))}(cid:1)(cid:3),
v,w∈V
Vi(u, Bi) =
where Vi(u, 0) = 0 for all u ∈ V , drivers i ∈ [m] and
Ii ⊆ Q. Note that, Vi(w, Bi−c(u, v)−c(v, w)) represents the
expected profit of driver i after drop-off at w. The conditional
probability of the drop-off location is the common knowledge
of the drivers and the ride-sourcing companies based on prior
customer data.
Intuitively, the expected profit in Equation (9) represents
the total expected profit of servicing requests with pick-up
location at v and drop-offs at w only if the
σ(cid:48)c(w, v) − σc(u, v) + Vi(w, Bi − c(u, v) − c(v, w)) ≥ 0.
Observe that finding Vi(u, Bi) for all u ∈ V and a given Bi
is performed in polynomial time, however, since the drivers
are not going through the calculation of Vi(u, Bi) for all
u ∈ V , we assume that they have access to the expected
profit of the vertices by experience.
Since the calculation of the expected profit for drivers
for each time step is computationally expensive, we trained
a Random Forest Regressor [22] implemented by [23] to
approximate the values of V for each number of vehicles
in the system with training data over 10000 instances with
work-day Bi of 5 average length rides, fare σ(cid:48) = $1.06 per
mile and driving cost σ = $0.3 [24].
B. Partial Information Sharing
Figure 7 shows the percentage improvement in the ex-
pected response time for different number of vehicles using
the partial information sharing control method of Section III
in the two scenarios. Observe that as the number of drivers
increases, the average improvement in the expected response
time increases. However, with a large number of drivers
randomly placed in the environment, the expected response
time decreases and the possibility to further optimize it with
information sharing is limited. On the other hand, in the
jammed scenario where the drivers are concentrated in an
Fig. 5: The set of pick-up and drop off locations in Manhattan N.Y.
The bar at the location of each cluster represents the ride request
arrival rate.
represented with a bar. The performance of the proposed
control methods are evaluated in two scenarios: 1) the initial
location of the drivers are selected uniformly randomly, and
2) jammed scenario where the drivers are initialized at 20
closest locations to the Rockefeller center in Manhattan.
Observe that the proposed algorithms to find the controls
are applicable to various driver models for V. In the follow-
ing section, we propose a behavior model V for the drivers.
A. Drivers' model
A driver model is a process of evaluating the expected
profit of different locations at each time instance. Prior to
introducing our driver model, we provide the parameters in
the proposed model.
The pick-up probability of a location v as seen by driver i
is the probability that a ride-request at v is assigned to driver
i before any other ride request. Consider a configuration Q
of the drivers and a vertex u, where driver i is the kth
closest driver to the vertex location u. Since a request is
assigned to the closest available driver, then driver i can
expect to be assigned to the kth request arriving at u. Let
Si(v, u) denote the number of drivers closer to v than driver
i located at vertex u. Note that Si(v, u) is a function of
the information of driver i regarding the position of other
drivers. Figure 6 illustrates an instance with three vehicles
and a pick-up location. Given the full information of the
vehicle positions, Sred at pick-up location is 2 and Sred is
zero if Ired = ∅.
The probability that a request at v is assigned to driver i
located at u as expected by driver i before any other request
is approximated by
Si(v,u)+Si(w,u)+1(cid:88)
(cid:1)k(cid:0)
(cid:18)(cid:80)
(cid:1)Si(v,u)+Si(w,u)+1−k
k=Si(v,u)+1
λw
k
.
w∈V Si(w, u) + 1
(cid:19)
pi(v, u) = Πw∈V
(cid:0)
λv
λv + λw
λv + λw
Let σ(cid:48) be the fare per unit time of servicing a request,
Fig. 7: Improvement in expected response time by sharing location
information.
Fig. 8: The expected response time of a system of 20 drivers
executing 100 ride requests arriving over time under the partial
information control method. The drivers are initialized under the
jammed scenario.
area, the information sharing method improves the expected
response time by 10% on average. The information sharing
method shares information on the position of the other
drivers with 31.0% and 41.7% of the drivers in the random
initial configuration and jammed scenarios, respectively. The
results are the average of 1000 instances for different number
of drivers and scenarios. The boxes show the first, first and
third quartiles of each set of experiments. The expected
response time of the solution obtained from the LP-rounding
algorithm of Section III on this set of experiments is within
0.014% on average of the solution of the LP relaxation of the
information sharing problem. The maximum deviation from
the optimal solution of the LP relaxation is 0.42%.
Figure 8 shows the expected response time of a set of
20 drivers responding to 100 requests arriving over time
with the jammed initial configuration. In this experiment,
the maximum arrival rate on the vertices is 0.03 per minute,
therefore, we assumed that there exist enough time to relo-
cate between the ride request arrivals. Note that the partial
information method maintains a low expected response time
over the course of responding to 100 requests compared to
the same set of drivers with no control input on their waiting
locations. The results are an average of 100 experiments with
100 randomly generated requests for each experiment. The
lines represent the average and shaded areas represent the
first and third quartiles.
C. Pay to Control
In this section, we evaluate the performance of the PAY-
TO-CONTROL method for the two scenarios. Figure 9 il-
lustrates the improvement in the expected response (solid
lines) time and the total amount paid to the drivers (dashed
lines) to relocate for different β values in the random initial
configuration scenario. The shaded area represents the first
and third quartiles of 1000 random instances for each number
of vehicles. The amount paid is proportional to the average
cost of riding UberXL, i.e., $0.3 per minute [24]. For larger
β, the expected response time is more important than the
amount paid for relocation. Therefore, with a larger number
of vehicles, the PAY-TO-CONTROL method increases the
amount paid to the drivers to minimize the expected response
time. Notice that with β = 10 the expected response time
Fig. 9: The percentage improvement in expected response time and
the incentive pay. The solid lines represent the average improvement
in the expected response time and the dashed lines represent the
total amount paid to the drivers.
has improved by 25% for $1 per driver.
Next, we evaluate the performance of the pay-to-control
algorithm in the jammed scenario. Figure 10 shows that with
a larger number of vehicles concentrated in a small area,
the pay-to-control algorithm improves the expected response
time significantly with limited amounts paid to the drivers.
Notice that with β = 10 the expected response time has
improved by 70% for $2 per driver.
Figure 11 shows the expected response time and the
amount paid to a set of 20 drivers responding to 100 requests
arriving over time with the jammed initial configuration.
Notice that the PAY-TO-CONTROL method with β = 1
maintains a low expected response time over the course of
responding to 100 requests compared to the same set of
drivers with no control input on their waiting locations. The
total amount paid to the drivers over the course of responding
to 100 requests is $1.87 per request. The results are an
average of 100 experiments with 100 randomly generated
requests for each experiment. The lines represent the average
and shaded areas represent the first and third quartiles.
51015202530NumberofVehicles0510152025PercentageImprovementinResponseTimeRandominitialconfigurationJammedscenario020406080100NumberofRequests350400450500550600650ExpectedResponseTimePartialInformationShareNocontrol10203040NumberofDrivers05101520253035PercentageImprovementinResponseTimeβ=1.0β=10.0102030405060AmountPaidtoDrivers($)[4] W. Zhang, S. Guhathakurta, J. Fang, and G. Zhang, "The performance
and benefits of a shared autonomous vehicles based dynamic rideshar-
ing system: An agent-based simulation approach," in Transportation
Research Board 94th Annual Meeting, no. 15-2919, 2015.
[5] M. Hyland and H. S. Mahmassani, "Dynamic autonomous vehicle fleet
operations: Optimization-based strategies to assign AVs to immediate
traveler demand requests," Transportation Research Part C: Emerging
Technologies, vol. 92, pp. 278 -- 297, 2018.
[6] M. Chang, D. S. Hochbaum, Q. Spaen, and M. Velednitsky, "DIS-
PATCH: an optimal algorithm for online perfect bipartite matching
with i.i.d. arrivals," CoRR, vol. abs/1805.02014, 2018.
[7] M. Maciejewski, J. Bischoff, and K. Nagel, "An assignment-based
approach to efficient real-time city-scale taxi dispatching," IEEE
Intelligent Systems, vol. 31, no. 1, pp. 68 -- 77, 2016.
[8] Uber. Driving with Uber, wait less, earn more. [Online]. Available:
https://www.uber.com/info/get-trips-without-waiting/
[9] M. Pavone, S. L. Smith, E. Frazzoli, and D. Rus, "Robotic load
balancing for mobility-on-demand systems," The International Journal
of Robotics Research, vol. 31, no. 7, pp. 839 -- 854, 2012.
[10] M. Tsao, R. Iglesias, and M. Pavone, "Stochastic model predic-
tive control for autonomous mobility on demand," arXiv preprint
arXiv:1804.11074, 2018.
[11] G. C. Calafiore, C. Novara, F. Portigliotti, and A. Rizzo, "A flow
optimization approach for the rebalancing of mobility on demand
systems," in IEEE International Conference on Decision and Control,
2017, pp. 5684 -- 5689.
[12] D. B. Shmoys, "Approximation algorithms for facility location prob-
lems," in International Workshop on Approximation Algorithms for
Combinatorial Optimization. Springer, 2000, pp. 27 -- 32.
[13] V. Arya, N. Garg, R. Khandekar, A. Meyerson, K. Munagala, and
V. Pandit, "Local search heuristics for k-median and facility location
problems," SIAM Journal on computing, vol. 33, no. 3, pp. 544 -- 562,
2004.
[14] E. D. Demaine, M. Hajiaghayi, H. Mahini, A. S. Sayedi-Roshkhar,
S. Oveisgharan, and M. Zadimoghaddam, "Minimizing movement,"
ACM Transactions on Algorithms (TALG), vol. 5, no. 3, p. 30, 2009.
[15] A. Sadeghi and S. L. Smith, "Re-deployment algorithms for multiple
service robots to optimize task response," in IEEE International
Conference on Robotics and Automation, 2018, pp. 2356 -- 2363.
[16] S. Bandyapadhyay, A. Banik, S. Das, and H. Sarkar, "Voronoi game on
graphs," Theoretical Computer Science, vol. 562, pp. 270 -- 282, 2015.
[17] R. Salhab, J. Le Ny, and R. P. Malham´e, "A dynamic ride-sourcing
game with many drivers," in 55th Annual Allerton Conference on
Communication, Control, and Computing, 2017, pp. 770 -- 775.
[18] R. Schuler, "An algorithm for the satisfiability problem of formulas in
conjunctive normal form," Journal of Algorithms, vol. 54, no. 1, pp.
40 -- 44, 2005.
[19] T. Basar and G. J. Olsder, Dynamic noncooperative game theory.
Siam, 1999, vol. 23.
[23] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion,
O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Van-
derplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and
E. Duchesnay, "Scikit-learn: Machine learning in Python," Journal
of Machine Learning Research, vol. 12, pp. 2825 -- 2830, 2011.
[24] Ride sharing driver. How much does uber cost? Uber fare estimator.
[Online]. Available: https://www.ridesharingdriver.com/
[20] S. Ahmadian, Z. Friggstad, and C. Swamy, "Local-search based
approximation algorithms for mobile facility location problems," in
Proceedings of the twenty-fourth annual ACM-SIAM symposium on
Discrete algorithms. SIAM, 2013, pp. 1607 -- 1621.
[21] (2014) Uber TLC FOIL response.
[Online]. Available: https:
//github.com/fivethirtyeight/uber-tlc-foil-response
[22] L. Breiman, "Random forests," Machine learning, vol. 45, no. 1, pp.
5 -- 32, 2001.
Fig. 10: The percentage improvement in the expected response
time and the incentive pay in the jammed scenario. The solid lines
represent the average improvement in the expected response time
and the dashed lines represent the total amount paid to the drivers.
Fig. 11: The expected response time and the paid amount to a
system of 20 drivers executing 100 ride requests arriving over time
under the PAY-TO-CONTROL method. The drivers are initialized
under the jammed scenario.
VI. CONCLUSION
This paper considered the problem of controlling self-
interested drivers in ride-sourcing applications. Two indirect
control methods were proposed and for each, a near-optimal
algorithm was presented. The extensive results show signif-
icant improvement in the expected response time on real-
world ride-sourcing data. In addition, we hope to extend the
results to capture vehicles with different capacities and ride-
sharing applications.
REFERENCES
[1] L. Rayle, S. Shaheen, N. Chan, D. Dai, and R. Cervero, "App-
based, on-demand ride services: Comparing taxi and ridesourcing
trips and user characteristics in san francisco university of california
transportation center (uctc)," University of California, Berkeley, United
States, 2014.
[2] N. Diakopoulos. How Uber surge pricing really works. [Online].
Available: https://www.washingtonpost.com/news/wonk/wp/2015/04/
17/how-uber-surge-pricing-really-works/
[3] A. Rosenblat and L. Stark, "Algorithmic labor and information asym-
metries: A case study of Ubers drivers," International Journal Of
Communication, 2016.
10203040NumberofDrivers01020304050607080PercentageImprovementinResponseTimeβ=1.0β=10.020406080AmountPaidtoDrivers($)020406080100NumberofRequests300400500600700ExpectedResponseTimePay-to-ControlNocontrolPaidamount05101520AmountPaidtoDrivers($) |
1705.01453 | 2 | 1705 | 2017-05-16T08:43:52 | Distributed Proportional-Fairness Control in MicroGrids via Blockchain Smart Contracts | [
"cs.MA"
] | Residential microgrids (MGs) may host a large number of Distributed Energy Resources (DERs). The strategy that maximizes the revenue for each individual DER is the one in which the DER operates at capacity, injecting all available power into the grid. However, when the DER penetration is high and the consumption low, this strategy may lead to power surplus that causes voltage increase over recommended limits. In order to create incentives for the DER to operate below capacity, we propose a proportional-fairness control strategy in which (i) a subset of DERs decrease their own power output, sacrificing the individual revenue, and (ii) the DERs in the subset are dynamically selected based on the record of their control history. The trustworthy implementation of the scheme is carried out through a custom-designed blockchain mechanism that maintains a distributed database trusted by all DERs. In particular, the blockchain is used to stipulate and store a smart contract that enforces proportional fairness. The simulation results verify the potential of the proposed framework. | cs.MA | cs | Distributed Proportional-Fairness Control in
MicroGrids via Blockchain Smart Contracts
Pietro Danzi, Marko Angjelichinoski, Cedomir Stefanovi´c, Petar Popovski
Department of Electronic Systems, Aalborg University, Denmark
Email: {pid,maa,cs,petarp}@es.aau.dk
7
1
0
2
y
a
M
6
1
]
A
M
.
s
c
[
2
v
3
5
4
1
0
.
5
0
7
1
:
v
i
X
r
a
Abstract-Residential microgrids (MGs) may host a large
number of Distributed Energy Resources (DERs). The strategy
that maximizes the revenue for each individual DER is the one in
which the DER operates at capacity, injecting all available power
into the grid. However, when the DER penetration is high and
the consumption low, this strategy may lead to power surplus
that causes voltage increase over recommended limits. In order
to create incentives for the DER to operate below capacity, we
propose a proportional-fairness control strategy in which (i) a
subset of DERs decrease their own power output, sacrificing
the individual revenue, and (ii) the DERs in the subset are
dynamically selected based on the record of their control history.
The trustworthy implementation of the scheme is carried out
through a custom-designed blockchain mechanism that maintains
a distributed database trusted by all DERs. In particular, the
blockchain is used to stipulate and store a smart contract that
enforces proportional fairness. The simulation results verify the
potential of the proposed framework.
I. INTRODUCTION
The deployment of Distributed Energy Resources (DERs)
in the residential low voltage (LV) microgrids (MGs) aims to
improve their self-sustainability and reduce the transmission
losses [1]. DERs based on renewable resources, such as solar
photovoltaic (PV), are traditionally operated at capacity to
inject all available power in the grid and thus maximize the
efficiency, regardless of the grid state. However, the variability
of the capacity may cause erratic voltage behavior on the dis-
tribution feeders. In particular, grids with high penetration of
PVs may experience voltage increase over the recommended
levels, e.g., during afternoons, when the production is high
and the household consumption is low [2]. An approach to
prevent grid instability due to dramatic voltage increases is
to control the power output of DERs, e.g., via active power
curtailment or reactive power adjustment [3]. In this respect,
[4] proposes a control strategy based on the principle of
proportional fairness, where all DERs equally contribute to
voltage regulation all the time; the strategy is executed by
the remote central authority such as the distribution system
operator (DSO). However, enforcing that all DERs participate
in voltage control and curtail their output power all the time
is characterized with a control complexity that increases with
the number of DERs and a reduced possibility for the owners
to operate an economic strategy. Moreover, existence of the
centralized authority involves the issue of Single Point of
Failure (SPoF).
In this paper, we propose a novel control scheme based on
the proportional fairness in which (i) only a subset of DERs
act as voltage regulators and curtail their individual power
outputs over control periods, and (ii) ensures that, in the long
term, DERs participation in voltage regulation is balanced. To
give the DERs the incentive to fairly participate in voltage
regulation, we introduce a principle based on exchange of
credits. Specifically, in order to join the regulating subset, DER
asks for a credit, which will be paid by the DERs that are
not in the regulating subset and therefore operate at their full
capacity. In turn, the decrease of credit status of the DERs that
have not participated in voltage regulation ultimately forces
them to participate in the voltage regulation in future.
In order to avoid existence of a central authority and,
thus, a SPoF,
the proposed protocol runs in a distributed
manner. The credit statuses of all DERs are tracked by the
use of a blockchain protocol, initially introduced with Bitcoin
cryptocurrency [5]. Its major advantage is the capability to
implement a distributed database that serves as record of
the system's state and of its history, trusted by all agents,
in this case DERs. All agents store identical copies of the
database. The database is hard to tamper with, since an agent
can add new record to it only if a proof-of-work (POW)
is obtained, where POW is the solution of a computational
puzzle that requires an investment of electrical energy to
run the computation. In particular, the blockchain is used
to memorize (i) the state of smart contracts [6], which are
computer programs that can receive, store and pay credit, i.e.,
cryptocurrency, and (ii) the credit history of agents. In the
proposed framework, a smart contract acts as a trustworthy
distrubuted control authority, realized via a custom-designed
blockchain mechanism operated by all DERs. Specifically,
DERs that are installed on the same distribution feeder stip-
ulate a smart contract among them, determining which units
will act as voltage regulator over control periods, based on
their available credit statuses and the economic strategy that
they individually adopt. In the long term, this ensures a fair
rotation in the participation of the DERs to the MG regulation.
The rest of the paper is organized as follows. Section II
introduces the system model and the proportional-fairness
control strategy assuming a centralized setup. Section III
introduces the main concepts of a blockchain protocol. Sec-
tion IV presents the distributed, blockchain-based architecture
fostering the proportional-fairness control. Section V contains
a case study based on a simulation of a power system and
an instance of blockchain protocol, verifying the proposed
framework. Section VI concludes this paper.
Fig. 1. The system model.
Fig. 2. Message exchanges between the DERs and the control authority.
max is the maximum tolerable apparent power.1 The
where s2
droop control law (1) clearly shows that, in VSC mode, the
active power of DER u is below capacity, leading to revenue
loss of the DER owner. Nevertheless, the presence of VSC
units is an imperative for voltage regulation of the MG.
II. SYSTEM MODEL
B. VSC election per MG based on proportional fairness
(cid:80)NMG
We consider a LV distribution grid (LVDG) composed of
NMG alternate-current MGs. A MG f hosts Uf DERs, Uf ≥
0, which are PV generators that supply residential loads, see
Fig. 1. The total number of DERs in the LVDG is Utotal =
f =1 Uf . All MGs jointly strive to maintain the LVDG grid
voltage amplitude within acceptable limits [7]. To do so, in
each MG there is a dedicated voltage regulator elected from
the local DERs. In the rest of this section, we first describe
the voltage regulation mechanism. Afterwards, we introduce
the regulator election strategy that each MG employs.
A. Voltage regulation
Assume MG f with Uf DERs indexed in the set U =
{1, 2, ..., Uf}. Each DER is connected to the MG via a power
electronic converter (PEC) that controls its output and that
supports dual mode capability [8], i.e., a PEC can operate in
current source converter (CSC) or voltage source converter
(VSC) mode. In CSC mode, DER u is operated at capacity,
outputting all available power gu using maximum power point
tracking algorithm, and is not capable of regulating the voltage
[7]. In VSC mode, DER u acts as the voltage regulator at the
expense of the reduced active output power pu, pu ≤ gu.
The voltage is regulated via the active output power using the
following droop control law [9]:
vu = vref − γ(gu − pu),
(1)
where vu and vref are the voltage at the output of the DER
and the reference voltage of the MG, respectively, while γ
is the droop parameter, chosen such that (i) vu is maintained
within tolerable limits vmin and vmax, and (ii) all VSCs in the
LVDG achieve proportional power sharing. The output reactive
power qu is determined via the active output power, subject
to a constraint on the apparent power, as follows:
qu =(cid:112)s2
max − p2
u,
(2)
We first formulate the centralized version of the VSC
election strategy, employed in each MG, and enabled by
an external control authority, e.g.,
the DSO, see Fig. 2.
The strategy runs periodically every T tc seconds, where the
interval between two consecutive VSC assignments is referred
to as control period, and is sufficiently long to allow reliable
exchange of messages among DERs and the authority. Let
µu(k) denote the operating mode of DER u in arbitrary control
period k. Hence, µu(k) is a binary variable:
µu(k) =
0
1
if DER u operates as CSC in period k,
if DER u operates as VSC in period k.
(cid:40)
(3)
Denote by µu the sequence of operating modes of DER u in
all periods up to interval K, i.e., µu = [µu(0), . . . , µu(K−1)].
Stacking µu, ∀u ∈ U, vertically, we form the Uf × K matrix
of control mode histories of all DERs in the MG up to period
K, denoted by M, where [M]u,k = µu(k). The k-th column
of M represents the operating modes of all DERs in the MG
in control period k, and is denoted by µ(k). The objective of
the VSC election strategy is to ensure fairness among DERs
in the MG, i.e., all DERs should equally participate in voltage
control over time. This can be expressed as follows:
M 1K =
K
Uf
1Uf ,
(4)
where 1Uf is the all-ones vector of length Uf . In addition, the
strategy should also ensure that only one DER per MG acts
as VSC in each control period, i.e.:
1T
Uf
µ(k) = 1,
(5)
with (·)T denoting the transpose operator.
DERs are given incentive to participate in voltage regulation
through acquisition of credit when they operate in VSC
mode. Denote by cu(k) the credit status of DER u in the
1We note that more sophisticated control schemes, based on both active
and reactive power adjustments, can be adopted for the voltage regulation.
However, they are beyond the scope of the paper.
Power plantMedium VoltageLow VoltageTransformer(PCC)𝑓1 𝑓2 𝑓3 𝑓4 𝑓5 𝑓6 Aggregated residential loadsDER𝑓7 Control authorityDERs...𝑤1(𝑘) 𝑤𝑈𝑓(𝑘) 1 𝑐1 𝑘 , µ1(𝑘) 𝑈𝑓 FeederFeeder...𝑓𝑁𝑀𝐺 𝑓1 µ𝑈𝑓(𝑘) 𝑐𝑈𝑓 𝑘 , (a)
(b)
(c)
(d)
Fig. 3. Different phases of blockchain protocol: (a) contract updates are propagated in the network, (b) contract updates are accumulated in the miners'
buffers, (c) a new block (red packet) that includes the updates is generated and propagated and (d) the new block is accepted by the entire network.
(cid:80)Uf
control period k and let c(k) = [c1(k), . . . , cUf (k)]. In the
proposed scheme, the total available credit is constant, i.e.,
u=1 cu(k) = C, ∀k, and the credit is only redistributed
among DERs, ultimately forcing them to act as VSCs.
The redistribution of the credit is performed in the following
way. In period k, DER u sends to the control authority the
credit demand wu(k) asked for performing the role of VSC
for the MG in the next period k + 1. The credit demand is
chosen in the interval [0, cu(k)], according to the individual
strategy adopted by DER u. For the sake of simplicity, in the
rest of the paper we assume that DER u ∈ U chooses wu(k),
∀k, randomly using uniform distribution:
wu(k) ∼ unif (0, cu(k)) .
(6)
The control authority stores the information sent by all DERs
in the MG in the vector w(k) = [w1(k), . . . , wUf (k)], and
chooses the DER with the lowest credit demand to operate as
VSC in the next control period:
u = argminuw(k).
(7)
Then, the control authority sends the messages about (i) the
control modes of all the DERs in the MG in the next control
period µ(k+1) = eu, where eu is a vector with 1 at position
u and 0 elsewhere, and (ii) the update of the total credit
(cid:16)
w(k)(cid:17)
c(k+1) = c(k) − w(k) +
1T
Uf
eu,
(8)
see Fig. 2. A careful inspection of (7) shows that the total
credit
is redistributed by (i) taking from the DERs their
respective credit demands and (ii) giving the total demanded
credit to the DER u that had the lowest demand and that will
take the VSC role in the next period.
The rule for choosing the credit demand (6) and the VSC
election rule (7) show that DERs with lower credit status have
higher chances of operating as VSC. On the other hand, low
credit status implies that the DER has previously infrequently
operated as VSC. In this way, the proportional fairness is
promoted among DERs in the MG. We also note that the
results provided in Section V verify that the objective (4)
becomes satisfied as the number of control period increases.
Finally,
To run the VSC election strategy, the LVDG requires a
communication network to interconnect the DERs with the
central authority to support the message exchange depicted in
Fig. 2. This can be implemented using wireless (e.g., cellular)
network, or wired network (e.g., power line communications).
the election strategy (7) and the credit update
rule (8) require presence of the central authority's database
that records the current credit status c(k) and that is trusted
by all agents. This need for the establishment of a trustful
relation among agents prevents the implementation of simple
decentralized control systems, such as token rings, in which
DERs hold the control in turns. Motivated by this insight, we
develop a decentralized control solution based on blockchain
protocol, which establishes a trustful distributed record both
of the credit status of all DERs and of the control history.
III. BLOCKCHAIN PROTOCOL
In this section, we describe a version of the blockchain pro-
tocol that realizes only the functionalities required to support
the proposed control strategy. An introduction to the general
variant of the blockchain can be found in [10].
A blockchain is a distributed database consisting of identical
copies that are stored in the memory of each agent. It is
organized as a concatenated list of blocks that can be expanded
by any agent with new blocks. Each block stores a set of smart
contracts updates. A smart contract is a computer program
that can be executed by an agent that has the blockchain
software. As the agent executes the program locally, whenever
it modifies the contract internal state, e.g., by exchanging
credit with it, the rest of the agents should be informed in
order to run the new version of the contract. The new state
is communicated through a smart contract update. To avoid
proliferation of different states of the contract, the blockchain
in parallel executes the update verification process via block
generation, ensuring that only verified updates are included in
the blockchain. We proceed by providing the details.
Fig. 3 illustrates the blockchain operation via an example
of a peer-to-peer network of interconnected agents. Every
agent is provided with a local copy of the blockchain, and
a buffer, named "mempool". When smart contract updates
MempoolBlockchain local copySmart contract updateBlockare produced, they are sent to the neighbors, Fig. 3(a). The
updates are temporary stored in mempools, Fig. 3(b), being
not considered valid yet. In parallel, agents are also generating
blocks, i.e., working to solve the computational puzzle (by
the blockchain protocol) and obtain POW. When an agent
obtains POW and generates a new block, it fills it with the
smart contract updates present in its mempool and transmits
the new block to its peers, see Fig. 3(c). Upon the reception
of the block, a neighbouring agent verifies that it contains a
valid POW, by checking the provided solution of the puzzle.
If the verification succeeds, the agent adds the block to its
blockchain, Fig. 3(d), and propagates it further to its neighbors.
The verification and propagation of successfully verified block
continues until all agents in the network are reached. Finally,
when all agents have received and verified the block, they have
the same updated version of the blockchain, see Fig. 3(d), and
thus, their copies of the smart contract have the same internal
state. The agents also remove from their mempools the smart
contract updates included in the received and verified blocks.
The smart contract can be abstracted as a virtual agent that
interacts with the actual agents according to the logic defined
in its program, and in this way regulating credit redistribution
among the actual agents through the contract updates. In the
context of the proposed framework, the smart contract updates
are produced by the MG control application, while the block
creation process is intrinsic to the blockchain and in charge
of keeping it consistent. These two process run independently,
where the latter ensures that the smart contract updates are
eventually stored in the blockchain.
A. Blockchain consistency
As depicted in Fig. 3(c)–(d), the blockchain consistency is
guaranteed through propagation of newly generated blocks
to all other agents. In order to avoid the generation of
uncontrolled amounts of blocks, a block generation requires
an investment of resources. In the seminal paper [5],
the
investment is the consumption of electrical power required to
solve a computational puzzle, known as POW. This process of
obtaining POW is named mining; the agent that first solves the
POW decides the content of the next block. The probability
pb to generate a new block before the other agents depends on
the computational resources allocated to solve the puzzle. The
difficulty of the puzzle is tuned to keep the block generation
rate constant over time, see [5] for details.
It may happen that two or more new valid blocks are created
concurrently by different agents, propagating in different sub-
graphs of the network. In this case, the network is split over
different, but valid versions of the blockchain. The contention
rule adopted by Bitcoin is "the longest chain wins", i.e., the
split is solved when some "newer" valid block is generated,
received and accepted by all agents, updating the blockchain
and making it consistent again [10].
B. The cost of mining
In standard blockchain realizations, the resource investment
in mining operation is compensated by attributing some credit,
i.e., cryptocurrency, to the miners, either by (i) increasing
the credit of the miner that generates the block, incrementing
the total amount of credit in the system, or (ii) letting the
miner demand a credit fee for each smart contract update
that it includes in a block. This stimulates miners to consume
electrical power to obtain POW, and thus reduces the risk that
a malicious miner may impose his version of the blockchain.
In this work, the miners are the DERs in the MG, i.e., the
blockchain is private, but they are not rewarded with credit
for mining. Nevertheless, a DER is stimulated to mine, in
order to ensure that the blockchain is consistent with its view
of the credit status and control history. Also, not providing
credit for mining eliminates the possibility of DERs being
more motivated in mining than in voltage regulation.
C. Peer-to-peer network and protocol messages
The blockchain is based on peer-to-peer networking, where
each agent connects to a set of randomly selected neighbors.2
The communication protocol adopts TCP connections to ex-
change two types of information, as shown in Fig. 3.
1) The smart contract updates, Fig. 3(a).
2) The blocks, Fig. 3(c).
D. Security issues of blockchain protocol
The blockchain protocol is founded on the assumption that
the resources required to generate blocks are well distributed
among agents, making it hard for a single agent
to con-
secutively generate blocks and and impose its view of the
blockchain that may potentially include false data [10]. This
assumption can be adopted in the scenario considered in the
paper, as it is expected that microcontrollers of the DERs have
similar hardware characteristics.
Security threats to blockchain may also come from peer-to-
peer networking. A prominent example is the eclipse attack
[11], in which all neighbors of an agent are under the control
of a malicious agent. In this case, the copy of the blockchain
of the attacked agent may be compromised. To avoid such
scenario, the communication peers are selected randomly.
IV. THE PROPOSED DISTRIBUTED CONTROL FRAMEWORK
The proposed solution is enabled by a blockchain protocol
(i.e., software) implemented by the agents,
i.e., DERs of
the distribution grid. The mining process is done by agents
themselves, where the agents do not cooperate and the POW
is of low difficulty determined by their limited computational
capabilities. The agents have access to a peer-to-peer network,
where the access is granted only to legitimate agents. We
assume that the rate at which POWs are obtained and new
blocks propagated through the network is sufficiently high
to prevent overflow of the mempools. Finally, the message
propagation delay is assumed negligible compared to the
control period duration T tc.
A smart contract is deployed for each grid feeder, playing
the role of the central authority (i.e., DSO), resulting in a
is required that
the communication graph formed in this way is
2It
connected, but the related details are beyond the scope of the paper.
(a) Credit sending.
(b) Credit receiving.
Fig. 4. Relationship among DERs in one feeder and their smart contract.
unique blockchain that stores NM G contracts. The relationship
of DERs in a feeder and their smart contract is depicted
in Fig. 4. During a control period, each DERs chooses its
credit demand for the next period via (6), and updates its
local copy of the smart contract by sending, i.e., transferring,
the demanded amount to it, see Fig. 4(a). These updates are
propagated to peers, Fig. 3(a)–(b), and the block generation
process, Fig. 3(c), ensures that all the copies of the smart
contract have the consistent knowledge of them, Fig. 3(d). The
credit sending is disabled during the final part of the period via
the contract locking, to ensure the consistency of local copies
at the control actuation instant, i.e., at the beginning of the
new period. At this point, based on its internal state, the smart
contract (i.e., each its copy) elects the (same) VSC for the
next control period using (7), and DERs are locally notified
(e.g., via reading the state of the smart contract) about their
operating mode for the next control period. In the next round,
the elected VSC updates its local smart contract to receive the
total demanded credit, see Fig. 4(b). This triggers a new round
of the update propagation, Fig. 3(a)–(b), which is eventually
stored in the blockchain after a block embedding it becomes
generated and propagated through the network, Fig. 3(c)–(d).
For the sake of completeness, in Fig. 5(a) we expose the
operating sequence of the framework related to a single control
period,
the contract updates
related to period k start in period k − 1:3
1) Credit sending: During period k − 1, each DER transfers
to the smart contract the credit demanded to operate as
VSC in the next period (represented by green arrows).
These updates are propagated through the network and
stored in the mempools, and gradually included in the
blockchain when new blocks are generated.
2) Contract lock and VSC election: At a predefined instant
before the end of period k − 1, all DERs modify the
state of the contract to lock it (purple arrow).4 The VSC
for control period k is elected via (7), uniquely over all
i.e., period k, assuming that
3In general, the framework can be operated such that the contract updates
for period k are started in a period k1, where k1 ≤ k − 1, allowing to solve
the eventual blockchain inconsistencies due to propagation and mining delays.
The related analysis is beyond the paper scope.
4Note that the contract is effectively locked only by the first contract update
that is included in the blockchain, which invalidates the consecutive locks.
(a) Blockchain-based scheme: the messages are exchanged among DERs.
(b) Centralized scheme: The messages are sent from DERs to the central
authority (uplink) and from the central authority to DERs (downlink).
Fig. 5. Sequence of the communication exchanges (a) in the blockchain-based
and (b) in the centralized scheme.
copies of the smart contract. All DERs set their control
mode accordingly.
3) Credit receiving: The VSC DER withdraws the credit
obtained for the control period k from the smart contract
(represented by the red arrow). To do this, it modifies
the state of the contract, communicates the state update
to the other agents, and waits for it to be included in a
newly mined block. The credit stored by the contract can
only be withdrawn by the DER operating as VSC.5
The figure also depicts the block generation process (repre-
sented by blue crosses) that is decoupled from the process
of contract updates. It may happen that some newly generated
blocks do not contain any updates and such blocks only verify
the consistency of the current state of the blockchain.
In the rest of this section, we outline several important
aspects of the framework.
A. Plug-and-play feature
The blockchain-enabled solution provides a smooth plug-
and-play since the joining DER just needs to start interacting
with the contract. Observe that it is likely that the joining DER
will be chosen as VSC in the next control periods, as its credit
status is zero.
B. Control availability and trustworthiness
The decentralized solution does not suffer from the SPoF,
providing an increased control availability with respect
to
the centralized architecture. It also avoids reliance on data
received by an external authority, which can be tampered
without being detected by the MG agents. On the other hand,
the major weakness of the blockchain-based architecture is the
modification of the database operated by a subset of agents
that are capable to generate new blocks faster, imposing their
version of the control history, as discussed in Section III-D.
C. Communication cost
Fig. 5 compares the communication exchanges in the
blockchain-based scheme, Fig. 5(a), with the exchanges in
5All contract updates are certified with public-key cryptography, cf. [5].
Update contract with credit demandsSmart contract:Collect 𝐰.Elect VSC.DER 1:Choose 𝑤#DER 𝑈%:Choose 𝑤&'. . .Update contract to receive total demanded creditSmart contractVSC DERxxxxx2) Contract lockNew blocks generated3) Credit receiving1) Credit sendingControl period k-1Control period kDecisionUplinkDownlinkActuationControl period k-1Control period kFig. 6. Comparison of communication costs.
the centralized one, Fig. 5(b). We proceed by evaluating and
comparing the communication costs of both approaches, where
the communication cost is expressed via the average amount
of data exchanged per agent during a control period.
In the blockchain-based scheme, data is generated by the
processes of smart contract updates and blocks generation. The
number of blocks generated during a control period, denoted
by Nb, is determined by the protocol. The communication cost
for agent u with N peers is:
(a) Without control.
(b) With the control.
J bc = N Lu + J rc + pbNbN Lb + J rb,
(9)
Fig. 7. The voltage measured on the LV feeders on the dataset corresponding
to 9th of June, indicated in the Per-Unit (PU) base.
i.e., it comprises the costs of propagating its own transaction,
expressed through the message length Lu, the relaying of
other's transactions J rc, the transmission of its own blocks and
the relaying of other's blocks J rb. For the sake of comparison,
we provide a lower bound on J bc for the simplified case
where a DER has just a single peer and does not relay data6,
assuming that the computational power is equally distributed
among DERs, i.e., pb = 1/Utotal:
J bc
LB = Lu +
NbLb
Utotal
.
(10)
In the centralized architecture, we denote the length of
messages wu, cu, µu in bits as Lw, Lc, Lµ. In this case, the
communication cost per DER is equal to J c = Lw + Lc + Lµ,
i.e., it is a constant. We compare the communication costs
in Fig. 6, assuming that Lw, Lµ, Lc are 64 bits long, Lu
is 800 bits and Lb is 8000 bits. The block period is set
to 10 s, which together with T tc = 15 minute provides
Nb = 90 blocks for control period. The communication cost
in the blockchain-based scheme is slightly decreasing with
the number of DERs, i.e., Utotal, as this reduces the number
of blocks that they individually generate in a control period.
However, the centralized solution is clearly less demanding
due to its simpler communication architecture.
V. CASE STUDY
Inspired by the MG LV scenario in [2], we adopt the power
system composed by LV and MV MGs depicted in Fig. 1 as
a case study. The LV MG is connected to a medium voltage
(MV) microgrid in which a 6 MW solar PV power plant is
installed. The power exchange between the LV and MV MGs
takes place via a on-load tap changing transformer (OLTC),
that constitutes the point of common coupling (PCC). The LV
MG is composed by NM G = 7 feeders, each supporting the
consumption of 10 households. On each feeder, except feeder
f1, there are installed 4 PV systems (i.e., DERs) with the rated
power of 4 kW, resulting with a total of Utotal = 24 PVs. For
the modeling of PVs, OLTC, households consumption, and the
other grid components, we adopt Disc framework [2].
We simulated the system in the Disc framework both for
the case without control and the case in which the proposed
control scheme is applied. When no control is adopted for
the PVs, in the afternoon hours we observe an overvoltage
on the feeders, which increases with their distance from the
transformer, see Fig. 7(a). Fig. 7(b) shows the proposed control
strategy7 provides a reduction of the over-voltages with respect
to the scenario without control. One can also observe that
the slope of the voltage profile in afternoon/morning hours
is reduced, which is another benefit of the control strategy.
Specifically, smoothing the voltage profile curve in systems
dominated by PV power gives more time and flexibility to the
bulk generation, which is characterized with high inertia and
slow transient ramp-up/ramp-down response, to respond to the
the power supply variations. The proposed control strategy was
6We note that the scenario with a single neighbor should be avoided, as in
this case a malicious neighbor may corrupt or hide the information [11].
7We used the optimized value of the droop parameter γ = 0.005, obtained
via simulations.
020406080100Number of DERs102103104105106JJbcLBJc05101520Time [hrs]0.80.911.11.2Voltages [PU]f1f2f3f4f5f6f705101520Time [hrs]0.80.911.11.2Voltages [PU]f1f2f3f4f5f6f7Fig. 8. The voltage measured on the LV feeders over the month of June
of Disc simulator (i) without control, depicted with purple boxes, and (ii)
with proposed control, blue boxes. The plot shows minimum, quartile and
maximum values.
Fig. 9. Evolution of the fraction of time spent by each DER as VSC in a
feeder with 4 DERs.
also simulated over a period of one month and the reduction
of over voltages was also verified, see Fig. 8. Observe that the
under-voltages are not reduced, as their control is not included
in the proposed strategy. Nevertheless, we note that a similar
credit system can be employed for the load prioritization
during low production periods.
The verification of the proportional fairness objective (4) in
a centralized setting was performed via MATLAB simulations,
where the initial credit was randomly distributed among DERs,
i.e., the credit status vector c was randomly initialized, and the
control period duration was set T tc = 15 minutes. We per-
formed 1000 simulation runs, corresponding to 250 hours of
LVDG operation, and obtained that the DERs spend the equal
fraction of time operating as VSCs (the detailed presentation
of these results is omitted due to space constraints).
Finally, we turn to the blockchain-related aspects of the
proposed framework. The blockchain software installed in
the DERs controller supported a private Ethereum blockchain
[6], which provides the possibility of writing complex smart
contracts, and is simulated using EthereumJS testrpc [12].
We deployed NM G contracts on the blockchain, where DERs
interacted with the one corresponding to their feeder, and
the initial credit was randomly distributed among DERs. The
scripts that interface DERs with the blockchain implemented
the functionalities described in Section IV. We monitored
the output of the scripts and observed that the contract was
effectively reproducing the fairness objective, see Fig. 9.
Clearly, after a transient period caused by the initial credit
distribution, DERs operate as VSCs for equal fractions of time.
VI. CONCLUSIONS
The current research efforts in MG control are oriented
towards distributed schemes, requiring development of novel
protocols to enforce the security and the information trust-
worthiness among control agents. The blockchain protocol has
interesting properties that can be used to this end, resulting in a
novel design of multi-agent control systems. In this paper, we
developed proportional fairness MG control and established
a comparison between the standard centralized architecture
and blockchain-based one, verifying that the blokchain-based
solution can reproduce the control objectives of the centralized
architecture. We note that further investigation should be
conducted with respect to more complex control schemes.
limits of
We also outline two potential
the private
blockchain architecture in the context of MG control: the
mining cost and the communication cost. Specifically, alter-
natives to the energy inefficient POW have to be found in
order to enable private blockchains for systems with limited
hardware capabilities, such as MG components. Secondly, the
communication cost of the blockchain protocol is significantly
higher than the cost of the centralized one. The design of
blockchain protocol tailored for MG applications is part of
our ongoing research.
ACKNOWLEDGMENT
The work presented in this paper was supported in part by
the EU, under grant agreement no. 607774 "ADVANTAGE".
REFERENCES
[1] L. E. Zubieta, "Are Microgrids the Future of Energy?: DC Microgrids
from Concept to Demonstration to Deployment," IEEE Electrific. Mag.,
vol. 4, no. 2, pp. 37–44, June 2016.
[2] R. Pedersen, C. Sloth, G. B. Andresen, and R. Wisniewski, "Disc: a
simulation framework for distribution system voltage control," in Proc.
of IEEE European Control Conference (ECC), 2015, pp. 1056–1063.
[3] R. Tonkoski, L. A. Lopes, and T. H. El-Fouly, "Coordinated active power
curtailment of grid connected PV inverters for overvoltage prevention,"
IEEE Trans. Sustain. Energy, vol. 2, no. 2, pp. 139–147, 2011.
[4] R. Pedersen, C. Sloth, and R. Wisniewski, "Coordination of electrical
distribution grid voltage control - a fairness approach," in Proc. IEEE
Conference on Control Applications (CCA), 2016, pp. 291–296.
[5] S. Nakamoto, "Bitcoin: A peer-to-peer electronic cash system," [Online].
Available: https://bitcoin.org/bitcoin.pdf, 2008, accessed: 2017-03-21.
[6] G. Wood, "Ethereum: A secure decentralised generalised transaction
ledger," [Online]. Available: http://gavwood.com/paper.pdf, 2014, ac-
cessed: 2017-03-21.
[7] J. Rocabert, A. Luna, F. Blaabjerg, and P. Rodriguez, "Control of power
converters in ac microgrids," IEEE Trans. Power Electron., vol. 27,
no. 11, pp. 4734–4749, 2012.
[8] T. Dragicevi´c, J. M. Guerrero, J. C. Vasquez, and D. Skrlec, "Supervi-
sory control of an adaptive-droop regulated dc microgrid with battery
management capability," IEEE Trans. Power Electron., vol. 29, no. 2,
pp. 695–706, 2014.
[9] J. M. Guerrero, J. C. Vasquez, J. Matas, L. G. De Vicuna, and
M. Castilla, "Hierarchical control of droop-controlled ac and dc mi-
crogridsa general approach toward standardization," IEEE Trans. Ind.
Electron., vol. 58, no. 1, pp. 158–172, 2011.
[10] A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bit-
coin and Cryptocurrency Technologies: A Comprehensive Introduction.
Princeton University Press, 2016.
[11] E. Heilman, A. Kendler, A. Zohar, and S. Goldberg, "Eclipse attacks on
bitcoin's peer-to-peer network." in USENIX Security, 2015, pp. 129–144.
Available:
[12] "Ethereumjs
[Online].
testrpc,"
https://github.com/ethereumjs/testrpc, accessed: 2017-03-21.
012345678Feeder number0.911.11.2Voltage [PU]10203040506070k050100Relative periods [%]DER1DER2DER3DER4 |
1809.05897 | 1 | 1809 | 2018-09-16T15:43:11 | Systems of bounded rational agents with information-theoretic constraints | [
"cs.MA",
"cs.AI",
"cs.IT",
"cs.IT"
] | Specialization and hierarchical organization are important features of efficient collaboration in economical, artificial, and biological systems. Here, we investigate the hypothesis that both features can be explained by the fact that each entity of such a system is limited in a certain way. We propose an information-theoretic approach based on a Free Energy principle, in order to computationally analyze systems of bounded rational agents that deal with such limitations optimally. We find that specialization allows to focus on fewer tasks, thus leading to a more efficient execution, but in turn requires coordination in hierarchical structures of specialized experts and coordinating units. Our results suggest that hierarchical architectures of specialized units at lower levels that are coordinated by units at higher levels are optimal, given that each unit's information-processing capability is limited and conforms to constraints on complexity costs. | cs.MA | cs |
Systems of bounded rational agents with
information-theoretic constraints
Sebastian Gottwald1 and Daniel A. Braun1
1Institute of Neural Information Processing, Faculty of Engineering, Computer Science
and Psychology, University of Ulm.
Keywords: Bounded rationality, multi-agent systems, hierarchical structure, spe-
cialization, Free Energy principle
Abstract
Specialization and hierarchical organization are important features of efficient
collaboration in economical, artificial, and biological systems. Here, we investi-
gate the hypothesis that both features can be explained by the fact that each entity
of such a system is limited in a certain way. We propose an information-theoretic
approach based on a Free Energy principle, in order to computationally analyze
systems of bounded rational agents that deal with such limitations optimally. We
find that specialization allows to focus on fewer tasks, thus leading to a more ef-
ficient execution, but in turn requires coordination in hierarchical structures of
specialized experts and coordinating units. Our results suggest that hierarchical
architectures of specialized units at lower levels that are coordinated by units at
higher levels are optimal, given that each unit's information-processing capability
is limited and conforms to constraints on complexity costs.
1
Introduction
The question of how to combine a given set of individual entities in order to perform a
certain task efficiently is a long-lasting question shared by many disciplines, including
economics, neuroscience, and computer science. Even though the explicit nature of a
single individuum might differ between these fields, e.g. an employee of a company,
a neuron in a human brain, or a computer or processor as part of a cluster, they have
one important feature in common that usually prevents them from functioning isolated
by themselves: they are all limited. In fact, this was the driving idea that inspired Her-
bert A. Simons early work on decision-making within economic organizations (Simon,
1943, 1955), which earned him a Nobel prize in 1978. He suggested that a scientific
behavioral grounding of economics should be based on bounded rationality, which has
remained an active research topic until today (Russell and Subramanian, 1995; Lipman,
1995; Aumann, 1997; Kaelbling et al., 1998; DeCanio and Watkins, 1998; Gigerenzer
and Selten, 2001; Jones, 2003; Sims, 2003; Burns et al., 2013; Ortega and Braun, 2013;
Acerbi et al., 2014; Gershman et al., 2015). Subsequent studies in management theory
have been built upon Simons basic observation, because "if individual managers had
unlimited access to information that they could process costlessly and instantaneously,
there would be no role for organizations employing multiple managers" (Geanakoplos
and Milgrom, 1991). In neuroscience and biology, similar concepts have been used
to explore the evolution of specialization and modularity in nature (Kashtan and Alon,
2005; Wagner et al., 2007). In modern computer science, the terms parallel computing
and distributed computing denote two separate fields that share the concept of decen-
tralized computing (Radner, 1993), i.e. the combination of multiple processing units in
order to decrease the time of computationally expensive calculations.
Despite of their success, there are also shortcomings of most approaches to the or-
ganization of decision-making units based on bounded rationality: As (DeCanio and
Watkins, 1998) point out, existing agent-based methods (including their own) are not
using an overreaching optimization principle, but are tailored to the specific types of
calculations the agents are capable of, and therefore lack in generality. Moreover, it
is usually imposed as a separate assumption that there are two types of units, special-
ized operational units and coordinating non-operational units, which was expressed by
(Knight, 1921) as "workers do, and managers figure out what to do".
Here, we use a Free Energy optimization principle in order to study systems of
bounded rational agents, extending the work in (Ortega and Braun, 2011, 2013; Ge-
newein and Braun, 2013; Genewein et al., 2015) on decision-making, hierarchical in-
formation-processing, and abstraction in intelligent systems with limited information-
processing capacity, that has precursors in the economic and game-theoretic literature
(McKelvey and Palfrey, 1995; Ochs, 1995; Mattsson and Weibull, 2002; Wolpert, 2006;
Spiegler, 2011; Howes et al., 2009; Todorov, 2009; Still, 2009; Tishby and Polani, 2011;
Kappen et al., 2012; Edward et al., 2014; Lewis et al., 2014). Note that the Free En-
ergy optimization principle of information-theoretic bounded rationality is connected
to the Free Energy principle used in variational Bayes and Active Inference (Friston
et al., 2015a,b, 2017a,b), but has a conceptually distinct interpretation and some formal
differences (see Section 6.3 for a detailed comparison).
By generalizing the ideas in (Genewein and Braun, 2013; Genewein et al., 2015) on
two-step information-processing to an arbitrary number of steps, we arrive at a general
Free Energy principle that can be used to study systems of bounded rational agents. The
advantages of our approach can be summarized as follows:
(i) There is a unifying Free Energy principle that allows for a multi-scale problem
formulation for an arbitrary amount of agents distributed among the steps of gen-
eral multi-step processes (see Sections 3.3 and 4.2).
(ii) The computational nature of the optimization principle allows to explicitly cal-
culate and compare optimal performances of different agent architectures for a
given set of objectives and resource constraints (see Section 5).
(iii) The information-theoretic description implies the existance of the two types of
2
units mentioned above, non-operational units (selector nodes) that coordinate the
activities of operational units. Depending on their individual resource constraints,
the Free Energy principle assigns each unit to a region of specialization that is part
of an optimal partitioning of the underlying decision space (see Section 4.3).
In particular, we find that, for a wide range of objectives and resource limitations
(see Sections 5 and 5), hierarchical systems with specialized experts at lower levels and
coordinating units at higher levels generally outperform other structures.
2 Preliminaries
This section serves as an introduction to the terminology required for our framework
presented in Section 3 and 4.
X . Given a probability distribution p ∈ P
f : X → R is denoted by (cid:104)f(cid:105)p :=(cid:80)
Notation
We use curly letters, W, X , A, etc. to denote sets of finite cardinality, in particular the
underlying spaces of the corresponding random variables W , A, X, etc., whereas the
values of these random variables are denoted by small letters, i.e. w ∈ W, a ∈ A,
and x ∈ X , respectively. We denote the space of probability distributions on a given
set X by P
X , the expectation of a function
x p(x)f (x). If the underlying probability measure
is clear without ambiguity we just write (cid:104)f(cid:105).
For a function g with multiple arguments, e.g. for g : X × Y → R, (x, y)(cid:55)→ g(x, y),
we denote the function X → R, x(cid:55)→ g(x, y) for fixed y ∈ Y by g(·, y) (partial applica-
tion), i.e. the dot indicates the variable of the new function. Similarly, for fixed y ∈ Y,
we denote a conditional probability distribution on X with values p(xy) by p(·y). This
if F is a functional defined on functions of one variable, e.g. F [f ] :=(cid:80)
notation shows the dependencies clearly without giving up the original function names
and thus allows to write more complicated expressions in a concise form. For example,
x f (x) for all
functions f : X → R, then evaluating F on the function g in its first variable while
that the resulting value (which equals(cid:80)
keeping the second variable fixed, is simply denoted by F [g(·, y)]. Here, the dot indi-
cates on which argument of g the functional F is acting and at the same time it records
x g(x, y) in the case of the example) does not
depend on a particular x but on the fixed y.
2.1 Decision-making
Here, we consider (multi-task) decision-making as the process of observing a world
state w ∈ W, sampled from a given distribution ρ ∈ P
W, and choosing a corresponding
action a ∈ A drawn from a posterior policy P (·w) ∈ P
A. Assuming that the joint
distribution of W and A is given by p(a, w) := ρ(w)P (aw), then P is the conditional
probability distribution of A given W . Unless stated otherwise, the capital letter P
always denotes a posterior, while the small letter p denotes the joint distribution or a
marginal of the joint (i.e. a dependent variable).
3
(cid:88)
(cid:88)
a∈A
A decision-making unit is called agent. An agent is rational, if its posterior policy
P maximizes the expected utility
(cid:104)U(cid:105) =
w∈W
ρ(w)
P (aw) U (a, w)
(1)
for a given utility function U : W ×A → R. Note that the utility U may itself represent
an expected utility over consequences in the sense of von Neumann and Morgenstern
(1944), where W would serve as a context variable for different tasks. The posterior P
can be seen as a state-action policy that selects the best action a ∈ A with respect to a
utility function U given the state w ∈ W of the world.
2.2 Bounded rational agents
In the information-theoretic model of bounded rationality (Ortega and Braun, 2011,
2013; Genewein et al., 2015), an agent is bounded rational if its posterior P maximizes
(1) subject to the constraint
ρ(w) DKL(P (·w)(cid:107)q) (cid:54) D0 ,
(2)
(cid:10)DKL(P(cid:107)q)(cid:11) =
defined by DKL(p(cid:107)q) := (cid:80)
y∈Y
(cid:88)
w∈W
for a given bound D0 > 0 and a prior policy q ∈ P
A. Here, DKL(p(cid:107)q) denotes the
Kullback-Leibler (KL) divergence between two distributions p, q ∈ P
Y on a set Y,
p(y) log(p(y)/q(y)). Note that, for DKL(p(cid:107)q) to be
well-defined, p must be absolutely continuous with respect to q, so that q(y) = 0 implies
p(y) = 0. When p or q are conditional probabilities, then we treat DKL(p(cid:107)q) as a
function of the additional variables.
Given a world state w, the information-processing consists of transforming a prior q
to a world state specific posterior distribution P (·w). Since DKL(P (·w)(cid:107)q) measures
by how much P (·w) diverges from q, the upper bound D0 in (2) characterizes the
limitation of the agent's average information-processing capability: If D0 is close to
zero, the posterior must be close to the prior for all world states, which means that
A contains only little information about W , whereas if D0 is large, the posterior is
allowed to deviate from the prior by larger amounts and therefore A contains more
information about W . We use the KL-divergence as a proxy for any resource measure,
as any resource must be monotone in processed information, which is measured by the
KL-divergence between prior and posterior.
Technically, maximizing expected utility under the constraint (2) is the same as
minimizing expected complexity cost under the constraint of a minimal expected per-
formance, where complexity is given by the expected KL-divergence between prior and
posterior and performance by expected utility. Minimizing complexity means minimiz-
ing the number of bits required to generate the actions.
2.3 Free Energy principle
By the variational method of Lagrange multipliers, the above constrained optimization
problem is equivalent to the unconstrained problem
,
(3)
(cid:16)
max
P
(cid:104)U(cid:105) −
1
β
(cid:10)DKL(P(cid:107)q)(cid:11)(cid:17)
4
In the literature on
where β > 0 is chosen such that the constraint (2) is satisfied.
information-theoretic bounded rationality (Ortega and Braun, 2011, 2013), the objective
in (3) is known as the Free Energy F of the corresponding decision-making process. In
this form, the optimal posterior can be explicitly derived by determining the zeros of the
functional derivative of F with respect to P , yielding the Boltzmann-Gibbs distribution
(4)
q(a) eβ U (a,w) , Z(w) :=
q(a) eβ U (a,w) .
(cid:88)
1
P (aw) =
Z(w)
a∈A
Note how the Lagrange multiplier β (also known as inverse temperature) interpolates
between an agent with zero processing capability that always acts according to its prior
policy (β = 0) and a perfectly rational agent (β → ∞). Note that, plugging (4) back
into the Free Energy (3) gives
(cid:10) log Z(cid:11) .
P F[P ] =
max
1
β
2.4 Optimal prior
The performance of a given bounded rational agent crucially depends on the choice of
the prior policy q. Depending on D0 and the explicit form of the utility function, it
can be advantageous to a priori prefer certain actions over others. Therefore, optimal
bounded rational decision-making includes optimizing the prior in (3). In contrast to
(3), the modified optimization problem
(cid:16)
max
P,q
(cid:104)U(cid:105) −
1
β
(cid:10)DKL(P(cid:107)q)(cid:11)(cid:17)
(5)
(6)
(7)
does not have a closed form solution. However, since the objective is convex in (P, q),
a unique solution can be obtained iteratively by alternating between fixing one and op-
timizing the other variable (Csisz´ar and Tusn´ady, 1984), resulting in a Blahut-Arimoto
type algorithm (Arimoto, 1972; Blahut, 1972) that consists of alternating the equations
(cid:40)
q(a) = p(a) = (cid:80)
P (aw) = 1
Z(w) q(a) eβU (a,w) ,
w ρ(w)P (aw),
with Z(w) given by (4). In particular, the optimal prior policy is the marginal p of the
joint distribution of W and A. In this case, the average Kullback-Leibler divergence
between prior and posterior coincides with the mutual information between W and A,
I(W ; A) =
p(w, a) log
(cid:88)
(cid:88)
w∈W
a∈A
p(w, a)
ρ(w)p(a)
(cid:17)
(cid:16)
max
P
(cid:104)U(cid:105) −
1
β
=(cid:10)DKL(P, p)(cid:11) .
It follows that the modified optimization principle (6) is equivalent to
I(W ; A)
.
(8)
Due to its equivalence to rate distortion theory (Shannon, 1959) (with a negative
distortion measure given by the utility function), (8) is denoted as the rate distortion
case of bounded rationality in (Genewein and Braun, 2013).
5
2.5 Multi-step and multi-agent systems
When multiple random variables are involved in a decision-making process, such a
process constitutes a multi-step system (see Section 3). Consider the case of a prior
over A that is conditioned on an additional random variable X with values x ∈ X , i.e.
q(·x) ∈ P
A for all x ∈ X . Remember that we introduced a bounded rational agent as
a decision-making unit, that, after observing a world state w, transforms a single prior
policy over a choice space A to a posterior policy P (·w) ∈ P
A. Therefore, in the case
of a conditional prior, the collection of prior policies {q(·x)}x∈X can be considered as
a collection or ensemble of agents, or a multi-agent system, where for a given x ∈ X ,
the prior q(·x) is transformed to a posterior P (·x, w) ∈ P
A by exactly one agent.
Note that a single agent deciding about both, X and A, would be modelled by a prior
of the form q(x, a) with x ∈ X and a ∈ A, instead.
Hence, in order to combine multiple bounded rational agents, we are first splitting
the full decision-making process into multiple steps by introducing additional interme-
diate random variables (Section 3), which then will be used to assign one or more agents
to each of these steps (Section 4). In this view, we can regard a multi-agent decision-
making system as performing a sequence of successive decision steps until an ultimate
action is selected.
3 Multi-step bounded rational decision-making
3.1 Decision nodes
Let W and A denote the random variables describing the full decision-making process
for a given utility function U : W × A → R, as described in Section 2.
In order
to separate the full process into N > 1 steps, we introduce internal random variables
X1, . . . , XN−1, which represent the outputs of additional intermediate bounded rational
decision-making steps. For each k, let Xk denote the target space and xk ∈ Xk a partic-
ular value of Xk. We call a random variable that is part of a multi-step decision-making
system a (decision) node. For simplicity, we assume that all intermediate random vari-
ables are discrete (just like W and A).
Here, we are treating feed-forward architectures originating at X0 := W and ter-
k=0 according to the
minating in XN := A. This allows to label the variables {Xk}N
information flow, so that Xj potentially can only obtain information about Xi if i < j.
The canonical factorization
p(w, x1, . . . , xN−1, a) = ρ(w) p(x1w) p(x2x1, w)··· p(axN−1, . . . , x1, w)
of the joint probability distribution of {Xk}N
cies of each decision node.
k=0 therefore consists of the posterior poli-
3.2 Two types of nodes: inputs and prior selectors
A specific multi-step architecture is characterized by specifying the explicit depen-
dencies on the preceding variables for each node's prior and posterior, or better the
6
Figure 1. Example of a processing node that is part of a multi-step architecture with
N = 5, visualized as a directed graph. Here, X3 processes the output of X2 by trans-
forming a prior policy p(x3x1) to a posterior policy P (x3x2, x1). The prior of X3
being conditioned on the output of X1 (indicated by the dashed arrow), means that X1
determines which of the prior policies {p(·x1)}x1∈X1 is used by X3 to process a given
output of X2.
missing dependencies. For example, in a given multi-step system, the posterior of the
node X3 might depend explicitly on the outputs of X1 and X2 but not on W , so that
P (x3x2, x1, w) = P (x3x2, x1). If its prior has the form q(x3x1), then X3 has to pro-
cess the output of X2. Moreover, in this case, the actual prior policy q(·x1) ∈ P
X3 that
is used by X3 for decision-making is selected by X1 (see Figure 1).
In general, the inputs Xi, . . . , Xj that have to be processed by a particular node Xk,
are given by the variables in the posterior that are missing from the prior, and, if its prior
q is conditioned on the outputs of Xl, . . . , Xm, then these nodes select which of the prior
policies {q(·xl, . . . , xm)}xl∈Xl,...,xm∈Xm ⊂ P
Xk is used by Xk for decision-making, i.e.
for the transformation
q(xkxl, . . . , xm) −→ P (xkxl, . . . , xm, xi, . . . , xj) .
We denote the collection of input nodes of Xk by X k
selecting nodes of Xk by X k
is then given by
in (:= {Xi, . . . , Xj}) and the prior
sel (:= {Xl, . . . , Xm}). The joint distribution of X0, . . . , XN
(cid:0)xN
(cid:12)(cid:12)xN
sel, xN
in
(cid:1)
(9)
Specifying the sets X k
for all xk ∈ Xk and xk
in ∈ X k
in of selectors and inputs for each node in the system
then uniquely characterizes a particular multi-step decision-making system. Note that
we always have (X 1
sel, xk
sel and X k
sel ∈ X k
Decompositions of the form (9) are often visualized by directed acyclic graphs, so-
called DAGs (see e.g. Bishop, 2006, pp. 360). Here, in addition to the decomposition
of the joint in terms of posteriors, we have added the information about the prior depen-
dencies in terms of dashed arrows, as shown in Figure 1.
sel, X 1
in) = ({},{X0}).
p(x0, . . . , xN ) = ρ(w) P1
(cid:0)x1
(cid:12)(cid:12)x1
(cid:1)
sel, x1
in
··· PN
in (k = 1, . . . , N).
7
WX1X2X3X4Ap(x3x1)−→p(x3x2,x1),
sup
(10)
(cid:16)
1
βk
k=1
P1,q1,...,PN ,qN
(cid:104)U(cid:105) −
(cid:88)
N(cid:88)
(cid:10)DKL(P(cid:107)q)(cid:11) =
3.3 Multi-step Free Energy principle
If Pk and qk denote the posterior and prior of the k-th node of an N-step decision-
process, then the Free Energy principle takes the form
where, in addition to the expectation over inputs, the average of DKL(Pk(cid:107)qk) now also
includes the expectation with respect to Xsel,
(cid:10)DKL(Pk(cid:107)qk)(cid:11)(cid:17)
(cid:0)P (·xsel, xin)(cid:107)q(·xsel)(cid:1) .
Since the prior policies only appear in the KL-divergences, and moreover, there is
exactly one KL-divergence per prior, it follows as in 2.4, that for each k = 1, . . . , N the
(cid:88)
optimal prior is the marginal given for all xk ∈ Xk by
I(cid:0)X k
sel = xsel. Hence, the Free Energy principle can be simplified to
qk(xkxsel) = pk(xkxsel) :=
{x0,...,xN}\({xk}∪xsel)
p(xsel, xin) DKL
whenever X k
p(x0, . . . , xN ) ,
(cid:1)(cid:17)
(cid:12)(cid:12)X k
sel
N(cid:88)
p(xsel)
in; Xk
(cid:16)
(12)
(11)
xsel,xin
1
,
sup
P1,...,PN
(cid:104)U(cid:105) −
1
βk
k=1
where I(X; Y Z) denotes the conditional mutual information of two random variables
X, Y given a third random variable Z.
By optimizing (12) alternatingly, i.e. optimizing one posterior at a time while keep-
ing the others fixed, we obtain for each k = 1, . . . , N,
(cid:0)xkxsel, xin
(cid:1) =
Pk
(cid:1)
(cid:0)xkxsel
pk
Zk(xsel, xin)
(cid:104)
exp
βk Fk[P1, . . . , PN ](xk, xsel, xin)
,
(13)
(cid:105)
sel = xsel and X k
in = xin. Here, Zk(xsel, xin) denotes the normaliza-
whenever X k
tion constant and Fk[P1, . . . , PN ] denotes the (effective) utility function on which the
decision-making in Xk is based on. More precisely, given X = (Xk, X k
in),
sel, X k
it is the Free Energy of the subsequent nodes in the system, i.e.
for any value of
x := (xk, xsel, xin) we obtain for Fk := Fk[P1, . . . , PN ],
(cid:88)
1
p(x)
{x0,...,xN}\x
Fk(x) =
where
p(x0, . . . , xN )Fk,loc(x0, . . . , xN ) ,
(cid:88)
i>k
1
βi
log
in)
Pi(xixi
pi(xixi
sel, xi
sel)
(14)
.
Fk,loc(x0, . . . , xN ) := U (x0, xN ) −
in and xi
sel are collections of values of the random variables in X i
Here, xi
sel,
respectively. The final Blahut-Arimito-type algorithm consists of iterating (13), (11),
and (14) for each k = 1, . . . , N until convergence is achieved. Note that, since each op-
timization step is convex (marginal convexity), convergence is guaranteed but generally
not unique (Jain and Kar, 2017), so that, depending on the initialization, one might end
up in a local optimum.
in and X i
8
3.4 Example: two-step information-processing
The cases of serial and parallel information-processing studied in (Genewein and Braun,
2013), are special cases of multi-step decision-making systems introduced above. Both
cases are two-step processes (N = 2) involving the variables X0 = W , X1 = X, and
in) = ({},{X1}), and the parallel
X2 = A. The serial case is characterized by (X 2
in) = ({X1},{X0}). There is a third possible combination for N = 2,
case by (X 2
in) = ({},{X0, X1}). However, it can be shown that this case is
given by (X 2
equivalent to the (one-step) rate distoration case from Section 2, because if A has direct
world state access, then any extra input to the final node A = X2, that is not a prior
selector, contains redundant information.
sel, X 2
sel, X 2
sel, X 2
4 Systems of bounded rational agents
4.1 From multi-step to multi-agent systems
As explained in 2.5 above, a single random variable Xk that is part of an N-step
decision-making system can represent a single agent or a collection of multiple agents,
sel, i.e. whether Xk has multiple priors which are
depending on the cardinality of X k
sel or not. Therefore, an N-step bounded rational decision-
selected by the nodes in X k
making system with N > 1 represents a bounded rational multi-agent system (of depth
N).
sel of X k
For a given k ∈ {1, . . . , N}, each value x ∈ X k
sel corresponds to exactly one
agent in Xk. During decision-making, the agents that belong to the nodes in X k
sel are
sel agents in Xk is going to receive a given input xin (see 4.4
choosing which of the X k
below for a detailed example). This decision is based on how well the selected agent
x will perform on the input xin by transforming its prior policy pk(·x) into a posterior
(cid:88)
policy Pk(·x, xin), subject to the constraint
p(xinx) DKL
(cid:0)Pk(·x, xin)(cid:107)pk(·x)(cid:1) (cid:54) Dx ,
(cid:104)DKL(Pkpk)(cid:105)(x) :=
(15)
xin
where Dx > 0 is a given bound on the agent's information-processing capability. Sim-
ilarly to multi-step systems, this choice is based on the performance measured by the
Free energy of the subsequent agents.
4.2 Multi-agent Free Energy principle
In contrast to multi-step decision-making, the information-processing bounds are al-
lowed to be functions of the agents instead of just the nodes, resulting in an extra La-
grange multiplier for each agent in the Free Energy principle (10). As in (12), optimiz-
ing over the priors yields the simplified Free Energy principle
I(cid:0)X k
(cid:12)(cid:12)X k
(cid:1)(cid:17)
in; Xk
sel = xk
sel
,
(16)
(cid:16)
sup
P1,...,PN
(cid:104)U(cid:105) −
N(cid:88)
(cid:88)
k=1
sel∈X k
xk
sel
p(xk
βk(xk
sel)
sel)
9
which can be solved iteratively as explained in the previous section, the only difference
sel. Hence, for the posterior of
being that the Lagrange parameters βk now depend on xk
an agent that belongs to node k, we have
(cid:0)xkxsel, xin
(cid:1) =
Pk
(cid:1)
(cid:0)xkxsel
pk
Zk(xsel, xin)
where βk(xk
Fk is given by (14) except that now we have
sel) is chosen such that the constraint (15) is fulfilled for all x ∈ xk
sel, and
Fk,loc(x0, . . . , xN ) := U (x0, xN ) −
1
βi(xi
sel)
log
in)
Pi(xixi
pi(xixi
sel, xi
sel)
.
(18)
The resulting Blahut-Arimoto-type algorithm is summarized in Algorithm 1.
(cid:105)
exp
βk(xk
sel) Fk(xk, xsel, xin)
,
(17)
(cid:104)
(cid:88)
i>k
Algorithm 1 Blahut-Arimito-type algorithm for (16)
1: procedure GETMULTIAGENTSOLUTION(U, ρ,{(X k
initialize p(x0, . . . , xN ) ∀x0, . . . , xN,
repeat
sel, X k
in)}N
k=1, β, )
Fk(xk, xsel, xin) ← (14), (18) ∀xk, xsel, xin
Pk(xkxsel, xin) ← (17) ∀xk, xsel, xin
p(xkxsel) ← (11) ∀xk, xsel
p(x0, . . . , xN ) ← (9) ∀x0, . . . , xN
(cid:46) calc. effective utility
(cid:46) update posterior
(cid:46) update prior
(cid:46) update joint
p0 ← p
for k = 1, . . . , N do
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14: end procedure
end for
error ← dist(p, p0)
until error <
return P1, . . . , PN
4.3 Specialization
Even though a given multi-agent architecture predetermines the underlying set of choices
for each agent, only a small part of such a set might be used by a given agent in the op-
timized system. For example, all agents in the final step potentially can perform any
action a ∈ A (see Figure 2 and the Example in 4.4 below). However, depending on
their indiviual information-processing capabilities, the optimization over the agents'
priors can result in a (soft) partitioning of the full action space A into multiple chunks,
where each of these chunks is given by the support of the prior of a given agent x,
supp(p(·x)) ⊂ A. Note that the resulting partitioning is not necessarily disjoint,
since agents might still be sharing a number of actions, depending on their available
information-processing resources. If the processing capability is low compared to the
amount of possible actions in the full space, and if there are enough agents at the same
level, then this partitioning allows each agent to focus on a smaller number of options
10
to choose from, provided that the coordinating agents have enough resources to decide
between the partitions reliably.
Therefore, the amount of prior adaptation of an agent, i.e. by how much its optimal
prior p deviates from a uniform prior p0 over all accessible choices, which is measured
by the KL-divergence DKL(p(cid:107)p0), determines its degree of specialization. More pre-
cisely, we define the specialization of an agent with prior p and choice space X by
S[p] :=
DKL(p(cid:107)p0)
log X
= 1 −
H[p]
log X
,
(19)
(cid:80)
where H[p] := −
x p(x) log p(x) denotes the Shannon entropy of p. By normalizing
with log X, we obtain a quantity between 0 and 1, since 0 (cid:54) H(p) (cid:54) log X. Here,
S[p] = 0 corresponds to H[p] = log X, which means that the agent is completely
unspecialized, whereas S[p] = 1 corresponds to H[p] = 0, which implies that p has
support on a single option x∗ ∈ X meaning that the agent deterministically performs
always the same action and therefore is fully specialized.
Figure 2. Example of a hierarchical architecture of 10 agents that are combined via
the 3-step decision-making system (N = 3) shown in the upper left corner (see 4.4 for
details). Here, every node -- and therefore every agent -- has access to the world states
(big circle). X1 consists of one agent that decides about which of the X1 = 3 agents in
X2 obtains a given world state as input. The selected agent in X2 selects which of the
X2 = 2 agents out of the X1 · X2 = 6 agents in A that are connected to it, obtains
the world state to perform the final decision about an action a ∈ A (grey circles on the
right). In our notation introduced below, this architecture is labelled by (1, 4)[1,3,(3,2)]
(see Section 5.1).
11
worldagentactioninputselectionWX1X2A4.4 Example: Hierarchical multi-agent system with three levels
Consider the example of an architecture of 10 agents shown in Figure 2 that are com-
bined via the 3-step decision-making system given by
(X 2
sel, X 2
in) = ({X1},{W}),
(X 3
sel, X 3
in) = ({X1, X2},{W}),
(20)
as visualized in the upper left corner of Figure 2. The number of agents in each node
is given by the cardinality of the target space of the selecting node(s) (or equals one if
there are no selectors). Hence, X1 consists of one agent, X2 consists of X1 agents, and
A consists of X1 · X2 agents. For example, if we have X1 = 3 and X2 = 2, as in
Figure 2, then this results in a hierarchy of 1, 3 and 6 agents.
The joint probability of the system characterized by (20) is given by
p(w, x1, x2, a) = p(w)P1(x1w)P2(x2x1, w)P3(ax2, x1, w) ,
and the Free Energy by
(cid:88)
(cid:20)
F[P1, P2, P3] =
p(w, x1, x2, a)
U (a, w) −
1
β1
log
P1(x1w)
p1(x1)
where the priors p1, p2, and p3 are given by the marginals (11), i.e.
1
β3(x1, x2)
log
P3(ax2, x1, w)
p3(ax2, x1)
w,x1,x2,a
1
β2(x1)
−
log
p1(x1) =
p2(x2x1) =
p3(ax2, x1) =
P2(x2x1, w)
p2(x2x1) −
(cid:88)
(cid:88)
(cid:88)
w
w
ρ(w)P (x1w) ,
p(wx1)P2(x2x1, w) ,
(cid:21)
,
(cid:105)
.
By (13), the posteriors that iteratively solve the Free Energy principle are
p(wx1, x2)P3(ax2, x1, w).
w
exp(cid:2)β1F1(w, x1)(cid:3) ,
exp(cid:2)β2(x1)F2(w, x1, x2)(cid:3) ,
exp(cid:2)β3(x1, x2)U (a, w)(cid:3) ,
p1(x1)
Z(w)
p2(x2x1)
Z(w, x1)
p3(ax2, x1)
Z(w, x1, x2)
P1(x1w) =
P2(x2x1, w) =
P3(ax2, x1, w) =
where, by (14) and (18),
(cid:88)
x2,a
(cid:88)
a
F1(w, x1) :=
F2(w, x1, x2) :=
p(x2, ax1, w)
1
β2(x1)
log
U (a, w) −
1
−
β3(x1, x2)
(cid:105)
,
P2(x2x1, w)
p2(x2x1)
P3(ax2, x1, w)
p3(ax2, x1)
log
log
1
P3(ax2, x1, w)
p3(ax2, x1)
P3(ax2, x1, w)
U (a, w) −
β3(x1, x2)
(cid:104)
(cid:104)
12
Given a world state w ∈ W, the agent in X1 decides about which of the three agents
in X2 obtains w as an input. This narrows down the possible choices for the selected
agent in X2 to two out of the six agents in A. The selected agent performs the final
decision by choosing an action a ∈ A. Depending on its degree of specialization, which
is a result of his own and the coordinating agents' resources, this agent will choose his
action from a certain subset of the full space A.
5 Optimal Architectures
Here, we show how the above framework can be used to determine optimal architectures
of bounded rational agents. Summarizing the assumptions made in the derivations, the
multi-agent systems that we analyze must fulfill the following requirements:
(i) The information-flow is feed-forward: An agent in Xk can obtain information
directly from another agent that belongs to Xm only if m < k.
(ii) Intermediate agents cannot be endpoints of the decision-making process:
the
information-flow always starts with the processing of W and always ends with
a decision a ∈ A.
(iii) A single agent is not allowed to have multiple prior policies: Agents are the small-
est decision-making unit, in the sense that they transform a prior to a posterior
policy over a set of actions in one step.
The performance of the resulting architectures is measured with respect to the ex-
pected utility they are able to achieve under a given set of resource constraints. To
this end, we need to specify (1) the objective for the full decision-making process, (2)
the number N of decision-making steps in the system, (3) the maximal number n of
agents to be distributed among the nodes, and (4) the individual resource constraints
{D1, . . . , Dn} of those agents.
We illustrate the specifications (1) -- (4) with a toy example in Section 5.2 by show-
casing and explicitly explaining the differences in performance of several architectures.
Moreover, we provide a broad performance comparison in Section 5.3, where we sys-
tematically vary a set of objective functions and resource constraints, in order to deter-
mine which architectural features most affect the overall performance. For simplicity,
in all simulations we are limiting ourselves to architectures with N (cid:54) 3 nodes and
n (cid:54) 10 agents. In the following section, we start by describing how we characterize the
architectures conforming to the requirements (i) -- (iii).
5.1 Characterization of architectures
Type. In view of property (ii) above, we can label any N-step decision-making
process by a tuple (i, j), which we call the type of the architecture, where i characterizes
13
Figure 3. Overview of the resulting architectures for N (cid:54) 3, each of them being
labelled by its type.
the relation between the first N −1 variables W , X1, . . . , XN−1, and j determines how
these variables are connected to XN = A.
For example, for N (cid:54) 3, we obtain the types shown in Figure 3, where i ∈ {0, 1, 2}
and j ∈ {0, . . . , 5} represent the following relations:
i = 0 : (X 2
i = 1 : (X 2
i = 2 : (X 2
j = 0 : (X 3
j = 1 : (X 3
j = 2 : (X 3
sel, X 2
sel, X 2
sel, X 2
sel, X 3
sel, X 3
sel, X 3
sel, X 3
sel, X 3
sel, X 3
in) = ({},{X1})
in) = ({X1},{W})
in) = ({},{W})
in) = ({},{X2})
in) = ({},{X1, X2})
in) = ({X1},{X2})
in) = ({X2},{X1})
in) = ({X1, X2},{W})
in) = ({X2},{W}) .
j = 3 : (X 3
j = 4 : (X 3
j = 5 : (X 3
For example, the architecture shown in Figure 2 has the type (1, 4). Correspondingly,
the two-step cases are labelled by (i, ) for i ∈ {0, 1, 2}, and the one-step rate distoration
case by (−1, ). Note that not every combination of i ∈ {0, 1, 2} and j ∈ {0, . . . , 5}
describes a unique system, e.g. (2, 3) is equivalent to (2, 2) when replacing X1 by
14
(−1,)WA(0,)WXA(1,)WXA(2,)WXA(0,0)WX1X2A(0,1)WX1X2A(0,2)WX1X2A(0,3)WX1X2A(0,4)WX1X2A(0,5)WX1X2A(1,0)WX1X2A(1,1)WX1X2A(1,2)WX1X2A(1,3)WX1X2A(1,4)WX1X2A(1,5)WX1X2A(2,1)WX1X2A(2,2)WX1X2A(2,3)WX1X2A(2,4)WX1X2AX2. Moreover, as mentioned above, (2, ) is equivalent to (−1, ), and similarly, (0, 1) is
equivalent to (0, ).
Figure 4. Visualization of exemplary 3-step multi-agent architectures specified by their
types and shapes.
Shape. After the number of nodes has been fixed, the remaining property that charac-
terizes a given architecture is the number of agents per node. For most architectures
there are multiple possibilities to distribute a given amount of agents among the nodes,
even when neglecting individual differences in resource constraints. We call such a dis-
tribution a shape, denoted by [n1, n2, . . . ], where nk denotes the number of agents in
node k. Note that, not all architectures will be able to use the full amount of available
agents, most immanently the one-step rate distortion case (1 agent), or the two-step
serial-case (2 agents). For these systems, we always use the agents with the highest
available resources in our simulations.
For example, for N (cid:54) 3 the resulting shapes for a maximum of n = 10 agents are
as follows:
• [1] for (−1, ), [1, 1] for (0, ), and [1, 9] for (1, ),
15
(0,3)[1,1,8](1,0)[1,8,1](1,2)[1,4,4](1,5)[1,3,6](2,1)[1,1,1]worldagentactioninputselection(2,4)[1,1,(2,4)]W118W181W144W136W111W118Figure 5. Utility function for Example 5.2 (left) and posterior policy of a single agent
with an information bound of 4.6 bit (right). The set of phone calls W is partitioned into
three separate regions, corresponding to three different topics about which customers
might have complaints or questions. Each of these can be divided into two subcate-
gories of four customer calls each. For each phone call there is exactly one answer that
achieves the best result (U = 1). Moreover, the responses that belong to one subcat-
egory of calls are also suitable for the other calls in that particular subcategory, albeit
slightly less effective (U = 0.85) than the optimal answers. Similarly, the responses
that belong to the same topic of calls are still a lot better (U = 0.7) than responses to
other topics (U = 0).
• [1, 1, 1] for (0, 0) and (2, 1),
• [1, 1, 8] for (0, 2), (0, 3), (0, 5), (2, 2),
• [1, 1, (2, 4)] and [1, 1, (4, 2)] for (0, 4) and (2, 4),
• [1, 8, 1] for (1, 0) and (1, 1),
• [1, 4, 4] for (1, 2),
• [1, 2, 7], [1, 3, 6], [1, 4, 5], [1, 5, 4], [1, 6, 3], [1, 7, 2] for (1, 3) and (1, 5),
• [1, 2, (2, 3)] and [1, 3, (3, 2)] for (1, 4),
where a tuple inside the shape means that two different nodes are deciding about the
agents in that spot, e.g.
[1, 1, (2, 4)] means that there are 8 agents in the last node,
labeled by the values (x1, x2) ∈ X1 × X2 with X1 = 2 and X2 = 4. In Figure 4, we
visualize one example architecture for each of the above 3-step shapes, except for the
shapes of type (1, 4) of which one example is shown in Figure 2.
Together, the type (i, . . . ) and shape [n1, . . . ] uniquely characterize a given multi-
agent architecture, denoted by (i, . . . )[n1,... ].
5.2 Example: Callcenter
Consider the operation of a company's callcenter as a decision-making process, where
customer calls (world states) must be answered with an appropriate response (action)
in order to achieve high customer satisfaction (utility). The utility function shown in
Figure 5 on the left can be viewed as a simplistic model for a real-world callcenter of a
big company such as a communication service provider. In this simplification, there are
16
04812162024responsesa04812162024phonecallswUtilityfunctionU04812162024responsesa04812162024Posteriorofasingleagentwith4.6bit0.00.20.40.60.81.024 possible customer calls that belong to three separate topics, for example questions
related to telephone, internet, or television, which can be further subdivided into two
subcategories, for example consisting of questions concerning the contract or problems
with the hardware. See the description of Figure 5 for the explicit utility values.
Handling all possible phone calls perfectly by always choosing the corresponding
response with maximum utility requires log2(24) ≈ 4.6 bit (see Figure 5). However, in
practice a single agent is usually not capable of knowing the optimal answers to every
single type of question. For our example this means that the callcenter only has access
to agents with information-processing capability less than 4.6 bit. It is then required
to organize the agents in a way so that each agent only has to deal with a fraction of
the customer calls. This is often realized by first passing the phone call through several
filters in order to forward it to a specialized agent. Arranging these selector or filter units
in a strict hierarchy then corresponds to architectures of the form of (1, 4) or (1, 5) (see
below for a comparison of these two), where at each stage a single operator selects how
a call is forwarded. In contrast, architectures of the form of (2, 4) allow for multiple
independent filters working in parallel, for example realized by multiple trained neural
networks, where each is responsible for a particular feature of the call (for example,
one node deciding about the language of the call, and another node deciding about the
topic). In the following we do not discriminate between human and artificial decision-
makers, since both can qualify equally well as information-processing units.
Assume that there are n = 10 bounded rational agents available. Considering the
given utility function, the architectures (1, 4)[1,3,(3,2)] (shown in Figure 2) and (1, 5)[1,3,6]
(shown in Figure 4) might be obvious choices as they represent the hierarchical structure
of the utility function. With an information bound of 1.6 (≈ log2(3)) bit for the first
agent and 0.1 bit for the rest, the optimal prior policies for (1, 5)[1,3,6] obtained by our
Free Energy principle are shown in Figure 6. We can see that, for this architecture, the
choice x1 of the agent at the first step corresponds to the general topic of the phone call,
the decisions x2 of the three agents at the second stage correspond to the subcategory
on which one of the six agents at the final stage is specialized to, who then makes the
decision about the final response a by picking one of the four actions in the support of
its prior.
Figure 6. Optimal prior policies for each agent of the architecture (1, 5)[1,3,6] with an
information bound of (D1, D2, . . . , D10) = (1.6, 0.1, . . . , 0.1).
17
0.00.2p(x1)012choicesxi0.00.20.4p(x2x1=0)0123450.00.20.4p(x2x1=1)0123450.00.20.4p(x2x1=2)0123450.00.2p(ax2=0)051015200.00.2p(ax2=1)051015200.00.2p(ax2=2)051015200.00.2p(ax2=3)051015200.00.2p(ax2=4)051015200.00.2p(ax2=5)05101520Figure 7. Performance comparison under two different information bounds.
We can see in Figure 7 on the left that a hierarchical structure as in (1, 5)[1,3,6] or
(1, 4)[1,3,(3,2)] is indeed superior when comparing with the architecture (2, 4)[1,1,(2,4)],
because there is no good selector for the second filter. We have also added two architec-
tures to the comparison that have a bottleneck of the information flow at either end of the
decision-making process, (0, 3)[1,1,8] and (1, 0)[1,8,1] (see Figure 4 for a visualization),
which are performing considerably worse than the others: in (0, 3)[1,1,8] the first agent is
the only one who has direct contact to the customer and passes the filtered information
on to everybody else, whereas in (1, 0)[1,8,1] the customer talks to multiple agents, but
these cannot take any decisions but pass on the information to a final decision node
who has to select from all possible options. Interestingly, as can be seen on the right
side of Figure 7, when changing the resource bounds such that the first agent only has
D1 = 1 bit instead of 1.6 and the second agent has D2 = 0.5 bit instead of 0.1, then the
strictly hierarchical architectures (1, 5)[1,3,6] and (1, 4)[1,3,(3,2)] are outperformed by the
architecture (2, 4)[1,1,(2,4)], because their first agent is not able to perfectly distinguish
between the three topics anymore. This is an ideal situation for (2, 4)[1,1,(2,4)], since
here the total information-processing for filtering the phone calls is split up efficiently
between the first two agents in the system.
Note that (1, 4) and (1, 5) do not necessarily perform identically (as can be seen on
the right in Figure 7), even though the structure of the utility function might suggest that
it is ideal for (1, 5)[1,3,6] to always have the optimal priors shown in Figure 6. However,
this crucially depends on the given information-processing bounds. In Figure 8, we
illustrate the difference between the two types in more detail, by showing the processed
information that can actually be achieved per agent in the respective architecture for an
information bound of D = (0.4, 2.6, 2.6, 2.6, 0.4, . . . , 0.4). When the first agent in the
hierarchy has low capacity, then the rigid structure of (1, 4) is penalized because the
agents at the second stage cannot compensate the errors of the first agent, irrespectively
Figure 8. Demonstration of the difference between the two architectures (1, 4)[1,3,(3,2)]
and (1, 5)[1,3,6] for an information bound of D = (0.4, 2.6, 2.6, 2.6, 0.4, . . . , 0.4).
18
(0,3)[1,1,8](1,0)[1,8,1](1,4)[1,3,(3,2)](1,5)[1,3,6](2,4)[1,1,(2,4)]0.00.20.40.60.8hUi(D1,D2,...,D10)=(1.6,0.1,...,0.1)[bit](0,3)[1,1,8](1,0)[1,8,1](1,4)[1,3,(3,2)](1,5)[1,3,6](2,4)[1,1,(2,4)]0.00.20.40.60.8(D1,D2,D3,...,D10)=(1.0,0.5,0.1,...,0.1)[bit](1,4)[1,3,(3,2)](1,5)[1,3,6]0.00.20.40.60.81.0hUi12345678910agenti0.00.51.01.52.02.5DKL(Pikpi)[bit](1,4)[1,3,(3,2)]0123456789agenti0.00.51.01.52.02.5DKL(Pikpi)[bit](1,5)[1,3,6)]04812162024responsesa04812162024phonecallsw(1,4)[1,3,(3,2)]04812162024responsesa04812162024phonecallsw(1,5)[1,3,6]PerformanceProcessedinformationEffectivepolicyp(aw)of their capacity. In contrast, for (1, 5), the connection between the second stage and
the executing stage can be changed freely, which leads to ignoring the first agent and
letting the three agents in the second stage determine the distribution of phone calls
completely. In this sense, (1, 5) is more robust to errors in the first filter than (1, 4).
5.3 Systematic performance comparison
In this section, we move away from an explicit toy example to a broad performance
comparison of all architectures for N (cid:54) 3, averaged over multiple types of utility func-
tions and a large number of resource constraints (as defined below). In Section 6.1,
this is supplemented with an analysis of the architectural features that best explain the
performances.
Figure 9. Utility functions on which the performances are measured.
Objectives. We compare all possible architectures for twelve different utility func-
tions, {Uk}12
k=1, defined on a world and action space of W = A = 20 elements, and
we assume the same cardinality for the range of all hidden variables. Note that the car-
dinality of the target set X for selector nodes X ∈ Xsel is given by the number of agents
it decides about. In particular, we consider three kinds of utility functions (one-to-one,
many-to-one, one-to-many) that we vary in a 2×2 paradigm, where the first dimension
19
0510152005101520worldstatesU1(diagisosm)0510152005101520U2(diagisomm)0510152005101520U3(diagnonisosm)0510152005101520U4(diagnonisomm)0510152005101520worldstatesU5(samwisosm)0510152005101520U6(samwisomm)0510152005101520U7(samwnonisosm)0510152005101520U8(samwnonisomm)05101520actions05101520worldstatesU9(maswisosm)05101520actions05101520U10(maswisomm)05101520actions05101520U11(maswnonisosm)05101520actions05101520U12(maswnonisomm)Figure 10. Proportion of conditions where the given architectures had the highest per-
formance, for all conditions, and separately for each of the three different schemes of
resource constraints.
is the number of maximum utility peaks (single, multiple) and the second dimension is
the range of utility values (binary, multi-valued). The utility functions are visualized in
Figure 9, where the three kinds of functions correspond to the three rows of the plot. A
one-to-one scenario applies to a needle-in-a-haystack situation where each world state
affords only a unique action, and vice versa each optimal action allows to uniquely iden-
tify the world state, for example an absolute identification task. A many-to-one scenario
allows for abstractions in the world states, for example in categorization when multiple
instances are judged to belong to the same class (e.g. vegetables are boiled, fruit is eaten
raw). A one-to-many scenario allows for abstractions in the action space, for example
in hierarchical motor control when a grasp action can be performed in many different
ways.
Resource limitations. We are considering three schemes of resource constraints:
(i) Same constraints for all agents.
(ii) Same constraints for all agents but one, which has a higher limit than the other
agents.
(iii) Same constraints for all but two agents, which can have a different limit and have
higher limits than all the other agents.
For (i), we compare 20 sets of constraints {D0, D1, . . .} with Di equally spaced in
the range between 0 and 3 bits, for (ii) we compare 39 sets in the same range but the
high resource agent having 1, 2 and 3 bits, and for (iii) we allow 89 sets with similar
constraints than in (ii) but additional combinations for the second high-resource agent.
Simulation results. The performance of an architecture is given by its expected util-
ity with respect to a given objective and a given information bound as defined above.
20
(−1,),[1](0,2),[1,1,8](0,4),[1,1,(2,4)](0,4),[1,1,(4,2)](1,3),[1,2,7](1,3),[1,4,5](1,4),[1,2,(2,3)](1,4),[1,3,(3,2)](1,5),[1,2,7](1,5),[1,3,6](1,5),[1,4,5](1,5),[1,5,4](1,5),[1,6,3](1,5),[1,7,2](1,),[1,9](2,2),[1,1,8](2,4),[1,1,(2,4)]0.00.10.20.30.40.5WinningrateAllconditions(0,4),[1,1,(2,4)](0,4),[1,1,(4,2)](1,3),[1,2,7](1,3),[1,4,5](1,4),[1,2,(2,3)](1,4),[1,3,(3,2)](1,5),[1,2,7](1,5),[1,3,6](1,5),[1,4,5](1,5),[1,5,4](1,5),[1,6,3](1,5),[1,7,2](1,),[1,9](2,2),[1,1,8](2,4),[1,1,(2,4)]0.00.10.20.30.4WinningrateSameconstraintsforallagents(−1,),[1](0,2),[1,1,8](0,4),[1,1,(2,4)](0,4),[1,1,(4,2)](1,3),[1,4,5](1,4),[1,2,(2,3)](1,4),[1,3,(3,2)](1,5),[1,2,7](1,5),[1,3,6](1,5),[1,4,5](1,5),[1,6,3](1,5),[1,7,2](1,),[1,9](2,2),[1,1,8](2,4),[1,1,(2,4)]0.00.10.20.30.40.5WinningrateSameconstraintsforallagentsbutone(−1,),[1](0,4),[1,1,(2,4)](0,4),[1,1,(4,2)](1,3),[1,4,5](1,4),[1,2,(2,3)](1,4),[1,3,(3,2)](1,5),[1,2,7](1,5),[1,3,6](1,5),[1,4,5](1,5),[1,5,4](1,5),[1,6,3](1,5),[1,7,2](1,),[1,9](2,2),[1,1,8](2,4),[1,1,(2,4)]0.00.20.40.6WinningrateSameconstraintsforallagentsbuttwoWinsFigure 11. Architecture performances averaged over all conditions (first row), averaged
over all information bounds for each utility function (second row), and averaged over
all objectives for each information bound (last three rows).
21
(−1,),[1](0,),[1,1](1,),[1,9](0,0),[1,1,1](0,2),[1,1,8](0,3),[1,1,8](0,4),[1,1,(2,4)](0,4),[1,1,(4,2)](0,5),[1,1,8](1,0),[1,8,1](1,1),[1,8,1](1,2),[1,4,4](1,3),[1,2,7](1,3),[1,3,6](1,3),[1,4,5](1,3),[1,5,4](1,3),[1,6,3](1,3),[1,7,2](1,4),[1,2,(2,3)](1,4),[1,3,(3,2)](1,5),[1,2,7](1,5),[1,3,6](1,5),[1,4,5](1,5),[1,5,4](1,5),[1,6,3](1,5),[1,7,2](2,1),[1,1,1](2,2),[1,1,8](2,4),[1,1,(2,4)]0.00.10.20.30.40.50.60.70.80.9AveragescoreAverageoverallconditionsU1U2U3U4U5U6U7U8U9U10U11U120.60.70.80.91.0AveragescoreAverageoverallconstraints -- foreachutilityfunction(2,4)[1,1,(2,4)](1,5)[1,3,6](1,4)[1,3,(3,2)]{0.1,...,0.1}{0.2,...,0.2}{0.3,...,0.3}{0.4,...,0.4}{0.5,...,0.5}{0.6,...,0.6}{0.7,...,0.7}{0.8,...,0.8}{0.9,...,0.9}{1.0,...,1.0}{1.1,...,1.1}{1.2,...,1.2}{1.3,...,1.3}{1.4,...,1.4}{1.5,...,1.5}{1.6,...,1.6}{1.7,...,1.7}{1.8,...,1.8}{1.9,...,1.9}{2.0,...,2.0}0.10.20.30.40.50.60.70.80.9AverageexpectedutilityAverageoverallutilityfunctions -- sameconstraintforallagents(2,4)[1,1,(2,4)](1,5)[1,3,6](1,4)[1,3,(3,2)]{1.0,0.1,...,0.1}{1.0,0.3,...,0.3}{1.0,0.4,...,0.4}{1.0,0.6,...,0.6}{1.0,0.7,...,0.7}{1.0,0.9,...,0.9}{2.0,0.1,...,0.1}{2.0,0.3,...,0.3}{2.0,0.4,...,0.4}{2.0,0.6,...,0.6}{2.0,0.7,...,0.7}{2.0,0.9,...,0.9}{2.0,1.0,...,1.0}{2.0,1.2,...,1.2}{2.0,1.3,...,1.3}{2.0,1.4,...,1.4}{2.0,1.6,...,1.6}{2.0,1.7,...,1.7}{2.0,1.9,...,1.9}{3.0,0.1,...,0.1}{3.0,0.3,...,0.3}{3.0,0.4,...,0.4}{3.0,0.6,...,0.6}{3.0,0.7,...,0.7}{3.0,0.9,...,0.9}{3.0,1.0,...,1.0}{3.0,1.2,...,1.2}{3.0,1.3,...,1.3}{3.0,1.4,...,1.4}{3.0,1.6,...,1.6}{3.0,1.7,...,1.7}{3.0,1.9,...,1.9}{3.0,2.0,...,2.0}{3.0,2.2,...,2.2}{3.0,2.3,...,2.3}{3.0,2.5,...,2.5}{3.0,2.6,...,2.6}{3.0,2.7,...,2.7}{3.0,2.9,...,2.9}0.10.20.30.40.50.60.70.80.9AverageexpectedutilityAverageoverallutilityfunctions -- sameconstraintforallagentsbutone(2,4)[1,1,(2,4)](1,5)[1,3,6](1,4)[1,3,(3,2)]{1.0,1.0,0.1,...,0.1}{1.0,1.0,0.3,...,0.3}{1.0,1.0,0.4,...,0.4}{1.0,1.0,0.6,...,0.6}{1.0,1.0,0.7,...,0.7}{1.0,1.0,0.9,...,0.9}{1.0,2.0,0.1,...,0.1}{1.0,2.0,0.3,...,0.3}{1.0,2.0,0.4,...,0.4}{1.0,2.0,0.6,...,0.6}{1.0,2.0,0.7,...,0.7}{1.0,2.0,0.9,...,0.9}{1.0,3.0,0.1,...,0.1}{1.0,3.0,0.3,...,0.3}{1.0,3.0,0.4,...,0.4}{1.0,3.0,0.6,...,0.6}{1.0,3.0,0.7,...,0.7}{1.0,3.0,0.9,...,0.9}{2.0,1.0,0.1,...,0.1}{2.0,1.0,0.3,...,0.3}{2.0,1.0,0.4,...,0.4}{2.0,1.0,0.6,...,0.6}{2.0,1.0,0.7,...,0.7}{2.0,1.0,0.9,...,0.9}{2.0,2.0,0.1,...,0.1}{2.0,2.0,0.3,...,0.3}{2.0,2.0,0.4,...,0.4}{2.0,2.0,0.6,...,0.6}{2.0,2.0,0.7,...,0.7}{2.0,2.0,0.9,...,0.9}{2.0,2.0,1.0,...,1.0}{2.0,2.0,1.2,...,1.2}{2.0,2.0,1.3,...,1.3}{2.0,2.0,1.4,...,1.4}{2.0,2.0,1.6,...,1.6}{2.0,2.0,1.7,...,1.7}{2.0,2.0,1.9,...,1.9}{2.0,3.0,0.1,...,0.1}{2.0,3.0,0.3,...,0.3}{2.0,3.0,0.4,...,0.4}{2.0,3.0,0.6,...,0.6}{2.0,3.0,0.7,...,0.7}{2.0,3.0,0.9,...,0.9}{2.0,3.0,1.0,...,1.0}{2.0,3.0,1.2,...,1.2}{2.0,3.0,1.3,...,1.3}{2.0,3.0,1.4,...,1.4}{2.0,3.0,1.6,...,1.6}{2.0,3.0,1.7,...,1.7}{2.0,3.0,1.9,...,1.9}{3.0,1.0,0.1,...,0.1}{3.0,1.0,0.3,...,0.3}{3.0,1.0,0.4,...,0.4}{3.0,1.0,0.6,...,0.6}{3.0,1.0,0.7,...,0.7}{3.0,1.0,0.9,...,0.9}{3.0,2.0,0.1,...,0.1}{3.0,2.0,0.3,...,0.3}{3.0,2.0,0.4,...,0.4}{3.0,2.0,0.6,...,0.6}{3.0,2.0,0.7,...,0.7}{3.0,2.0,0.9,...,0.9}{3.0,2.0,1.0,...,1.0}{3.0,2.0,1.2,...,1.2}{3.0,2.0,1.3,...,1.3}{3.0,2.0,1.4,...,1.4}{3.0,2.0,1.6,...,1.6}{3.0,2.0,1.7,...,1.7}{3.0,2.0,1.9,...,1.9}{3.0,3.0,0.1,...,0.1}{3.0,3.0,0.3,...,0.3}{3.0,3.0,0.4,...,0.4}{3.0,3.0,0.6,...,0.6}{3.0,3.0,0.7,...,0.7}{3.0,3.0,0.9,...,0.9}{3.0,3.0,1.0,...,1.0}{3.0,3.0,1.2,...,1.2}{3.0,3.0,1.3,...,1.3}{3.0,3.0,1.4,...,1.4}{3.0,3.0,1.6,...,1.6}{3.0,3.0,1.7,...,1.7}{3.0,3.0,1.9,...,1.9}{3.0,3.0,2.0,...,2.0}{3.0,3.0,2.2,...,2.2}{3.0,3.0,2.3,...,2.3}{3.0,3.0,2.5,...,2.5}{3.0,3.0,2.6,...,2.6}{3.0,3.0,2.7,...,2.7}{3.0,3.0,2.9,...,2.9}Information-processingconstraints[bits]0.10.20.30.40.50.60.70.80.9AverageexpectedutilityAverageoverallutilityfunctions -- sameconstraintforallagentsbuttwo(2,4)[1,1,(2,4)](1,5)[1,3,6](1,4)[1,3,(3,2)]In Figure 10, we show which of the architectures won at least one condition, together
with the proportion of conditions won by each of these architectures. We can see that
(2, 4)[1,1,(2,4)] overall outperforms all the other systems (see Figure 4 for a visualiza-
tion). In the case when all agents have the same resource constraints, the architecture
(1, 4)[1,3,(3,2)] is a strong second winner, however this is not the case if one or two agents
have more resources than the rest. It is not surprising that in these situations the parallel
case with one high-resource agent distributing the work among the low resource agents,
and even the case of a single agent that does everything by himself, are both performing
well.
A closer look on the achieved expected utilities however, shows that there are several
architectures that are almost equally well performing for many conditions. In order to
increase comparability between the different utility functions, we measure performance
in terms of a relative score, which, for a given utility function and resource constraint, is
given by the architectures' expected utility divided by the maximum expected utility of
all architectures. The score averaged over all conditions is shown for each architecture
in Figure 11 in the top row. We can see that the best architectures are pretty close to each
other. As expected, the architecture that won the most conditions also has the highest
overall performance, however there are multiple architectures that are very close. The
top three architectures are
(2, 4)[1,1,(2,4)], (1, 5)[1,3,6], (1, 4)[1,3,(3,2)],
(21)
which have been visualized above (Figure 2 and 4).
A better understanding of their performances under different resource constraints
can be gathered from the remaining graphs in Figure 11. In the second row we can
see that the top three overall architectures also perform best for almost all utility func-
tions when averaged over the information bounds. The last three graphs in Figure 11
show the expected utility of each architecture averaged over all utility functions for each
information bound. We can see how the expected utility increases with higher informa-
tion bounds, for some architectures more than for others. The top three architecures
perform differently for most of the bounds, with spans of bounds where each of them
clearly outperforms the others.
6 Discussion
6.1 Analysis of the simulations
There are plenty of factors that influence the performance of each of the given architec-
tures. Here, we attempt to unfold the features that determine their performances in the
clearest way. To this end, we compare the architectures with respect to the following
quantities:
Average specialization of operational agents: the specialization (19) averaged over
all agents in the final stage of the architecture.
Hierarchical: boolean value that specifies whether an architecture is hierarchical
or not, meaning that consecutive nodes are occupied by an increasing amount of
agents.
22
Agents with direct w-access: the number of agents with direct world state access.
operational agents with direct w-access: the number of agents in the last node of
the architecture.
Number of w-bottlenecks: the total number of nodes that are missing direct access
to the world state.
Figure 12. Proposed features to explain the architectures' performances (see 6.1).
As can be seen from Figure 12, we found that these architectural features explain the
differences in performance quite well. More precisely, the architectures can be roughly
grouped into three different categories, indicated by slightly different color saturations
in Figure 12): The poorest performing group consists of architectures that have between
one and two w-bottlenecks, and therefore have only few agents with direct w-access,
in particular none of their operational agents has direct w-access. Moreover, in this
group, most architectures are not hierarchical at all, and their operational agents have
low specialization, with two exceptions that both have two w-bottlenecks.
23
0.000.250.500.751.00Scores0.00.20.40.60.8Averagespecializationofexecutingagents0.000.250.500.751.00Hierarchical0.02.55.07.510.0Agentswithdirectw-access02468Executingagentswithdirectw-access(2,4),[1,1,(2,4)](1,5),[1,3,6](1,4),[1,3,(3,2)](1,5),[1,2,7](1,5),[1,4,5](1,4),[1,2,(2,3)](1,5),[1,5,4](1,5),[1,6,3](1,),[1,9](1,5),[1,7,2](0,4),[1,1,(4,2)](2,2),[1,1,8](0,4),[1,1,(2,4)](-1,),[1](0,5),[1,1,8](1,3),[1,2,7](1,3),[1,3,6](1,3),[1,4,5](1,2),[1,4,4](1,3),[1,5,4](1,3),[1,6,3](0,2),[1,1,8](1,3),[1,7,2](2,1),[1,1,1](1,1),[1,8,1](0,3),[1,1,8](1,0),[1,8,1](0,),[1,1](0,0),[1,1,1]0.00.51.01.52.0Numberofw-bottlenecksThe architectures with medium performance have maximally one w-bottleneck and
many of them are hierarchical. Here, those systems that have operational units with
high specialization are missing direct w-access, and the systems that have operational
units with direct w-access have low specialization.
All architectures in the top group have many agents with direct world-state access
and they have no w-bottlenecks. Interestingly, the best six architectures are all strictly
hierarchical. Moreover, the order of performance is almost in direct accordance with
the average specialization of the operational agents.
Overall we can say that, it is best to have as many operational units as needed
to discriminate the actions well, as long as the coordinating agents have enough re-
sources to discriminate between them properly. The architecture (1, 4)[1,1,(2,4)] has eight
operational agents, which are managed by two coordinating units, which need maxi-
mally two bits (for choosing among four agents) and one bit (for choosing among two
agents) in order to perform well. Both of the other top three architectures, (1, 5)[1,3,6]
and (1, 4)[1,3,(3,2)], have six operational agents, which are managed by three coordinat-
ing units, so that each of them needs maximally one bit. But compared to (1, 4)[1,1,(2,4)],
there are less agents to spare for the operational stage. Hence, if the operational units
have low resources, it is always a trade-off between the number of operational units and
the resources of the coordinating ones.
Another way to see why the architecture (1, 4)[1,1,(2,4)] overall outperforms all the
other high-ranked systems, might be its lower average choice-per-agent ratio, i.e. the
average number options for the decision of each agent in the system. In (1, 4)[1,1,(2,4)],
the second agent also directly observes the world state, and moreover, the choice space
of eight agents at the operational stage is split into two and four choices. Therefore,
10 = 2.6 choices per agent on average, whereas for (1, 5)[1,3,6] and
there are only 2+4+20
(1, 4)[1,3,(3,2)], there are 3+6+20
10 = 2.9.
6.2 Limitations of our analysis
The analysis presented above only provides a rough explanation of the differences in
performance. Which architecture is optimal, depends a lot on the actual information
bounds of each agent. In all of our conditions, we assumed that most agents have the
same processing capabilities, which is why there is a certain bias towards architectures
that perform well under this assumption (low variance in choice-per-agent ratio across
the agents).
Due to the large amount of Lagrange parameters in the Free Energy principle (16),
the data generation was done by running the Blahut-Arimoto-type algorithm for 10.000
different combinations of parameters for each of the architectures, for each type of
the different types of resource limitations, (i) -- (iii) in 5, and for each of the utility
functions defined in 5. For a given information bound, the corresponding parameters
were determined by looking for the points with the highest Free Energy that still respect
the bound.A better approach would be to enhance the global parameter search by a more
fine-grained local search. Another possibility is to use an evolutionary algorithm, where
each population is given by multiple sets of parameters and the information constraints
are built in by a method similar to (Chehouri et al., 2016). This works well but requires
significantly more time to process.
24
Since the Blahut-Arimoto type algorithm is not guaranteed to converge to a global
maximum, the resulting values for the expected utility and mutual information for a
given set of parameters can depend on the initialization of the algorithm. In practice, this
variation is small enough, so that it influences the average performance over multiple
conditions only by a negligable amount. However, direct comparisons of architectures
for a given information bound and utility function should be repeated multiple times to
make sure that the results are stable.
6.3 Relation to Variational Bayes and Active Inference
Above, we determined the architectures that achieve the highest expected utility under a
given resource constraint. These constraints are fulfilled by tuning the Lagrange multi-
pliers in the Free Energy principle. If the Lagrange multipliers themselves are fixed, for
instance as exchange rates between information and utility (Ortega and Braun, 2010),
or inverse temperatures in thermodynamics (Ortega and Braun, 2013), then the Free
Energy itself would be an appropriate performance measure. This is done, for example
in Bayesian model selection, which is also known as structure learning and represents
an important problem in Bayesian inference and machine learning. The Bayesian ap-
proach for evaluating different Bayesian network structures, in order to find the relation
of a given set of hidden variables that best explains a dataset D, consists in comparing
the marginal likelihood or evidence p(DS) of the structures S (Friedman and Koller,
2003). This can be seen to be analogous to a performance comparison of different
decision-making architectures measured by the Free Energy. In the simple case of one
observable Y and one hidden variable X, we have
(cid:88)
x∈X
p(yS) =
p(xS) p(yx, S)
∀y ∈ Y ,
where the likelihood p(yx, S) is assumed to be known. Given a prior p(xS) and, for
simplicity, a single observed datapoint y ∈ Y , the posterior distribution of X can be
inferred by using Bayes' rule,
p(xy, S) =
p(xS) p(yx, S)
p(yS)
∀x ∈ X .
(22)
As has been noted before (Ortega and Braun, 2013), when comparing (22) with the
Boltzmann equation (4) we can see that (22) is equivalent to the posterior P of a
bounded rational decision-maker with choice space X , prior policy p(xS), Lagrange
parameter β = 1, and utility function given by U (x) := log p(yx, S). Since the
marginal likelihood p(yS) is the normalization constant in (22), it follows immedi-
ately from (5) that log p(yS) is the optimal Free Energy Fvar[P = p(·y, S)] of this
25
decision-maker, where
Fvar[P ] :=
=
=
(cid:88)
(cid:88)
(cid:88)
x
x
x
P (x) log p(yx, S) −
P (x) log
P (x) log
p(xy, S)
P (x)
p(x, yS)
P (x)
(cid:88)
x
P (x) log
P (x)
p(xS)
+ log p(yS)
.
(23)
In Bayesian statistics, Fvar is known as the variational Free Energy, and the given
decomposition is often referred to in terms of the difference between accuracy (ex-
pected log-likelihood) and complexity (KL-divergence between prior and posterior).
It is used in the variational characterization of Bayes' rule, i.e. the approximation of
the exact Bayesian posterior p(·y, S) given by (22) in terms of a simpler -- for exam-
ple a parametrized -- distribution q by minimizing the KL-divergence between q and
p(·y, S). Since DKL(q(cid:107)p(·y, S)) = −Fvar[q] + log p(y, S), this is equivalent to the
maximization of Fvar.
The same is true for multiple hidden variables. For example, let S be the 3-step
architecture of type (1, 4) from Section 4.4 with W = Y and hidden variables X1, X2,
and X3 = A. Setting β1 = β2 = β3 = 1 and U (a, x1, x2, y) = log p(ya, x1, x2, S), we
obtain
F2(y, x1, x2) = log p(yx1, x2, S) , F1(y, x1) = log p(yx1, S) ,
and
Z(y, x1, x2) = p(yx1, x2, S) , Z(y, x1) = p(yx1, S) , Z(y) = p(yS) .
Note that, even though so far we always assumed that the utility function only depends
on the world states and actions, the equations in Sections 3, 4, and 4.4 are also valid
in the general case of U depending on all the variables in the system. The total Free
Energy for a given y ∈ Y then takes the form
(cid:17)
(cid:88)
(cid:88)
x1,x2
=
x1
(cid:16)
(cid:16)
p(x1, x2y, S)
log p(yx1, x2, S) − log
p(x1y, S)
log p(yx1, S) − log
p(x2x1, y, S)
(cid:17)
p(x2x1, S) − log
= log p(yS) .
p(x1y, S)
p(x1S)
p(x1y, S)
p(x1S)
Hence, also in this case, the logarithm of the marginal likelihood is given by the Free
Energy of the corresponding decision-making system. Choosing the multi-step archi-
tecture with the highest Free Energy is then analogous to Bayesian model selection with
the marginal likelihood or Bayesian model evidence as performance measure.
Another interesting interpretation of (23) is that here the hidden variable X can be
thought of as an action causing observed outcomes y. This is close to the framework
of Active Inference (Friston et al., 2015b, 2017b), where actions directy cause transi-
tions of hidden states, which generate outcomes that are observed by the actor. More
precisely, there the real-world process generating observable outcomes is distinguished
26
from an internal generative model describing the beliefs about the external generative
process (e.g. a Markov decision process). Observations are generated from transitions
of hidden states, which depend on the decision-maker's actions. Decision-making is
given by the optimization of a variational Free Energy analogous to (23), where the
log-likelihood is given by the generative model, which describes beliefs about the hid-
den and control states of the generative process. This way utilities are absorbed into a
(desired) prior (Ortega and Braun, 2015). There are several differences to our approach.
First, the structure of the Free Energy principle of bounded rationality originates from
the maximization of a given pre-defined external utility function under information
constraints, whereas the Free Energy principle of Active Inference aims to minimize
surprise or Bayesian model evidence, effectively minimizing the divergence between
approximate and true posterior. Second, in Active Inference, utility is transformed into
preferences in terms of prior beliefs, while in bounded rationality prior policies over
actions can be part of the optimization process, which results in specialization and ab-
straction. In constrast, Active Inference compounds utilities and priors into a single
desired prior which is fixed and does not allow to separately optimize utility and action
priors.
7 Conclusion
In this work, we have presented an information-theoretic framework to study systems
of decision-making units with limited information-processing capabilities. It is based
on an overreaching Free Energy optimization principle, which, on the one hand, allows
to compute the optimal performances of explicit architectures, and on the other hand,
produces optimal partitions of the involved choice spaces into regions of specialization.
In order to combine a given set of bounded rational agents, first the full decision-making
process is split into multiple decision steps by introducing intermediate decision vari-
ables, and then a given set of agents is distributed among these variables. We have
argued that this leads to two types of agents, non-operational units that distribute the
work among subordinates, and operational units that are doing the actual work in the
sense of choosing a particular action that either serves as an input for another agent
in the system, or represents the final decision of the full process. This "vertical" spe-
cialization is enhanced by optimizing over the agents' prior policies, which leads to
an optimal soft partitioning of the underlying choice space of each step in the system,
resulting in a "horizontal" specialization as well.
In order to illustrate the proposed framework, we have simulated and analyzed the
performances under a number of different resource constraints and tasks for all possible
3-step architectures whose information flow starts by observing a given world state and
ends with the selection of a final decision. Even though the relative architecture perfor-
mances depend crucially on the explict information-processing constraints, the overall
best performing architectures tend to be hierarchical systems of non-operational "man-
ager" units at higher hierarchical levels and operational "worker" units at the lowest
level.
Our approach is based on earlier work on information-theoretic bounded rationality
27
(Ortega and Braun, 2011, 2013; Genewein and Braun, 2013; Genewein et al., 2015)
(see also the references therein).
In particular, the N-step decision-making systems
introduced in Section 3 generalize the two-step processes studied in (Genewein and
Braun, 2013; Genewein et al., 2015). According to Simon (Simon, 1979), there are
three different bounded rational procedures that can transform intractable into tractable
decision problems: (i) Looking for satisfactory choices instead of optimal ones, (ii)
replacing global goals with tangible subgoals, and (iii) dividing the decision-making
task among many specialists. From this point of view, the decision-making process of
a single agent, given by the one-step case of information-theoretic bounded rationality
(Ortega and Braun, 2011, 2013) described in Section 2, corresponds to (i), while the
bounded rational multi-step and multi-agent decision-making processes introduced in
Section 3 and 4, can be attributed to (ii) and (iii).
The main advantage of a purely information-theoretic treatment is its universality.
To our knowledge this work is the first systematic theory-guided approach to the organi-
zation of agents with limited resources in the generality of information theory. In other
approaches, more specific methods are used instead, that are tailored to each particular
focus of study. In particular, bounded rationality has usually a very specific meaning,
often being implemented by simply restricting the cardinality of the choice space. For
example, in management theory the well-known results by Graicunas from the 1930s
(Graicunas, 1933) suggest that managers must have a limited span of control in order
to be efficient. By counting the number of possible relationships between managers
and their subordinates, he concludes that there is an explicit upper bound of five or
six subordinates. Of course, there are many cases of successful companies today that
disagree with Graicunas' claim, e.g. Apple's CEO has 17 managers that are reporting
directly to him. However, current management experts think that the optimal number
is somewhere between 5 and 12. The idea of restricting the cardinality of the space of
decision-making is also studied for operational agents. For example in (Camacho and
Persky, 1988), Camacho and Persky explore the hierarchical organization of specialized
producers with a focus on production. Even though their treatment is more abstract and
more general than many preceeding studies, their take on bounded rationality is very
explicit and based on the assumption that the number of elementary parts that form a
product, as well as the number of possibilities of each part, are larger than a single
individual can handle. Similarly, in most game theoretic approaches that are based on
automaton theory (Neyman, 1985; Abreu and Rubinstein, 1988; Hern´andez and Solan,
2016), the boundedness of an agent's rationality is expressed by a bound on the number
of states of the automaton. Most of these non-information theoretic treatments consider
cases when there is a hard upper bound on the number of options, but they usually lack a
probabilistic description of the behaviour in cases when the number of options is larger
than the given bound.
The work by Geanakoplos and Milgrom (1991) uses "information" to describe the
limited attention of managers in a firm. But here, the term is used more informally, and
not in the classical information-theoretical sense. However, one of their results suggests
that "firms with more prior information about parameters [...] will employ less able
managers, or give their managers wider spans of control" (Geanakoplos and Milgrom,
1991, p. 207). This observation is in line with information-theoretic bounded rationality,
since by optimizing over priors in the Free Energy principle, the required processing-
28
information is decreased compared to the case of non-optimal priors, so that less able
agents can perform a given task, or similarly, an agent with a higher information bound
can have a larger choice space.
In neuroscience, the variational Bayes approach explained in Section 6.3 has been
proposed as a theoretical framework to understand brain function in terms of Active
Inference (Friston, 2009, 2010; Friston et al., 2015a,b, 2017a,b), where perception is
modelled as variational Bayesian inference over hidden causes of observations. There,
a processing node (usually a neuron) is limited in the sense that it can only linearly
combine a set of input signals into a single output signal. Decision-making is mod-
elled by approximating Bayes' rule in terms of these basic operations, and then tuning
the weights of the resulting linear transformations in order to optimize the Free En-
ergy (23). Hence, there, the Free Energy serves as a tool to computationally simplify
Bayesian inference on the neuronal level, whereas our Free Energy principle is a tool
to computationally trade off expected utility and processing costs, providing an abstract
probabilistic description of the best possible choices when the information-processing
capability is limited.
In the general setting of approximate Bayesian inference, there are many interesting
algorithms and belief update schemes, for example belief propagation in terms of mes-
sage passing on factor graphs (see e.g. Yedidia et al., 2005). These algorithms make use
of the notion of the Markov boundary (minimal Markov blanket) of a node X, which
consists of the nodes that share a common factor with X (so-called neighbours). Con-
ditioned on its Markov boundary a given random variable is independent of all other
variables in the system, which allows to approximate marginal probabilities in terms of
local messages between neighbours. These approximations are generally only exact on
tree-like factor graphs without loops (M´ezard and Montanari, 2009, Thm. 14.1). This
raises the interesting question of whether such algorithms could also be applied to our
setting. First, it should be noted that variational Bayesian inference constitutes only
a subclass of problems that can be expressed by utility optimization with information
constraints. In this subclass, all random variables have to appear either in utility func-
tions, that is they have to be given as log-likelihoods, or they have to appear in marginal
distributions that are kept fixed -- see for example the definition of the utility in the in-
ference example above where U (a, x1, x2, y) = log p(ya, x1, x2, S) compared to the
utility functions of the form U (w, a) used throughout the paper that leave all interme-
diate random variables X1, . . . , XN−1 unspecified. Second, while it may be possible to
exploit the notion of Markov blankets by recursively computing free energies between
the nodes in a similar fashion to message-passing, there can also be contributions from
outside the Markov boundary, for example when the action node has to take an expec-
tation over possible world states that lie outside the Markov boundary. Finally, it may
be interesting to study whether message passing algorithms can be extended to deal
with our general problem setting and at least to approximately generate the same kind
of solutions as Blahut-Arimoto, even though in general we do not have tree-structured
graphs.
There are plenty of other possible extensions of the basic framework introduced in
this work. Marschak and Reichelstein (1998) study multi-agent systems in terms of
communication cost minimization, while ignoring the actual decision-making process.
One could combine our model with the information bottleneck method (Tishby et al.,
29
1999) and explicitly include communication costs in order to study more general agent
architectures, in particular systems with non-directed information flow. Moreover, we
have seen in our simulations that specialization of operational agents is an important
feature shared among all of the best performing architectures. In the biological liter-
ature, specialization is often paired with modularity. For example Kashtan and Alon
(2005) and Wagner et al. (2007) show that modular networks are an evolutionary con-
sequence of modularly varying goals. Similarly, it would be interesting to study the
effects of changing environments on specialization, abstraction, and optimal network
architectures of systems of bounded rational agents.
Acknowledgement
This study was funded by the European Research Council (ERC-StG-2015-ERC Start-
ing Grant, Project ID: 678082, "BRISC: Bounded Rationality in Sensorimotor Coordi-
nation").
Appendix
7.1 Proof of (13)
The Free Energy functional F that is optimized in the Free Energy principle (12) is
given by
F[P1, . . . , PN ] =
p(x) F0,loc(x) ,
(cid:1)
where x := (x0, . . . , xN ), and for all k ∈ {0, . . . , n}
p(x) = ρ(x0) P1
Fk,loc(x) = U (x0, xN ) −
By writing
F0,loc(x) = Fk,loc(x) −
1
βk
log
where x<k := (x0, . . . , xk−1), and
Rk(x<k) :=
(cid:88)
i<k
(cid:88)
x
(cid:0)x1
(cid:12)(cid:12)x1
(cid:88)
sel, x1
in
1
βi
i>k
(cid:0)xN
(cid:12)(cid:12)xN
(cid:1) ,
··· PN
Pi(xixi
log
pi(xixi
sel, xi
sel)
sel, xN
in
in)
.
Pk(xkxk
pk(xkxk
in)
sel, xk
sel) − Rk(x<k) ,
in)
Pi(xixi
pi(xixi
sel, xi
sel)
,
1
βi
log
30
we obtain for any k ∈ {0, . . . , n},
sel, xk
F[P1, . . . , PN ] =
p(xk
(cid:88)
xk
sel,xk
in
1
βk
−
DKL
(cid:20)(cid:88)
(cid:0)Pk(·xk
in)
xk
Pk(xkxk
sel, xk
(cid:88)
sel)(cid:1)(cid:21)
(cid:13)(cid:13)pk(xkxk
in)
xc
−
sel, xk
in)
p(xcx)Fk,loc(x)
(cid:88)
p(x<k)Rk(x<k)
x<k
utility Fk(x) =(cid:80)
with x = (xk, xk
In this form, we can see that
optimizing for Pk yields the Boltzmann distribution (13) with respect to the effective
sel, xk
in) and xc := (x0, . . . , xN ) \ x.
xc p(xcx)Fk,loc(x) as defined in (14).
References
Abreu, D. and Rubinstein, A. (1988). The structure of nash equilibrium in repeated
games with finite automata. Econometrica, 56(6):1259 -- 1281.
Acerbi, L., Vijayakumar, S., and Wolpert, D. M. (2014). On the origins of suboptimality
in human probabilistic inference. PLOS Computational Biology, 10(6):1 -- 23.
Arimoto, S. (1972). An algorithm for computing the capacity of arbitrary discrete
memoryless channels. IEEE Transactions on Information Theory, 18(1):14 -- 20.
Aumann, R. J. (1997). Rationality and bounded rationality. Games and Economic
Behavior, 21(1):2 -- 14.
Bishop, C. M. (2006). Pattern Recognition and Machine Learning (Information Science
and Statistics). Springer-Verlag New York, Inc., Secaucus, NJ, USA.
Blahut, R. E. (1972). Computation of channel capacity and rate-distortion functions.
IEEE Transactions on Information Theory, 18(4):460 -- 473.
Burns, E., Ruml, W., and Do, M. B. (2013). Heuristic search when time matters. Journal
of Artificial Intelligence Research, 47(1):697 -- 740.
Camacho, A. and Persky, J. J. (1988). The internal organization of complex teams:
Bounded rationality and the logic of hierarchies. Journal of Economic Behavior &
Organization, 9(4):367 -- 380.
Chehouri, A., Younes, R., Perron, J., and Ilinca, A. (2016). A constraint-handling tech-
nique for genetic algorithms using a violation factor. Journal of Computer Sciences,
12(7):350 -- 362.
Csisz´ar, I. and Tusn´ady, G. (1984). Information geometry and alternating minimization
procedures. Statistics and Decisions, Supplement Issue, 1:205 -- 237.
DeCanio, S. J. and Watkins, W. E. (1998). Information processing and organizational
structure. Journal of Economic Behavior & Organization, 36(3):275 -- 294.
31
Edward, V., Noah, G., L., G. T., and B., T. J. (2014). One and done? optimal decisions
from very few samples. Cognitive Science, 38(4):599 -- 637.
Friedman, N. and Koller, D. (2003). Being bayesian about network structure. a bayesian
approach to structure discovery in bayesian networks. Machine Learning, 50(1):95 --
125.
Friston, K. J. (2009). The free-energy principle: a rough guide to the brain? Trends in
Cognitive Sciences, 13(7):293 -- 301.
Friston, K. J. (2010). The free-energy principle: a unified brain theory? Nature Reviews
Neuroscience, 11.
Friston, K. J., Levin, M., Sengupta, B., and Pezzulo, G. (2015a). Knowing one's place:
a free-energy approach to pattern regulation. Journal of The Royal Society Interface,
12(105).
Friston, K. J., Lin, M., Frith, C., and Pezzulo, G. (2017a). Active inference, curiosity
and insight. Neural Computation, 29(10):2633 -- 2683.
Friston, K. J., Parr, T., and de Vries, B. (2017b). The graphical brain: Belief propagation
and active inference. Network Neuroscience, 1(4):381 -- 414.
Friston, K. J., Rigoli, F., Ognibene, D., Mathys, C., Fitzgerald, T., and Pezzulo, G.
(2015b). Active inference and epistemic value. Cognitive Neuroscience, 6(4):187 --
214. PMID: 25689102.
Geanakoplos, J. and Milgrom, P. (1991). A theory of hierarchies based on limited man-
agerial attention. Journal of the Japanese and International Economies, 5(3):205 --
225.
Genewein, T. and Braun, D. A. (2013). Abstraction in decision-makers with limited
information processing capabilities. NIPS workshop on Planning with Information
Constraints.
Genewein, T., Leibfried, F., Grau-Moya, J., and Braun, D. A. (2015). Bounded ratio-
nality, abstraction, and hierarchical decision-making: An information-theoretic opti-
mality principle. Frontiers in Robotics and AI, 2:27.
Gershman, S. J., Horvitz, E. J., and Tenenbaum, J. B. (2015). Computational rationality:
A converging paradigm for intelligence in brains, minds, and machines. Science,
349(6245):273 -- 278.
Gigerenzer, G. and Selten, R. (2001). Bounded Rationality: The Adaptive Toolbox.
MIT Press.
Graicunas, V. A. (1933). Relationship in organization. Bulletin of the International
Management Institute, (7):39 -- 42.
Hern´andez, P. and Solan, E. (2016). Bounded computational capacity equilibrium. Jour-
nal of Economic Theory, 163:342 -- 364.
32
Howes, A., Lewis, R. L., and Vera, A. (2009). Rational adaptation under task and pro-
cessing constraints: Implications for testing theories of cognition and action. Psy-
chological Review, 116(4):717 -- 751.
Jain, P. and Kar, P. (2017). Non-convex Optimization for Machine Learning. Now
Foundations and Trends.
Jones, B. D. (2003). Bounded rationality and political science: Lessons from public
administration and public policy. Journal of Public Administration Research and
Theory: J-PART, 13(4):395 -- 412.
Kaelbling, L. P., Littman, M. L., and Cassandra, A. R. (1998). Planning and acting in
partially observable stochastic domains. Artificial Intelligence, 101(1):99 -- 134.
Kappen, H. J., G´omez, V., and Opper, M. (2012). Optimal control as a graphical model
inference problem. Machine Learning, 87(2):159 -- 182.
Kashtan, N. and Alon, U. (2005). Spontaneous evolution of modularity and network
motifs. Proceedings of the National Academy of Sciences, 102(39):13773 -- 13778.
Knight, F. (1921). Risk, Uncertainty and Profit. Cambridge, MA: Houghton Mifflin.
Lewis, R. L., Howes, A., and Singh, S. (2014). Computational rationality: Linking
mechanism and behavior through bounded utility maximization. Topics in Cognitive
Science, 6(2):279 -- 311.
Lipman, B. L. (1995). Information processing and bounded rationality: A survey. The
Canadian Journal of Economics / Revue canadienne d'Economique, 28(1):42 -- 67.
Marschak, T. and Reichelstein, S. (1998). Network mechanisms, informational effi-
ciency, and hierarchies. Journal of Economic Theory, 79(1):106 -- 141.
Mattsson, L.-G. and Weibull, J. W. (2002). Probabilistic choice and procedurally
bounded rationality. Games and Economic Behavior, 41(1):61 -- 78.
McKelvey, R. D. and Palfrey, T. R. (1995). Quantal response equilibria for normal form
games. Games and Economic Behavior, 10(1):6 -- 38.
M´ezard, M. and Montanari, A. (2009). Information, Physics, and Computation. Oxford
Graduate Texts.
Neyman, A. (1985). Bounded complexity justifies cooperation in the finitely repeated
prisoners' dilemma. Economics Letters, 19(3):227 -- 229.
Ochs, J. (1995). Games with unique, mixed strategy equilibria: An experimental study.
Games and Economic Behavior, 10(1):202 -- 217.
Ortega, P. A. and Braun, D. A. (2010). A conversion between utility and information.
The Third Conference on Artificial General Intelligence, pages 115 -- 120.
33
Ortega, P. A. and Braun, D. A. (2011). Information, Utility and Bounded Rationality,
pages 269 -- 274. Springer Berlin Heidelberg, Berlin, Heidelberg.
Ortega, P. A. and Braun, D. A. (2013). Thermodynamics as a theory of decision-making
with information-processing costs. Proceedings of the Royal Society of London A:
Mathematical, Physical and Engineering Sciences, 469(2153).
Ortega, P. A. and Braun, D. A. (2015). What is epistemic value in free energy models
of learning and acting? a bounded rationality perspective. Cognitive Neuroscience,
6(4):215 -- 216. PMID: 25990838.
Radner, R. (1993). The organization of decentralized information processing. Econo-
metrica, 61(5):1109 -- 1146.
Russell, S. J. and Subramanian, D. (1995). Provably bounded-optimal agents. Journal
of Artificial Intelligence Research, 2(1):575 -- 609.
Shannon, C. E. (1959). Coding theorems for a discrete source with a fidelity criterion.
IRE International Convention Record, 7:142 -- 163.
Simon, H. A. (1943). A Theory Of Administrative Decision. PhD thesis, University of
Chicago.
Simon, H. A. (1955). A behavioral model of rational choice. The Quarterly Journal of
Economics, 69(1):99 -- 118.
Simon, H. A. (1979). Rational decision making in business organizations. The Ameri-
can Economic Review, 69(4):493 -- 513.
Sims, C. A. (2003).
Implications of rational inattention. Journal of Monetary Eco-
nomics, 50(3):665 -- 690. Swiss National Bank/Study Center Gerzensee Conference
on Monetary Policy under Incomplete Information.
Spiegler, R. (2011). Bounded Rationality and Industrial Organization. Oxford Univer-
sity Press: Oxford.
Still, S. (2009).
Information-theoretic approach to interactive learning. EPL (Euro-
physics Letters), 85(2):28005.
Tishby, N., Pereira, F. C., and Bialek, W. (1999). The information bottleneck method.
pages 368 -- 377.
Tishby, N. and Polani, D. (2011).
Perception-Action Cycle: Models, Architectures, and Hardware. Springer.
Information theory of decisions and actions.
In
Todorov, E. (2009). Efficient computation of optimal actions. Proceedings of the Na-
tional Academy of Sciences, 106(28):11478 -- 11483.
von Neumann, J. and Morgenstern, O. (1944). Theory of Games and Economic Behav-
ior. Princeton University Press.
34
Wagner, G. P., Pavlicev, M., and Cheverud, J. M. (2007). The road to modularity. Nature
Reviews Genetics, 8:921.
Wolpert, D. H. (2006). Information Theory -- The Bridge Connecting Bounded Rational
Game Theory and Statistical Physics, pages 262 -- 290. Springer Berlin Heidelberg,
Berlin, Heidelberg.
Yedidia, J. S., Freeman, W. T., and Weiss, Y. (2005). Constructing free-energy ap-
proximations and generalized belief propagation algorithms. IEEE Transactions on
Information Theory, 51(7):2282 -- 2312.
35
|
1503.00071 | 1 | 1503 | 2015-02-28T06:06:33 | Crowd Congestion and Stampede Management through Multi Robotic Agents | [
"cs.MA"
] | Crowd management is a complex, challenging and crucial task. Lack of appropriate management of crowd has, in past, led to many unfortunate stampedes with significant loss of life. To increase the crowd management efficiency, we deploy automated real time detection of stampede prone areas. Then, we use robotic agents to aid the crowd management police in controlling the crowd in these stampede prone areas. While doing so, we aim for minimum interference by robotic agents in our environment. Thereby not disturbing the ambiance and aesthetics of the place. We evaluate the effectiveness of our model in dealing with difficult scenarios like emergency evacuation and presence of localized congestion. Lastly, we simulate a multi agent system based on our model and use it to illustrate the utility of robotic agents for detecting and reducing congestion. | cs.MA | cs | Crowd Congestion and Stampede Management
through Multi Robotic Agents
Garima Ahuja and Kamalakar Karlapalem
Center for Data Engineering,
International Institute of Information Technology Hyderabad, India
{[email protected],[email protected]}
Abstract. Crowd management is a complex, challenging and crucial
task. Lack of appropriate management of crowd has, in past, led to
many unfortunate stampedes with significant loss of life. To increase the
crowd management efficiency, we deploy automated real time detection
of stampede prone areas. Then, we use robotic agents to aid the crowd
management police in controlling the crowd in these stampede prone ar-
eas. While doing so, we aim for minimum interference by robotic agents
in our environment. Thereby not disturbing the ambience and aesthetics
of the place. We evaluate the effectiveness of our model in dealing with
difficult scenarios like emergency evacuation and presence of localized
congestion. Lastly, we simulate a multi agent system based on our model
and use it to illustrate the utility of robotic agents for detecting and
reducing congestion.
Keywords: Crowd Management, Stampede, Congestion, Localized Con-
gestion, Emergency Evacuation
1
Introduction
Managing large crowds is a difficult task. Ineffective execution of this task can
potentially lead to stampedes. History suggests that crowd management police
appointed to prevent such incidents have not been very successful. During a coro-
nation festival in Russia, a police force of 1,800 men failed to control the crowd,
leading to loss of 1,389 lives by trampling [4]. Crowd management is a team
task, it requires strategic communication to figure out where to lead the crowd.
And due to perennial availability of agents, communication between agents is
more reliable than communication between humans. Moreover, these incidents
are not entirely unexpected, they repeatedly occur at similar occasions like re-
ligious gatherings [1,3], music concerts, sports tournaments, etc [2,5]. Wherever
large crowds gather in a relatively small area, risk of stampede is high. And that
is why police officers in large numbers are assigned at these places to ensure
safe management of crowd. To help the police officers in crowd management, we
propose a multi agent based solution. More specifically, in this paper, we deal
with the problem of congestion detection and congestion control in large crowds.
We assume a two dimensional space on ground where humans can move in any
5
1
0
2
b
e
F
8
2
]
A
M
.
s
c
[
1
v
1
7
0
0
0
.
3
0
5
1
:
v
i
X
r
a
2
Garima Ahuja and Kamalakar Karlapalem
arbitrary direction. Given such a scenario, we propose automated strategies to
detect congested areas of the field and an automated strategy for congestion
reduction. As demonstrated in our simulations, the agents we propose can suc-
cessfully detect and control congestion for obedient crowds. The agents can also
successfully detect presence of in-obedient crowds and request police intervention
in such scenarios.
The organization of the paper is as follows. In section 2, we describe our
crowd management model. Following which, we present our congestion detection
strategies and address congestion control in sections 3 and 4 respectively. Then,
we illustrate the results in section 5. In section 6, we discuss the existing work in
crowd dynamics modeling and crowd management. Finally we present conclusion
in section 7.
2 Crowd Management Agents
We have two kinds of agents for crowd management: Congestion Detecting
Agents (CDAs) and Congestion Controlling Agents (CCAs). Congestion detect-
ing agents inspect parts of the field and report presence or absence of congestion
in them. Congestion controlling agents take pro-active measures to reduce con-
gestion in a congested area.
Congestion Detecting Agents (CDAs) are computing machines present off-
site. They receive location coordinates of humans present inside the field. (We
do not delve into the details of how we receive the location coordinates, possible
ways to obtain positional information are GPS or RFID). CDAs then use this
information to check for congestion.
Congestion Controlling Agents (CCAs) on the other hand are flying robots
(like droids). They have a spotlight and a speaker attached to them to allow them
to illuminate the areas below them and to announce instructions. CCAs receive
instructions from CDAs and execute them to achieve congestion reduction.
Our CDAs never enter the site. This helps in accomplishing minimum in-
terference by robotic agents in our human environment. We do not send any
robotic agent inside the field unless there is a stampede risk; which is when,
it becomes absolutely necessary to do so. In the following sections, we present
how we achieve congestion detection and congestion control using the agents
described.
3 Congestion Detection
For computational ease and efficiency, we divide our field into smaller rectangular
areas (henceforth called grids). The division allows multiple CDAs to parallely
inspect grids.
We fork as many CDAs as there are grids to parallely inspect the grids and
check for presence of congestion in them. For the grids for which presence of
congestion is reported, we find the extent and boundaries of the congested area
using the breadth first search algorithm Algorithm 1.
Title Suppressed Due to Excessive Length
3
Algorithm 1 Given a grid id as input, return grid ids of the neighbouring
congested grids.
1: Given : gridId
2: list congestedGridIds ← emptyList
3: list toBeCheckedGridIds ← emptyList
4: toBeCheckedGridIds.add(gridId)
5: while toBeCheckedGridIds (cid:54)= empty do
6:
7:
8:
currentGridId ← toBeCheckedGridIds.getF irstElement()
/*
Strategies for checkForCongestion() function are described in subsections of sec-
tion 3.
*/
if checkF orCongestion(currentGridId) == true then
//congestion present
congestedGridIds.add(currentGridId)
list neighbouringGridIds ← getF ourOverlappingGridIds(currentGridId)
for each neighbouringGridId in neighbouringGridIds do
/*
One of the overlapping grids of a child grid would be the parent congested
grid itself, gridId of which would be present in congestedGridIds. Since we
have already checked the parent congested grid, we do not add it to the
toBeCheckedGridIds list.
*/
if neighbouringGridId not present in congestedGridIds then
toBeCheckedGridIds.add(neighbouringGridId)
end if
end for
end if
/*
The first element of the toBeCheckedGridIds list is currentGridId. We finished
inspecting the grid corresponding to the currentGridId, so we remove it from the
list.
*/
toBeCheckedGridIds.removeF irstElement()
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
25:
26:
27: end while
28: return congestedGrids
4
Garima Ahuja and Kamalakar Karlapalem
The CCAs need to know the boundaries of the congested areas to resolve
congestions. We discuss the details of congestion control in section 4.
In the following subsections, we describe the different strategies that could
be used for congestion detection in a grid.
3.1 Naive Strategy
We can estimate the capacity of a grid based on its area. A CDA would then
count the number of humans present inside the grid and report presence of
congestion if this number is more than the capacity of the grid. Otherwise, the
CDA would report absence of congestion.
3.2 Free Flow Strategy
CDA counts the number of humans who entered or left the grid in one unit time.
If the number of humans who left the grid is more than the number of humans
who entered, we say that there is free flow in the grid and report absence of
congestion; otherwise we report presence of congestion.
3.3 Trapped Humans Strategy
We report presence of congestion in the grid when there are one or more trapped
humans present. A human is trapped when he has more than minN neighbours
in his neighbourhood where the neighbourhood is defined as a circle of radius r
around a human. Figure 1 shows one such scenario. This strategy is not computa-
tionally efficient as it involves inspecting neighbourhood of every human present
in the grid. However, search space can be decreased using Locality Sensitive
Hashing (LSH), thereby improving the performance.
Fig. 1. Trapped humans are represented by filled circles.
3.4 A Macro Micro Strategy
The strategies suggested so far use only the location coordinates of humans
present inside the field for congestion detection. We can however use a human’s
Title Suppressed Due to Excessive Length
5
previous and current positions to determine the direction he/she is moving in. We
can also record the time stamps as and when we receive the location coordinates
and use it to determine his/her speed.
Another important piece of information we have not considered in the other
strategies is the human behaviour. Humans tend to visit places in groups of
families or friends [13]. In a particular group, all the humans tend to be close
to each other and move in the same direction. Their direction of movement also
depends on their inherent tendency to avoid collisions.
We now propose a macro micro strategy for congestion detection which uses
all the information we have not been utilizing till now. We divide the humans
into groups where a group is defined as a connected group of humans moving in
the same direction. The congestion detection then proceeds as follows:
(i) At the macro or inter-group level, we count the number of groups that are
moving towards a fixed point. We report presence of congestion if this number is
greater than or equal to three. (Our simulations show that when the number of
conflicting directions is two, the human tendency to avoid collisions is ensuring
hassle free movement.)
(ii) At the micro or intra-group level, we further divide the groups into con-
nected sub-groups of humans moving with similar speeds. We report presence
of congestion if speed of a sub-group is more than the speed of the sub-group
moving in front of it (front is along the direction of movement of the group).
(iii) If both the conditions stated above do not hold, we report absence of
congestion.
4 Congestion Control
Our simulation results (presented in the next section) show that the macro micro
strategy performs better than the other strategies for congestion detection. We
therefore use it and, based on it, devise a strategy for congestion control.
Recall that the CDA not just reports presence or absence of congestion in
a grid but also finds out the boundaries of the congested area. Thus, the CDA
knows where to lead the humans present in the congested area, i.e. out of the
congestion boundary. The CDA calls a CCA and then they work together to
achieve congestion control. One of the following cases will arise:
(i) There are no conflicting directions (intersecting directions) but the speed
of a sub-group is greater than the speed of the sub-group moving in front of it
(front is along the direction of movement of the group). Recall that the CCA has
a spotlight attached to it to illuminate the area below. The CCA starts moving
above the sub-group while shining its spotlight on the sub-group and playing a
pre-recorded message requesting the humans to slow down.
(ii) There are conflicting directions but at least one of the group has space in
front to proceed (see Figure 2). The CCA then positions itself above that group
and leads the group in its target direction while requesting the other groups to
wait for it to return. The group being led is requested to follow the spotlight and
maintain the speed of the spotlight. After the group is led out of the congested
6
Garima Ahuja and Kamalakar Karlapalem
area, the new scenario could conform to case (ii) or case (iii) and is handled
accordingly recursively till congestion is resolved.
Fig. 2. When there is space in front of at least one of the groups, that group is led
while the others wait.
(iii) There are conflicting directions and none of the groups have space in front
to proceed (see Figure 3). Using the pre-recorded messages and the spotlight, the
CCA leads one of the group through a semi circular path around the congested
area while requesting the other groups to wait for it to return. The center of the
semi circular path is given by (1) and (2) and the radius is given by (3).
centerx = {(ax + bx)/2dist(a, b) ≥ dist(i, j)∀i, j ∈ humansInCongestedArea}
(1)
centery = {(ay + by)/2dist(a, b) ≥ dist(i, j)∀i, j ∈ humansInCongestedArea}
(2)
radius = {dist(a, b)/2dist(a, b) ≥ dist(i, j)∀i, j ∈ humansInCongestedArea}
(3)
Fig. 3. When there is no space in front of any of the groups, one of the group is led
through a semi circular path around the congested area while the other groups wait.
After the group is led out of the congested area, the new scenario could con-
form to case (ii) or case (iii) and is handled accordingly recursively till congestion
is resolved.
Title Suppressed Due to Excessive Length
7
Notice in Figure 3 that the groups finally end up moving in the direction
they originally intended to. Only difference being that the CCAs made them
move around the congested area while they were trying to move through the
congested area.
Also, note that the isVacant() function used in the congestion boundary de-
tection algorithm (presented in section 3) would use results from naive strategy,
not macro micro strategy. The reason being that the CCAs need to know where
there is empty space so that they can lead the conflicting groups accordingly.
Macro Micro strategy would report absence of congestion for densely populated
grids too as long as there are no conflicting directions present and therefore it
cannot be used for the isVacant() function.
The environment we are dealing with is non-deterministic. The outcome of
the congestion control strategy would depend on the obedience of the crowd.
Therefore, it is crucial to take feedback from the environment and act accord-
ingly. To that end, the CDA keeps recalculating humans’ speeds and directions
to calculate the percentage of disobedience. A human is disobedient if he/she
does not have the speed or direction he/she is being instructed to have. If the
percentage of disobedience is high, the CDA requests the police in charge to take
over and manage the crowd.
5 Results
We use Helbing and Molnar’s social force model [9] for crowd simulation. The
motion of each human is governed by the summation of all the forces exerted on
and by the human. The following forces help us in modeling group behavior:
(i) Intent: A human exerts force in the direction he wants to move in.
(ii) Cohesion: A human exerts force so as to remain close to his group.
(iii) Coherency: A human exerts force so as to walk in the same direction
as his group.
(iv) Momentum: Inertial force.
(v) Avoidance: A human exerts force to avoid colliding with other humans
and obstacles.
The first scenario we consider is an emergency evacuation scenario. To sim-
ulate that, we add a force towards the exit door to the above forces. In an
evacuation scenario, we do not want our congestion controlling agents to inter-
rupt the evacuation if the humans are moving towards the exit door in a calm
manner. So we want absence of congestion to be reported if the movement of
the crowd is not unruly. Figure 4 shows such a scenario where the humans are
moving in an orderly manner towards the exit gate while avoiding obstacles.
Naive strategy, free flow strategy and trapped humans strategy all fail in the
evacuation scenario because they cannot distinguish between a calm crowd and
an unruly one. However, macro micro strategy recognizes the gradually changing
direction as one direction and reports absence of congestion if speed conflicts are
absent. Therefore, we will not unnecessarily interrupt evacuation if the crowd
is calm (speed conflicts absent). However as soon as the crowd becomes unruly,
8
Garima Ahuja and Kamalakar Karlapalem
speed conflicts will be detected and remedial measures will be taken. Hence, our
crowd managing model is able to successfully handle the emergency evacuation
scenario without any unnecessary interruptions.
Fig. 4. Outputs of different congestion detection strategies when humans are moving
calmly towards the golden exit gate while avoiding obstacles. Direction of the compass
represents direction of the human. Red compasses represent congestion.
We now consider a localized congestion scenario i.e. a scenario where con-
gestion is localized to a relatively small area (in this case a grid). To simulate
this scenario, to the above listed forces we add a force directed towards a fixed
point. Results of various congestion detection strategies for localized congestion
scenario is shown in Figure 5. Naive strategy, free flow strategy and trapped hu-
mans strategy again fail in this scenario because the grid is sparsely populated
and number of humans entering the grid is zero. However, macro micro strat-
egy is able to identify the root cause behind congestion which is the conflicting
directions and reports congestion successfully.
Fig. 5. Outputs of different congestion detection strategies for the localized conges-
tion scenario. Direction of the arrow represents direction of the human. Red humans
represent congestion.
Title Suppressed Due to Excessive Length
9
Now that we have shown that the macro micro strategy works better than
other strategies for congestion detection, we test our congestion control strategy
for the above stated localized congestion scenario. The results are presented in
Figure 6. Figure 6(a) shows the present scenario. Figure 6(b) shows the blue
group being led on a semi circular path. Figure 6(c) shows the brown group
being led on a straight path. Figure 6(d) shows the scenario after congestion is
successfully resolved.
Fig. 6. Output of macro micro congestion control for the localized congestion scenario.
The present scenario is shown in (a), (b) shows the blue group being led on a semi
circular path, (c) shows the brown group being led on a straight path and (d) shows
the scenario after congestion is successfully resolved.
Finally, we simulate humans on a central park background and test our con-
gestion detection and congestion control strategies. The results are presented in
Figure 7.
Fig. 7. Situation before(a) and after(b) congestion control. Red dots represent humans
experiencing congestion.
The time taken to resolve congestion for different magnitudes of congestion
is tabulated in Table 1.
10
Garima Ahuja and Kamalakar Karlapalem
Table 1. Time taken to resolve congestion
No.
Number of hu-
mans in the con-
gested area
1
2
3
4
5
6
6
12
19
28
34
41
Number of con-
flicting
groups
in the congested
area
3
3
3
5
6
8
Maximum walk-
ing speed of a
human in metres
per second
1.4
1.2
1.4
1.3
1.3
1.2
Time taken to re-
solve
congestion
in seconds
2.2
10.9
24.3
97.6
134.0
247.8
Remember that we pointed out that the groups finally end up moving in the
direction they originally intended to. Only difference being that the CCAs made
them move around the congested area while they were trying to move through
the congested area. Since we are not making the humans move in a direction they
did not intend to, we cannot assure complete absence of congestion. Direction
conflicts will inevitably arise unless we force the humans to move in a direction
they do not want to move in (see Figure 7(b)). Nevertheless, our congestion
control strategy resolves congestion as soon as it is detected and keeps on doing
so to ensure hassle free movement of the crowd.
6 Related Work
There has been a lot of research in trying to model crowd dynamics and be-
haviour. There are cellular automata based models [6,7,11] and agent-based
models [14,15,17]. Helbing and Molnar [9] model is a social force model that
simulates motion of each individual in the crowd under the influence of the
forces exerted on the individual by other individuals and inanimate objects. An
individual can exert two types of forces, physical and social. The social forces
represent the intention of a human to move in a chosen direction and avoid colli-
sion. The resultant motion of the human is governed by sum of all forces exerted
by the human and on the human. We used this model to simulate human agents
in our experiments.
These crowd behaviour models help in increasing our understanding and pro-
vide a framework to work towards crowd management models. Helbing, Johans-
son and Al-Abideen studied the dynamics of crowd disasters [8]. They analyzed
the videos of crowd disasters during Hajj and studied crowd response and be-
haviour. Helbing and Mukerji analyzed the Love Parade disaster [10]. Sime [16]
proposed that early warning would help in efficient crowd management during
disasters. Kolli and Karlapalem [12] presented crowd management strategies in
long queues, a one-dimensional and unidirectional scenario. However, the prob-
lem of crowd management in a two-dimensional scenario using robotic agents
proposed in this paper has not been studied.
Title Suppressed Due to Excessive Length
11
7 Conclusion
In this paper, we presented a multi agent based solution to crowd management.
Our results show that the agents are able to detect the presence of congestion as
well as take remedial actions even in difficult scenarios like localized congestion
and emergency evacuation. Thus the robotic agents help the police force in
ensuring a congestion free movement of the crowd. Future work may look into
how to handle congestion in a three dimensional scenario where say there are
stairways present. Such a scenario is more dangerous as the chances of stumbling
and falling increase and therefore it needs to be addressed.
References
1. Allahabad
stampede
kills
36
kumbh
mela
pilgrims.
http://in.reuters.com/article/2013/02/11/kumbh-mela-stampede-allahabad-
update-idINDEE91907I20130211.
2. Hillsborough disaster and its aftermath. http://www.bbc.com/news/uk-19545126.
3. A history of hajj tragedies. http://www.theguardian.com/world/2006/jan/13/saudiarabia.
4. Khodynka tragedy. http://worldhistoryproject.org/1896/5/18/khodynka-tragedy.
5. The who concert disaster. http://en.wikipedia.org/wiki/The Who concert disaster.
6. J. Dijkstra, H. J. Timmermans, and A. Jessurun. A multi-agent cellular automata
system for visualising simulated pedestrian activity. In Theory and Practical Issues
on Cellular Automata, pages 29–36. Springer, 2001.
7. T. Hamagami and H. Hirata. Method of crowd simulation by using multiagent on
cellular automata. In Intelligent Agent Technology, 2003. IAT 2003. IEEE/WIC
International Conference on, pages 46–52. IEEE, 2003.
8. D. Helbing, A. Johansson, and H. Z. Al-Abideen. Dynamics of crowd disasters: An
empirical study. Physical review E, 75(4):046109, 2007.
9. D. Helbing and P. Molnar. Social force model for pedestrian dynamics. Physical
review E, 51(5):4282, 1995.
10. D. Helbing and P. Mukerji. Crowd disasters as systemic failures: analysis of the
love parade disaster. EPJ Data Science, 1(1):1–40, 2012.
11. A. Kirchner and A. Schadschneider. Simulation of evacuation processes using a
bionics-inspired cellular automaton model for pedestrian dynamics. Physica A:
Statistical Mechanics and its Applications, 312(1):260–276, 2002.
12. S. Kolli and K. Karlapalem. Mama: multi-agent management of crowds to avoid
In Proceedings of the 2013 international conference
stampedes in long queues.
on Autonomous agents and multi-agent systems, pages 1203–1204. International
Foundation for Autonomous Agents and Multiagent Systems, 2013.
13. R. Kota, V. Bansal, and K. Karlapalem. System issues in crowd simulation using
massively multi-agent systems. In Workshop on Massively Multi Agent Systems,
pages 251–257, 2006.
14. Y. Murakami, K. Minami, T. Kawasoe, and T. Ishida. Multi-agent simulation
for crisis management. In Knowledge Media Networking, 2002. Proceedings. IEEE
Workshop on, pages 135–139. IEEE, 2002.
15. T. Osaragi. Modeling of pedestrian behavior and its applications to spatial evalu-
ation. In Proceedings of the Third International Joint Conference on Autonomous
Agents and Multiagent Systems-Volume 2, pages 836–843. IEEE Computer Society,
2004.
12
Garima Ahuja and Kamalakar Karlapalem
16. J. D. Sime. Crowd facilities, management and communications in disasters. Facil-
ities, 17(9/10):313–324, 1999.
17. M. C. Toyama, A. L. Bazzan, and R. Da Silva. An agent-based simulation of
pedestrian dynamics: from lane formation to auditorium evacuation. In Proceedings
of the fifth international joint conference on Autonomous agents and multiagent
systems, pages 108–110. ACM, 2006.
|
1108.3462 | 1 | 1108 | 2011-08-17T12:13:44 | A Multiagent Simulation for Traffic Flow Management with Evolutionary Optimization | [
"cs.MA",
"nlin.AO"
] | A traffic flow is one of the main transportation issues in nowadays industrialized agglomerations. Configuration of traffic lights is among the key aspects in traffic flow management. This paper proposes an evolutionary optimization tool that utilizes multiagent simulator in order to obtain accurate model. Even though more detailed studies are still necessary, a preliminary research gives an expectation for promising results. | cs.MA | cs |
A Multiagent Simulation for Traffic Flow
Management with Evolutionary Optimization
Patryk Filipiak
Institute of Computer Science
University of Wroclaw, Poland
[email protected]
October 11, 2018
Abstract
A traffic flow is one of the main transportation issues in nowadays
industrialized agglomerations. Configuration of traffic lights is among the
key aspects in traffic flow management. This paper proposes an evolution-
ary optimization tool that utilizes multiagent simulator in order to obtain
accurate model. Even though more detailed studies are still necessary, a
preliminary research gives an expectation for promising results.
1 Traffic flow management
Early models of traffic flow (called macroscope models) treated vehicles in the
collective manner basing on the analogy to particles in a fluid [7]. Later on, more
precise (mezoscope) models were being created consecutively (mostly based on
gas kinetics) [5]. Currently, a multiagent simulation mechanism provides much
more efficient microscope model where each vehicle can be regarded separately
allowing for highly detailed analysis including collision avoidance [4], traffic
virtualization [2], interactions with pedestrians [3], etc.
Traffic flow management varies from tracing main roads average capacity
across certain area (where macroscope models give satisfactory results) to very
low-level manipulations including re-arrangement of lanes, modifying traffic
lights configuration, planning bridge locations, etc. where microscope models
are most suitable [9].
2 Multiagent traffic flow simulator
The agent-based traffic flow simulator described in [9] is the universal microscope
model. The environment for agents in this model comprises of a system of city
streets defined in XML files using the following entities illustrated in Figure 1:
1
Figure 1: Elements of environment description presented on the part of a sample
junction.
• road -- defines the one-way part of a street, i.e. an existing path leading
from one junction to another. For the sake of simplicity, roads at the
frontiers of a model are considered dead-end even though they play roles
of ingoing or outgoing roads.
• queue -- defines a single lane represented as a first-in-first-out list of ve-
hicles located on this lane one after another. Note that there has to be at
least one queue for each road at each junction.
• trajectory -- corresponds to a trajectory of vehicles crossing the junction
from a given ingoing road to a given outgoing road. Each trajectory stores
the information about other trajectories with possibile collisions with it.
• track -- an abstract pair queue-trajectory binding three entities, namely
queue at ingoing road, queue at outgoing road and trajectory from one to
another.
Each vehicle in the environment is an agent that is aware of its current
speed and exact location within a model (particularly, its relative position on
the present road). What is more, a vehicle is assigned another agent who drives
it in order to achive the driver's own aim which is to get from point A to point
B chosing the best possible way.
Driver agents are equipped with a simple perception mechanism that allows
them to acquire information about a vehicle driven by them (e.g. current lane,
driving speed or acceleration) and the current state of environment in their
proximity, particularly: other vehicles (their behaviour, distance to them, etc.)
and traffic lights.
For the sake of efficiency, described model includes the following simplifica-
tions that should be taken into account: there are traffic lights at each junction,
there are no roundabouts and the presence of pedestrians is ignored.
2
Simulation process in described model is the sequence of N ∈ N iterations
executed every τ > 0 miliseconds (by default N = 1000 and τ = 200). Each
iteration includes the following operations:
1. Apply changes in the environment (if there are any at this time period)
including the presence of colliding tracks and the state of traffic lights.
2. Refresh all agents' local information about the state of environment.
3. Refresh locations of all moving vehicles according to intentions of their
drivers considering current speed and acceleration of vehicles.
4. Remove agents that achived their aims and create new ones if possible.
Vehicle agents collect some essential information during simulation, i.e. exact
trace; number, locations and durations of stops; average speed etc. for the sake
of further analysis.
Figure 3 depicts arrangement of main streets in Wroclaw, Poland that can
be easily modelled using described agent-based simulator.
3 Optimization of traffic lights
Traffic lights are commonly used as an effective solution for car flow routine
regulation in virtually all agglomerations. Modification of traffic lights configu-
ration is the key aspect in optimization of traffic flow for the model presented
in the previous section.
In many real-world situations, traffic lights configuration settings are based
on combination of averaged theoretical data and designer's assumptions. A
multiagent simulation approach can be used instead in order to provide more
accurate data.
A cyclic sequence of consecutive changes of lights including detailed informa-
tion about duration of time when each light is on combined with dependencies
amongst all traffic lights within a given area (typically a crossroad) is referred
to as traffic lights programme. The usual representation of such programme is
a graphical timeline presented in Figure 2.
Figure 2: A sample junction with two pairs of traffic lights (left) and a corre-
sponding traffic lights programme (right).
3
Figure 3: Arrangement of main streets in Wroclaw (Poland) that can be easily
modelled with the agent-based simulator.
The merit of underlying optimization process lies in realistic accuracy pro-
vided by the agent-based simulator. Performance of contemporary hardware is
sufficiently enough for launching simulations containing even millions of agents
in place of less accurate statistical estimations that were used in previous years.
Thus, the values of a function that is being optimized are in fact results of
agent-based simulation.
3.1 Constraints
Any traffic lights programme is obliged to satisfy the following constraints:
• A change of lights cannot violate the sequence (green, yellow, red, red+yellow)
repeated continuously.
• Duration of green light must be greater or equal to a given minimal time
length whereas durations of transient lights (i.e. yellow and red+yellow)
are constant and cannot undergo any optimization.
• No collision possibilities are allowed, i.e. red light must be lit on at one
pair of traffic lights until green light turns to yellow on another pair and
remains yellow for a given time period; similar condition must be satisfied
during a change from green to red light.
3.2 Criteria
The aim is to optimize a traffic lights programme by maximizing a car flow
subject to constraints described above. Typical optimization criteria in such
case would be: maximizing the number of agents that achived their aims during
simulation, minimizing the average time of a ride, maximizing average speed of
vehicles, etc. Since most of the criteria correspond to each other an aggregation
of at least two of them provides a fair evaluation function.
4
Figure 4: A sample programme of i-th traffic lights represented in binary chro-
mosome form (up) and its corresponding timeline form (down).
3.3 Representation
Assume that T > 0 is a time length of one traffic lights cycle at a junction. Time
range [0, T ] can be discretized into T /τ intervals of τ > 0 miliseconds each as it
was mentioned in the previous section. Let tmin be the minimal and
tmax =
T
τ
− k · tmin − C,
(C = const)
(1)
be the maximal feasible time length of green light duration. Note that tmax is
determined by the time length of green light duration for k tracks colliding with
current track and some constant value reserved for transient lights.
As a result, any programme of M > 0 traffic lights can be well-defined by
the set of pairs
{(start1, t1), (start2, t2), . . . , (startM , tM )},
(2)
where starti represents the number of time interval when i-th traffic light turns
to green and remains for the next ti time intervals (i = 1, . . . , M ). Duration of
red light can be computed therefore as T − ti − C.
Evolutionary algorithms provide an efficient optimization mechanism for the
problem presented above. Let n > 0 be the lowest integer value that satisfies
condition T /τ ≤ 2n, hence
0 < tmin ≤ tmax ≤ 2n.
(3)
Any traffic lights programme expressed in the form (2) can be encoded as a
2M N -element binary chromosome containing M pairs of N -bit values (Li, Ri)
such that
starti = Li mod T /τ,
ti = tmin + [Ri mod (tmax − tmin + 1)]
(4)
(5)
5
for i = 1, . . . , M .
3.4 Algorithm
Population-Based Incremental Learning (PBIL) [1] can be used as an evolu-
tionary optimization tool for the stated problem thanks to its simplicity and
promising results in a broad range of applications.
It is also worth noticing
that even more complex evolutionary algorithms could be applied instead with-
out a significant decrease of performance due to considerably time consuming
evaluation process that is suggested in this paper.
Algorithm 1 presents the pseudocode of PBIL. It is so called Estimation of
Distribution Algorithm (EDA) [6] based on the idea of optimizing a probability
model for solution rather than implicit set of solutions. Later on, individuals
are randomly generated according to obtained probability distribution.
The requirement for collision avoidance is not satisfied by the traffic lights
programme definition itself, hence the presence of infeasible individuals in popu-
lation might be expected. Figure 5 presents a simple conflicts resolving method
for this case. If a collision possibility occurres between a pair of trajectories
then corresponding traffic lights programme can be modified in order to ensure
arbitrary set C ′ distance between green light durations. If any of modified green
light durations becomes shorter than tmin then it is automaticaly expanded to
tmin in the only possible way. Finally, if a conflict still occurres, a new random
individual is selected.
Algorithm 1 Standard PBIL algorithm with parameters 0 < θ1, θ2, θ3 < 1 on a
population of size individuals each of which is represented as d-element binary
vector.
p ← InitialProbabilityVector()
P ← RandomPopulation(p, size)
PopulationEvaluation(P )
while not TerminationCondition(P ) do
xi ← BestIndividual(P )
for k ← 1 to d do
pk ← pk · (1 − θ1) + xik · θ1
end for
for k ← 1 to d do
if UniformRandom(0, 1) ¡ θ2 then
pk ← pk · (1 − θ3) + BinaryRandom(0.5) · θ3
end if
end for
P ← RandomPopulation(p, size)
PopulationEvaluation(P )
end while
6
4 Conclusions and Perspectives
Even though the results are partial at the moment and more detailed studies
are still necessary, a preliminary research gives an expectation for promising
results. An improvement of agent-based traffic flow model could be a next step.
Also a modification of evolutionary mechanism may improve the performance of
optimization process. Replacing PBIL with Bayesian Optimization Algorithm
(BOA) [8] could ensure obtaining much more detailed model. Unlike other
evolutionary algorithms, BOA not only searches for optimal solution but also
gives some information about its structure. Lots of dependencies (e.g. among
traffic lanes and even adjacent junctions) could be modelled in terms of Bayesian
networks that are utilized in BOA. What is more, such dependency model could
include the fact that more effort should be put to traffic flow management inside
city centers than suburbs because of greater amount of junctions, narrow and/or
one-way street, etc.
As it is clearly seen, the effectiveness of agent-based approach applied for
traffic flow managements provides a broad range of ideas.
5 Acknowledgements
The multiagent simulator developed by Krzysztof Sroka within confines of his
Master's dissertation [9] was extensively used during research process for this
paper.
Figure 5: Simple conflicts resolving method.
7
References
[1] Baluja, S., Population-Based Incremental Learning: A Method for Integrating Ge-
netic Search Based Function Optimization and Competitive Learning, Technical
Report (Pittsburgh, PA: Carnegie Mellon University), 1994.
[2] Berg van den, J., Sewall, J., Lin, M., Manocha, D., Virtualized Traffic: Recon-
structing Traffic Flows from Discrete Spatio-Temporal Data in Proceedings of IEEE
VR, 2009.
[3] Godara, A., Lassarre, S., Banos, A., Simulating Pedestrian-Vehicle Interaction
in an Urban Network Using Cellular Automata and Multi-Agent Models. Lecture
Notes in Computer Science, Traffic and Granular Flow05, Part IV, 2007
[4] Hoffmann, G., M., Tomlin, C., J., Decentralized cooperative collision avoidance for
acceleration constrained vehicles. 47th IEEE Conference on Decision and Control
(CDC), 2008.
[5] Hoogendoorn, S., P., Bovy, P., H., L., State-of-the-art of Vehicular Traffic Flow
Modelling, Special Issue on Road Traffic Modelling and Control of the Journal of
Systems and Control Engineering, 2001.
[6] Larranaga, P., Lozano, J. A., Estimation of distribution algorithms: A new tool
for evolutionary computation. Kluwer Academic Publishers, Boston, 2002.
[7] Lighthill, M., H., Whitham, G., B., On kinematic waves II: a theory of traffic flow
on long, crowded roads. Proceedings of the Royal Society of London series A, 1955.
[8] Pelikan, M., Goldberg, D. E., Cantu-Paz, E., Linkage problem, distribution estima-
tion, and Bayesian networks. IlliGAL Report No. 98013: Illinois Genetic Algorithm
Laboratory, University of Illinois at Urbana-Champaign, 1998.
[9] Sroka, K., A traffic lights programme optimization, Master's Thesis, Institute of
Computer Science, University of Wroclaw, 2009.
8
|
1912.10944 | 2 | 1912 | 2019-12-26T14:47:34 | A Survey of Deep Reinforcement Learning in Video Games | [
"cs.MA",
"cs.AI",
"cs.LG"
] | Deep reinforcement learning (DRL) has made great achievements since proposed. Generally, DRL agents receive high-dimensional inputs at each step, and make actions according to deep-neural-network-based policies. This learning mechanism updates the policy to maximize the return with an end-to-end method. In this paper, we survey the progress of DRL methods, including value-based, policy gradient, and model-based algorithms, and compare their main techniques and properties. Besides, DRL plays an important role in game artificial intelligence (AI). We also take a review of the achievements of DRL in various video games, including classical Arcade games, first-person perspective games and multi-agent real-time strategy games, from 2D to 3D, and from single-agent to multi-agent. A large number of video game AIs with DRL have achieved super-human performance, while there are still some challenges in this domain. Therefore, we also discuss some key points when applying DRL methods to this field, including exploration-exploitation, sample efficiency, generalization and transfer, multi-agent learning, imperfect information, and delayed spare rewards, as well as some research directions. | cs.MA | cs | A Survey of Deep Reinforcement Learning in Video
Games
Kun Shao, Zhentao Tang, Yuanheng Zhu, Member, IEEE, Nannan Li, and Dongbin Zhao, Fellow, IEEE
1
9
1
0
2
c
e
D
6
2
]
A
M
.
s
c
[
2
v
4
4
9
0
1
.
2
1
9
1
:
v
i
X
r
a
Abstract -- Deep reinforcement learning (DRL) has made great
achievements since proposed. Generally, DRL agents receive
high-dimensional inputs at each step, and make actions according
to deep-neural-network-based policies. This learning mechanism
updates the policy to maximize the return with an end-to-
end method. In this paper, we survey the progress of DRL
methods, including value-based, policy gradient, and model-based
algorithms, and compare their main techniques and properties.
Besides, DRL plays an important role in game artificial
in-
telligence (AI). We also take a review of the achievements of
DRL in various video games, including classical Arcade games,
first-person perspective games and multi-agent real-time strategy
games, from 2D to 3D, and from single-agent to multi-agent.
A large number of video game AIs with DRL have achieved
super-human performance, while there are still some challenges
in this domain. Therefore, we also discuss some key points
when applying DRL methods to this field, including exploration-
exploitation, sample efficiency, generalization and transfer, multi-
agent learning,
imperfect information, and delayed spare re-
wards, as well as some research directions.
Index Terms -- reinforcement
learning, deep learning, deep
reinforcement learning, game AI, video games.
I. INTRODUCTION
A RTIFICIAL intelligence (AI) in video games is a long-
standing research area. It studies how to use AI tech-
nologies to achieve human-level performance when playing
games. More generally, it studies the complex interactions be-
tween agents and game environments. Various games provide
interesting and complex problems for agents to solve, making
video games perfect environments for AI research. These
virtual environments are safe and controllable. In addition,
these game environments provide infinite supply of useful data
for machine learning algorithms, and they are much faster than
real-time. These characteristics make games the unique and
favorite domain for AI research. On the other side, AI has
been helping games to become better in the way we play,
understand and design them [1].
Broadly speaking, game AI involves the perception and
the decision-making in game environments. With these com-
ponents,
there are some crucial challenges and proposed
solutions. The first challenge is that the state space of the
game is very large, especially in strategic games. With the rise
K. Shao, Z. Tang, Y. Zhu, N. Li, and D. Zhao are with the State Key
Laboratory of Management and Control for Complex Systems, Institute of Au-
tomation, Chinese Academy of Sciences. Beijing 100190, China. They are also
with the University of Chinese Academy of Sciences, Beijing, China (e-mail:
[email protected]; [email protected]; [email protected];
[email protected], [email protected]).
This work is supported by National Natural Science Foundation of
China (NSFC) under Grants No.61573353, No.61603382, No.6180337, and
No.61533017.
of representation learning, the whole system has successfully
modeled large-scale state space with deep neural networks.
The second challenge is that learning proper policies to make
decisions in dynamic unknown environment is difficult. For
this problem, data-driven methods, such as supervised learn-
ing and reinforcement learning (RL), are feasible solutions.
The third challenge is that the vast majority of game AI is
developed in a specified virtual environment. How to transfer
the AI's ability among different games is a core challenge. A
more general learning system is also necessary.
For a long time, solving these challenges with reinforcement
learning is widely used in game AI. And in the last few
years, deep learning (DL) has achieved remarkable perfor-
mance in computer vision and natural language processing
[2]. The combination, deep reinforcement learning (DRL),
teaches agents to make decisions in high-dimensional state
space in an end-to-end framework, and dramatically improves
the generalization and scalability of traditional RL algorithms.
Especially, DRL has made great progress in video games,
including Atari, ViZDoom, StarCraft, Dota2, and so on. There
are some related works to introduce these achievements in this
field. Zhao et al. [3] and Tang et al. [4] survey the development
of DRL research, and focus on AlphaGo and AlphaGo Zero.
Justesen et al. [5] reviews DL-based methods in video game
play,
including supervised learning, unsupervised learning,
reinforcement learning, evolutionary approaches, and some
hybrid approaches. Arulkumaran et al. [6] make a brief intro-
duction of DRL, covering central algorithms and presenting
a range of visual RL domains. Li [7] gives an overview of
recent achievements of DRL, and discusses core elements,
important mechanisms, and various applications. In this paper,
we focus on DRL-based game AI, from 2D to 3D, and from
single-agent to multi-agent. The main contributions include
the comprehensive and detailed comparisons of various DRL
methods, their techniques, properties, and the impressive and
diverse performances in these given video games.
The organization of the remaining paper is arranged as
follows. In Section II, we introduce the background of DL and
RL. In Section III, we focus on recent DRL methods, including
value-based, policy gradient, and model-based DRL methods.
After that, we make a brief introduction of research platforms
and competitions, and present performances of DRL methods
in classical single-agent Arcade games, first-person perspective
games, and multi-agent real-time strategy games. In Section
V, we discuss some key points and research directions in this
field. In the end, we draw a conclusion of this survey.
2
Fig. 1. The framework diagram of the typical DRL for video games. The deep learning model takes input from video games API, and extract meaningful
features automatically. DRL agents produces actions based on these features, and make the environments transfer to next state.
II. BACKGROUND
B. Reinforcement learning
Generally speaking, training an agent to make decisions
with high-dimensional inputs is difficult. With the development
of deep learning, researchers take deep neural networks as
function approximations, and use plenty of samples to opti-
mize policies successfully. The framework diagram of typical
DRL for video games is depicted in Fig. 1.
A. Deep learning
Deep learning comes from artificial neural networks, and
is used to learn data representation. It
is inspired by the
theory of brain development, and can be learned in supervised
learning, unsupervised learning and semi-supervised learning.
Although the term deep learning is introduced in 1986 [8],
deep learning has a winter time because of lacking data and
incapable computation hardware. However, with more and
more large-scale datasets being released, and capable hardware
being available, a big revolution happens in DL [9].
Convolutional neural network (CNN) [10] is a class of
deep neural networks, which is widely applied to computer
vision. CNN is inspired by biological processes, and is
shift invariant based on shared-weights architecture. Recurrent
Neural Network (RNN) is another kind of deep nerial net-
work, especially for natural language processing. As a special
kind of RNN, Long Short Term Memory (LSTM) [11] is
capable of learning long-term dependencies. Deep learning
architectures have been applied into many fields, and have
achieved significant successes, such as speech recognition, im-
age classification and segmentation, semantic comprehension,
and machine translation [2]. DL-based methods with efficient
parallel distributed computing resources can break the limit
of traditional machine learning methods. This method inspires
scientists and researchers to achieve more and more state-of-
the-art performance in respective fields.
Reinforcement learning is a kind of machine learning meth-
ods where agents learn the optimal policy by trial and error
[12]. By interacting with the environment, RL can be suc-
cessfully applied to sequential decision-making tasks. Consid-
ering a discounted episodic Markov decision process (MDP)
(S, A, γ, P, r), the agent chooses an action at according to
the policy π(atst) at state st. The environment receives the
action, produces a reward rt+1 and transfers to the next state
st+1 according to the transition probability P (st+1st, at).
This transition probability is unknown in RL domain. The
process continues until the agent reaches a terminal state or a
maximum time step. The objective is to maximize the expected
discounted cumulative rewards
∞(cid:88)
Eπ[Rt] = Eπ[
γirt+i],
(1)
where γ ∈ (0, 1] is the discount factor.
i=0
Reinforcement learning can be devided into off-policy and
on-policy methods. Off-policy RL algorithms mean that the
behavior policy used for selecting actions is different from the
learning policy. On the contrary, behavior policy is the same
with the learning policy in on-policy RL algorithms. Besides,
reinforcement learning can also be devided into value-based
and policy-based methods. In value-based RL, agents update
the value function to learn suitable policy, while policy-based
RL agents learn the policy directly.
Q-learning is a typical off-policy value-based method. The
update rule of Q-learning is
δt = rt+1 + γ arg max
Q(st+1, a) − Q(st, at),
a
Q(st, at) ← Q(st, at) + αδt.
(2a)
(2b)
δt is the temporal difference (TD) error, and α is the learning
rate.
VideoGamesAPIValue-based Policy gradient Model-based etc…StatesFeaturesEnvironmentsRL AgentsActionsRewardsCNN, LSTM, etc…3
Fig. 2. The network architectures of typical DRL methods, with increased complexity and performance. (a): DQN network; (b)Dueling DQN network; (c):
DRQN network; (d): Actor-critic network; (e): Reactor network.
Policy gradient [13] parameterizes the policy and updates
parameters θ. In its general form, the objective function of
policy gradient is defined as
J(θ) = Eπ[
log πθ(atst)R].
(3)
∞(cid:88)
∞(cid:88)
R is the total accumulated return.
t=0
Actor-critic [12] reinforcement learning improves the policy
gradient with an value-based critic
J(θ) = Eπ[
Ψt log πθ(atst)].
(4)
t=0
Ψt is the critic, which can be the state-action value function
Qπ(st, at), the advantage function Aπ(st, at) = Qπ(st, at) −
V π(st) or the TD error rt + V π(st+1) − V π(st).
III. DEEP REINFORCEMENT LEARNING
DRL makes a combination of DL and RL, achieving rapid
developments since proposed. This section will
introduce
various DRL methods, including value-based methods, policy
gradient methods, and model-based methods.
A. Value-based DRL methods
Deep Q-network (DQN) [14] is the most famous DRL
model which learns policies directly from high-dimensional
inputs. It receives raw pixels, and outputs a value function to
estimate future rewards, as shown in Fig. 2(a). DQN uses the
experience replay method to break the sample correlation, and
stabilizes the learning process with a target Q-network. The
loss function at iteration i is
Li(θi) = E(s,a,r,s(cid:48))∼U (D)[(yDQN
i
− Q(s, a; θi))2],
with
yDQN
i
= r + γ max
a(cid:48) Q(s(cid:48), a(cid:48); θi
−).
(5)
(6)
DQN bridges the gap between high-dimensional visual
inputs and actions. After that, researchers have improved DQN
in different aspects. Double DQN [15] introduces double Q-
learning to reduce observed overestimations, and it leads to
much better performance. Prioritized experience replay [16]
helps prioritize experience to replay important
transitions
i(cid:80)
more frequently. The sample probability of transition i as
P (i) = pα
, where pi is the priority of transition i. Dueling
DQN [17] uses the dueling neural network architecture for
model-free DRL. It includes two separate estimators: one for
state value function V (s; θ, β) and the other for advantage
function A(s, a; θ, α), as shown in Fig. 2(b).
k pα
k
Q(s, a : θ, α, β) = V (s; θ, β) + A(s, a; θ, α).
(7)
Pop-Art [18] is proposed to adapt to different and non-
stationary target magnitudes, which successfully replaces the
clipping of rewards as done in DQN to handle various mag-
nitudes of targets. Fast reward propagation [19] is a novel
training algorithm for reinforcement learning, which combines
the strength of DQN, and exploits longer state-transitions in
experience replays by tightening the optimization via con-
straints. This novel
technique makes DRL more practical
by drastically reducing training time. Gorila [20] is the first
massively distributed architecture for DRL. This architecture
uses four main components: parallel actors; parallel learners;
a distributed neural network to represent the value function
or behavior policy; and a distributed store of experience. To
address the limited memory and imperfect game information
at each decision point, Deep Recurrent Q-Network (DRQN)
[21] replaces the first fully-connected layer with a recurrent
neural network in DQN, as shown in Fig. 2(c).
Generally, DQN learns rich domain representations and
approximates the value function with deep neural networks,
while batch RL algorithms with linear representations are
more stable and require less hyperparameter tuning. The Least
Squares DQN (LS-DQN) [22] combines DQN's rich feature
representations with the stability of a linear least squares
method. In order to reduce approximation error variance in
DQNs target values, averaged-DQN [23] averages previous
Q-values estimates,
leading to a more stable training and
improved performance. Deep Q-learning from Demonstrations
(DQfD) [24] combines DQN with human demonstrations,
which improves the sample efficiency greatly. DQV [25] uses
TD learning to train a Value neural network, and uses this
(a)(b)(c)(d)(e)it
network to train a second Quality-value network to esti-
mate state-action values. DQV learns significantly faster and
better than double-DQN. Researchers have proposed several
improvements to DQN. However,
is unclear which of
these are complementary and how much can be combined.
Rainbow [26] combines with main extensions to DQN, and
gives each component's contribution to overall performance.
RUDDER [27] is a novel reinforcement learning approach
for finite MDPs with delayed rewards, which is also a return
decomposition method, RUDDER is exponentially faster on
tasks with different lengths of reward delays. Ape-X DQfD
[28] uses a new transformed Bellman operator to process
rewards of varying densities and scales, and applies human
demonstrations to ease the exploration problem to guide agents
towards rewarding states. Additional, it proposes an auxiliary
temporal consistency loss to train stably extending the effective
planning horizon by an order of magnitude. Soft DQN [29]
is an entropy-regularized versions of Q-learning, with better
robustness and generalization .
Distributional DRL learns the value distribution, in contrast
to common RL that models the expectation of return, or value.
C51 [30] focuses on the distribution of value, and designs
distributional DQN algorithm to learn approximate value dis-
tributions. QR-DQN [31] methods close a number of gaps
between theoretical and algorithmic results. Distributional
reinforcement learning with Quantile regression in which the
distribution over returns is modeled explicitly instead of only
estimating the mean. Implicit Quantile Networks (IQN) [32] is
a flexible, applicable, and state-of-the-art distributional DQN.
IQN approximates the full Quantile function for the return
distribution with Quantile regression, and provides a fully
integrated distributional RL agent without prior assumptions
on the parameterization of the return distribution. Furthermore,
IQN allows to expand the class of control policies to a wide
range of risk-sensitive policies connected to distortion risk
measures.
B. Policy gradient DRL methods
Policy gradient DRL optimizes the parameterized policy
directly. Actor-critic architecture computes the policy gradi-
ent using a value-based critic function to estimate expected
future reward, as shown in Fig. 2(d). Asynchronous DRL
is an efficient framework for DRL that uses asynchronous
gradient descent to optimize the policy [33]. Asynchronous
advantage actor-critic (A3C) trains several agents on multiple
environments, showing a stabilizing effect on training. The
objective function of the actor is demonstrated as
J(θ) = Eπ[
Aθ,θv (st, at) log πθ(atst) + βHθ(π(st))],
(8)
where Hθ(π(st)) is an entropy term used to encourage explo-
ration.
t=0
GA3C [34] is a hybrid CPU/GPU version of A3C, which
achieves a significant speed up compared to the original CPU
implementation. UNsupervised REinforcement and Auxiliary
Learning (UNREAL) [35] learns separate policies for max-
imizing many other pseudo-reward functions simultaneously,
∞(cid:88)
4
including value function replay, reward prediction, and pixel
control. This agent drastically improves both data efficiency
and robustness to hyperparameter settings. PAAC [36] is a
novel framework for efficient parallelization of DRL, where
multiple actors learn the policy on a single machine. Pol-
icy gradient methods are efficient
techniques for policies
improvement, while they are usually on-policy and unable
to take advantage of off-policy data. The new method is
referred as PGQ [37], which combines policy gradient with Q-
learning. PGQ establishes an equivalency between regularized
policy gradient techniques and advantage function learning
algorithms. Retrace(λ) [38] takes the best of the importance
sampling, off-policy Q(λ), and tree-backup(λ), resulting in
low variance, safety, and efficiency. It makes a combination
of dueling DRQN architecture and actor-critic architecture,
as shown in Fig. 2(e). Reactor [39] is a sample-efficient
and numerical efficient reinforcement learning agent based
on a multi-step return off-policy actor-critic architecture. The
network outputs a target policy, an action-value Q-function,
and an estimated behavioral policy. The critic is trained with
the off-policy multi-step Retrace method and the actor is
trained by a β-leave-one-out policy gradient. Importance-
Weighted Actor Learner Architecture (IMPALA) [40] is a new
distributed DRL, which can scale to thousands of machine.
IMPALA uses a single reinforcement learning agent with a
single set of parameters to solve a mass of tasks. This method
achieves stable learning by combining decoupled acting and
learning with a novel V-trace off-policy correction method,
which is critical for achieving learning stability.
1) Trust region method: Trust Region Policy Optimization
(TRPO) [41] is proposed for optimizing control policies,
with guaranteed monotonic improvement. TRPO computes
an ascent direction to improve on policy gradient, which
can ensure a small change in the policy distribution. The
constrained optimization problem of TRPO in each epoch is
maximizeθ Es∼ρθ(cid:48) ,a∼πθ(cid:48) [
Aθ(cid:48)(s, a)],
s.t. Es∼ρθ(cid:48) [DKL(πθ(cid:48)(·s))] ≤ δKL.
πθ(as)
πθ(cid:48)(as)
(9a)
(9b)
This algorithm is effective for optimizing large nonlinear
policies. Proximal policy optimization (PPO) [42] samples
data by interaction with the environment, and optimizes the
objective function with stochastic gradient ascent
rt(θ) =
,
(10a)
πθ(atst)
πθold(atst)
(10b)
L(θ) = Et[min(rt(θ) At, clip(rt(θ), 1 − , 1 + ) At].
rt(θ) denotes the probability ratio. This objective function
clips the probability ratio to modify the surrogate objective.
PPO has some benefits over TRPO, and is much simpler to
implement, with better sample complexity. Actor-critic with
experience replay (ACER) [43] introduces several innovations,
including stochastic dueling network, truncated importance
sampling, and a new trust region method, which is stable and
sample efficient. Actor-critic using Kronecker-Factored Trust
Region (ACKTR) [44] bases on natural policy gradient, and
uses Kronecker-factored approximate curvature (K-FAC) with
trust region to optimize the actor and the critic. ACKTR is
sample efficient compared with other actor-critic methods.
2) Deterministic policy: Apart from stochastic policy, deep
deterministic policy gradient (DDPG) [45] is a kind of deter-
ministic policy gradient method which adapts the success of
DQN to continuous control. The update rule of DDPG is
Q(st, at) = r(st, at) + γQ(st+1, πθ(st+1)).
(11)
DDPG is an actor-critic, off-policy algorithm, and is able
to learn reasonable policies on various tasks. Distributed
Distributional DDPG (D4PG) [46] is a distributional update to
DDPG, combined with the use of multiple distributed workers
all writing into the same replay table. This method has a much
better performance on a number of difficult continuous control
problems.
3) Entropy-regularized policy gradient: Soft Actor Critic
(SAC) is an off-policy policy gradient method, which estab-
lishes a bridge between DDPG and stochastic policy optimiza-
tion. SAC incorporates the clipped double-Q trick, and the
objective function of maximum entropy DRL is
T(cid:88)
J(π) =
E(st,at)∼ρπ [r(st, at) + αH(π(.st))],
(12)
t=0
SAC uses an entropy regularization in its objective function.
It trains the policy to maximize a trade-off between entropy
and expected return. The entropy is a measure of randomness
in the policy. This mechanism is similar to the trade-off
between exploration and exploitation. Increasing entropy can
encourage more exploration, and accelerate learning process.
Moreover, it can also prevent the learning policy from con-
verging to a poor local optimum.
C. Model-based DRL methods
is a differentiable, recursive,
Combining model-free reinforcement learning with on-line
planning is a promising approach to solve the sample effi-
ciency problem. TreeQN [47] is proposed to address these
challenges. It
tree-structured
model that serves as a drop-in replacement for any value
function network in DRL with discrete actions. TreeQN dy-
namically constructs a tree by recursively applying a transition
model in a learned abstract state space and then aggregating
predicted rewards and state-values using a tree backup to esti-
mate Q-values. ATreeC is an actor-critic variant that augments
TreeQN with a softmax layer to form a stochastic policy
network. Both approaches are trained end-to-end, such that
the learned model is optimized for its actual use in the plan-
ner. TreeQN and ATreeC outperform n-step DQN and value
prediction networks on multiple Atari games. Vezhnevets et
al. [48] presents STRategic Attentive Writer (STRAW) neural
network architecture to build implicit plans. STRAW purely
interacts with an environment, and is an end-to-end method.
STRAW model can learn temporally abstracted high-level
macro-actions, which enables both economic computation and
structured exploration. STRAW employs temporally extended
planning strategies and achieves strong improvements on Atari
games. The world model [49] uses an unsupervised manner
to train a generative recurrent neural network, which can
5
model RL environments through compressed spatiotemporal
representations. It feeds extracted features into simple and
compact policies, achieving impressive results in several en-
vironments. Value propagation (VProp) [50] bases on value
iteration, and is an efficient differentiable planning module. It
can successfully be trained to learn to plan using reinforcement
learning. As a general framework of AlphaZero, MuZero
[54] combines MCTS with a learned model, and predicts
the reward, the action-selection policy, and the value function
to make planning. It extends model-based RL to a range of
logically complex and visually complex domains, and achieves
superhuman performance.
A general review of various DRL methods from 2017 to
2019 is presented in Table I.
IV. DRL IN VIDEO GAMES
Playing video games like human experts is challenging for
computers. With the development of DRL, agents are able
to play various games end-to-end. Here we focus on game
research platforms and competitions, and impressive progress
in various video games, from 2D to 3D, and from single-agent
to multi-agent, as shown in Fig. 3.
A. Game research platforms
Platforms and competitions make great contributions to
the development of game AI, and help to evaluate agents'
intelligence, as presented in Table II. Most platforms can be
described by two major categories: General Platforms and
Specific Platforms.
General Platforms: Arcade Learning Environment (ALE)
[55] is the pioneer evaluation platform for DRL algorithms,
which provides an interface to plenty of Atari 2600 games.
ALE presents both game images and signals, such as player
scores, which makes it a suitable testbed. To promote the
progress of DRL research, OpenAI integrates a collection of
reinforcement learning tasks into a platform called Gym [56],
which mainly contains Algorithmic, Atari, Classical Control,
Board games, 2D and 3D robots. After that, OpenAI Universe
[57] is a platform for measuring and training agents' general
intelligence across a large supply of games. Gym Retro [58]
is a wrapper for video game emulator with a unified interface
as Gym, and makes Gym easy to be extended with a large
collection of video games, not only Atari but also NEC,
Nintendo, and Sega, for RL research. The OpenAI Retro
contest aims at exploring the development of DRL that can
generalize from previous experience. OpenAI bases on the
Sonic the HedgehogT M video game, and presents a new DRL
benchmark [59]. This benchmark can help to measure the
performance of few-shot
learning and transfer learning in
reinforcement learning. General Video Game Playing [60] is
intended to design an agent to play multiple video games
without human intervention. The General Video Game AI
(GVGAI) [61] competition is proposed to provide a easy-to-
use and open-source platform for evaluating AI methods, in-
cluding DRL. DeepMind Lab [62] is a first-person perspective
learning environment, and provides multiple complicated tasks
in partially observed, large-scale, and visually diverse worlds.
A GENERAL REVIEW OF RECENT DRL METHODS FROM 2017 TO 2018.
TABLE I
Main Techniques
Networks
Category
6
DRL Algorithms
DQN [14]
Double DQN [15]
Dueling DQN [17]
Prioritized DQN [16]
Bootstrapped DQN [51]
Gorila [20]
LS-DQN [22]
Averaged-DQN [23]
DQfD [24]
DQN with Pop-Art [18]
Soft DQN [29]
DQV [25]
Rainbow [26]
RUDDER [27]
experience replay, target Q-network
double Q-learning
dueling neural network architecture
prioritized experience replay
combine deep exploration with DNNs
massively distributed architecture
combine least-squares updates in DRL
averaging learned Q-values estimates
learn from the demonstration data
adaptive normalization with Pop-Art
KL penalty and entropy bonus
training a Quality-value network
integrate six extensions to DQN
return decomposition
CNN
CNN
CNN
CNN
CNN
CNN
CNN
CNN
CNN
CNN
CNN
CNN
CNN
CNN-LSTM
CNN
CNN
CNN
CNN
value-based, off-policy
value-based, off-policy
value-based, off-policy
value-based, off-policy
value-based, off-policy
value-based, off-policy
value-based, off-policy
value-based, off-policy
value-based, off-policy
value-based, off-policy
value-based, off-policy
value-based, off-policy
value-based, off-policy
value-based, off-policy
value-based, off-policy
value-based, off-policy
value-based, off-policy
value-based, off-policy
CNN
CNN
CNN-LSTM policy gradient, on-policy
CNN-LSTM policy gradient, on-policy
CNN-LSTM policy gradient, on-policy
CNN-LSTM policy gradient, off-policy
CNN-LSTM policy gradient, on-policy
policy gradient, off-policy
CNN-LSTM policy gradient, on-policy
CNN-LSTM policy gradient, off-policy
policy gradient, on-policy
CNN-LSTM policy gradient, off-policy
CNN-LSTM policy gradient , on-policy
policy gradient , on-policy
policy gradient, off-policy
CNN-LSTM policy gradient, on-policy
CNN-LSTM policy gradient, on-policy
model-based, on-policy
model-based, on-policy
model-based, on-policy
model-based, off-policy
CNN-LSTM
CNN
CNN
CNN
CNN
CNN
Ape-X DQfD [28]
transformed Bellman operator, temporal consistency loss
C51 [30]
QR-DQN [31]
IQN [32]
A3C [33]
GA3C [34]
PPO [42]
ACER [43]
ACKTR [44]
Soft Actor-Critic [52]
UNREAL [35]
Reactor [39]
PAAC [36]
DDPG [45]
TRPO [41]
D4PG [46]
PGQ [37]
IMPALA [40]
FiGAR-A3C [53]
TreeQN/ATreeC [47]
STRAW [48]
World model [49]
MuZero [54]
distributional Bellman optimality
distributional RL with Quantile regression
an implicit representation of the return distribution
asynchronous gradient descent
hybrid CPU/GPU version
clipped surrogate objective, adaptive KL penalty coefficient
experience replay, truncated importance sampling
K-FAC with trust region
entropy regularization
unsupervised auxiliary tasks
Retrace(λ), β-leave-one-out policy gradient estimate
parallel framework for A3C
DQN with deterministic policy gradient
incorporate a KL divergence constraint
distributed distributional DDPG
combine policy gradient and Q-learning
importance-weighted actor learner architecture
fine grained action repetition
on-line planning, tree-structured model
macro-actions, planning strategies
mixture density network, variational autoencoder
representation function, dynamics function, and prediction function
A LIST OF GAME AI COMPETITIONS SUITABLE FOR DRL RESEARCH.
TABLE II
Competition Name
ViZDoom AI competition
Time
2016, 2017, 2018
StarCraft AI competitions (AIIDE, CIG, SSCAIT)
2010 -- 2019
microRTS competition
The GVGAI competition -- learning track
Microsoft Malmo collaborative AI challenge
The multi-agent RL in Malmo competition
The OpenAI Retro contest
NeurIPS Pommerman competition
Unity Obstacle Tower Challenge
NeurIPS MineRL competition
2017, 2018, 2019
2017, 2018
2017
2018
2018
2018
2019
2019
Unity ML-Agents Toolkit [63] is a new toolkit for creating
and interacting with simulation environments. This platform
has sensory, physical, cognitive, and social complexity, and
enables fast and distributed simulation, and flexible control.
Specific Platforms: Malmo [64] is a research platform for
AI experiments, which is built on top of Minecraft. It is a
first-person 3D environment, and can be used for multi-agent
research in Microsoft Malmo collaborative AI challenge 2017
and the multi-agent RL in MalmO competition 2018. TORCS
[65] is a racing car simulator which has both low-level and
visual features for the self-driving car with DRL. ViZDoom
[66] is a first-person shooter game platform, and encourages
DRL agent to utilize the visual information to perform naviga-
tion and shooting tasks in a semi-realistic 3D world. ViZDoom
AI competition has attracted plenty of researchers to develop
their DRL-based Doom agents since 2016. As far as we
7
Fig. 3. The diagram of various video games AI, from 2D to 3D, and from single-agent to multi-agent.
know, real-time strategy (RTS) games are very challenging for
reinforcement learning method. Facebook proposes TorchCraft
for StarCraft I [67], and DeepMind releases StarCraft II
learning environment [68]. They expect researchers to propose
powerful DRL agents to achieve high-level performance in
RTS games and annual StarCraft AI competitions. CoinRun
[69] provides a metric for an agent's ability to transfer its
experience to novel situations. This new training environment
strikes a desirable balance in complexity: the environment is
much simpler than traditional platform games, but it still poses
a worthy generalization challenge for DRL algorithms. Google
Research Football is a new environment based on open-source
game Gameplay Football for DRL research.
B. Atari games
ALE is an evaluation platform that aims at building agents
with general intelligence across hundreds of Atari 2600 games.
As the most popular testbed for DRL research, a large num-
ber of DRL methods have achieved outstanding performance
consecutively. Machado et al. [70] takes a review at
the
ALE in DRL research community, proposes diverse evaluation
methodologies and some key concerns. In this section, we
will introduce the main achievements in the ALE domain,
including the extremely difficult Montezuma's Revenge.
As the milestone in this domain, DQN is able to surpass
the performances of previous algorithms, and achieves human-
level performance across 49 games [14]. Averaged-DQN ex-
amines the source of value function estimation errors, and
demonstrates significantly improved stability and performance
on the ALE benchmark [23]. UNREAL significantly outper-
forms the previous best performance on Atari, averaging 880%
expert human performance [35]. PAAC achieves sufficiently
good performance on ALE after a few hours of training [36].
DQfD has better initial performance than DQN on most Atari
games, and receives more average rewards than DQN on 27
of 42. In addition, DQfD learns faster than DQN even when
given poor demonstration data [24]. Noisy DQN replaces the
MEAN AND MEDIAN SCORES ACROSS 57 ATARI GAMES OF TYPICAL DRL
METHODS, MEASURED AS PERCENTAGES OF HUMAN BASELINE.
TABLE III
Methods
DQN [14]
C51 [30]
UNREAL [35]
QR-DQN [30]
IQN [32]
Rainbow [26]
Ape-X DQN [71]
Ape-X DQfD ∗ [28]
Mean
228%
701%
880%
915%
1019%
1189%
1695%
2346%
Median
79%
178%
250%
211%
218%
230%
434%
702%
year
2015
2017
2017
2017
2018
2018
2018
2018
Note: ∗ means this method is measured across 42 Atari games.
conventional exploration heuristics with NoisyNet, and yields
substantially higher scores in ALE domain. As a distributional
DRL method, C51 obtains a new series of impressive results,
and demonstrates the importance of the value distribution in
approximated RL [30]. Rainbow provides improvements in
terms of sample efficiency and final performance. The authors
also show the contribution of each component to overall per-
formance [26]. QR-DQN algorithm significantly outperforms
recent improvements on DQN, including the related C51 [30].
IQN shows substantial gains on the Atari benchmark over
QR-DQN, and even halves the distance between QR-DQN
and Rainbow [32]. Ape-X DQN substantially improves the
performance on the ALE, achieving better final score in less
wall-clock training time [71]. When tested on a set of 42 Atari
games, the Ape-X DQfD algorithm exceeds the performance
of an average human on 40 games using a common set of
hyperparameters. Mean and median scores across multiple
Atari games of typical DRL methods that achieve state-of-
the-art performance consecutively are presented in Table III.
Montezuma's Revenge is one of the most difficult Atari
video games. It is a goal-directed behavior learning environ-
ment with long horizons and sparse reward feedback signals.
2D3DSingle-agentMulti-agentMinecraftQuake III Arena CTFViZDoomTORCSMontezuma's RevengeALEDM LabStarCraftDota2DimensionsNumber of agentsPlayers must navigate through a number of different rooms,
avoid obstacles and traps, climb ladders up and down, and then
pick up the key to open new rooms. It requires a long sequence
of actions before reaching the goal and receiving a reward,
and is difficult to explore an optimal policy to tackle tasks.
Efficient exploration is considered as a crucial factor to learn
in a delayed feedback environment. Then, Ostrovski et al. [72]
provide an improved version of count-based exploration with
PixelCNN as a supplement for pseudo-count, also reveals the
importance of Monte Carlo return for effective exploration.
In addition to improve the exploration efficiency, learning
from human data is also a proper method to reach better
performance in this problem. Le et al. [73] leverage imitation
learning from expert interaction and hierarchical reinforcement
learning at different
levels. This method learns obviously
faster than original hierarchical reinforcement learning, and
also significantly more efficiently than conventional imitation
learning. Other than gameplay, the demonstration is also a
valuable kind of sample for agent to learn. DQfD utilizes
a small set of demonstration data to speed up the learning
process [24]. It combines prioritized replay mechanism with
temporal difference updates and supervised classification, and
finally achieves a better and impressive result. Further, Aytar
et al. [74] only use YouTube video as a demonstration sample
and invests a transformed Bellman operator for learning from
human demonstrations. Interestingly, these two works both
claim being the first to solve the entire first level of Mon-
tezuma's Revenge. Go-explore [75] makes further progress,
and achieves scores over 400,000 on average. Go-Explore sep-
arates learning into exploration and robustification. It reliably
solves the whole game, and generalizes well.
C. First-person perspective games
Different from Atari games, agents in first-person perspec-
tive video games can only receive observations from their own
perspectives, resulting from imperfect information inputs. In
RL domain, this is a POMDP problem which requires efficient
exploration and memory.
1) ViZDoom: First-person shooter (FPS) games play an
important role in game AI research. Doom is a classical
FPS game, and ViZDoom is presented as a novel testbed
for DRL [66]. Agents learn from visual inputs, and interact
with the ViZDoom environment in a first-person perspective.
Wu et al. [76] propose a method that combines A3C and
curriculum learning. The agent learns to navigate and attack
via playing against built-in agents progressively. Parisotto et
al. [77] develop Neural Map, which is a memory system
with an adaptable write operator. Neural Map uses a spatially
structured 2D memory image to store the environment's in-
formation. This method surpasses other DRL memories on
several challenging ViZDoom maze tasks and shows a capable
generalization ability. Shao et al. [78] show that ACKTR can
successfully teach agents to battle in ViZDoom environment,
and significantly outperform A2C agents by a significant
margin.
2) TORCS: TORCS is a racing game where actions are ac-
celeration, braking and steering. This game has more realistic
8
graphics than Atari games, but also requires agents to learn the
dynamic of the car. FIGAR-DDPG can successfully complete
the race task and finish 20 laps of the circuit, with a 10× total
reward against that obtained by DDPG, and much smoother
policies [53]. Normalized Actor-Critic (NAC) normalizes the
Q-function effectively, and learns an initial policy network
from demonstration and refine the policy in a real environment
[79]. NAC is robust to suboptimal demonstration data, learns
robustly and outperforms existing baselines when evaluated
on TORCS. Mazumder et al. [80] incorporate state-action
permissibility (SAP) and DDPG, and applies it to tackle the
lane keeping problem in TORCS. The proposed method can
speedup DRL training remarkably for this task. In [81], a
two-stage approach is proposed for the vision-based vehicle
lateral control problem which includes an multi-task learning
perception stage and an RL control stage. By exerting the
correlation between multiple learning task,
the perception
module can robustly extract track features. Additionally, the
RL agent learns by maximizing the geometry-based reward
and performs better than the LQR and MPC controllers. Zhu
et al. [82] use DRL to train a CNN to perceive driving data
from images of first-person view, and learns a controller to get
driving commands, showing a promising performance.
3) Minecraft: Minecraft is a sandbox construction game,
where players can build creative creations, structures, and
artwork across various game modes. Recently, it becomes a
popular platform for game AI research, with 3D infinitely
varied data. Project Malmo is an experimentation platform [83]
that builts on the Minecraft for AI research. It supports a large
number of scenarios, including navigation, problem solving
tasks, and survival to collaboration. Xiong et al. [84] propose
a novel Q-learning approach with state-action abstraction and
warm start using human reasoning to learn effective policies in
the Microsoft Malmo collaborative AI challenge. The ability to
transfer knowledge from source task to target task in Minecraft
is one of the major challenges. Tessler et al. [85] provides a
DRL agent which can transfer knowledge by learning reusable
skills, and then incorporated into hierarchical DRL network
(H-DRLN). H-DRLN exhibits superior performance and low
learning sample complexity compared to regular DQN in
Minecraft, and the potential to transfer knowledge between
related Minecraft tasks without any additional learning. To
solve the partial or non-Markovian observations problems,
Jin et al. [86] propose a new DRL algorithm based on
counterfactual regret minimization that iteratively updates an
approximation to a cumulative clipped advantage function. On
the challenging Minecraft first-person navigation benchmarks,
this algorithm can substantially outperform strong baseline
methods.
4) DeepMind lab: DeepMind lab is a 3D first-person
game platform extended from OpenArena, which is based
on Quake3. Comparable to other first-person game platforms,
DeepMind lab has considerably richer visuals and more re-
alistic physics, making it a significantly complex platform.
On a challenging suite of DeepMind lab tasks, the UNREAL
agent leads to a mean speedup in learning of 10× over A3C
and averaging 87% expert human performance. As learning
agents become more powerful, continual learning has made
quick progress recently. To test continual learning capabilities,
Mankowitz et al. [87] consider an implicit sequence of tasks
with sparse rewards in DeepMind lab. The novel agent archi-
tecture called Unicorn, demonstrates strong continual learning
and outperforms several baseline agents on the proposed
domain. Schmitt et al. [88] present a method which uses
teacher agents to kickstart the training of a new student agent.
On a multi-task and challenging DMLab-30 suite, kickstarted
training improves new agents' sample efficiency to a great
extend, and surpasses the final performance by 42%. Jaderberg
et al. [89] focus on Quake III Arena Capture the Flag, which is
a popular 3D first-person multiplayer video game, and demon-
strates that DRL agents can achieve human-level performance
with only pixels and game points as input. The agent uses
population based training to optimize the policy. This method
trains a large number of agents concurrently from thousands
of parallel matches, where agents plays cooperatively in teams
and against each other on randomly generated environments.
In an evaluation, the trained agents exceed the winrate of self-
play baseline and high-level human players both as teammates
and opponents, and are proved far stronger than existing DRL
agents.
D. Real-time strategy games
Real-time strategy games are very popular among players,
and have become popular platforms for AI research.
1) StarCraft: In StarCraft, players need to perform actions
according to real-time game states, and defeat the enemies.
Generally speaking, designing an AI bot have many chal-
lenges, including multi-agent collaboration, spatial and tem-
poral reasoning, adversarial planning, and opponent model-
ing. Currently, most bots are based on human experiences
and replays, with limited flexibility and intelligence. DRL is
proved to be a promising direction for StarCraft AI, especially
in micromanagement, build order, mini-games and full-games
[90].
Recently, micromanagement is widely studied as the first
step to solve StarCraft AI. Usunier et al. [91] introduce the
greedy MDP with episodic zero-order optimization (GMEZO)
algorithm to tackle micromanagement scenarios, which per-
forms better than DQN and policy gradient. BiCNet [92] is
a multi-agent deep reinforcement learning method to play
StarCraft combat games. It bases on actor-critic reinforcement
learning, and uses bi-directional neural networks to learn
collaboration. BiCNet successfully learns some cooperative
strategies, and is adaptable to various tasks, showing better
performances than GMEZO. In aforementioned works, re-
searchers mainly develops centralized methods to play mi-
cromanagement. Foerster et al. [93] focus on decentralized
control for micromanagement, and propose a multi-agent
actor-critic method. To stabilize experience replay and solve
nonstationarity, they use fingerprints and importance sampling,
which can improve the final performance. Shao et al. [94]
follow decentralized micromanagement task, and propose pa-
rameter sharing multi-agent gradient descent SARSA(λ) (PS-
MAGDS) method. To resue the knowledge between various
micromanagement scenarios, they also combine curriculum
9
transfer learning to this method. This improves the sample
efficiency, and outperforms GMEZO and BiCNet in large-scale
scenarios. Kong et al. [95] bases on master-slave architecture,
and proposes master-slave multi-agent reinforcement learning
(MS-MARL). MS-MARL includes composed action represen-
tation, independent reasoning, and learnable communication.
This method has better performance than other methods in
tasks. Rashid et al. [96] focus on sev-
micromanagement
eral challenging StarCraft II micromanagement
tasks, and
use centralized training and decentralized execution to learn
cooperative behaviors. This eventually outperforms state-of-
the-art multi-agent deep reinforcement learning methods.
Researchers also use DRL methods to optimize the build
order in StarCraft. Tang et al. [97] put forward neural network
fitted Q-learning (NNFQ) and convolutional neural network
fitted Q-learning (CNNFQ) to build units in simple StarCraft
maps. These models are able to find effective production
sequences, and eventually defeat enemies. In [68], researchers
present baseline results of several main DRL agents in the
StarCraft II domain. The fully convolutional advantage actor-
critic (FullyConv-A2C) agents achieve a beginner-level
in
StarCraft II mini-games. Zambaldi et al. [98] introduce the
relational DRL to StarCraft, which iteratively reasons about
the relations between entities with self-attention, and uses
it to guide a model-free RL policy. This method improves
sample efficiency, generalization ability, and interpretability of
conventional DRL approaches. Relational DRL agent achieves
impressive performance on SC2LE mini-games. Sun et al. [99]
develop the DRL based agent TStarBot, which uses flat action
structure. This agent defeats the built-in AI agents from level
1 to level 10 in a full game firstly. Lee et al. [100] focus
on StarCraft II AI, and present a novel modular architecture,
which splits responsibilities between multiple modules. Each
module controls one aspect of the game, and two modules are
trained with self-play DRL methods. This method defeats the
built-in bot in "Harder" level. Pang et al. [101] investigate
a two-level hierarchical RL approach for StarCraft II. The
macro-action is automatically extracted from expert's data, and
the other is a flexible and scaleable hierarchical architecture.
More recently, DeepMind proposes AlphaStar, and defeats
professional players for the first time.
2) MOBA and Dota2: MOBA (Multiplayer Online Battle
Arena) is originated from RTS games, which has two teams,
and each team consists of five players. To beat the opponent,
five players in a team must cooperate together, kill enemies,
upgrade heros, and eventually destroy the opponent base. Since
MOBA research is still in a primary stage, there are fewer
works than conventional RTS games. Most works on MOBA
concentrate on dataset analysis and case study. However, due
to a series of breakthroughs that DRL achieves in game AI,
researchers start to pay more attention to MOBA recently.
King of Glory (a simplified mobile version of Dota) is the most
popular mobile-end MOBA game in China. Jiang et al. [102]
apply Monte-Carlo Tree Search and deep neural networks to
this game. The experimental results indicate that MCTS-based
DRL method is efficient and can be used in 1v1 MOBA
scenario. Most impressive works on MOBA are proposed by
OpenAI. Their results prove that DRL method with self-play
can not only be successful in a 1v1 and 2v2 Dota2 scenarios
[103], but also in 5v5 [104] [105]. The model architecture is
simple, using a LSTM layer as the core component of neural
network. Under the support of massively distributed cloud
computing and PPO optimization algorithm, OpenAI Five can
master the critical abilities of team fighting, searching forest,
focusing, chasing, and diversion for team victory, and defeat
human champion OG with 2:0. Their works truly open a new
door to MOBA research with DRL method.
V. CHALLENGES IN GAMES WITH DRL
Since DRL has achieved large progress in some video
games, it is considered as one of most promising ways to
realize the artificial general intelligence. However, there are
still some challenges should be conquered towards goal. In this
secition, we discuss some crucial challenges for DRL in video
games, such as tradeoff between exploration and exploitation,
low sample efficiency, dilemma in generalization and overfit-
ing, multi-agent learning, incomplete information and delayed
sparse rewards. Though there are some proposed approaches
have been tried to solve these problems, as presented in Fig.
4, there are still some limitations should be broken.
A. Exploration-exploitation
Exploration can help to obtain more diversity samples,
while exploitation is the way to learn the high reward policy
with valuable samples. The trade-off between exploration and
exploitation remains a major challenge for RL. Common meth-
ods for exploration require a large amount of data, and can not
tackle temporally-extended exploration. Most model-free RL
algorithms are not computationally tractable in complicated
environments.
Parametric noise can help exploration to a large extend in
the training process [106] [107]. Besides, randomized value
functions become an effective approach for efficient explo-
ration. Combining exploration with deep neural networks can
help to learn much faster, which greatly improves the learning
speed and final performance in most games [51].
A simple generalization of popular count-based ap-
proach can reach satisfactory performance on various high-
dimensional DRL benchmarks [108]. This method maps states
to hash codes, and counts their occurrences via a hash table.
Then, according to the classic count-based method, we can use
these counts to compute a reward bonus. On many challenging
tasks,
these simple hash functions can achieve impressive
performance. This exploration strategy provides a simple and
powerful baseline to solve MDPs requiring considerable ex-
ploration.
B. Sample efficiency
DRL algorithms usually take millions of samples to achieve
human-level performance. While humans can quickly master
highly rewarding actions of an environment. Most model-
free DRL algorithms are data inefficient, especially for a
environment with high dimension and large explore space.
They have to interact with environment in a large time cost
10
for seek out high reward experiences in a complex sample
space, which limits their applicability to many scenarios. In
order to reduce the exploration dimension of environment and
ease the expenditure of time on interaction, some solutions
can be used for improving data efficiency, such as hierarchy
and demonstration.
Hierarchical reinforcement learning (HRL) allows agents to
decompose the task into several simple subtasks, which can
speed up training and improve sample efficiency. Temporal
abstraction is key to scaling up learning, while creating
such abstractions autonomously has remained challenging. The
option-critic architecture has the ability to learn the internal
policies and the options' termination conditions, without any
additional rewards or subgoals [109]. FeUdal Networks (FuNs)
include a Manager module and a Worker module [110]. The
Manager sets abstract goals at high-level. The Worker receives
these goals, and generates actions in the environment. FuN
dramatically outperforms baseline agents on tasks that involve
long-term credit assignment or memorization. Representation
learning methods can also be used to guide the option discov-
ery process in HRL domain [111].
Demonstration is a proper technique to improve sample
efficiency. Current approaches that learn from demonstration
use supervised learning on expert data and use reinforcement
learning to improve the performance. This method is difficult
to jointly optimize divergent losses, and is very sensitive to
noisy demonstrations. Leveraging data from previous control
of the system can greatly accelerate the learning process even
with small amounts of demonstration data [24]. Goals defined
with human preferences can effectively solve complicated RL
tasks without the reward function, while greatly reducing the
cost of human oversight [112].
C. Generalization and Transfer
The ability to transfer knowledge across multiple environ-
ments is considered as a critical aspect of intelligent agents.
With the purpose of promoting the performance of generaliza-
tion in multiple environments, multi-task learning and policy
distillation have been focus on these situations.
Multi-task learning with shared neural network parameters
can solve the generalization problem, and efficiency can be
improved through transfer across related tasks. Hybrid reward
architecture takes a decomposed reward function as input and
learns a separate value function for each component [113].
The whole value function is much smoother, which can be
easily approximated with a low-dimensional representation,
and learns more effectively. IMPALA shows the effectiveness
for multi-task reinforcement learning, using less data and ex-
hibiting positive transfer between tasks [40] . PopArt-IMPALA
combines PopArt's adaptive normalization with IMPALA, and
allows a more efficient use of parallel data generation, showing
impressive performance on multi-task domain [114].
To successfully learn complex tasks with DRL, we usually
need large task-specific networks and extensive training to
achieve good performance. Distral shares a distilled policy
which can learn common knowledge across multiple tasks
[115]. Each worker is trained to solve individual task and to be
close to the shared policy, while the shared policy is trained by
distillation. This approach shows efficient transfer on complex
tasks, with more robust and more stable performance. Mix &
Match is a training framework that is designed to encourage
effective and rapid learning in DRL agents [116]. It allows to
automatically form a curriculum over agent, and progressively
trains more complex agents from simpler agents.
D. Multi-agent learning
Multi-agent
learning is very important
in video games,
such as StarCraft. In a cooperative multi-agent setting, curse-
of-dimensionality, communication, and credit assignment are
major challenges.
Team learning uses a single learner to learn joint solutions
in multi-agent system, while concurrent learning uses multiple
learners for each agent. Recently,
the centralised training
of decentralised policies is becoming a standard paradigm
for multi-agent training. Multi-agent DDPG considers other
agents' action policy and can successfully learn complex
multi-agent coordination behavior [117]. Counterfactual multi-
agent policy gradients uses a centralized critic to estimate
the action-value function and decentralized actors to opti-
mize each agents' policies, with a counterfactual advantage
function to address the multi-agent credit assignment problem
[118] . In addition, communication protocols is important
to share information to solve multi-agent tasks. Reinforced
Inter-Agent Learning (RIAL) and Differentiable Inter-Agent
Learning (DIAL) use deep reinforcement learning to learn end-
to-end communication protocols in complex environments.
Analogously, CommNet is able to learn continuous communi-
cation between multiple agents.
E. Imperfect information
In partially observable and first-perspective games, DRL
agents need to tackle imperfect information to learn a suitable
policy. Making decisions in these environments is challenging
for DRL agents.
A critical component of enabling effective learning in these
environment is the use of memory. DRL agents have used
some simple memory architectures, such as several past frames
or an LSTM layer. But these architectures are limited to only
remember transitory information. Model-free episode control
learns difficult sequential decision-making tasks much faster,
and achieves a higher overall reward [119]. Differentiable
neural computer uses a neural network to read from and
write to an external memory matrix [120]. This method can
solve complex, structured tasks which can not access to neural
networks without external read and write memory. Neural
episodic control
inserts recent state representations paired
with corresponding value functions into the appropriate neural
dictionary, and learns significantly faster than other baseline
agents [121].
F. Delayed spare rewards
The sparse and delayed reward is very common in many
games, and is also one of the reasons that reduce sample
efficiency in reinforcement learning.
11
In many scenarios, researchers use curiosity as an intrinsic
reward to encourage agents to explore environment and learn
useful skills. Curiosity can be formulated as the error that
the agent predicts its own actions' consequence in a visual
space [122]. This can scale to high-dimensional continuous
state spaces. Moreover, it leaves out the aspects of environment
that cannot affect agents. Curiosity search for DRL encourages
intra-life exploration by rewarding agents for visiting as many
different states as possible within each episode [123].
VI. CONCLUSION AND DISCUSSION
Game AI with deep reinforcement learning is a challenging
and promising direction. Recent progress in this domain has
promote the development of artificial intelligence research. In
this paper, we review the achievements of deep reinforcement
learning in video games. Different DRL methods and their
successful applications are introduced. These DRL agents
achieve human-level or super-human performances in various
games, from 2D perfect information to 3D imperfect infor-
mation, and from single-agent to multi-agent. In addition to
these achievements, there are still some major problems when
applying DRL methods to this field, especially in 3D imperfect
information multi-agent video game. A high-level game AI
requires to explore more efficient and robust DRL techniques,
and needs novel frameworks to be implemented in complex
environment. These challenges have not been fully investigated
and could be opened for further study in the future.
ACKNOWLEDGMENT
The authors would like to thank Qichao Zhang, Dong Li and
Weifan Li for the helpful comments and discussions about this
work.
REFERENCES
[1] N. Y. Georgios and T. Julian, Artificial Intelligence and Games. New
[2] Y. Lecun, Y. Bengio, and G. Hinton, "Deep learning," Nature, vol. 521,
York: Springer, 2018.
no. 7553, pp. 436 -- 444, 2015.
[3] D. Zhao, K. Shao, Y. Zhu, D. Li, Y. Chen, H. Wang, D. Liu, T. Zhou,
and C. Wang, "Review of deep reinforcement learning and discussions
on the development of computer Go," Control Theory and Applications,
vol. 33, no. 6, pp. 701 -- 717, 2016.
[4] Z. Tang, K. Shao, D. Zhao, and Y. Zhu, "Recent progress of deep
learning: from AlphaGo to AlphaGo Zero," Control
reinforcement
Theory and Applications, vol. 34, no. 12, pp. 1529 -- 1546, 2017.
[5] J. Niels, B. Philip, T. Julian, and R. Sebastian, "Deep learning for video
game playing," CoRR, vol. abs/1708.07902, 2017.
[6] A. Kailash, P. D. Marc, B. Miles, and A. B. Anil, "Deep reinforcement
learning: A brief survey," IEEE Signal Processing Magazine, vol. 34,
pp. 26 -- 38, 2017.
[7] L. Yuxi, "Deep reinforcement learning: An overview," CoRR, vol.
[8] R. Dechter, "Learning while searching in constraint-satisfaction-
[9] J. Schmidhuber, "Deep learning in neural networks," Neural Networks,
abs/1701.07274, 2017.
problems," pp. 178 -- 183, 1986.
vol. 61, pp. 85 -- 117, 2015.
[10] A. Krizhevsky, I. Sutskever, and G. E. Hinton, "Imagenet classification
with deep convolutional neural networks," in International Conference
on Neural Information Processing Systems, 2012, pp. 1097 -- 1105.
[11] S. Hochreiter and J. Schmidhuber, "Long short-term memory," Neural
Computation, vol. 9, no. 8, pp. 1735 -- 1780, 1997.
[12] R. S. Sutton and A. G. Barto, Reinforcement Learning: An Introduction.
MIT Press, 1998.
[13] J. W. Ronald, "Simple statistical gradient-following algorithms for
connectionist reinforcement learning," Machine Learning, vol. 8, pp.
229 -- 256, 1992.
[14] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G.
Bellemare, A. Graves, M. Riedmiller, A. K. Fidjeland, and G. Os-
trovski, "Human-level control through deep reinforcement learning,"
Nature, vol. 518, no. 7540, p. 529, 2015.
[15] v. H. Hado, G. Arthur, and S. David, "Deep reinforcement learning
with double Q-learning," in AAAI Conference on Artificial Intelligence,
2016.
[16] S. Tom, Q. John, A. Ioannis, and S. David, "Prioritized experience
replay," in International Conference on Learning Representations,
2016.
[17] W. Ziyu, S. Tom, H. Matteo, v. H. Hado, L. Marc, and d. F. Nando,
"Dueling network architectures for deep reinforcement learning," in
International Conference on Machine Learning, 2016.
[18] P. v. H. Hado, G. Arthur, H. Matteo, M. Volodymyr, and S. David,
"Learning values across many orders of magnitude," in Advances in
Neural Information Processing Systems, 2016.
[19] S. H. Frank, L. Yang, G. S. Alexander, and P. Jian, "Learning to play
in a day: faster deep reinforcement learning by optimality tightening,"
in International Conference on Learning Representations, 2017.
[20] "Massively parallel methods for deep reinforcement
learning," in
International Conference on Machine Learning Workshop on Deep
Learning, 2015.
[21] J. H. Matthew and S. Peter, "Deep recurrent Q-learning for partially
observable MDPs," CoRR, vol. abs/1507.06527, 2015.
[22] L. Nir, Z. Tom, J. M. Daniel, T. Aviv, and M. Shie, "Shallow updates
for deep reinforcement learning," in Advances in Neural Information
Processing Systems, 2017.
[23] A. Oron, B. Nir, and S. Nahum, "Averaged-DQN: variance reduction
and stabilization for deep reinforcement learning," in International
Conference on Machine Learning, 2017.
[24] "Deep Q-learning from demonstrations," in AAAI Conference on Arti-
ficial Intelligence, 2018.
[25] M. Sabatelli, G. Louppe, P. Geurts, and M. Wiering, "Deep quality-
value (dqv) learning." abs/1810.00368, 2018.
[26] "Rainbow: combining improvements in deep reinforcement learning,"
in AAAI Conference on Artificial Intelligence, 2018.
[27] A. A.-M. Jose, G. Michael, W. Michael, U. Thomas, and H. Sepp,
"RUDDER: return decomposition for delayed rewards," CoRR, vol.
abs/1806.07857, 2018.
[28] "Observe and look further: achieving consistent performance on Atari,"
CoRR, vol. abs/1805.11593, 2018.
[29] S. John, A. Pieter, and C. Xi, "Equivalence between policy gradients
and soft Q-learning," CoRR, vol. abs/1704.06440, 2017.
[30] G. B. Marc, D. Will, and M. Remi, "A distributional perspective
on reinforcement learning," in International Conference on Machine
Learning, 2017.
[31] D. Will, R. Mark, G. B. Marc, and M. R´emi, "Distributional rein-
forcement learning with quantile regression," in AAAI Conference on
Artificial Intelligence, 2018.
[32] D. Will, O. Georg, S. David, and M. R´emi, "Implicit quantile networks
for distributional reinforcement learning," CoRR, vol. abs/1806.06923,
2018.
[33] "Asynchronous methods for deep reinforcement learning," in Interna-
tional Conference on Machine Learnin, 2016.
[34] B. Mohammad, F. Iuri, T. Stephen, C. Jason, and K. Jan, "Reinforce-
ment learning through asynchronous advantage actor-critic on a GPU,"
in International Conference on Learning Representations, 2017.
[35] J. Max, M. Volodymyr, C. Wojciech, S. Tom, Z. L. Joel, S. David, and
K. Koray, "Reinforcement learning with unsupervised auxiliary tasks,"
in International Conference on Learning Representations, 2017.
[36] "Efficient parallel methods for deep reinforcement learning," CoRR,
vol. abs/1705.04862, 2017.
[37] O. Brendan, M. R´emi, K. Koray, and M. Volodymyr, "PGQ: combin-
ing policy gradient and Q-learning," in International Conference on
Learning Representations, 2017.
[38] M. R´emi, S. Tom, H. Anna, and G. B. Marc, "Safe and efficient
off-policy reinforcement learning," in Advances in Neural Information
Processing Systems, 2016.
[39] G. Audrunas, G. A. Mohammad, G. B. Marc, and R. Munos,
"The Reactor: a sample-efficient actor-critic architecture," CoRR, vol.
abs/1704.04651, 2017.
[40] "IMPALA: scalable distributed deep-RL with importance weighted
actor-learner architectures," CoRR, vol. abs/1802.01561, 2018.
12
[41] S. John, L. Sergey, A. Pieter, I. J. Michael, and M. Philipp, "Trust
region policy optimization," in International Conference on Machine
Learning, 2015.
[42] S. John, W. Filip, D. Prafulla, R. Alec, and K. Oleg, "Proximal policy
optimization algorithms," CoRR, vol. abs/1707.06347, 2017.
[43] W. Ziyu, B. Victor, H. Nicolas, M. Volodymyr, M. R´emi, K. Koray,
and d. F. Nando, "Sample efficient actor-critic with experience replay,"
in International Conference on Learning Representations, 2017.
[44] W. Yuhuai, M. Elman, L. Shun, B. G. Roger, and B. Jimmy, "Scalable
trust-region method for deep reinforcement learning using Kronecker-
factored approximation," in Advances in Neural Information Processing
Systems, 2017.
[45] P. L. Timothy, J. H. Jonathan, P. Alexander, H. Nicolas, E. Tom,
T. Yuval, S. David, and W. Daan, "Continuous control with deep
reinforcement learning," CoRR, vol. abs/1509.02971, 2015.
[46] "Distributed distributional deterministic policy gradients," CoRR, vol.
abs/1804.08617, 2018.
[47] F. Gregory, R. Tim, I. Maximilian, and W. Shimon, "TreeQN and
ATreeC: differentiable tree planning for deep reinforcement learning,"
in International Conference on Learning Representations, 2018.
[48] V. Alexander, M. Volodymyr, O. Simon, G. Alex, V. Oriol, A. John,
and K. Koray, "Strategic attentive writer for learning macro-actions,"
in Advances in Neural Information Processing Systems, 2016.
[49] D. Ha and J. Schmidhuber, "Recurrent world models facilitate policy
evolution," Neural Information Processing Systems, 2018.
[50] N. Nantas, S. Gabriel, L. Zeming, K. Pushmeet, H. S. T. Philip, and
U. Nicolas, "Value propagation networks," CoRR, vol. abs/1805.11199,
2018.
[51] O. Ian, B. Charles, P. Alexander, and V. R. Benjamin, "Deep ex-
ploration via bootstrapped DQN," in Advances in Neural Information
Processing Systems, 2016.
[52] T. Haarnoja, A. Zhou, P. Abbeel, and S. Levine, "Soft actor-critic: Off-
policy maximum entropy deep reinforcement learning with a stochastic
actor," international conference on machine learning, pp. 1856 -- 1865,
2018.
[53] S. Sahil, S. L. Aravind, and R. Balaraman, "Learning to repeat:
learning," in
fine grained action repetition for deep reinforcement
International Conference on Learning Representations, 2017.
[54] S. Julian, A. Ioannis, and H. Thomas, "Mastering atari, go, chess and
shogi by planning with a learned model," abs/1911.08265, 2019.
[55] G. B. Marc, N. Yavar, V. Joel, and H. B. Michael, "The Arcade learning
environment: An evaluation platform for general agents," J. Artif. Intell.
Res., vol. 47, pp. 253 -- 279, 2013.
[56] B. Greg, C. Vicki, P. Ludwig, S. Jonas, S. John, T. Jie, and Z. Wojciech,
"OpenAI Gym," CoRR, vol. abs/1606.01540, 2016.
[57] "OpenAI Universe github," https://github.com/openai/universe, 2016.
[58] "OpenAI Retro github," https://github.com/openai/retro, 2018.
[59] N. Alex, P. Vicki, H. Christopher, K. Oleg, and S. John, "Gotta
learn fast: a new benchmark for generalization in RL," CoRR, vol.
abs/1804.03720, 2018.
[60] "General video game AI: a multi-track framework for evaluat-
ing agents, games and content generation algorithms," CoRR, vol.
abs/1802.10363, 2018.
[61] R. T. Ruben, B. Philip, T. Julian, L. Jialin, and P.-L. Diego, "Deep
learning for general video game AI," CoRR, vol.
reinforcement
abs/1806.02448, 2018.
[62] "DeepMind Lab," CoRR, vol. abs/1612.03801, 2016.
[63] J. Arthur, B. Vincent-Pierre, V. Esh, G. Yuan, H. Hunter, M. Marwan,
and L. Danny, "Unity: a general platform for intelligent agentst," CoRR,
vol. abs/1809.02627, 2018.
[64] "OpenAI Malmo github," https://github.com/Microsoft/malmo, 2017.
[65] B. Wymann, E. Espi´e, C. Guionneau, C. Dimitrakakis, R. Coulom, and
A. Sumner, "Torcs, the open racing car simulator," Software available
at http://torcs. sourceforge. net, vol. 4, p. 6, 2000.
[66] M. Kempka, M. Wydmuch, G. Runc, J. Toczek, and W. Jakowski,
"ViZDoom: a Doom-based AI research platform for visual reinforce-
ment learning," in IEEE Conference on Computational Intelligence and
Games, 2017, pp. 1 -- 8.
[67] S. Gabriel, N. Nantas, A. Alex, C. Soumith, L. Timoth´ee, L. Zeming,
R. Florian, and U. Nicolas, "TorchCraft: a library for machine learning
research on real-time strategy games," CoRR, vol. abs/1611.00625,
2016.
[68] "StarCraft II: a new challenge for reinforcement learning," CoRR, vol.
abs/1708.04782, 2017.
[69] C. Karl, K. Oleg, H. Chris, K. Taehoon, and S. John, "Quantifying
generalization in reinforcement learning," CoRR, vol. abs/1812.02341,
2018.
[70] C. M. Marlos, G. B. Marc, T. Erik, V. Joel, J. H. Matthew, and
B. Michael, "Revisiting the Arcade learning environment: evaluation
protocols and open problems for general agents," Journal of Artificial
Intelligence Research, vol. 61, pp. 523 -- 562, 2018.
[71] H. Dan, Q. John, B. David, B.-M. Gabriel, H. Matteo, v. H. Hado, and
S. David, "Distributed prioritized experience replay," in International
Conference on Learning Representations, 2018.
[72] O. Georg, G. B. Marc, O. Aaron, and M. Remi, "Count-based ex-
ploration with neural density models," in International Conference on
Machine Learning, 2017.
[73] M. L. Hoang, J. Nan, A. Alekh, D. Miroslav, Y. Yisong, and D. Hal,
"Hierarchical imitation and reinforcement learning," in International
Conference on Machine Learning, 2018.
[74] Y. Aytar, T. Pfaff, D. Budden, T. L. Paine, Z. Wang, and N. D. Freitas,
"Playing hard exploration games by watching youtube," 2018.
[75] "Montezuma's revenge solved by go-explore, a new algorithm for hard-
exploration problems," https://eng.uber.com/go-explore/, 2018.
[76] Y. Wu and Y. Tian, "Training agent for first-person shooter game
with actor-critic curriculum learning," in International Conference on
Learning Representations, 2017.
[77] P. Emilio and S. Ruslan, "Neural map: structured memory for deep
reinforcement learning," CoRR, vol. abs/1702.08360, 2017.
[78] K. Shao, D. Zhao, N. Li, and Y. Zhu, "Learning battles in ViZDoom via
deep reinforcement learning," in IEEE Conference on Computational
Intelligence and Games, 2018.
[79] G. Yang, X. Huazhe, L. Ji, Y. Fisher, L. Sergey, and D. Trevor,
"Reinforcement learning from imperfect demonstrations," CoRR, vol.
abs/1802.05313, 2018.
[80] M. Sahisnu, L. Bing, W. Shuai, Z. Yingxuan, L. Lifeng, and L. Jian,
"Action permissibility in deep reinforcement learning and application
to autonomous driving," in ACM SIGKDD Conference on Knowledge
Discovery and Data Mining, 2018.
[81] D. Li, D. Zhao, Q. Zhang, and Y. Chen, "Reinforcement learning
and deep learning based lateral control for autonomous driving," IEEE
Computational Intelligence Magazine, 2018.
[82] Y. Zhu and D. Zhao, "Driving control with deep and reinforcement
learning in the open racing car simulator," in International Conference
on Neural Information Processing, 2018.
[83] J. Matthew, H. Katja, H. Tim, and B. David, "The Malmo platform for
artificial intelligence experimentation," in International Joint Confer-
ences on Artificial Intelligence, 2016.
[84] X. Yanhai, C. Haipeng, Z. Mengchen, and A. Bo, "HogRider: cham-
pion agent of Microsoft Malmo collaborative AI challenge," in AAAI
Conference on Artificial Intelligence, 2018.
[85] T. Chen, G. Shahar, Z. Tom, J. M. Daniel, and M. Shie, "A deep
hierarchical approach to lifelong learning in Minecraft," in AAAI
Conference on Artificial Intelligence, 2017.
[86] H. J. Peter, L. Sergey, and K. Kurt, "Regret minimization for partially
observable deep reinforcement learning," in International Conference
on Learning Representations, 2018.
[87] "Unicorn: continual learning with a universal, off-policy agent," CoRR,
vol. abs/1802.08294, 2018.
[88] "Kickstarting
deep
abs/1803.03835, 2018.
reinforcement
learning,"
CoRR,
vol.
[89] "Human-level
performance
with population-based deep reinforcement
abs/1807.01281, 2018.
in first-person multiplayer
games
learning," CoRR, vol.
[90] Z. Tang, K. Shao, Y. Zhu, D. Li, D. Zhao, and T. Huang, "A review
of computational intelligence for StarCraft AI," in IEEE Symposium
Series on Computational Intelligence (SSCI), 2018.
[91] N. Usunier, G. Synnaeve, Z. Lin, and S. Chintala, "Episodic ex-
ploration for deep deterministic policies: an application to StarCraft
tasks," in International Conference on Learning
micromanagement
Representations, 2017.
[92] P. Peng, Q. Yuan, Y. Wen, Y. Yang, Z. Tang, H. Long, and J. Wang,
"Multiagent bidirectionally-coordinated nets for learning to play Star-
Craft combat games," 2017.
[93] J. Foerster, N. Nardelli, G. Farquhar, T. Afouras, P. H. S. Torr,
P. Kohli, and S. Whiteson, "Stabilising experience replay for deep
multi-agent reinforcement learning," in International Conference on
Machine Learning, 2017.
[94] K. Shao, Y. Zhu, and D. Zhao, "StarCraft micromanagement with
learning," IEEE
Intelligence,
reinforcement
Transactions on Emerging Topics in Computational
DOI:10.1109/TETCI.2018.2823329, 2018.
learning and curriculum transfer
13
[95] K. Xiangyu, X. Bo, L. Fangchen, and W. Yizhou, "Revisiting the
master-slave architecture in multi-agent deep reinforcement learning,"
CoRR, vol. abs/1712.07305, 2017.
[96] R. Tabish, S. Mikayel, S. d. W. Christian, F. Gregory, N. F. Jakob, and
W. Shimon, "QMIX: monotonic value function factorisation for deep
multi-agent reinforcement learning," CoRR, vol. abs/1803.11485, 2018.
[97] T. Zhentao, Z. Dongbin, Z. Yuanheng, and G. Ping, "Reinforcement
learning for build-order production in StarCraft II," in International
Conference on Information Science and Technology, 2018.
[98] V. Zambaldi, D. Raposo, A. Santoro, V. Bapst, Y. Li, I. Babuschkin,
K. Tuyls, D. Reichert, T. Lillicrap, E. Lockhart et al., "Relational deep
reinforcement learning," CoRR, vol. abs/806.01830, 2018.
[99] P. Sun, X. Sun, L. Han, J. Xiong, Q. Wang, B. Li, Y. Zheng, J. Liu,
Y. Liu, H. Liu, and T. Zhang, "TStarBots: defeating the cheating level
builtin AI in StarCraft II in the full game," CoRR, vol. abs/1809.07193,
2018.
[100] L. Dennis, T. Haoran, O. Z. Jeffrey, X. Huazhe, D. Trevor, and
A. Pieter, "Modular architecture for starcraft ii with deep reinforcement
learning," CoRR, p. abs/1811.03555, 2018.
[101] P. Zhen-Jia, L. Ruo-Ze, M. Zhou-Yu, Z. Yi, Y. Yang, and L. Tong,
"On reinforcement learning for full-length game of starcraft," CoRR,
p. abs/1809.09095, 2018.
[102] R. J. Daniel, E. Emmanuel, and L. Hao, "Feedback-based tree search
for reinforcement learning," in International Conference on Machine
Learning, 2018.
[103] "OpenAI Dota 1v1," https://blog.openai.com/dota-2/, 2017.
[104] "OpenAI Dota Five," https://blog.openai.com/openai-five/, 2018.
[105] B. Christopher, B. Greg, and C. Brooke, "Dota 2 with large scale deep
reinforcement learning," abs/1912.06680, 2019.
[106] "Noisy networks for exploration," CoRR, vol. abs/1706.10295, 2017.
[107] "Parameter space noise for exploration," CoRR, vol. abs/1706.01905,
2017.
[108] T. Haoran, H. Rein, F. Davis, S. Adam, C. Xi, D. Yan, S. John, D. T.
Filip, and A. Pieter, "Exploration: a study of count-based exploration
for deep reinforcement learning," in Advances in Neural Information
Processing Systems, 2017.
[109] B. Pierre-Luc, H. Jean, and P. Doina, "The option-critic architecture,"
in AAAI Conference on Artificial Intelligence, 2017.
[110] S. V. Alexander, O. Simon, S. Tom, H. Nicolas, J. Max, S. David, and
K. Koray, "FeUdal networks for hierarchical reinforcement learning,"
in International Conference on Machine Learning, 2017.
[111] C. M. Marlos, R. Clemens, G. Xiaoxiao, L. Miao, T. Gerald, and
C. Murray, "Eigenoption discovery through the deep successor rep-
resentation," CoRR, vol. abs/1710.11089, 2017.
[112] F. C. Paul, L. Jan, B. B. Tom, M. Miljan, L. Shane, and A. Dario,
"Deep reinforcement learning from human preferences," in Advances
in Neural Information Processing Systems, 2017.
[113] v. S. Harm, F. Mehdi, L. Romain, R. Joshua, B. Tavian, and T. Jeffrey,
"Hybrid reward architecture for reinforcement learning," in Advances
in Neural Information Processing Systems, 2017.
[114] H. Matteo, S. Hubert, E. Lasse, C. Wojciech, S. Simon, and v. H.
Hado, "Multi-task deep reinforcement learning with popart," CoRR,
vol. abs/1809.04474, 2018.
[115] "Distral: robust multitask reinforcement
learning," in Advances in
Neural Information Processing Systems, 2017.
[116] "Mix& Match - agent curricula for reinforcement learning," CoRR, vol.
abs/1806.01780, 2018.
[117] L. Ryan, W. Yi, T. Aviv, H. Jean, A. Pieter, and M. Igor, "Multi-agent
actor-critic for mixed cooperative-competitive environments," 2017, pp.
6382 -- 6393.
[118] J. Foerster, G. Farquhar, T. Afouras, N. Nardelli, and S. Whiteson,
"Counterfactual multi-agent policy gradients," in AAAI Conference on
Artificial Intelligence, 2018.
[119] B. Charles, U. Benigno, P. Alexander, L. Yazhe, R. Avraham, Z. L. Joel,
W. R. Jack, W. Daan, and H. Demis, "Model-free episodic control,"
CoRR, vol. abs/1606.04460, 2016.
[120] "Hybrid computing using a neural network with dynamic external
memory," Nature, vol. 538, pp. 471 -- 476, 2016.
[121] "Neural episodic control," in International Conference on Machine
Learning, 2017.
[122] P. Deepak, A. Pulkit, A. E. Alexei, and D. Trevor, "Curiosity-driven
exploration by self-supervised prediction," in IEEE Conference on
Computer Vision and Pattern Recognition Workshops, 2017, pp. 488 --
489.
[123] S. Christopher and C. Jeff, "Deep curiosity search: intra-life exploration
learning
improves performance on challenging deep reinforcement
problems," CoRR, vol. abs/1806.00553, 2018.
|
1305.2386 | 1 | 1305 | 2013-05-10T16:47:02 | Disappointment in Social Choice Protocols | [
"cs.MA"
] | Social choice theory is a theoretical framework for analysis of combining individual preferences, interests, or welfare to reach a collective decision or social welfare in some sense. We introduce a new criterion for social choice protocols called social disappointment. Social disappointment happens when the outcome of a voting system occurs for those alternatives which are at the end of at least half of individual preference profiles. Here we introduce some protocols that prevent social disappointment and prove an impossibility theorem based on this key concept. | cs.MA | cs |
Disappointment in Social Choice Protocols
Mohammad Ali Javidian, Rasoul Ramezanian1
Department of Mathematics Sharif University of Technology, Tehran, Iran
Complex and Multi Agent Systems Lab
[email protected], [email protected]
Abstract
Social choice theory is a theoretical framework for analysis of combining individual
preferences, interests, or welfares to reach a collective decision or social welfare in some
sense. We introduce a new criterion for social choice protocols called "social disappoint-
ment". Social disappointment happens when the outcome of a voting system occurs for
those alternatives which are at the end of at least half of individual preference pro-
files. Here we introduce some protocols that prevent social disappointment and prove
an impossibility theorem based on this key concept.
1
Introduction
In social sciences, we are facing two kinds of social choices: voting which is used to make a
political decision and market mechanism as a tool to make an economic decision[1]. Here,
we are merely concerned with the former.
The theory underlying voting systems is known as social choice theory and is concerned
with the design and analysis of methods for collective decision making[27]. Voting pro-
cedures are among the most important methods for collective decision making.
In this
paper, our attention is on voting procedures. Voting procedures focus on the aggregation
of individuals' preferences to produce collective decisions. In practice, a voting procedure
is characterized by ballot responses and the way ballots are tallied to determine winners.
Voters are assumed to have clear preferences over candidates (alternatives) and attempt
to maximize satisfaction with the election outcome by their ballot responses. Voting pro-
cedures are formalized by social choice functions, which map ballot response profiles into
election outcomes(see[6], page:175).
We use a broad class of social choice functions such as Condorcet method, Plurality rule,
Hare system, Borda count, Sequential Pairwise Voting with a Fixed Agenda (Seq. Pairs),
and Dictatorship. Condorcet method is typically attributed to the Marquis de Condorcet
(1743-1794); However, it dates back to Ramon Llull in the thirteenth century([28] p. 6).
Hare procedure was introduced by Thomas Hare in 1861, and is also known by names
such as the "single transferable vote system"(STV) or "instant runoff voting" ([28] p. 7).
Jean Charles Chevalier de Borda (1733-99) in 1781 [5] introduced an aggregation procedure
known as Borda count. Interestingly, recent historical work by McLean, Urken (1993) [17],
and Pukelsheim (unpublished) reveals that Bordas system had been explicitly described in
1433 by Nicholas of Cusa (1401-64), a Renaissance scholar interested in the question of how
1Corresponding Author
German kings should be elected ([30] p. 9). For more details and examples, see [28] sec.
1.3.
There are five desirable properties that relate to such procedures: Always-A-Winner
Condition (AAW), Condorcet Winner Criterion (CWC), Pareto Condition, Monotonicity
(Mono), Independence of Irrelevant Alternatives (IIA). A social choice procedure is said to
satisfy AAWcondition if every sequence of individual preference lists produces at least one
winner. An alternative 'x' is said to be a Condorcet winner if it is the unique winner in
Condorcets method. A social choice procedure is said to satisfy CWC provided that-if there
is a Condorcet winner-then it alone is the social choice. A social choice procedure is said to
satisfy the Pareto condition (or just Pareto) if the following holds for every pair 'x' and 'y'
of alternatives: If everyone prefers 'x' to 'y', then y is not a social choice. A social choice
procedure is said to be monotone provided that the following holds for every alternative 'x':
If 'x' is the social choice (or tied for such) and someone changes his or her preference list by
moving 'x' up one spot, then 'x' should still be the social choice (or tied for such). A social
choice procedure has IIA condition the social choice set includes 'x' but not 'y', and one or
more voters change their preferences, but no one changes his or her mind about whether 'x'
is preferred to 'y' or 'y' to 'x', then the social choice set should not change so as to include
'y'. The condition of "independence of irrelevant alternatives" was first used by Arrow [1]
in 1951. For more details of these properties see [28], sec. 1.4.
In this paper, we propose a new property for social choice procedures called social
disappointment in voting which is a situation that happens when the winner is the least
favorable candidate for at least half of the voters. See the definition and an example of
social disappointment in section 2.
The rest of the paper is organized as follows.
In section 2 we introduce the concept
of social disappointment and the Least Public Resentment procedure (L.P.R) which is a
procedure that prevents social disappointment in voting. In section 3 in imitation of Tay-
lor's work (see[29] also[28] pp. 28-31) we present an impossibility theorem based on social
disappointment in voting.
Notice:
In this paper, we will follow the notation and basic results of Taylor and
Pacelli(see[28], chapter:1).
2 Social Disappointment
We start explaining the social disappointment property by the following example.
Example 2.1 Consider the following situation in which there are four Dutchmen, three
Germans, and two Frenchmen who have to decide which drink will be served for lunch (only
a single drink will be served to all).
4
3
2
Milk
Beer Wine
Wine Wine Beer
Beer Milk Milk
Now, which drink should be served based on these individual preferences? Milk could be
chosen since it has the most agents ranking it first. Milk is the winner according to the
plurality rule, which only considers how often each alternative is ranked in first place. How-
ever, a majority of agents will be dissatisfied with this choice as they prefer any other drink
to Milk(see[7], pp. 3,4).
Definition 2.1 Social disappointment in voting happens when the outcome of a voting
system (for 3 or more alternatives) occurs for those alternatives which are at the end of at
least half of individual preference profiles.
Now the question is for which protocols social disappointment(S.D) may hap- pen? The
answer is given in the following table (where a 'yes' indicates that social disappointment
may happen).
Plurality Borda Hare Seq. Pairs Dictator Condorcet
S.D
Yes
Yes
Yes
Yes
Yes
Yes
We prove the seven claims in Table 1.
Claim 2.1 The Plurality rule does not prevent social disappointment.
Proof. See Example 2.1. ⊣
Claim 2.2 The Borda count does not prevent social disappointment.
Proof. Consider the three alternatives 'a', 'b', and 'c' and the following sequence of two
preference lists:
Voters Voters
3and4
1and2
a
b
c
c
b
a
Alternatives 'a', 'b' and 'c' are the social choice when the Borda count procedure is used.
Although 'a' is the social choice (also 'c'), but it is at the bottom of individual preference
lists and so social disappointment has taken place. ⊣
Claim 2.3 The Hare procedure does not prevent social disappointment.
Proof. Consider the three alternatives 'a', 'b', and 'c' and the following sequence of ten
preference lists grouped into voting blocks of size four, three, and two:
Voters Voters Voters
8-10
1-4
a
b
c
5-7
c
b
a
Alternative 'a' is the social choice when the Hare system is used. Although 'a' is the social
choice, but it is at the bottom of individual preference lists and so social disappointment
has taken place. ⊣
Claim 2.4 Sequential pairwise voting with a fixed agenda does not prevent social disap-
pointment.
Proof. Consider the three alternatives 'b', 'c', and a and suppose that this ordering of
the alternatives is also the agenda. Consider the following sequence of four preference lists
grouped into voting blocks of size two, one, and one:
Alternatives 'a', 'b' are the social choice when the Hare system is used. Although 'a'
is the social choice, but it is at the bottom of individual preference lists and so social
disappointment has taken place. ⊣
Claim 2.5 A dictatorship does not prevent social disappointment.
Proof. Consider the three alternatives 'a', 'b', and 'c' and the following three preference
lists:
Voters Voter Voter
1and2
b
c
a
4
c
b
a
4
c
b
a
Voters Voter Voter
1and2
3
b
c
a
3
c
b
a
a
b
c
a
b
c
Assume that Voter 1 is the dictator. Then 'a' is the social choice, but obviously social
disappointment has happened. ⊣
Claim 2.6 If in Condorcet method more than half of voters put 'a' at the bottom of indi-
vidual preference lists then for sure 'a' would not be the social choice and in this case social
disappointment would not occur. But if the number of voters is even and precisely half of
voters put 'a' in the end of their lists, one of these two possibilities happens:
• 1. Not all voters in the other half put 'a' at the top of their lists, which in this case,
'a' definitely does not hold the social choice and social disappointment occures.
• 2. All the voters in the other half also put 'a' at the top of their lists, which in this
case 'a' is definitely in the set of social choice and therefore we face with the social
disappointment.
Proof. It is concluded from the definitions. ⊣
Remark 2.1 Regarding case 2 in claim 2.6 if we have only three alternatives, the set of
social choice certainly have more than one member.
2.1 The least public resentment procedure (L.P.R):
We observed that none of the famous procedures listed in Table 1 prevents social disap-
pointment. We introduce a procedure which prevents social disappointment in voting, called
The least public resentment procedure (L.P.R). In this procedure we begin by deleting the
alternative or alternatives occurring at bottom of the most lists. At this stage we have lists
that are at least one alternative shorter than the lists we started with. Now, we simply
repeat this procedure of deleting the least public resentment alternative or alternatives.
The alternative(s) deleted last is declared as the winner.
Example 2.2 Consider Example 2.1, we decide which alternative occurs at the bottom of
the most lists and delete it from all the lists. Milk is deleted from each list leaving the
following:
4
3
2
Wine Beer Wine
Beer Wine Beer
Now, Beer occurs at the bottom of six of the nine lists, and thus is eliminated. Hence, Wine
is the social choice when the L.P.R is used.
Which properties does this procedure satisfy? The answer is given in the following table:
AAW CWC Pareto Mono
Yes
Yes
No
L.P.R
No
IIA Non S.D
No
Yes
Proposition 2.1 The L.P.R procedure satisfies AAW, Pareto, and nonexistence of social
disappointment (Non S.D) criterion but does not satisfy CWC, Monotonicity, and IIA.
Proof. For this procedure, the description makes it clear that there is at least one winner
for every profile. So L.P.R satisfies AAW condition.
Suppose that there is a winner that is in the end of at least half of preference profiles.
The L.P.R procedure would delete this alternative from profile lists in the first stage, so the
social disappointment for this alternative could not occure.
Consider the three alternatives 'a', 'b', and 'c' and the following sequence of seven
preference lists grouped into voting blocks of size two, two, two, and one:
Voters Voters Voters Voter
1and2
3and4
5and6
a
b
c
a
c
b
b
c
a
7
c
b
a
The L.P.R procedure produces 'b' as the social choice. However, 'a' is clearly the Condorcet
winner, defeating each of the other alternatives in one-on-one competitions. Since the
Condorcet winner is not the social choice in this situation, we have that the L.P.R procedure
does not satisfy the Condorcet winner criterion.
L.P.R procedure satisfies the Pareto condition. Because if in all lists 'b' has occurred
down below 'a', therefore at some point 'b' would be gone but 'a' stands still due to the
fact that 'b' socially is more resentful than 'a'. So based on social choice procedure in this
system 'b' would be eliminated in early stages or at most in comparison with 'a'.
Consider the three alternatives 'a', 'b', and 'c' and the following sequence of seven
preference lists grouped into voting blocks of size two, two, two, and one:
Voters Voters Voter
1and2
3and4
b
a
c
c
a
b
5
b
c
a
We delete the alternatives which have taken place more than the other alternatives at the
end of the votes. In this case, that would be alternatives 'c' and 'b' with the two last places
in votes for each as compared to one for 'a'. But now 'a' is the only alternative left, and so
it is the social choice when the L.P.R procedure is used.
Now suppose that the single voter on the most right changes his or her list by in-
terchanging 'a' with the alternative that is right above 'a' on this list. This apparently
favorable-to-'a'-change yields the following sequence of preference lists:
Voters Voters Voter
1and2
3and4
b
a
c
c
a
b
If we apply the L.P.R procedure again, we delete the alternatives which have taken place
more than the other alternatives at the end of the votes. In this case, 'c' is that alternative.
But the reader can now easily check that with 'c' so eliminated, alternative 'b' is at bottom
of two of the fifth lists. Alternative 'a' is deleted and so 'b' is the social choice. This change
in social choice from 'a' to 'c' shows that the L.P.R procedure does not satisfy monotonicity.
Consider the three alternatives 'a', 'b', and 'c' and the following sequence of four pref-
erence lists grouped into voting blocks of size one, one, and two:
5
b
a
c
b
c
a
Voter Voter Voters
3and4
1
b
a
c
2
a
c
b
Alternative 'b' is the social choice when the L.P.R procedure is used.
In particular, 'b'
is a winner and 'a' is a non-winner. Now suppose that Voter 4 changes his or her list by
interchanging the alternatives 'a' and 'c'. The lists then become:
Voter1 Voter2 Voter3 Voter4
b
a
c
a
c
b
b
c
a
b
a
c
Notice that we still have 'b' over 'a' in Voter 4s list. However, L.P.R procedure now has
'a' and 'b' tied for the win. Thus, although no one changed his or her mind about whether
'a' is preferred to 'b' or 'b' to 'a', the alternative 'a' went from being a non-winner to
being a winner. This shows that independence of irrelevant alternatives fails for the L.P.R
procedure. ⊣
3 A Glimpse of Impossibility
Taylor proved in [29] also [28] pp. 28-31 that there is no social choice procedure for three
or more alternatives that satisfies the always-a-winner criterion, independence of irrelevant
alternatives, and the Condorcet winner criterion. Now we prove an impossibility theorem
based on social disappointment concept.
Theorem 3.1 There is no social choice procedure for four or more alternatives that satisfies
the nonexistence of S.D. criterion, and the Condorcet winner criterion.
Proof. We assume that we have a social choice procedure that satisfies the Condorcet
winner criterion. We then show that if this procedure is applied to the profile that consists
of Condorcets voting paradox [10], then it produces a winner which will lead to social
disappointment. We prove this claim for when we have four alternatives.
Assume that we have a social choice procedure that satisfies the Condorcet winner
criterion. Consider the following profile:
b b
d d d
c
c
c
a
a
a
a
b b
a
b d d d
c
c
c
a
b
Alternative 'd' is the unique social choice when the Condorcets method is used. Although
'd' is the social choice, but it is at the bottom of individual preference lists and so social
disappointment has taken place. ⊣
Corollary 3.1 There is no social choice procedure for four or more alternatives that sat-
isfies:
• a) the nonexistence of S.D. criterion, always a winner, and the Condorcet winner
criterion.
• b) the nonexistence of S.D. criterion, monotonicity, and the Condorcet winner crite-
rion.
• c) the nonexistence of S.D. criterion, Independence of Irrelevant Alternatives, and the
Condorcet winner criterion.
• d) the nonexistence of S.D. criterion, Pareto, and the Condorcet winner criterion.
Proof. It is obvious considering Theorem 3.1. ⊣
3.1 Condorcet with an amendment and Seq. Pairs with an amendment
procedure
Before considering the rest of the possible cases, we introduce following two procedures and
investigate their properties which we mentioned in this article.
Condorcet with an amendment procedure
This protocol is done the same as Condorcets method, with the difference that in the end
we remove those alternatives with the social disappointment from the set of social choice.
Seq. Pairs with an amendment procedure
This protocol is done the same as Seq. Pairs, with the difference that in the end we remove
those alternatives with the social disappointment from the set of social choice.
Which properties do the procedures satisfy? The answer is given in the following table:
Condorcet with an amendment
Seq. Pairs with an amendment
AAW CWC Pareto Mono
Yes
Yes
No
Yes
No
No
Yes
Yes
IIA Non S.D
Yes
No
Yes
Yes
Here we will only prove three items of the table above. We leave the rest for the reader
(The proof will be easy to comprehend according to the given definitions and [28] sections
1.5,1.6 ).
Proposition 3.1 Condorcet with an amendment and Seq. Pairs with an amendment pro-
cedures do not satisfy the Condorcet winner criterion. Furthermore Condorcet with an
amendment procedure does not satisfy the always a winner criterion.
Proof. Consider the following profile:
b b
d d d
c
c
a
a
c
a
b b
a
a
b d d d
c
c
c
a
b
Alternative 'd' is the unique social choice when the Condorcets method is used. There-
fore there is no winner (NW) when the Condorcet with an amendment procedure is used.
Consider Seq. Pairs voting with fixed agenda a,b,c,d. Alternatives 'c', 'd' are the social
choices when the Seq. Pairs voting with this particular fixed agenda is used. Thus alterna-
tive 'c' is the social choice when Seq. Pairs with an amendment is used, so Condorcet with
an amendment and Seq. Pairs with an amendment procedures do not satisfy the Condorcet
winner criterion. Furthermore according to what was said Condorcet with an amendment
procedure does not satisfy the always a winner criterion.
⊣
Remark 3.1 In light of Remark 2.1 we understand that set of social choice would be either
all three alternatives or two alternatives which one would be free from social disappointment.
Anyway, set of social choice would include the alternative with no social disappointment.
Considering this fact the following proposition will be prove.
Proposition 3.2 There exist some social choice procedures for three alternatives that sat-
isfy:
• a) the nonexistence of S.D. criterion, and the Condorcet winner criterion.
• b) the nonexistence of S.D. criterion, the Condorcet winner, and always a winner
criterion.
• c) the nonexistence of S.D. criterion, the Condorcet winner, and Pareto criterion.
• d) the nonexistence of S.D. criterion, the Condorcet winner, and monotonicity crite-
rion.
• e) the nonexistence of S.D. criterion, the Condorcet winner, and independence of
irrelevant alternatives criterion.
• f ) the Pareto criterion, the Condorcet winner, and independence of irrelevant alter-
natives criterion.
• g) the nonexistence of S.D. criterion, monotonicity, and independence of irrelevant
alternatives criterion.
Proof. For (b) consider Seq. Pairs with an amendment and for the rest Condorcet's method
with an amendment. ⊣
3.2 The Least Unpopular (L.U) and The Least Unpopular Reselection
procedure(L.U.R)
To investigate the remaining cases we introduce and investigate The Least Unpopular and
The Least Unpopular Reselection procedures.
The Least Unpopular procedure (L.U)
The social choice in this procedure is (are) the alternative(s) that appears lesser than the
others at the bottom of individual preference lists. This protocol satisfies AAW, monotonic-
ity, and nonexistence of S.D. criterion, but does not satisfy CWC, Pareto, and IIA criterion.
Proposition 3.3 The Least Unpopular procedure does not satisfy CWC, IIA, and Pareto
criterion.
Proof. Consider the four alternatives 'a', 'b', 'c', and 'd' and the following profile:
Voters Voter Voter
1and2
a
b
c
d
3
c
a
b
d
4
d
a
b
c
Alternatives 'a', 'b' are the social choices when the Least Unpopular procedure is used.
Thus, alternative 'b' is in the set of social choice even though everyone prefers 'a' to 'b'.
This show that Pareto fails. Now consider the three alternatives 'a', 'b', 'c' and following
profile:
Voters Voter
1and2
3
b
c
a
a
b
c
Alternative 'b' is the social choice when the Least Unpopular procedure is used. However,
'a' is clearly the Condorcet winner, defeating each of the other alternatives in one-on-one
competitions. Since the Condorcet winner is not the social choice in this situation, we have
that the Least Unpopular procedure does not satisfy the Condorcet winner criterion. On
the other hand 'b' is a non-winner. Now suppose that voter 3 changes his or her list by
interchanging the alternatives 'a' and 'c'. The lists then become:
Voters Voter
1and2
3
b
a
c
a
b
c
Notice that we still have 'b' over 'a' in Voter 4s list. However, Least Unpopular procedure
now has 'a' and 'b' tied for the win. Thus, although no one changed his or her mind about
whether 'a' is preferred to 'b' or 'b' to 'a', the alternative 'a' went from being a non-winner
to being a winner. This shows that independence of irrelevant alternatives fails for the
Least Unpopular procedure. ⊣
Proposition 3.4 There are some social choice procedures for three or more alternatives
that satisfy:
a) the nonexistence of S.D. criterion, monotonicity, and always a winner criterion.
b) the nonexistence of S.D. criterion, Pareto, and always a winner criterion.
Proof. The Least Unpopular procedure is one of them. ⊣ Now we introduce and investigate
The Least Unpopular Reselection procedure.
The Least Unpopular Reselection (L.U.R)
First of all we choose a set of alternatives appearing lesser than the others at the bottom of
individual preference lists. If this set has only one member, it would be the social choice.
Otherwise we remove the remaining alternatives and run the L.U. procedure for the set
obtained from the first stage, and keep doing this until there will be no continuing. The
obtained set in the last repetition would be the social choice. This protocol satisfies AAW,
monotonicity, Pareto, and nonexistence of S.D. criterion, but does not satisfy CWC, and
IIA criterion.
Proposition 3.5 The Least Unpopular Reselection procedure does not satisfy CWC and
IIA criterion.
Proof. Perform as we did in the proof of Proposition 3.3. ⊣
Proposition 3.6 There are some social choice procedures for three or more alternatives
that satisfy the nonexistence of S.D. criterion, Pareto, and monotonicity criterion.
Proof. The L.U.R procedure is one of them. ⊣
4 Conclusion and Future Direction
Here in the following table we summarize what we came to conclusion in the previous
sections:
AAW CWC Pareto Mono
Condorcet
Plurality
Borda count
Hare system
Seq. Pairs
Dictator
L.P.R
Condorcet with an amendment
Seq. Pairs with an amendment
L.U
L.U.R
no
yes
yes
yes
yes
yes
yes
no
yes
yes
yes
yes
no
no
no
no
no
no
no
no
no
no
yes
yes
yes
yes
no
yes
yes
yes
yes
no
yes
yes
yes
yes
no
yes
yes
yes
yes
yes
yes
yes
IIA Non S.D
yes
no
no
no
no
no
no
yes
no
no
no
no
no
no
no
no
no
yes
yes
yes
yes
yes
Finally we must note that the well-known procedures that satisfy the condition IIA are
Condorcet extension which means that they choose the Condorcet winner whenever one
exists. Since CWC is not compatible with the nonexistence of S.D. criterion, we dont
know whether there are some social choice procedures for three alternatives that satisfy the
nonexistence of S.D. criterion, always a winner criterion, and independence of irrelevant
alternatives criterion.
This question can be a motivation for future work.
History and Related Works
Kenneth Arrow showed that it is impossible to design a voting rule that satisfies some very
natural properties (Arrow, 1950)[2]. This seminal work is thus named Arrows impossibility
theorem, and is broadly regarded as the beginning of modern Social Choice Theory, which
is an active research direction in Economics[32].
In terms of the literature, there are, as one might expect, an abundance of treatments
of Arrows theorem. Two of the most notable book-length treatments are Arrow (1963)[2]
and Kelly (1978)[14]. Textbook coverage (with proofs) is also widely available, including
chapters in Kelly (1987)[15], Saari (1995)[21], and Taylor(1995)[28].
The 1970s seem to have been the heyday for social choice research in the second half
of the twentieth century. For references, Kelly (1991)[16] is remarkable. Books on social
choice (from a number of different perspectives) include Sen (1970)[24], Fishburn (1973)[13],
Feldman (1980)[11], Riker (1982)[19], Schofield (1985)[23], Campbell (1992)[8], Shepsle and
Bonchek (1997)[25], Austen-Smith and Banks (2000)[3], and Arrow, Sen, and Suzumura,
(2002)[4]. Books on different aspects of voting include Straffin (1980)[26], Nurmi (1987)[18],
Saari (1994)[20], Felsenthal and Machover (1998)[12], Taylor and Zwicker (1999)[31], and
Saari (2001)[22]. An important recent survey is Brams and Fishburn (2002)[6](see[28], pp.
19,20).
Originating in economics and political science, social choice theory has since found its
place as one of the fundamental tools for the study of multi-agent systems. The reasons for
this development are clear: if we view a multi-agent system as a society of autonomous soft-
ware agents, each of which has different objectives, is endowed with different capabilities,
and possesses different information, then we require clearly defined and well-understood
mechanisms for aggregating their views so as to be able to make collective decisions in
such a multi-agent system(see[7], page:3).
In fact, a burgeoning areaComputational So-
cial Choiceaims to address problems in computational aspects of information/preference
representation and aggregation in multi-agent scenarios(see[32],[9]and[7]).
References
[1] Arrow, K. A difficulty in the concept of social welfare. The Journal of Political Economy
58 (1950), 328-46.
[2] Arrow, K. Social Choice and Individual Values. John Wiley and Sons, (1951). Second
edition (1963).
[3] Austen-Smith, D. and J. Banks, Positive political theory I: collective preferences. Uni-
versity of Michigan Press: Ann Arbor, (2000).
[4] Arrow, K. and A. Sen and K. Suzumura (Eds.), Handbook of social choice and welfare,
vol. I, North-Holland, New York, (2002).
[5] Borda J-C de (1953) M´emoire sur les ´elections au Scrutin. In: Histoire de l'Acad´emie
Royale des Sciences, (1781). (Translated by Grazia A de as Mathematical derivation
of an election system. Isis 44:42-51)
[6] Brams, S. and P. Fishburn, Voting procedures. In the Handbook of Social Choice and
Welfare. Arrow, Sen, and Suzumura, eds. (2002), 175-236.
[7] Brandt, F., Conitzer, V., and Endriss, U. Computational Social Choice. MIT Press
(2012).
[8] Campbell, D. Equity, efficiency, and social choice. Clarendon Press, Oxford, (1992).
[9] Chevaleyre, Y., Endriss, U., Lang, J., and Maudet, N. (2007), A Short Introduction
to Computational Social Choice, in Proceedings of the 33rd Conference on Current
Trends in Theory and Practice of Computer Science (SOFSEM-2007).
[10] Condorcet, Marquis De. Essai sur l'application de l'analyse `a la probabilit´e des d´ecisions
rendues `a la pluralit´e des voix, Paris, (1785).
[11] Feldman, A. Welfare economics and social choice theory. Kluwer: Nijhoff, (1980).
[12] Felsenthal, D. and M. Machover, The measurement of voting power: theory and prac-
tice, problems and paradoxes. Edward Elgar: Cheltenham, UK, (1998).
[13] Fishburn, P. The theory of social choice. Princeton University Press: Princeton, NJ,
(1973).
[14] Kelly, J. Arrow impossibility theorems. Academic Press: New York, (1978).
[15] Kelly, J. Social choice theory: an introduction. Springer-Verlag: New York, (1987).
[16] Kelly, J. Social choice bibliography. Social Choice and Welfare 8 (1991), 97-169.
[17] McLean, I. and Urken, A. B. General introduction, in: I. McLean and A. Urken (eds),
Classics of Social Choice, The University of Michigan Press(1995).
[18] Nurmi, H. Comparing voting systems. D. Reidel Publishing Company: Dordrecht,
Holland, 1987.
[19] Riker,W. Liberalism against populism: a confrontation between the theory of democ-
racy and the theory of social choice. W. H. Freeman: San Francisco, (1982).
[20] Saari, D. The geometry of voting. Springer-Verlag: New York, (1994).
[21] Saari, D. Basic geometry of voting. Springer-Verlag: New York, (1995).
[22] Saari, D. Choatic elections: a mathematician looks at voting. The American Mathe-
matical Society, (2001).
[23] Schofield, N. Social choice and democracy. Springer Verlag: Berlin, (1985).
[24] Sen, A. Collective choice and social welfare. Holden Day: San Francisco, (1970).
[25] Shepsle, K. and M. Bonchek, Analyzing politics: rationality, behavior, and institutions.
Norton: New York and London, (1997).
[26] Straffin, P. Topics in the theory of voting. Birkhauser: Boston, (1980).
[27] Suzumura, K. Handbook of Social Choice and Welfare, Volume 1, Edited by K.J Arrow,
A.K. Sen and K Suzumura. Elsevier Science B.V.(2002), 1-32.
[28] Taylor, A. Mathematics and politics: strategy, voting, power, and proof. Springer-
Verlag: New York, (1995). Second edition (2008).
[29] Taylor, Alan. A glimpse of impossibility, Perspectives on Political Science 26:2326
(1997).
[30] Taylor, Alan. Social Choice and the Mathematics of Manipulation, Cambridge, Eng-
land: Cambridge University Press (2005).
[31] Taylor, A. and W. Zwicker, Simple games: desirability relations, trading, and pseu-
doweightings. Princeton University Press: Princeton, NJ, (1999).
[32] Xia, Lirong. Computational Voting Theory: Game-Theoretic and Combinatorial As-
pects. Dissertation submitted in partial fulfillment of the requirements for the degree of
Doctor of Philosophy in the Department of Computer Science in the Graduate School
of Duke University (2011).
|
1909.00893 | 1 | 1909 | 2019-09-03T00:04:24 | A Predictive Deep Learning Approach to Output Regulation: The Case of Collaborative Pursuit Evasion | [
"cs.MA"
] | In this paper, we consider the problem of controlling an underactuated system in unknown, and potentially adversarial environments. The emphasis will be on autonomous aerial vehicles, modelled by Dubins dynamics. The proposed control law is based on a variable integrator via online prediction for target tracking. To showcase the efficacy of our method, we analyze a pursuit evasion game between multiple autonomous agents. To obviate the need for perfect knowledge of the evader's future strategy, we use a deep neural network that is trained to approximate the behavior of the evader based on measurements gathered online during the pursuit. | cs.MA | cs | A Predictive Deep Learning Approach to Output Regulation: The Case of
Collaborative Pursuit Evasion
S. Shivam1, A. Kanellopoulos2, K. G. Vamvoudakis2, and Y. Wardi1
9
1
0
2
p
e
S
3
]
A
M
.
s
c
[
1
v
3
9
8
0
0
.
9
0
9
1
:
v
i
X
r
a
Abstract -- In this paper, we consider the problem of con-
trolling an underactuated system in unknown, and potentially
adversarial environments. The emphasis will be on autonomous
aerial vehicles, modelled by Dubins dynamics. The proposed
control
law is based on a variable integrator via online
prediction for target tracking. To showcase the efficacy of our
method, we analyze a pursuit evasion game between multiple
autonomous agents. To obviate the need for perfect knowledge
of the evader's future strategy, we use a deep neural network
that is trained to approximate the behavior of the evader based
on measurements gathered online during the pursuit.
I. INTRODUCTION
Output tracking in dynamical systems, such as robots,
flight control, economics, biology, cyber-physical systems,
is the practice of designing decision makers which ensure
that a system's output tracks a given signal [1], [2].
Well-known existing methods for nonlinear output reg-
ulation and tracking include control techniques based on
nonlinear inversions [3], high-gain observers [4], and the
framework of model predictive control (MPC) [5], [6].
Recently a new approach has been proposed, based on
the Newton-Raphson flow for solving algebraic equations
[7]. Subsequently it has been tested on various applications
including controlling an inverted pendulum, and position
control of platoons of mobile robotic vehicles [8], [9]. While
perhaps not as general as the aforementioned established
techniques, it seems to hold out promise of efficient com-
putations and large domains of stability.
The successful deployment of complex control systems
in real world applications increasingly depends on their
ability to operate on highly unstructured -- even adversarial
-- settings, where a-priori knowledge of the evolution of
the environment is impossible to acquire. Moreover, due to
the increasing interconnection between the physical and the
cyber domains, control systems become more intertwined
with human operators, making model-based solutions fragile
to unpredictable. Towards that, methods that augment low-
level control
techniques with intelligent decision making
mechanisms have been extensively investigated in [10]. Ma-
chine learning [11], [12], offers a suitable framework to
1S. Shivam, and Y. Wardi are with the School of Electrical and Computer
Engineering, Georgia Institute of Technology, Atlanta, GA, 30332, USA.
e-mail: ([email protected], [email protected]).
2A. Kanellopoulos, and K. G. Vamvoudakis are with the Daniel
Guggenheim School of Aerospace Engineering, Georgia Institute of Tech-
nology, Atlanta, GA, 30332, USA. e-mail: ([email protected], kyri-
[email protected]).
This work was supported in part, by ONR Minerva under grant No.
N00014 ´ 18 ´ 1 ´ 2160, and by NSF under grants No. SaTC-1801611
and CPS-1851588.
allow control systems to autonomously adapt by leveraging
data gathered from their environment. To enable data-driven
solutions for autonomy,
learning algorithms use artificial
neural networks (NNs); classes of functions that, due to
properties that stem from their neurobiological analogy,
offer adaptive data representations and prediction based on
external observations.
NNs have been used extensively in control applications
[13], both in open-loop and closed-loop fashion. In closed-
loop applications, NNs have been utilized as dynamics ap-
proximators, or in the framework of reinforcement learning,
in enabling online solution of the Hamilton-Jacobi-Bellman
equation [14]. However, the applicability of NNs in open-
loop control objectives is broader, due to their ability to
operate as classifiers, or as nonlinear function approximators
[15].
The authors of [13] introduced NN structures for system
identification as well as adaptive control. Extending the
identification capabilities of learning algorithms, the authors
of [16] introduce a robustification term that guarantees
asymptotic estimation of the state and the state derivative.
Furthermore, reinforcement learning has received increas-
ing attention since the development of methods that solve
optimal control problems for continuous time control sys-
tems online without the knowledge of the dynamics [17].
Prediction has been in the forefront of research conducted
on machine learning. Learning-based attack prediction was
employed both in [18] and [19] in the context of cyber-
security, and [20] utilized NNs to solve a pursuit evasion
game by constructing both the evader's and the pursuer's
strategies offline using pre-computed trajectories. Recently,
authors of this paper have applied NN for on-line model
construction in a control application [21].
This paper applies an NN technique to the pursuit-evasion
problem investigated in [22], which is more challenging
than the problem addressed in [21]. The strategies of both
pursuers and evader are based on respective games. In Ref.
[22], the pursuers know the game of the evader ahead of time,
and an MPC technique is used to determine their trajectories.
In this paper the pursuers do not have an a-priori knowledge
of the evader's game or its structure, and they employ an NN
in real time to identify its input-output mapping. We use our
tracking-control technique [7] rather than MPC, and obtain
similar results to [22]. Furthermore, the input to the system
has a lesser dimension that its output, and hence the control
is underactuated. We demonstrate a way of overcoming this
limitation, which may have a broad scope in applications.
The rest of the paper is structured as follows. Section II
Fig. 1.
Basic control system scheme.
describes our proposed control technique and some prelim-
inary results on NN, and it formulates the pursuers-evader
problem. Section III describes results on model-based and
learning-based strategies. Simulation results are presented
in Section IV. Finally, Section V concludes the paper and
discusses directions for future research.
II. PRELIMINARIES AND PROBLEM FORMULATION
A. Tracking Control Technique
This subsection recounts results published in our previous
work in which prediction-based output tracking was used for
fully-actuated systems [7] -- [9]. Consider a system as shown
in Figure 1 with rptq P Rm, yptq P Rm, uptq P Rm, and
eptq :" rptq ´ yptq. The objective of the controller is to
ensure that
tÑ8rptq ´ yptq ă ε,
lim
(1)
for a given (small) ε P R`.
´Bg
¯´1`
r ´ yptq
To illustrate the basic idea underscoring the controller, let
us first assume that (i) The plant subsystem is a memoryless
nonlinearity of the form
yptq " gpuptqq,
(2)
for a continuously-differentiable function g : Rm Ñ Rm,
and (ii) the target reference trptq : t P r0,8qu is a constant,
rptq " r for a given r P Rm.1 These assumptions will be
relaxed later. In this case, the tracking controller is defined
by the following equation,
9uptq "
puptqq
,
Bu
(3)
assuming that the Jacobian matrix BgBupuptqq is nonsingular at
every point uptq computed by the controller via (3). Observe
that (3) defines the Newton-Raphson flow for solving the
algebraic equation r ´ gpuq " 0, and hence (see [7], [8])
rptq ´
the controller converges in the sense that limtÑ8
yptq
" 0. Next, suppose that the reference target is time-
dependent, while keeping the assumption that the plant is
a memoryless nonlinearity. Suppose that trptqu is bounded,
continuous, piecewise-continuously differentiable, and t 9rptqu
is bounded. Define
`
η :" lim sup
tÑ8
9rptq,
(4)
then (see [8]), with the controller defined by (3), we have
that
tÑ8rptq ´ yptq ď η.
lim
(5)
1Henceforth we will use the notation txptqu For a generic signal
txptq, t P r0,8qu, to distinguish it from its value at a particular point
t, xptq.
Note that Eqs. (2) and (3) together define the closed-loop
system. Observe that the plant-equation (2) is an algebraic
equation while the controller equation (3) is a differential
equation, hence the closed-loop system represents a dynam-
ical system. Its stability, in the sense that typtqu is bounded
whenever trptqu and t 9rptqu are bounded, is guaranteed by
(5) as long as the control trajectory tuptqu does not pass
through a point uptq where the Jacobian matrix BgBupuptqq is
singular.
Finally, let us dispense with the assumption that the plant
subsystem is a memoryless nonlinearity. Instead, suppose
that it is a dynamical system modeled by the following two
equations,
`
x ` 1
9xptq " fpxptq, uptqq, xp0q :" x0
yptq " hpxptqq,
(6)
(7)
where the state variable xptq is in Rn, and the functions
f : Rn Rm Ñ Rn and h : Rn Ñ Rm satisfy the following
assumption.
Assumption 1. (i). The function f : Rn Rm Ñ Rn is
continuously differentiable, and for every compact set Γ Ă
Rm there exists K P R` such that, for every x P Rn and
u P Γ, fpx, uq ď K
. (ii). The function h :
Rn Ñ Rm is continuously differentiable.
l
This assumption ensures that whenever the control signal
tuptqu is bounded and continuous, the state equation (6) has
a unique solution xptq on the interval t P r0,8q.
In this setting, yptq is no longer a function of uptq, but
rather of xptq which is a function of tupτq : τ ă tu.
Therefore (2) is no longer valid, and hence the controller
cannot be defined by (3). To get around this conundrum
we pull the feedback not from the output yptq but from a
predicted value thereof. Specifically, fix the look-ahead time
T P R`, and suppose that at time t the system computes
a prediction of ypt ` Tq, denoted by ypt ` Tq. Suppose
also that ypt ` Tq is a function of pxptq, uptqq, hence can
be written as ypt ` Tq " gpxptq, uptqq, where the function
g : Rn Rm Ñ Rm is continuously differentiable.
Now the feedback law is defined by the following equa-
Bu
. (8)
pxptq, uptqq
rpt ` Tq ´ gpxptq, uptqq
tion,
9uptq "
The state equation (6) and control equation (8) together
define the closed-loop system. This system can be viewed
as an pn ` mq-dimensional dynamical system with the state
variable pxptqT, uptqTqT P Rn`m and input rptq P Rm. We
are concerned with a variant of Bounded-Input-Bounded-
State (BIBS) stability whereby if trptqu and t 9rptqu are
bounded, txptqu is bounded as well. Such stability no-longer
can be taken for granted as in the case where the plant is a
memoryless nonlinearity.
We remark that a larger T means larger prediction errors,
and these translate into larger asymptotic tracking errors. On
the other hand, an analysis of various second-order systems
in [7] reveals that they all were unstable if T is too small, and
¯´1`
´Bg
r(t) e(t) � Controller u(t) Plant y(t) � � +.-stable if T is large enough. It can be seen that, a requirement
for a restricted prediction error can stand in contradiction
with the stability requirement. This issue was resolved by
speeding up the controller in the following manner. Consider
α ą 1, and modify (8) by multiplying its right hand side by
α, resulting in the following control equation:
9uptq " α
rpt ` Tq ´ gpxptq, uptqq
¯´1`
pxptq, uptqq
´Bg
.
Bu
It was verified in [7] -- [9], that regardless of the value of
T P R`, a large-enough α stabilizes the closed-loop system.2
Furthermore, if the closed-loop system is stable then the
following bound holds,
lim sup
tÑ8
rptq ´ yptq ď η
α
,
(9)
where η is defined by (4). Thus, a large gain α can stabilize
the closed-loop system and reduce the asymptotic tracking
error.
B. Problem Formulation
In an attempt to broaden the application scope of the
control algorithm, underactuated systems such as the fixed-
wing aircraft are explored, which are widely used in the
domain of aerospace engineering. The behavior of a fixed
wing aircraft at constant elevation can be approximated by
a planar Dubins vehicle with 3 states [23] @t ě 0,
1ptq " V p cos θpptq,
9zp
2ptq " V p sin θpptq,
9zp
9θpptq " uptq,
it
„
«
ff
1ptq, zp
where pzp
2ptqqT denotes the planar position of the
vehicle, θpptq its heading and uptq the angular acceleration,
constrained as, (cid:107)u(cid:107) ď umax. The input saturation enforces
a minimum turning radius equal to V0{umax. For testing
the efficacy of the controller for the underactuated system,
henceforth referred to as the pursuer,
is tasked with
tracking an evading vehicle, modeled as a single integrator,
with dynamics as follows:
1ptq
ze
2ptq
ze
d
dt
2ptqqJ denote the planar position of the
1ptq, ze
where pze
evader, and V e is its speed. We consider two cases; one
where the evader is agnostic to the pursuer and follows
a known trajectory and the other where the the evader is
adversarial
in nature and its trajectory is not known to
the pursuer. The next section will provide two solutions
for the problem of estimating the evader's trajectory based,
respectively, on a model-based approach and a learning-
based approach.
V e cos θe
V e sin θe
"
,
2This statement seems to have a broad scope, and does not require the
plant to be a minimum-phase system.
III. PREDICTIVE FRAMEWORK
1ptq, zp
A. Model-Based Pursuit Evasion
The considered system is underactuated because the pur-
2ptqqJ, is two-dimensional while it is
suer's position, pzp
controlled by an one-dimensional variable, uptq. This raises
a problem since the application of the proposed tracking
technique requires the control variable and system's output
to have the same dimension. To get around this difficulty,
we define a suitable function F : R2 Ñ R` and set
gpxptq, uptqq :"
Fpyppτq ´ yepτqqdτ where yppτq and
yepτq are the predicted position of the pursuer and the evader
at time τ; we apply the Newton-Raphson flow to the equation
gpxptq, uptqq " 0. The modified controller becomes
ş
´Bg
¯´1`
t`T
t
gpxptq, uptqq
, t ě 0.
9uptq " ´α
pxptq, uptqq
Bu
(10)
the modified algorithm works
Since gpx, uq is a scalar,
similar to the base case.
Assume general nonlinear system dynamics as in (6) with
output described in (7). The predicted state trajectory is
computed by holding the input to a constant value over
the prediction horizon, given by the following differential
equation:
pτq ` Bf
Bu
pτq " Bf
Bξ
9ξpτq " fpξpτq, uptqq, τ P rt, t ` Ts,
pξpτq, uptqqBξ
Bu
(11)
with the initial condition ξptq " xptq as shown in [7]. The
predicted output at τ is yppτq " hpξpτqq. Furthermore, by
taking the partial derivative of (11) with respect to u(t), we
obtain
9Bξ
Bu
(12)
with the initial condition BξBuptq " 0. The above is a
differential equation in BξBupτq; τ P rt, t ` Ts and (11) and
(12) can be solved numerically. Finally, the values of gpx, uq
and BgBupx, uq can be substituted in (10) to get the control law.
In the next section, results are presented for an agnostic
as well as an adversarial pursuer- evader system. However,
as mentioned above, in the adversarial problem formulation,
the trajectory of the evader is not known in advance, which
can be overcome in two ways.
pξpτq, uptqq,
In the first approach, the pursuer(s) use game theory to
predict the approximate direction of evasion. As mentioned
in [24], in the case of single pursuer, the evader's optimal
strategy is to move along the line joining the evader and
pursuer's position, if the pursuer is far enough. When the
distance between the pursuer and the evader reduces to the
turning radius of the pursuer, the evader switches strategies
and enters into the non-holonomic constraint region of the
pursuer. This can be represented as follows:
θE "
arctan
arctan
2ptq´zp
ze
1ptq´zp
ze
2ptq
1ptq
2ptq´zp
ze
1ptq´zp
ze
2ptq
1ptq
,
d ą RP ,
π{2, d ď RP .
(13)
$''''&''''%
Here θE is the expected evasion angle of the evader and d
is the distance between the pursuer and evader,
If there are multiple pursuers, it is assumed that the evader
follows the same strategy by considering only the closest
pursuer. It is notable that this will not provide the pursuers a
correct prediction of the evader's motion as they do not know
about the goal seeking behavior mentioned above. However,
it gives a good enough approximation of the pursuer's motion
that the algorithm can be used for tracking.
The second approach involves learning the evader's be-
havior over time using NN. The pursuers take their positions
and the position of the evader as input and the NN gives the
estimated evasion direction as the output after training.
To showcase the efficacy of our method, we consider a
pursuit evasion problem, involving multiple pursuing agents.
Such problems are typically formulated as zero-sum dif-
ferential games [24]. Due to the difficulty of solving the
underlying Hamilton-Jacobi-Isaacs (HJI) equations [25] of
this problem, we shall utilize the method described in II-A
to approximate the desired behavior. Furthermore, we show
that augmenting the controller with learning structures in
order to tackle the pursuit evasion problem without explicit
knowledge of the evader's behavior is straightforward.
In order to formulate the pursuit evasion problem, we
define a global state space system consisting of the dynamics
of the pursuers and the evader. For ease of exposition, the
analysis will focus on the 2-pursuer, 1-evader problem, since
extending the results to multiple pursuers is straightforward.
The global state dynamics become,
» -- -- -- -- -- -- -- -- -- -- -- -- --
"
» -- -- -- -- -- -- -- -- -- -- -- -- --
fiffiffiffiffiffiffiffiffiffiffiffiffifl
1 ptq
p1
z
2 ptq
p1
z
θp1ptq
1 ptq
p2
z
2 ptq
p2
z
θp2ptq
1ptq
ze
2ptq
ze
d
dt
fiffiffiffiffiffiffiffiffiffiffiffiffifl ,
V p1 cos θp1
V p1 sin θp1
up
1
V p1 cos θp2
V p2 sin θp2
up
2
V e cos θe
V e sin θe
(14)
where the subscripts indicate the autonomous agent. For
compactness, we denote the global state vector as xptq P R8,
the pursuers' control vector uptq P R2, and the nonlinear
mapping described by the right-hand side of (14). Thus,
given the initial states of the agents x0 P R8, the evolu-
tion of the pursuit evasion game is described by 9xptq "
fpxptq, u, ueq, xp0q " x0, t ě 0.
Subsequently, this zero-sum game can be described as a
e´γtLpxqdt
β1pd2
e´γt
minimax optimization problem through the cost index,
Jpx, u, ueq "
:"
a
1 ´ zeq2 ` pzi
pzi
dt,
(15)
where di "
2q2, i P tp1, p2u is the
distance between the i-th pursuer and the evader, β1, β2 P
d2
1d2
2
1 ` d2
d2
2q ` β2
1 ` d2
2 ´ ze
0
2
ż 8
ż 8
0
R` are user defined contants, and γ P R` is a discount
factor. The first term ensures that the pursuers remain close
to the evader, while the second term encourages cooperation
between the agents. The cost decreases exponentially to
ensure that the integral has a finite value in the absence of
equilibrium points.
Let V pxq : R8 Ñ R be a smooth function quantifying the
value of the game when specific policies are followed starting
from state xptq. Then, we can define the corresponding
`
Hamiltonian of the game as,
H
The optimal feedback policies u‹pxq, u‹
(16)
epxq of this game
" Lpxq ` BV
Bx
fpx, u, ueq ` γV.
BV
Bx
x, u, ue,
are known to constitute a saddle point [25] such that,
T
u
u‹pxq " arg min
epxq " arg max
u‹
`
ue
x, u‹, u‹
e,
H
Hpx, u, ueq,
Hpx, u, ueq.
‹
" 0.
BV
Bx
(17)
(18)
(19)
Under the optimal policies (17),(18), the HJI equation is
satisfied,
Evaluating the optimal pursuit policies, yields the singular
optimal solutions described by, Vθp1u1 " Vθp2 u2 " 0, where
Vxi is the partial derivative of the value function with respect
to the state xi, calculated by solving (19). To obviate the
need for bang-bang control, as is derived by (17) and (18)
we shall employ the predictive tracking technique described
in Section II-A to derive approximate, easy to implement,
feedback controllers for the pursuing autonomous agents.
Furthermore, by augmenting the predictive controller with
learning mechanisms, the approximate controllers will have
epxq, the evader's policy.
no need for explicit knowledge of u‹
The following theorem presents bounds on the optimality
loss induced by the use of the look-ahead controller approx-
imation.
Theorem 1. Let the pursuit evasion game evolve according to
the dynamics given by (14), where the evader is optimal with
respect to (15) and the pursuers utilize the learning-based
predictive tracking strategy given (10). Then, the tracking
error of the pursuers and the optimality loss due to the use
of the predictive controller are bounded if D ¯∆ P R`, such
that, ∆pxptq, uptq, uptqeq ď ¯∆, @t ě 0, where ∆px, u, ueq "
1 ´
Vxe vepcos ue ´ cos u‹
2 ´ u2q, with Vξ denoting the partial derivative
u1q ` Vθp2pu‹
of the game value with respect to the state component ξptq.
Proof: Consider the Hamiltonian function when the ap-
proximate controller, denoted uptq and the NN-based pre-
diction of the evader's policy, ueptq are used,
eq ` Vye vepsin ue ´ sin u‹
eq ` Vθp1pu‹
Hpx, u, ueq " Lpxq `
fpx, u, ueq ` γV.
(20)
T
`BV
Bx
Taking into account the nonlinear dynamics of the system
(14), one can rewrite (20) in terms of the optimal Hamil-
tonian as,Hpx, u, ueq " Hpx, u‹, u‹
eq ` ∆pu, ueq, where
Hpx, u‹, u‹
eq " 0 is the HJI equation that is obtained after
T
`BVBx
substituting (17) and (18) in (16). Now, take the orbital
derivative of the value function along the trajectories using
fpx, u, ueq.
the approximate controllers as,
Substituting (20) yields 9V " ´Lpxq ´ γV ` ∆px, u, ueq.
Thus, since Lpxq ą 0, @x P R8zt0u,
9V "
9V ă ´γV ` ∆px, u, ueq ñ 9V ă ´γV ` ¯∆.
Hence for V ě ¯∆{γ, we have 9V ď 0. Thus tx P
R8 V pxq ď ¯∆{γu is a forward invariant set, which implies
that the tracking error and the optimality loss over any finite
horizon is bounded.
Remark 1. Note that we do not use optimal control or MPC
to solve the pursuit evasion problem. Instead, the controller
is governed by (10), which is simple to implement and has
l
low computational complexity.
B. Deep Learning-Based Pursuit Evasion
A deep NN, consisting of L ą 2 hidden layers, describes
a nonlinear mapping between its input space Rn and output
space Rp. Each layer receives the output of the previous
layer as an input and, subsequently, feeds its own output to
the next layer. Each layer's output consists of the weighted
sum of its input alongside a bias term, filtered through an
application-specific activation function [11].
Specifically, let Rnl be the input space of a specific layer,
the corresponding output space. Then the layer's
and Rpl
output is,
X1
. . . Xnl
where X1 "
gathered from training data or from the output of previous
layers, vij P R is a collection of nl weights for each layer,
vi0 P R the bias term and σ : Rnl Ñ R is the layer's
activation function. We note that it is typical to write the
output of layer compactly, with slight abuse of notation, as,
"
(21)
P Rpnl`1qpl
Y1
l Ñ Rnl is the activation function of the previous
Y " σpW Tσ1pXqq,
"
P Rpl, W "
. . . Ypl
where Y "
and σ1 : Rn1
layer, taking as input the vector X "
ıT
X1T
‰
"
‰
vij
1
.
It is known [26], that two-layer NNs possess the universal
approximation property, according to which, any smooth
function can be approximated arbitrarily close by an NN
of two or more layers. Let S Ă Rn be a simply connected
compact set and consider the nonlinear function κ : S Ñ Rp.
Given any b ě 0, there exists a NN such structure such that,
W Tσ1pxq
where }} ď b. We note that,
function of the output layer σpq is taken to be linear.
` , @x P S,
typically,
κpxq " σ
the activation
`
Evaluating the weight matrix W in a network is the main
concern of the area of machine learning. In this work, we em-
ploy the gradient descent based backpropagation algorithm.
Given a collection of Nd training data, stored in the tuple
nlÿ
j"1
Yipxq " σ
"
vijXj ` vi0
‰T P Rnl is the input vector,
, i " 1, 2, . . . , pl,
txk, κkuk, where xk P Rn, κk P Rp, @k " 1, . . . , Nd, we
denote the output errors as rk " κpxkq´κk. Then, the update
equation for the weights at each optimization iteration tk is
given by,
BprT
krkq
Bwij
1 , δzpi
1 , δzp1
, @tk P N,
wijptk ` 1q " wijptkq ´ η
1 , δzpN
2 , . . . , δzpN
this presupposes that
2 q, where, pδzpi
(22)
where η P R` denotes the learning rate. We note that the
update index tk need not correspond to the sample index
k, since different update schedules leverage the gathered
data in different ways [26]. It can be seen that in order
for the proposed method to compute the pursuers' control
inputs, an accurate prediction of the future state of the evader
is required. However,
the pursuers
themselves have access to the evader's future decisions; an
assumption that is, in most cases, invalid. Thus, we augment
the pursuers' controllers with a NN structure, that learns to
predict the actions of the evader, based on past recorded data.
Initially, we assume that the evader's strategy is com-
puted by a feedback algorithm, given her relative posi-
tion to the pursuers. This way, the unknown function we
wish to approximate is f : R2N Ñ R2, with, ue "
fpδzp1
2 q denote
the distance of pursuer i to the evader in the X and Y axes,
respectively. In order to train the network, we let the pursuers
gather data regarding the fleet's position with respect to
the evader, as well as her behavior over a predefined time
window Tl ą 0.
Remark 2. Increasing the time window Tl will allow the
pursuers to gather more training data for the predictive
network. However,
this will not only increase the com-
putational complexity of the learning procedure, but will
make the pursuers more inert
to sudden changes in the
evader's behavior. Simulation results corroborate our choice
`
l
of training parameters.
‰
Subsequently, we denote by uepxq, the current prediction
W T σ1pχq
function for the evader's strategy, i.e., uepxq " σ
,
where χ "
P R2N , W
denotes the current weight estimate of the NNs output
layer, and σ1pq is the current estimate of the hidden layers,
parametrized by appropriate hidden weights.
Remark 3. While the learning algorithm for the evader's
behavior operates throughout the duration of the pursuit, thus
making the approximation weights time-varying, we suppress
their explicit dependence on time since the process is open-
loop, in the sense that the system is learning in batches,
l
rather that in a continuous fashion.
δxN δyN
"
δy1
δz1
. . .
IV. SIMULATION RESULTS
This section presents results for the problems briefly
described in the previous section. First, the agnostic evader
case is considered followed by the adversarial case. For
the second case, single and multiple pursuer systems are
considered separately. The controller is implemented on a
Dubins vehicle. For the purpose of tracking, we define the
system output to be yi "
‰T, i P tp1, p2, eu.
"
zi
1
zi
2
A. Single Pursuer - Agnostic Target
In this subsection, the controller is tested on a Dubins
vehicle with the task of pursuing an agnostic target moving
along a known trajectory. Since the vehicle has a constant
speed and an input saturation is enforced, it has an inherent
minimum turning radius. For this simulation, we set V p "
2 rad/s and then
2 m/s and the input saturation is first set to π
to 2π rad/s. The evader moves along two semicircular curves
with a constant speed which is less than V p.
As a consequence, when the pursuer catches up to the
evader, it overshoots and has to go around a full circle to
again start tracking. Naturally, lower turning radius translates
to better tracking as the vehicle can make "tighter" turns.
This can be seen when comparing the trajectories of the
vehicle in Figure 2 with Figure 4. For the same trajectory
of the evader, the tracking performance is far better in the
second case. Once the pursuer catches up to the target, the
maximum tracking error in the first case is approximately
4 meters and only 1 meter in the second case, shown in
Figures 3 and 5. This is consistent with the fact that the
ratio of the turning radii is 4 : 1.
B. Single Pursuer - Adversarial Evader
The pursuer is again modelled as a Dubins vehicle, while
the evader is modelled as a single integrator with a maximum
velocity less than the speed of the pursuer. Hence, while the
pursuer is faster, the evader is more agile, and can instantly
change its direction of motion. In this and subsequent cases,
the evader is considered adversarial in nature and uses game
theory to choose evasion direction.
Let ypptq and yeptq be the position vector of the pursuer
and evader respectively at time t. First, the pursuer makes
an estimate of the optimal evasion direction based on the
relative position of the evader and itself at time t using
(13). Assuming this direction of evasion to be fixed over
the prediction window from t to t ` T gives the predicted
position of the evader at all time instances in this interval,
Algorithm 1 Deep Learning-Based and Predictive Pursuit
Evasion
Inputs: XPiptq, @it1, . . . , Nu, XEptq and evasion strategy
approximation weights W .
Output: uPiptq, @it1, . . . , Nu.
1: Compute pδxi, δyiq, i P t1, . . . , Nu.
2: Predict evader's future behavior via (21).
3: Train NN as in (22).
4: Predict evader's future state as XEpt ` Tq " XEptq `
5: Propagate pursuer dynamics to get XPpt ` Tq.
6: Computed current Newton flow parameters using (23).
7: Computed control dynamics 9uPiptq from (3).
8: Propagate actual system evolution using (14).
9: Append current distances pδxi, δyiq to a stack of previ-
rVE cos θE VE sin θEsTT .
ous observations.
10: Update evader prediction network through (22).
Fig. 2. Agnostic evader with a large turning radius.
Fig. 3. Evolution of an agnostic evader tracking error with a large turning
radius.
Fig. 4. Agnostic evader with a small turning radius.
Fig. 5. Evolution of the agnostic evader tracking error with a small turning
radius.
denoted as yepτq, τ P rt, t ` Ts. Next, the pursuer estimates
its own predicted position if its input is kept constant, called
yppτq, τ P rt, t ` Ts. Finally, gptq is set as yept ` Tq ´
yppt ` Tq2 and the value of BgBupxptq, uptqq (xptq being the
ensemble vector of the states of the pursuer and the evader)
is used to compute the input differential equation (10).
Figures 6 shows the trajectories of the pursuer and the
evader, with the goal for the evader set to to point p150, 60q.
It can be observed that the evader moves towards the goal
while the pursuer is far away and starts evasive maneuvers
when it gets close to it, by entering its non-holonomic region.
Figure 7 displays the tracking error, defined as the distance
between the pursuer and the evader, which is almost periodic.
This is because the evader's maneuver forcing the pursuer to
circle back. The peak tracking error after the pursuer catches
up is slightly more than twice the turning radius, as expected.
of the tracking error of the model-based algorithm vis-`a-
vis the NN-based control. Figure 12 showcases the quality
of the performance of the proposed algorithm based on the
game theoretic cost metric. From these figures, it can be seen
that the NN structure offers fast predictive capabilities to the
controller; hence the overall performance is comparable to
the model based control.
Fig. 6.
Trajectories for a single pursuer-evader system.
Fig. 7. Evolution of the tracking error for a single pursuer-evader system.
C. Multiple Pursuers - Adversarial Evader
While the previous section had only one pursuer, this
simulation considers the case of two pursuers and a single
evader. Having multiple pursuers means there must be coop-
eration between them in order to optimally utilize resources.
Thus, a pursuer can no longer make decisions solely based
on the position of the evader relative to itself. The positions
of the rest of the pursuers must also be factored in. Thus
we redefine the expression for gpx, uq to include these
parameters as shown below for the case of two pursuers.
Let dp be the distance between the two pursuers, and let
*
2pτq
1pτqd2
2pτqq ` β2
gpxptq, uptqq :"
d2
2pτq
1pτq ` d2
d2
dτ, @t ě 0.
(23)
"
β1pd2
` β3e
1pτq ` d2
´γdppτq
ż
t`T
t
The first term ensures that the pursuers remain close to
the evader, while the second term encourages cooperation
between agents. The last term is added to repel pursuers
apart if they come close to each other, as having multiple
pursuers in close vicinity of each other is sub-optimal.
Figure 8 shows the trajectories of the pursuers and the
evader when the goal for the evader is set to the point
p15,´1q. In this case, the pursuers close in on the evader
and trap it away from its goal due to their cooperative
behavior. The evader is forced to continuously perform
evasive maneuvers as the other pursuer closes in when the
first has to make a turn. This can be seen more clearly in
the tracking error plot given in Figure 9. After catching up
with the evader, it can be seen that when one pursuer is at its
maximum distance, the other is at its minimum. The results
achieved show good coordination between the pursuers and
low tracking error and are qualitatively comparable to [22].
Lastly, we present the results under the learning-based
prediction. In Figure 11, we present a comparative result
Fig. 8.
Trajectories for the two pursuer-single evader system.
Fig. 9. Evolution of the tracking error for the two pursuer-single evader
system.
V. CONCLUSION AND FUTURE WORK
This work extends the framework of prediction-based
nonlinear tracking in the context of pursuit evasion games.
We present results for vehicle pursuit of agnostic targets,
modeled as moving along known trajectories, as well as
adversarial target tracking, where the evader evolves accord-
ing to game-theoretic principles. Furthermore, to obviate the
need for explicit knowledge of the evader's strategy, we em-
ploy learning algorithms alongside the predictive controller.
The overall algorithm is shown to produce comparable results
to those in the literature, while it precludes the need for
solving an optimal control problem.
Future work will focus on developing robustness guaran-
tees will allow for more realistic scenarios, where noise and
external disturbances are taken into consideration.
REFERENCES
[1] S. Devasia, D. Chen, and B. Paden, "Nonlinear inversion-based output
tracking," IEEE Transactions on Automatic Control, vol. 41, no. 7, pp.
930 -- 942, 1996.
[2] P. Martin, S. Devasia, and B. Paden, "A different look at output
tracking: control of a vtol aircraft," Automatica, vol. 32, no. 1, pp.
101 -- 107, 1996.
[3] A. Isidori and C. Byrnes, "Output regulation of nonlinear systems,"
IEEE Trans. Automat. Control, vol. 35, pp. 131 -- 140, 1990.
[4] H. Khalil, "On the design of robust servomechanisms for minimum
phase nonlinear systems," Proc. 37th IEEE Conf. Decision and Con-
trol, Tampa, FL, pp. 3075 -- 3080, 1998.
and Design of Hybrid Systems (2018 ADHS)l, Oxford, the UK, July
11-13, 2018.
[9] S. Shivam, I. Buckley, Y. Wardi, C. Seatzu, and M. Egerstedt, "Track-
ing control by the newton-raphson flow: Applications to autonomous
vehicles," in European Control Conference, Naples, Italy, June 25-28,
2018.
[10] G. Saridis, "Intelligent robotic control," IEEE Transactions on Auto-
matic Control, vol. 28, no. 5, pp. 547 -- 557, 1983.
[11] S. S. Haykin, Neural networks and learning machines. Pearson Upper
Saddle River, 2009, vol. 3.
[12] D. Vrabie, K. G. Vamvoudakis, and F. L. Lewis, Optimal adaptive
control and differential games by reinforcement learning principles.
IET, 2013, vol. 2.
[13] K. S. Narendra and K. Parthasarathy, "Identification and control of
dynamical systems using neural networks," IEEE Transactions on
neural networks, vol. 1, no. 1, pp. 4 -- 27, 1990.
[14] K. G. Vamvoudakis and F. L. Lewis, "Online actor -- critic algorithm to
solve the continuous-time infinite horizon optimal control problem,"
Automatica, vol. 46, no. 5, pp. 878 -- 888, 2010.
[15] C. M. Bishop et al., Neural networks for pattern recognition. Oxford
university press, 1995.
[16] S. Bhasin, R. Kamalapurkar, M. Johnson, K. G. Vamvoudakis, F. L.
Lewis, and W. E. Dixon, "A novel actor -- critic -- identifier architecture
for approximate optimal control of uncertain nonlinear systems,"
Automatica, vol. 49, no. 1, pp. 82 -- 92, 2013.
[17] K. G. Vamvoudakis, "Q-learning for continuous-time linear systems:
A model-free infinite horizon optimal control approach," Systems &
Control Letters, vol. 100, pp. 14 -- 20, 2017.
[18] B. G. Weber and M. Mateas, "A data mining approach to strategy
prediction," in 2009 IEEE Symposium on Computational Intelligence
and Games.
IEEE, 2009, pp. 140 -- 147.
[19] T. Alpcan and T. Bas¸ar, Network security: A decision and game-
theoretic approach. Cambridge University Press, 2010.
[20] H. J. Pesch, I. Gabler, S. Miesbach, and M. H. Breitner, "Synthesis
of optimal strategies for differential games by neural networks," in
New Trends in Dynamic Games and Applications.
Springer, 1995,
pp. 111 -- 141.
[21] A. Kanellopoulos, K. Vamvoudakis, and Y. Wardi, "Predictive learning
via lookahead simulation," in AIAA Scitech 2019 Forum, San Diego,
California, January 7-11, 2019.
[22] S. A. Quintero, D. A. Copp, and J. P. Hespanha, "Robust uav coordina-
tion for target tracking using output-feedback model predictive control
with moving horizon estimation," in American Control Conference,
Chicago, Illinois, July 1-3, 2015.
[23] S. M. LaValle, Planning algorithms.
Cambridge university press,
2006.
[24] R. Isaacs, Differential games: a mathematical theory with applications
to warfare and pursuit, control and optimization. Courier Corpora-
tion, 1999.
[25] T. Basar and G. J. Olsder, Dynamic noncooperative game theory.
Siam, 1999, vol. 23.
[26] F. Lewis, S. Jagannathan, and A. Yesildirak, Neural network control
of robot manipulators and non-linear systems. CRC Press, 1998.
Fig. 10. Trajectories for two pursuers-single evader system with learning.
Fig. 11.
learning.
Evolution of the tracking error for the systems with and without
Fig. 12. Total cost for the system with and without learning.
[5] F. Allgower and A. Zheng, Nonlinear model predictive control.
Birkhauser, 2012, vol. 26.
[6] J. Rawlings, D. Mayne, and M. Diehl, Model Predictive Control:
Nob Hill, LLC,
Theory, Computation, and Design, 2nd Edition.
2017.
[7] Y. Wardi, C. Seatzu, M. Egerstedt, and I. Buckley, "Performance reg-
ulation and tracking via lookahead simulation: Preliminary results and
validation," in 56th IEEE Conf. on Decision and Control, Melbourne,
Australia, December 12-15, 2017.
[8] Y. Wardi, C. Seatzu, and M. Egerstedt, "Tracking control via variable-
gain integrator and lookahead simulation: Application to leader-
follower multiagent networks," in Sixth IFAC Conference on Analysis
|
1905.04083 | 1 | 1905 | 2019-05-10T11:48:27 | ES-CTC: A Deep Neuroevolution Model for Cooperative Intelligent Freeway Traffic Control | [
"cs.MA"
] | Cooperative intelligent freeway traffic control is an important application in intelligent transportation systems, which is expected to improve the mobility of freeway networks. In this paper, we propose a deep neuroevolution model, called ES-CTC, to achieve a cooperative control scheme of ramp metering, differential variable speed limits and lane change control agents for improving freeway traffic. In this model, the graph convolutional networks are used to learn more meaningful spatial pattern from traffic sensors, a knowledge sharing layer is designed for communication between different agents. The proposed neural networks structure allows different agents share knowledge with each other and execute action asynchronously. In order to address the delayed reward and action asynchronism issues, the evolutionary strategy is utilized to train the agents under stochastic traffic demands. The experimental results on a simulated freeway section indicate that ES-CTC is a viable approach and outperforms several existing methods | cs.MA | cs |
ES-CTC: A Deep Neuroevolution Model for Cooperative Intelligent Freeway
Traffic Control
1School of Mechanical Engineering, Beijing Institute of Tachnology, China
Yuankai Wu1 , Huachun Tan2∗ , Zhuxi Jiang3 and Bin Ran4
2∗School of Transportation Engineering, Southeast University, China
3Momenta, China
[email protected], 2∗[email protected], [email protected], [email protected],
4College of Engineering, University of Wisconsin-Madison, USA
Abstract
Cooperative intelligent freeway traffic control is an
important application in intelligent transportation
systems, which is expected to improve the mobil-
ity of freeway networks. In this paper, we propose
a deep neuroevolution model, called ES-CTC, to
achieve a cooperative control scheme of ramp me-
tering, differential variable speed limits and lane
change control agents for improving freeway traf-
fic. In this model, the graph convolutional networks
are used to learn more meaningful spatial pattern
from traffic sensors, a knowledge sharing layer
is designed for communication between different
agents. The proposed neural networks structure al-
lows different agents share knowledge with each
other and execute action asynchronously. In order
to address the delayed reward and action asynchro-
nism issues, the evolutionary strategy is utilized to
train the agents under stochastic traffic demands.
The experimental results on a simulated freeway
section indicate that ES-CTC is a viable approach
and outperforms several existing methods.
1 Introduction
The ongoing drastic expansion of car ownership and travel
demand have led to increasing freeway congestion, with ad-
verse effects on the economy. To relieve freeway congestion,
numerous freeway traffic control approaches, e.g. dynamic
routing, variable speed limit (VSL), ramp metering (RM),
lane change control (LCC) etc., are studied. From a system-
atic viewpoint, using one management approach alone cannot
fully optimize the freeway traffic in practice. The mainlane
flow, on-ramp flow, routing behaviors and lane changing be-
haviors need to be regulated in a coordinated manner in order
to improve the freeway condition. This is the motivation for
investigating the coordination of different traffic control ap-
proaches.
There is a large volume of published studies describing the
cooperative traffic control: Hedgy et.al [2005] developed a
predictive coordinated control approach for the coordination
of VSL and RM. Carlson et.al [2010] formulated coordinated
VSL and RM control as an optimal control problem using
second-order traffic flow model. Recently, the coordination
of RM, VSL and LCC under connected autonomous vehicle
environment was studied [Roncoli et al., 2015]. Two limita-
tions worth noting in respect of the studies mentioned above
are: 1) The control model are highly dependent on the in-
tegrated traffic flow models, which are inevitably inconsis-
tent with the real-world traffic breakdown. 2) The success
of proactive approaches are based on robustness and reliabil-
ity of the short-term traffic prediction model. The accurate
and reliable short-term traffic prediction is not an easy task
because the evolution of traffic state is related to many fac-
tors [Wu et al., 2018b].
Recently, the advent of deep reinforcement learning (DRL)
has lead to potential applications of reinforcement learning
(RL) techniques to tackle challenging control problems in in-
telligent transportation systems. DRL has given promising
results in RM [Belletti et al., 2018], traffic light control [Wei
et al., 2018], differential VSL control [Wu et al., 2018c], fleet
management [Lin et al., 2018] and hybrid electric vehicle en-
ergy management [Wu et al., 2018a]. The utilization of deep
learning algorithms within RL allows a well-trained traffic
control agent achieves a proactive control scheme, and opti-
mizes the transportation benefits. The success of DRL on one
specific traffic control approach hold great promise for ap-
plication of DRL on coordination of different traffic control
approaches.
However, the coordination of different traffic control ap-
proaches within one DRL framework is not an easy task. The
first challenge is due to the difference between the control cy-
cle of different agents. In many situations, the agents change
actions asynchronously, a somewhat different situation from
that familiar from popular multi-agent DRL frameworks [Fo-
erster et al., 2016; Lowe et al., 2017]. For example, the agents
controlling on-ramp flow should decide whether to change
traffic light phase every few seconds. While the control cy-
cle for VSL agents are always above 1 minute because a fre-
quently change speed limit will unstablilize the traffic flow.
The second challenge stems from the difficulties in defin-
ing a representative reward signal for different traffic control
agents. The aim of traffic management would be to reduce
travel time and increase traffic flow. However, the average
travel time and total flow cannot be computed until all the
vehicles have completed their routes, which causes the issue
of delayed rewards [Van der Pol and Oliehoek, 2016]. The
delayed rewards would cause further credit assignment prob-
lems in multi-agent DRL [Foerster et al., 2017].
The third challenge lies in the modeling of the traffic state.
Traditional, the traffic state collected from sensors are mod-
eled as images and/or vectors, and is directly taken as an input
for a convolutional neural networks (CNN) [Wei et al., 2018]
or fully connected neural networks (FC) [Li et al., 2016].
However, sensors on the road network contain complex spa-
tial correlations and exhibits graph structure. There have been
numerous studies reported that the graph convolutional net-
work (GCN) is more suitable for modeling spatial correlation
of traffic sensors than CNN and FCN in traffic prediction [Li
et al., 2018; Lv et al., 2018].
To tackle those challenges, we propose a deep neuroevolu-
tion [Salimans et al., 2017] based multi-agent framework for
cooperative traffic control (ES-CTC). The main contributions
of this paper can be summarized as follows:
1. We find that the deep neuroevolution approach is a per-
fect match for cooperative traffic control. In deep neu-
roevolution approach like evolutional strategies (ES), the
only feedback signal for different agents is the final re-
turn of an episode. As a result, the problem of delayed
reward is readily solved with ES.
2. We proposed a novel structure named knowledge shar-
ing graph convolutional nets (KS-GCN) to generate con-
trol actions from state collected from traffic sensors.
GCN is used as the building block for the proposed
structure, which can fully capture the spatial depen-
dency between different sensors. The structure allows
communication and knowledge-sharing between differ-
ent agents. Based on the knowledge sharing layer, the
neural agent can coordinate with other agents by execut-
ing action in its own control circle.
3. The travel demands for training the neural networks
are modeled as a stochastic distribution, leading to the
changes in system dynamics of the environment. The ex-
periments show that the proposed approach works well
under stochastic travel demands.
2 Problem Statement
The freeway section considered in this paper is given in Fig-
ure 1. The freeway section in Figure 1 is composed by mul-
tiple lanes and it presents an on-ramp and an off-ramp. As it
may be seen in the figure, the interference between vehicles
is appearing in the merging area between inflow of on-ramp
and outflow of mainstream. The conflicts cause further speed
reductions in the merging area, contributing to the creation of
a generalised bottleneck.
Following the statement in [Roncoli et al., 2015], we con-
sider that the freeway flow with a high ratio of connected au-
tonomous vehicle (CAV). Therefore the differential VSL and
LCC can be successfully implemented. More specifically, the
following control agents are considered in this paper:
• Ramp-metering agent: The agent is to regulate the in-
flow from on-ramp to mainstream by change the phase
of the traffic light in on-ramp.
Figure 1: The freeway section has an on-ramp and an off-ramp.
There is a recurrent bottleneck caused by conflicts between inflow in
on-ramp and outflow in mainlane. There are several traffic detectors
and controllers in this freeway section. The controllers include VSL
signs, traffic lights for RM and road side units for LCC.
• Differential VSL (DVSL) agent: The DVSL agent
aims at regulating the outflow of controlled area to pre-
vent the capacity drop at bottlenecks. The conflicts be-
tween vehicles occur mostly in the right lanes. There-
fore different speed limits among lanes might be more
effective. The DVSL strategy can be implemented un-
der CAV environment. The DVSL signs can send speed
limit orders to the vehicles in the corresponding lane,
the vehicles are forced to drive under the received speed
limit.
• LCC agent: The LCC is used to regulate the lateral
flows for each lane. The implementation of LCC agent
is more challenging than RM and DVSL agents. In this
paper, we only considered to use a road-side unit (RSU)
to send "keep lane" orders to the vehicle in left 2 lanes
of the merge area. The reason is that the lateral inflow
from left lanes to right lanes will cause severe conges-
tion when traffic breakdown occured in the merge area
of the right lanes.
Each control agent executes its own action according to its
own control cycle. We denote by T R the control cycle for
RM agent, T D for DVSL agent and T L for LCC agent. The
main goal of these agents is to reduce congestion and promote
the freeway capacity in a coordinated manner.
3 The KS-GCN Model Description
Figure 2 presents the architecture of KS-GCN, which is com-
prised of several GCN layers, traffic state inputs for DVSL,
RM, LCC, several knowledge sharing layers, DVSL, RM and
LCC actuators respectively.
3.1 Framework
The function of KS-GCN is to generate coordinated actions
for the DVSL agent, RM agent and LCC agent given observed
traffic state from correlated sensors/detectors on the targeted
freeway section. Each agent only receives states from its
mostly related sensors. Each sensor collects P traffic vari-
ables (e.g., velocity, occupancy rate) in one cycle and is de-
noted as a vector xT−T c ∈ RP . The sensor network can be
represented as a weighted undirected graph G = (V,E, W),
where V is a set of nodes V = N, E is a set of edges,
j
self-connections. IN is the identity matrix. ¯Dii =(cid:80)
where ¯W = W + IN is the adjacency matrix that added
¯Wij.
U(l) ∈ Rf (l)×f (l+1), b(l) ∈ Rf (l+1) are the layer-specific
trainable weight matrix and bias. H(l) ∈ RN×f (l), N is the
number of graph signal, f (l) is the number of feature in l-th
layer, and αl() is the activation in l-th layer.
In KS-GCN,
there are 3 stacked GCNs, which are used to learn features
from traffic states for RM, DVSL and LCC agents respec-
tively.
On top of the GCN, we further use a knowledge sharing
layer to learn the sharing features for each agent. After L
layers of GCN, the last output matrix HL is of size N × f (L).
We use a simple FC layer for knowledge sharing, the output
matrix is reshaped as a vector hL ∈ RN f (L). The sharing
feature s can be obtained by:
s = αks(UkshL + bks),
(3)
Uks ∈ RK×N f (L) and bks ∈ RK are trainable weights for
the knowledge sharing layer. K is the dimension of the shar-
ing knowledge. Each agent shares its own knowledge with
the other agents for generating specific action. The sharing
process is done by concatenation:
zRM = concat(hL,RM , sDV SL, sLCC),
zDV SL = concat(hL,DV SL, sRM , sLCC),
zLCC = concat(hL,LCC, sRM , sDV SL).
(4)
Here, z is the final vectorized feature for generating control
action, concat is the concatenation layer.
3.3 Action Design
In this subsection, we introduce the action representation of
different agents. The action for RM is represented by the
phase of traffic light in the on-ramp. It is defined as aRM = 1:
change the light to green phase (the vehicles in on-ramp is
allowed to enter the freeway), and aRM = 0: change the
light to red phase. The action for RM agent can be generated
by a FC layer with softmax activation:
aRM = argmax(sof tmax(URM zRM + bRM ))
(5)
where URM ∈ R2×f RM , and bRM ∈ R2 are the trainable
weights. argmax is used to find the index with maximum
value.
A similar action design can be applied to LCC agent. The
action of LCC agent is defined as aLCC = 1: allow lane
change in left 2 lanes, and aLCC = 0: forbidden lane change
in left 2 lanes. The generation process of aLCC is:
aLCC = argmax(sof tmax(ULCCzLCC + bLCC)).
(6)
The action aDV SL interacts the speed limit of all lanes
in the controlled area. Therefore aDV SL ∈ Rc, where c
is the number of lane at the controlled section. Consider-
ing the real world implementation and the driver compli-
ance issue, the elements of aDV SL is set as discrete values
∈ [0, 1,··· , M ]. And the speed limits V ∈ Rc is
aDV SL
i
equal to V0 + jaDV SL, where V0 is the minimum value of
Figure 2: The architecture of KS-GCN
W ∈ RN×N is a weighted adjacency matrix. The KS-GCN
learns functions that map graph signals to traffic control sig-
nals asynchronously:
[XR
T−T R , XD
T−T D , XL
[XR
T−T R , XD
T−T D , XL
[XR
T−T R , XD
T−T D , XL
T−T L , WR, WD, WL] → aRM,
if T = iT R
T−T L , WR, WD, WL] → aDVSL,
if T = iT D
T−T L , WR, WD, WL] → aLCC,
if T = iT L
(1)
where XR ∈ RN R×P , XD ∈ RN D×P and XL ∈ RN L×P
are graph sensor signals that related to RM, DVSL and LCC
agents respectively.The 3 agents can share sensors, therefore
N R + N D + N L ≥ N. WR, WD and WL are RM, DVSL
and LCC similarity matrices derived from W. i is an integer.
KS-GCN asynchronously updates the control signals every
control cycle. The control cycles of RM (T R), DVSL (T D)
and LCC (T L) can be different from each other.
3.2 Network Structure
We use the GCN architecture proposed in [Kipf and Welling,
2016] to learn the spatial dependence between traffic signals
on the graph. The layer-wise propagation rule of the specific
GCN is:
H(l+1) = αl( ¯D− 1
2 ¯W ¯D− 1
2 H(l)U(l) +
(2)
)
b(l)
.
.
.
b(l)
the speed limit, j is the integer multiples, the maximum value
of speed limits is V0 + jM. It is not feasible for a neural
networks to generate explicit discrete speed limits for mul-
tiple lanes because the total number of actions for a c-lane
freeway section will be as large as M c. The neural networks
with limited size is difficult or impossible to handle such a
large action space. Follow the work in [Wu et al., 2018c], the
action generation process for the DVSL agent is defined as:
aDV SL = int((M +1)sigmoid(UDV SLzDV SL +bDV SL)),
(7)
The activation of FC layer for DVSL agent is sigmoid func-
tion. The outputs of the FC layer are then multiplied with
M + 1. The discrete action aDV SL is obtained by the integer
parts of the scaled outputs.
4 Evolutionary Strategy for Optimization
In this section our aim is to propose an efficient and effective
optimization algorithm for coopetative traffic control using
KS-GCN based on evolutionary strategy (ES). Finding an op-
timal coopetative control policy for a given freeway section
in section 2 can be seen as an optimization problem to search
for a trainable parameter set θ for KS-GCN that maximize the
0 rt of the freeway section. rt is the
total outflow F (θ) =(cid:80)T
instantaneous outflow of the freeway section.
The parameters θ of KS-GCN can be directed updated by
using the final return Fj(θ + σj) of parallel workers in ES,
therefore we proposed to use ES as the optimization algo-
rithm for KS-GCN. Another objective of the freeway control
agents is to achieve an optimal control scheme under stochas-
tic traffic demand. This also can be easily done via ES. In
simulation, the traffic demand is modeled as a random pro-
cess. In each episode, a new traffic demand is set by sampling
data from the random process, then several parallel workers
are used to run on simulations with the same traffic demand,
finally the parameters θ is updated by the final returns of
these parallel workers. We find that this stochastic training
approach guarantees the generalization of the agents.
Another core challenge is how to balance exploration and
exploitation using ES. The total outflow as the reward func-
tion is sometimes deceptive, e.g, the agents that achieved high
outflow for a specific traffic demand might perform badly un-
der another traffic demand sampled from the same random
process. Without adequate exploration, the agents might fail
to discover effective traffic control strategies. In this paper,
we exploit the novelty-seeking (NS) proposed in [Conti et
al., 2018] for exploration.
In NS, the novelty of one pol-
icy is characterized by a behavior vector b(πθ) that describes
its behavior. For CTC, we define traffic demand D specific
b(πθ, D) as:
b(πθ, D) = avg(aRM
D ), avg(
aDV SL
D
M + 1
D )
), avg(aLCC
(8)
D
and aLCC
D , aDV SL
where aRM
are vectors that contain all
time RM, DVSL and LCC actions under demand D. The
original work of NS use a set of parameters to calculate the
novelty. Because the traffic demand changes every episode,
D
Learning rate α,
noise
random demand procees PD,
standard deviation
balance parameter
Algorithm 1 ES-CTC
Input:
σ,
w
1: For t = 1,2,... do
2:
3:
4:
5:
6:
7:
8:
9:
10: End For
End For
Set θt+1 = θt + α 1
nσ
Decrease w
Sample traffic demand Dt from PD
Compute bahavior vector bt(θt, Dt)
For each work j = 1,2,...,n do
Sample j ∼ N (0, I)
Compute returns Fj and novelties Nj using Eq (10)
(cid:80)n
j=1(1 − w)Fj + wNj
calculating demand specific behavior vectors for a set of pa-
rameters will be very time-consuming. In this paper, the nov-
elty of a parallel worker is directly defined as the distance
between its behavior vector and the one of unperturbed agent
on demand D:
Nj(b(πθ+σj , D), b(πθ, D)) = (cid:107)b(πθ+σj , D) − b(πθ, D)(cid:107)2,
(9)
The parameter update rule for ES-CTC is then expressed as
follows:
θt+1 = θt + α
1
nσ
(1 − w)Fj + wNj
(10)
n(cid:88)
j=1
where n is the number of parallel workers, α is the learning
rate. 0 ≤ w ≤ 1 is the parameter to balance between ex-
ploration and exploitation. In this work, we slowly decrease
w every episode. Algorithm 1 summarizes the optimization
procedure of ES-CTC
5 Experiments
In this section, we mainly conducted experiments on a sim-
ulated freeway section built by SUMO to evaluate the effec-
tiveness of ES-CTC.
5.1 The simulated freeway section
The open source software SUMO is selected for the exper-
iments. The software supports set the speed limits for each
lane, set traffic phase for traffic light and forbidden lane
changing using its API -- the Traffic Control Interface (TraCI)
package. A 874.51m freeway section with on- and off- ramps
of I405 north bound in California, USA is selected. The
original speed limits for the mainlane of this section are
65mile/h, for the on- and off- ramps are 50mile/h. The
freeway section in SUMO and each agents' control area can
be found in Figure 3. The travel demand of this freeway
can be categorized into 3 routes: 1) From mainlane to main-
lane (M2M), 2) From mainlane to off-ramp (M2Off), and
3) From on-ramp to mainline (On2M). Based on observa-
tion from recorded traffic flow from sensors of PeMS1, the
hourly demand of these 3 routes is modeled as Poisson distri-
bution with average value 5427, 1809 and 1153 respectively.
1http://pems.dot.ca.gov
The depart lane of the vehicles are randomly set according to
uniform distribution. Passenger car with a length 3.5m and
truck/bus with a length 8m are selected as vehicle types in
the simulated traffic stream. The type of vehicles are selected
randomly according to probability [0.85, 0.15]. Each round
simulation lasts for 1 hour.
Figure 3: The freeway section in SUMO
We place sensors in the upstream of DVSL controlled area,
DVSL controlled area, on-ramp and merge area to detect the
traffic state. The sensors on off-ramp and downstream area
are used to calculate the outflow of the freeway section. The
outflow can be used to compute the final return for the agents.
The traffic speed and occupancy rate collected from these
sensors are used as inputs for the KS-GCN. Specifically, the
on-ramp and upstream of merge area are used for RM agent.
The sensors in the upstream of DVSL controlled, DVSL con-
trolled area and upstream of merge area are used for DVSL
agent. The sensors in the merge area are used for LCC agent.
The sizes of XR, XD and XL are 8× 2, 22× 2 and 12× 2 re-
spectively. The element wij of similarity matrix W for input
states is given by:
exp
0.9
1
if
if
−loc(i)−loc(j)
10
if
(i, j) ∈ S
i = j
wij =
(i, j) ∈ D
(11)
where loc() denotes the location of the sensor. (i, j) ∈ D
means that sensor i and sensor j belong to different freeway
sections. (i, j) ∈ S denotes that sensor i and sensor j are
in the same freeway section. The control cycle T R, T D and
T L of RM, DVSL and LCC agents are set to 3, 60 and 30
seconds respectively. The speed limits set for DVSL agent is
[10mph, 15mph,··· , 75mph].
5.2 Benchmarks
We compare ES-CTC with the following baseline methods,
which include numerous DRL based traffic control models:
• No control: The baseline without any DVSL, RM and
LCC control.
• DQN-RM A modified version of DQN based traffic
light control for RM. The state input of the neural net-
works is the vectorization of XR. The agent is modeled
as a neural networks with two hidden FC layers.
• TRPO-RM The actor and critic of the agent are mod-
eled as neural networks with two hidden FC layers.
• DDPG-DVSL A DRL based DVSL control model
whose actor and critic of the agent are modeled as a neu-
ral networks with two hidden FC layers.
The traffic state XR is used as the state variable for DQN-
RM and TRPO-RM. The traffic state XD is used as the state
variable for DDPG-DVSL. The neural networks of DQN-
RM, actor and critic of DDPG-DVSL and TRPO-RM have
2 hidden FC layers, which contain 30 hidden neurons and 20
hidden neuron respectively. The agents of ES-CTC are built
upon 2 layer GCNs, the numbers of feature in 1st and 2nd
are 5 and 3 respectively, the dimensions of sharing feature
are set as 8. The reward signal of DQN-RM, TRPO-RM and
DDPG-DVSL is the outflow rt of the freeway section at time
point t. Their discount factors are set to 0.9. The return Fj
for ES-CTC is the total outflow of the freeway section.
5.3 Performance Comparisons
Scenario 1
We first evaluate all models on a simple case, they are con-
stantly optimized on a same demand profile. The DRL based
DQN-RM, TRPO-RM and DDPG-DVSL are trained with the
demand with 2000 episodes. The number of parallel work-
ers n for ES-CTC is set to 50. To make the comparison fair,
we update the parameters of ES-CTC 40 times therefore all
models are learned with same number of simulation. In this
scenario, we can observe whether the compared models can
converge to a stable and optimal point by the training process
of all models. The evolution of the overall outflow of each
algorithm during training can be seen in Figure 4.
(a) Evolution of total outflow of DQN-RM, TRPO-RM
and DDPG-DVSL
(b) Evolution of total outflow of the ES-CTC model
Figure 4: Evolution of total outflow of the models over iterations of
the algorithms.
We discover that the DQN-RM, TRPO-RM and DDPG-
DVSL fail to converge to a stable value. Several oscillations
can be observed from Figure 5(a). The outflow are related to
many other factors such as the inflow of on-ramp and outflow
of off-ramp, which could not fully controlled by the agents.
Moreover, the vehicle can be computed as a out vehicle only
when it has leaved the freeway section, there could be a delay
between the control effects of the agents on the vehicle and
computation of reward signal. These issues make the DRL
based approaches difficult to converge.
It is observed that
ES-CTC is more stable from Figure 5(c). ES-CTC reaches a
relatively high outflow after 25 round generation and achieves
the highest max outflow with 6609 vehicles. Another advan-
tage of ES-CTC models is that they are significantly faster
Models
ES-CTC
DQN-RM
TRPO-RM
DDPG-DVSL
Outflow
6725.1
6567.2
6563.9
6642.3
T DS
0.7949
0.7819
0.7839
0.7904
IL
0.0656
0.0471
0.0437
0.0502
Table 1: The average evaluation metrics on 100 stochastic traffic
demands
than DRL models due to their higher parallelization capabil-
ity. The results indicate that deep neuroevolution model is
more suitable for cooperative traffic control compared with
DRL models. The total number of outflow only reaches 6289
when no control strategy is implemented. The maximum out-
flows of all DRL models and ES-CTC are significantly higher
than 6289. The maximum outflows for DQN-RM, TRPO-RM
and DDPG-DVSL are 6577, 6570 and 6588 respectively. It
shows that the traffic control strategies can promote the ca-
pacity of the freeway.
Scenario 2
In the second case, the DQN-RM, TRPO-RM, DDPG-DVSL
and ES-CTC are trained and evaluated on stochastic traffic
demand. The DRL based DQN-RM, TRPO-RM and DDPG-
DVSL are trained with the demand with 3000 episodes. They
are trained with a new traffic demand in each episode. The
number of parallel workers n for ES-CTC is set to 100. In or-
der to guarantee all models consume similar wall-clock time,
we evolved the ES-CTC model with 200 generations. After
training, we compare the average outflow of all models on
100 stochastic demands. The traditional performance metric
used in the RL problems is the average total return achieved
by the model in an episode. In order to obtain more represen-
tative metrics independent of reward shaping for traffic con-
trol, we also compute the average traffic demand satisfaction
degree T DS and average improvement level IL, which are
defined as
Fi
T DS =
Di
Fi − F N
i
IL =
.
F N
i
(12)
Here Di is the total demand of the ith episode, F N
is the to-
i
tal outflow of ith episode without any traffic control agents.
The evaluation results of 4 models are given in Table 1. We
can find ES-CTC achieves relatively higher average outflow,
T DS and IL than three DRL benchmarks on 100 stochastic
traffic demands. The ES based optimization strategy, graph
convolutional structure and coordination between different
agents are the keys to its success.
The RM, DVSL and LCC actions of ES-CTC obtained
from one simulation are presented in Figure 5. The most in-
teresting one is the speed limits produced by DVSL agent.
The DVSL agent has learned to always set a maximum speed
limit for the leftest lane.
it automatically set the left lanes
as overtaking lanes. The agents mainly adjusts inflow to the
bottleneck by adjusting the speed limits of the right lanes,
on-ramp vehicles and vehicles' lane change behaviors. As
stated before, the conflicts between vehicles occur mostly in
the right lanes. Therefore it is not necessary to decrease the
speed limits of left 2 lanes (lane 4 and lane 5).
(a) The RM action produced
by ES-CTC in the first 6
minute
(b) The variable speed limits
produced by ES-CTC
(c) The LCC action pro-
duced by ES-CTC
Figure 5: Visualization of RM, DVSL and LCC actions produced by
ES-CTC.
6 Conclusion
In this paper we have proposed a deep neuroevolutional
model for cooperative freeway traffic control.
In order to
learn the spatial dependence between traffic sensors, the neu-
ral networks structure of the model are built upon graph con-
volutional layer. Our structure allows several traffic control
agents with different control cycles work cooperatively to im-
prove the freeway traffic efficiency. Our solution outperforms
the state-of-the-art DRL based solutions in terms of improve-
ments in freeway capacity.
Several interesting questions stem from our paper both the-
oretically and practically, that we plan to study in the future.
We aim to extend the approach to large freeway networks and
a broader set of dynamic events such as adverse weather and
traffic incidents in the future. Another interesting direction
we plan to study is the incorporation of more advanced traffic
control strategies. In this paper, the most basic graph con-
volutional network architecture and evolutionary strategy are
used. We believe that a more systemic research of architec-
tures and optimization strategies may provide improvements
in control performance.
Acknowledgments
The work was supported by national natural science foun-
dation of China (61620106002). Any opinions expressed in
this paper are solely those of the authors and do not repre-
sent those of the sponsors. The authors would like to thank
experienced anonymous reviewers for their constructive and
[Lowe et al., 2017] Ryan Lowe, Yi Wu, Aviv Tamar, Jean
Harb, OpenAI Pieter Abbeel, and Igor Mordatch. Multi-
agent actor-critic for mixed cooperative-competitive envi-
ronments. In Advances in Neural Information Processing
Systems, pages 6379 -- 6390, 2017.
[Lv et al., 2018] Zhongjian Lv,
Jiajie Xu, Kai Zheng,
Hongzhi Yin, Pengpeng Zhao, and Xiaofang Zhou. Lc-
rnn: A deep learning model for traffic speed prediction. In
IJCAI, pages 3470 -- 3476, 2018.
[Roncoli et al., 2015] Claudio Roncoli, Markos Papageor-
giou, and Ioannis Papamichail. Traffic flow optimisa-
tion in presence of vehicle automation and communica-
tion systems -- part ii: Optimal control for multi-lane mo-
torways. Transportation Research Part C: Emerging Tech-
nologies, 57:260 -- 275, 2015.
[Salimans et al., 2017] Tim Salimans,
Jonathan Ho,
Xi Chen, Szymon Sidor, and Ilya Sutskever. Evolution
strategies as a scalable alternative to reinforcement
learning. arXiv preprint arXiv:1703.03864, 2017.
[Van der Pol and Oliehoek, 2016] Elise Van der Pol and
Frans A Oliehoek. Coordinated deep reinforcement learn-
ers for traffic light control. Proceedings of Learning, Infer-
ence and Control of Multi-Agent Systems (at NIPS 2016),
2016.
[Wei et al., 2018] Hua Wei, Guanjie Zheng, Huaxiu Yao, and
Zhenhui Li.
Intellilight: A reinforcement learning ap-
proach for intelligent traffic light control. In Proceedings
of the 24th ACM SIGKDD International Conference on
Knowledge Discovery & Data Mining, pages 2496 -- 2505.
ACM, 2018.
[Wu et al., 2018a] Jingda Wu, Hongwen He, Jiankun Peng,
Yuecheng Li, and Zhanjiang Li. Continuous reinforcement
learning of energy management with deep q network for a
power split hybrid electric bus. Applied Energy, 222:799 --
811, 2018.
[Wu et al., 2018b] Yuankai Wu, Huachun Tan, Lingqiao
Qin, Bin Ran, and Zhuxi Jiang. A hybrid deep learning
based traffic flow prediction method and its understanding.
Transportation Research Part C: Emerging Technologies,
90:166 -- 180, 2018.
[Wu et al., 2018c] Yuankai Wu, Huachun Tan, and Bin Ran.
Differential variable speed limits control for freeway re-
current bottlenecks via deep reinforcement learning. arXiv
preprint arXiv:1810.10952, 2018.
valuable suggestions for improving the overall quality of this
paper.
References
[Belletti et al., 2018] Francois Belletti, Daniel Haziza,
Gabriel Gomes, and Alexandre M Bayen. Expert level
control of
ramp metering based on multi-task deep
reinforcement learning. IEEE Transactions on Intelligent
Transportation Systems, 19(4):1198 -- 1207, 2018.
[Carlson et al., 2010] Rodrigo C Carlson,
Ioannis Pa-
pamichail, Markos Papageorgiou, and Albert Messmer.
Optimal motorway traffic flow control involving variable
speed limits and ramp metering. Transportation Science,
44(2):238 -- 253, 2010.
[Conti et al., 2018] Edoardo Conti, Vashisht Madhavan, Fe-
lipe Petroski Such, Joel Lehman, Kenneth Stanley, and Jeff
Clune.
Improving exploration in evolution strategies for
deep reinforcement learning via a population of novelty-
seeking agents. In Advances in Neural Information Pro-
cessing Systems, pages 5032 -- 5043, 2018.
[Foerster et al., 2016] Jakob Foerster,
Ioannis Alexandros
Assael, Nando de Freitas, and Shimon Whiteson. Learn-
ing to communicate with deep multi-agent reinforcement
learning. In Advances in Neural Information Processing
Systems, pages 2137 -- 2145, 2016.
[Foerster et al., 2017] Jakob Foerster, Gregory Farquhar,
Triantafyllos Afouras, Nantas Nardelli, and Shimon
Whiteson. Counterfactual multi-agent policy gradients.
arXiv preprint arXiv:1705.08926, 2017.
[Hegyi et al., 2005] Andreas Hegyi, Bart De Schutter, and
Hans Hellendoorn. Model predictive control for optimal
coordination of ramp metering and variable speed limits.
Transportation Research Part C: Emerging Technologies,
13(3):185 -- 209, 2005.
[Hellinga and Mandelzys, 2011] Bruce
and
Michael Mandelzys. Impact of driver compliance on the
safety and operational impacts of freeway variable speed
Journal of Transportation Engineering,
limit systems.
137(4):260 -- 268, 2011.
Hellinga
[Kipf and Welling, 2016] Thomas N Kipf and Max Welling.
Semi-supervised classification with graph convolutional
networks. arXiv preprint arXiv:1609.02907, 2016.
[Li et al., 2016] Li Li, Yisheng Lv, and Fei-Yue Wang.
Traffic signal timing via deep reinforcement learning.
IEEE/CAA Journal of Automatica Sinica, 3(3):247 -- 254,
2016.
[Li et al., 2018] Yaguang Li, Rose Yu, Cyrus Shahabi, and
Yan Liu. Diffusion convolutional recurrent neural net-
work: Data-driven traffic forecasting. 2018.
[Lin et al., 2018] Kaixiang Lin, Renyu Zhao, Zhe Xu, and
Jiayu Zhou. Efficient large-scale fleet management via
multi-agent deep reinforcement learning. arXiv preprint
arXiv:1802.06444, 2018.
|
1703.01931 | 1 | 1703 | 2017-03-06T15:44:10 | Context-Based Concurrent Experience Sharing in Multiagent Systems | [
"cs.MA"
] | One of the key challenges for multi-agent learning is scalability. In this paper, we introduce a technique for speeding up multi-agent learning by exploiting concurrent and incremental experience sharing. This solution adaptively identifies opportunities to transfer experiences between agents and allows for the rapid acquisition of appropriate policies in large-scale, stochastic, homogeneous multi-agent systems. We introduce an online, distributed, supervisor-directed transfer technique for constructing high-level characterizations of an agent's dynamic learning environment---called contexts---which are used to identify groups of agents operating under approximately similar dynamics within a short temporal window. A set of supervisory agents computes contextual information for groups of subordinate agents, thereby identifying candidates for experience sharing. Our method uses a tiered architecture to propagate, with low communication overhead, state, action, and reward data amongst the members of each dynamically-identified information-sharing group. We applied this method to a large-scale distributed task allocation problem with hundreds of information-sharing agents operating in an unknown, non-stationary environment. We demonstrate that our approach results in significant performance gains, that it is robust to noise-corrupted or suboptimal context features, and that communication costs scale linearly with the supervisor-to-subordinate ratio. | cs.MA | cs |
Context-Based Concurrent Experience Sharing in
Multiagent Systems
Dan Garant
University of Massachusetts
[email protected]
Amherst, MA 01002
Victor Lesser
University of Massachusetts
[email protected]
Amherst, MA 01002
Bruno C. da Silva
Federal University of Rio
Grande do Sul. Porto Alegre,
Brazil 91540-000
[email protected]
Chongjie Zhang
Tsinghua University
Beijing, China
[email protected]
ABSTRACT
One of the key challenges for multi-agent learning is scalability.
In this paper, we introduce a technique for speeding up multi-
agent learning by exploiting concurrent and incremental experi-
ence sharing. This solution adaptively identifies opportunities to
transfer experiences between agents and allows for the rapid ac-
quisition of appropriate policies in large-scale, stochastic, homo-
geneous multi-agent systems. We introduce an online, distributed,
supervisor-directed transfer technique for constructing high-level
characterizations of an agent's dynamic learning environment --
called contexts -- which are used to identify groups of agents oper-
ating under approximately similar dynamics within a short tempo-
ral window. A set of supervisory agents computes contextual infor-
mation for groups of subordinate agents, thereby identifying candi-
dates for experience sharing. Our method uses a tiered architecture
to propagate, with low communication overhead, state, action, and
reward data amongst the members of each dynamically-identified
information-sharing group. We applied this method to a large-scale
distributed task allocation problem with hundreds of information-
sharing agents operating in an unknown, non-stationary environ-
ment. We demonstrate that our approach1 results in significant per-
formance gains, that it is robust to noise-corrupted or suboptimal
context features, and that communication costs scale linearly with
the supervisor-to-subordinate ratio.
1.
INTRODUCTION
In large-scale multi-agent systems consisting of hundreds to
thousands of reinforcement-learning agents, convergence to a near-
optimal joint policy, when possible, may require a large number
of samples. These systems, however, may contain groups of agents
working on nearly identical local tasks or under approximately sim-
ilar environmental dynamics. Identifying such groups may prove
useful in cooperative domains, due to the opportunity of exploiting
shared information. Information sharing has been extensively stud-
ied in single-agent settings with the goal of transferring knowledge
from a source task to novel tasks [26, 12, 2]. Applying this idea
to the multi-agent setting (MAS), it is apparent that experiences
may be transferred not only across similar tasks, but also between
concurrently-learning agents in a shared environment. This paper
focuses on the problem of online transfer of experiences between
1A more complete presentation of our approach, as well as addi-
tional experiments, can be found in [5].
such agents -- with an emphasis on the adaptive discovery of groups
of agents where experience sharing is possible and beneficial.
In multi-agent settings, agents need to interact and learn con-
currently. The environment, from each agent's perspective, is
non-stationary due to the presence of other concurrently-adapting
agents. Since the observations made by one agent are conditioned
on the behaviors of its neighbors, it is not clear when they can be
usefully exchanged and reused by other agents -- which may be op-
erating under different local environments and may be interacting
with different types of neighbors. Experience exchange is, there-
fore, not straightforward in non-stationary MAS. As an example,
consider the task allocation problem depicted in Figure 1. Agents
Figure 1: Sample task allocation network.
are represented as nodes and may receive tasks from the environ-
ment or from other agents. Each agent can choose to fulfill a given
task or to forward it to a neighboring agent. Assume that agents
have partial knowledge of the system: they do not know the global
structure of the network nor have access to state or policy informa-
tion of other agents. This results in a non-stationary problem where
it may be inappropriate to transfer information between some pairs
of agents. Agent D, for instance, receives a large number of tasks
from the environment and may need to forward them to a neigh-
bor; agent C receives tasks from a neighbor and may need to direct
them away from its heavily-loaded neighbor. Agents A and B, on
CBDA302792773EEEE1923111810the other hand, undergo similar task-forwarding patterns with re-
spect to their neighbors. Experience transfer, then, may be appro-
priate between agents A and B (said to be contextually compatible
agents), but not between agents D and C.
To address the information-sharing problem in non-stationary
MAS we propose modeling contexts as inherently dynamic local
characterizations of the environment under which agents operate.
They are defined over short timescales during which policies and
models are approximately static.
In Sections 5 and 6 we intro-
duce and motivate a context-similarity measure grounded in the
comparison of abstract representations of environment dynamics,
rather than policies or Q-values, and advocate the use of supervi-
sory agents (which periodically collect data from subordinates) as
a way of identifying contextually-compatible agent groups where
experiences may be shared. As will be further discussed in the
following sections, contextual modeling is made possible through
the commonly-studied property of interaction sparsity [29], or what
Simon [24] referred to as nearly-decomposable systems. This is ap-
parent in many domains, such as distributed task allocation, disaster
planning [9, 19] and sensing networks [31], in which agents inter-
act strongly with only a small group of closely-related partners.
Although other transfer mechanisms are possible, to our knowl-
edge no other methods exist that address the particular setting and
scale presented in this paper. We believe this is the first algorithm
that allows experience sharing in a concurrent and interacting MAS
with ∼1000 agents while undergoing low communication and com-
putational overhead. We evaluate our method on a large-scale dis-
tributed problem and demonstrate that context-based transfer yields
significant performance gains. We further show 1) that the time
complexity of our method scales with the number of agents within
each supervisory group, not with the total number of agents in the
network; 2) that our method is robust to noise-corrupted or sub-
optimal context features; 3) that communication costs scale lin-
early with the supervisor-to-subordinate ratio; and 4) that sparse
lossy compression schemes may be deployed and provide signifi-
cant improvements in communication costs, while inducing negli-
gible negative impact on system-wide performance.
2. RELATED WORK
In this section we discuss related work that also aims at expe-
rience sharing in MAS. Kretchmar et al.
introduced a technique
for agents to periodically exchange Q-values to accelerate learning
[11]. They assumed, however, that agents operate on independent
copies of an environment and do not interact. Boutsioukis et al. re-
laxed this assumption via a method for using Q-values of a source
task to bias the initial policy of target tasks [1]. They assumed
that learning on the source task had to be completed before trans-
fer was made possible, and required the use of inter-task mappings.
We do not assume that such mappings are needed and instead in-
fer when observations may be transfered by identifying groups of
agents that operate under similar local contexts. Taylor et al. in-
troduced a transfer method that allowed for source and target tasks
to be learned in parallel [25]. It implicitly assumed that all agents
experienced tasks with similar state values -- which may not be true
if they operate in contexts with different transition dynamics. More
recently, Mnih et al. introduced a technique for accelerating deep
learning algorithms via asynchronous sharing of policy gradients
[16]. This allowed for independent agents to cooperate in solving a
complex task, but required that agents did not interact while doing
so. In Section 5 we extend the discussion presented here and intro-
duce related techniques relevant to the problem of characterizing
local contexts in order to identify sharing opportunities.
3. SETTING
Multi-agent decision-making problems are often framed in the
context of Markov games [20]. Markov games model n agents
operating in an environment described by a joint state S. A state
transition function specifies the conditional probability of the en-
vironment transitioning to state S(cid:48), given that it was in S and
that agents executed a particular joint action (a1, . . . , an); i.e.,
P (S(cid:48)S, a1, . . . , an). In Markov games, each agent i holds a par-
ticular reward function Ri(riS, a1, . . . , an), which we consider
here to be a conditional distribution over rewards.
In cooperative environments, individual reward functions may
be identical -- each agent's individual performance perfectly aligns
with the system's performance. In this paper we consider the more
general case of decomposable reward functions, which arise in
structured settings such as Network Distributed-Partially Observ-
able Markov decision processes [18] or factored multi-agent MDPs
[6]. We also assume that the global state S is decomposable into
(potentially overlapping) components si, each of which represents
the portions of the state that agent i can directly observe. This
arises in systems where it may be infeasible for agents to learn
over the full joint space or when network structure or communi-
cation bandwidth introduce limitations on state observability.
In
general, the state observable by individual agents may be insuf-
ficient to faithfully reconstruct the overall state transition model,
iS, a1, a2, . . . , an). Motivated by the idea of interaction spar-
Pi(s(cid:48)
sity [29], we address this difficulty by observing that sparsity in Pi
may allow observations collected from a small number of neigh-
boring agents to be used in order to reasonably estimate Pi.
4. OVERVIEW OF THE METHOD
Before introducing the technical details of the method we pro-
pose, we start by presenting a high-level summary of the steps
involved in determining sharing opportunities by grouping agents
based on their local learning environments (or contexts):
1. each agent collects observations from its local environment
in the form of state, action, reward, and next state tuples.
Every K time steps (the reporting interval), agents report
such observations to their corresponding supervisors;
2. supervisors use the received information and their local
knowledge about the interactions between subordinate agents
to compute context summary vectors, one per agent. These
vectors correspond to dynamic local characterizations of the
environment under which agents operate, and are used to
identify possible sharing experiences;
3. supervisors measure the similarity between the context sum-
mary of each subordinate agent with respect to a covariance-
appropriate and scale-independent metric; similar agents are
organized into sharing groups;
4. supervisors relay experiences (state, action, reward, next
state tuples) between all members of each sharing group;
5. return to step (1) and adaptively regroup agents according to
updated context information.
Intuitively, a supervisor periodically collects information from a
small number of subordinate agents in its supervisory group and
computes context features. These are embedded in a summary
space in which similarity stochastically determines sharing oppor-
tunities -- not all agents within a same supervisory group need to
share experiences. Note that the method we propose here does not
aim at finding optimal subordinate-supervisor assignments, but on
efficiently identifying sharing opportunities within a given super-
visory structure. Sharing opportunities between agents are dynam-
ically re-evaluated by our method based on updated information
collected in a reporting interval. The overall context-creation and
data-transfer process is depicted in Figure 2.
Figure 2: Overview of the context-based transfer process.
5. CONTEXT FEATURES AS
ABSTRACTIONS
STATE
Context features are compact abstractions of the local learning
environment under which an agent operates. Carrol & Seppi [2]
discuss the difficulty of constructing such abstractions given the
difficulty of defining similarity metrics between learning environ-
ments. In the single-agent RL setting, many metrics are possible;
most compare local environments by comparing policies, Q-values,
or reward function differences [1, 7, 25]. In the multi-agent setting,
however, we wish to capture a measure of compatibility in the local
learning environment of agents.
Compatibility-based metrics are helpful to avoid issues arising
by using policy, Q-function or model similarity as proxies of en-
vironment similarity. Consider, for instance, the problem of expe-
rience imbalance: the policies or Q-values under comparison need
to be constructed with enough samples so that they are accurate
estimates of an optimal policy [22]. Metrics based on policy com-
parison are also difficult to define since optimal policies for Markov
games are not unique [14], thus making policy similarity a poor in-
dication of environment similarity. Metrics based on Q-function
comparison are also non-trivial to define since latent features often
cause agents to operate in different state spaces.
To avoid these problems, we propose reasoning over the under-
lying latent model of a stochastic game via contextual comparison.
In particular, if we can identify that agents are working under a
same local transition and reward model, we can infer (from the
homogeneity of the system) that they are facing the same learn-
ing problem. Experiences gathered by each compatible agent are
interchangeable and can be transferred. Since estimating system-
wide transition and reward models is impractical in large systems,
we rely on the use of context features to form broad-scope sum-
maries, or abstractions, of transition and reward models as experi-
enced by individual agents. Abstractions in RL have been stud-
ied extensively, and are not the focus of this paper; we simply
rely on any of the many existing methods (e.g. [4, 23, 15, 8, 13,
21, 10]) to construct features capable of abstracting the state of a
particular problem at hand.
If prior domain knowledge is avail-
able, context features may also be manually specified to abstract an
agent's state variables -- and possibly those of its observable neigh-
bors. The way in which sufficient statistics and features for such
abstractions are defined and computed depends on the structure of
the MAS and needs to be defined in light of the characteristics of
the application at hand.
In this paper we empirically show that
even simple (and possibly noise-corrupted) abstractions are often
sufficient to allow for experience sharing opportunities to be iden-
tified in large-scale non-stationary systems composed of hundreds
of concurrently-learning agents.
6. CONTEXT-BASED LEARNING
As mentioned above, context features are abstractions of the lo-
cal learning environment of an agent, and are constructed based
on data collected at a particular time t.
In order to characterize
the broader context of an agent's learning environment -- for in-
stance, the medium-term effects of its interactions with neighbor-
ing agents -- one needs to combine context observations across a
time window2. We refer to this aggregate context information as a
context summary vector. Context summaries are computed by hav-
ing neighborhoods of agents (called supervisory groups) send local
context information to their common supervisor. The supervisor
annotates these with information about the states and actions ex-
perienced by the agents it oversees. The contextual information re-
ceived by the supervisor is then used to compute a context summary
according to the method described in Section 6.2 and Algorithm 1.
When comparing context summaries to identify possible sharing
experiences, it is necessary to select an appropriate distance met-
ric in context space. This metric depends on the distribution from
which context features are drawn. Unless a designer has a priori in-
formation about this distribution, we assume that it can be approxi-
mated by a multivariate Gaussian. This is justified by two reasons:
1) by the central limit theorem (CLT), applied here in the limit of
K;3 and 2) because this is the distribution that imposes minimal
prior structural constraints (it is the maximum-entropy distribution
for these parameters) in the absence of prior knowledge. From this
assumption, it follows that context features can be summarized into
a context summary via a mean context vector and its covariance
matrix, and that a natural scale-invariant distance metric to com-
pare context summaries exists: the Mahalanobis distance [17].
Mahalanobis metrics generalize Euclidean distances in a way
that naturally takes correlations of the dataset (i.e., correlations be-
tween context features of different agents) into account. Further-
more, these distances are preserved under full-rank linear transfor-
mations of the space spanned by the data. This implies that con-
text distances are preserved even if the context features are further
abstracted or transformed under non-degenerate projections down
onto any other context space. Even though this metric is quite gen-
eral (it is naturally data-adaptive, scale-invariant, and preserved un-
der non-degenerate transformations) and imposes the least prior
structural constraints in the absence of expert knowledge, other
metrics may be used. In a designer chooses to do so, our method
changes trivially -- the Gram matrix used to stochastically identify
sharing opportunities (see Algorithm 1) is in that case computed
according to the alternative selected metric.
6.1 Agent Organization
Agents are dynamically organized by our method in sharing
groups whenever they are close (in context space) to other agents
within a supervisory group. This organization process involves a
trade-off between how many supervisors exist in the system and
the number of agents within each sharing group. As the num-
ber of supervisors grows, the sharing assignment problem becomes
increasingly distributed, reducing the computational requirements
2As will be discussed later, selecting a time window has impli-
cations on runtime, communication overhead, and reliability. See
Section 7 for more details.
3A variant of the CLT for weakly dependent processes can also be
applied assuming that sufficiently separated agents have approxi-
mately independent experiences [3].
Supervisora1a2a3Raw ObservationsContext FeaturesSubordinatesV1V2V3Context SummariesRaw Observatonsa1a2a3SubordinatesRaw Observations Context Features Context Summaries Raw Observations imposed on any individual supervisor. On the other hand, super-
visors overseeing larger groups of subordinates are capable of se-
lecting from a larger pool of experiences, increasing the likelihood
that similar agent groups can be identified. Each supervisor is gen-
erally responsible for a set of subordinates selected through self-
organization [32] or directly given the network structure. In this
work we do not focus on finding optimal subordinate-supervisor
assignments, but on efficiently identifying sharing opportunities
within a given supervisory structure. In the experiments presented
in Section 7 we evaluate our method in a network of hundreds
of agents cooperatively solving a large-scale distributed task allo-
cation problem; in this case, subordinate-supervisor assignments
are determined in a way that supervisors span physical regions of
the network consistent with agent interaction strength [32]. Such
an agent-organization criterion is justified in this task due to the
assumption of interaction sparsity [29], a general characterist of
nearly-decomposable systems. Many other real-world multi-agent
systems with similar local sparse network-like interactions exist
and could be organized similarly -- ranging from disaster planning
systems [9, 19] to sensing networks [31].
6.2 Assessing Context Similarity
We now present a method for computing contextual similarity
between agents and forming sharing groups. Suppose that an agent
communicates K observations to its supervisor every K time units.
Our solution easily extends to cases where agents do not make one
observation per time step. Let Oi be a time-indexed experience
vector of agent i:
(cid:48)
Oi = [(s, a, s
(cid:48)
, r)t1 , (s, a, s
(cid:48)
, r)t2 , . . . , (s, a, s
, r)tK ]
(cid:62)
.
1, . . . , Ot
A supervisor overseeing n agents computes contextual informa-
tion by mapping Ω = {O1, . . . , On} into an n-tuple of con-
text summary vectors V = (V1, . . . Vn). Assume we are given
a function f for computing context features for agent i at time
t, given the history of observations Ωt = {Ot
n}, where
i = {(s, a, s(cid:48), r)hh ≤ t}. That is, Ωt contains the observations
Ot
of all n agents in the neighborhood up to some time t. The con-
text features for agent i at some time t ∈ [t1, . . . , tK ] are given
by f (i, Ωt). Note that f may use information about neighboring
agents when constructing features that describe i's local learning
environment. This yields a total of nK context features vectors per
supervisor. Each context feature vector is a sample drawn at a par-
ticular time from the (latent, unknown) underlying context distribu-
tion of an agent. These samples can be combined by the supervisor
to compute an unbiased estimate of the true mean of the underlying
context distribution. Unbiased estimates of the true mean vector
of the context distribution are called context summary vectors, and
are compact descriptions of the learning environment of each agent
within a supervisory group. The supervisor stores the context sum-
mary vectors of its n subordinates in a tuple V :
(cid:33)
tK(cid:88)
t=t1
(cid:32)
tK(cid:88)
t=t1
1
K
V =
f (1, Ωt), . . . ,
1
K
f (n, Ωt)
Note that each element of V , as computed above, is an unbi-
ased estimate of the true mean context vector under the distribution
assumptions made in Section 6. If a different distance metric is se-
lected by a domain expert, the elements of V need to be defined
so that they correspond to unbiased estimators of the mean of the
corresponding underlying distribution posited by the designer.
Our method for identifying sharing opportunities is based on a
stochastic sampling process that probabilistically partitions agents
into sharing groups, based on their contextual similarity. In partic-
ular, membership of an agent to a sharing group is stochastically
determined based on the similarity of that agent's context sum-
mary and the context summaries of other agents in the same sharing
group. This stochastic process partitions subordinate agents within
a given supervisory group so that agents operating under similar
underlying local dynamics have a higher probability of undergoing
experience sharing.
The sampling process that we define consists in a two-stage se-
lection routine. First, agents are partitioned into potential sharing
groups C1, . . . , Ck, based on to their similarity. Here, similarity is
measured with respect to the selected context distance metric. Po-
tential sharing groups are sets of agents (within a same supervisory
group) that, given their contextual similarity, are deemed to be fea-
sible candidates to undergo experience sharing. Partitioning agents
into potential sharing groups is an unsupervised process that can
be implemented via any standard clustering algorithm. Its purpose
is to ensure that the computational costs of stochastically sampling
agents in order to construct sharing groups is approximately con-
stant, independently of the number of agents within a supervisory
group. In particular, it ensures that the Gram matrix used to define
the sampling distribution (see next paragraph and Algorithm 1) has
dimensions that scale linearly with k. We say that agent Ai ∈ Cj if
that agent's context summary Vi belongs to potential sharing group
Cj.
Next, the tuple V of context summaries collected by a supervisor
is used to define a probability distribution that stochastically deter-
mines whether particular pairs of subordinate agents should belong
to a same sharing group. First, pairwise distances are computed
over the context summaries of every pair of agents Ah and Aj in
a potential sharing group Ci. This distance is stored in the (h, j)-
th entry of a Gram matrix M. Each h-th row of M corresponds,
therefore, to distances in context space between an agent Ah and all
other agents in a potential sharing group Ci. We use M to define
a sampling distribution Pi that stochastically determines whether
pairs of subordinate agents in Ci should belong to a same sharing
group, given their contextual similarities.
In particular, Pi(h, j)
denotes the probability that any two agents h and j within Ci will
be assigned to a same sharing group, based on their distances in
context space. In this paper we define Pi as a Boltzmann distribu-
tion constructed based on the pairwise context summary distances
between agents in Ci:
(cid:1)
exp(cid:0)M i
(cid:16)
h,j
(cid:17)
a,b∈Ci
exp
M i
a,b
(cid:80)
Pi(h, j) ≡
Boltzmann distributions are widely used in machine learning when
one needs to define probability distributions that depend on the rel-
ative difference between numerical quantities associated with each
element in a given population. Here, they depend on the distance
between context summaries of any given pair of agents in Ci. Note
that Pi, as defined above, assigns a probability to every pair of
agents in Ci and reflects how likely it is that those agents will be
selected for membership in a same sharing group. Agents are se-
lected for membership in a sharing group by sampling from Ci
without replacement; this ensures that agents will belong to at most
a single sharing group -- see Algorithm 1 for details. This selection
process is repeated in order to construct a group-sharing function
Ψ, which maps agents to sharing groups. Once Ψ has been estab-
lished, supervisors relay all observations within the K-unit time
window from all agents in Ψ(i) to agent i. Agents incorporate
these experiences into their policies using any off-policy learning
algorithm. Note that an agent i within a potential sharing group
Ci is not necessarily associated to any sharing partners; if i is dis-
similar from all other (n − 1) subordinates, Ψ(i) = ∅ with high
probability.
groups (P(·) denotes powerset)
Input: Set of agents A = {1, 2, . . . , n}
Input: Tuple V = (V1, . . . , Vn) of context summaries
Output: Mapping Ψ : A → P(A) from agents to sharing
Let M be a selected context distance metric.
Partition V into k potential sharing groups C1, . . . , Ck w.r.t.
M
for i ← {1, 2, . . . , k} do
Mh,j ← M(Ah, Aj) (Gram matrix over Agents(Ci))
(cid:17) (sampling distribution)
(cid:16)
Pi(h, j) ←
exp(M i
h,j)
exp
for each agent a ∈ Ci do
for each agent b ∈ Agents(Ci) − {a} do
a,b∈Ci
With probability Pi(a, b)
Let Ψ(a) ← Ψ(a) ∪ {b}
Let Agents(Ci) ← Agents(Ci) − {b}
(cid:80)
M i
a,b
Algorithm 1: Selection of Sharing Partners
The process for selecting sharing partners, described in Algo-
rithm 1, is repeated (in parallel) by each supervisor once every K
steps. Let n be the number of agents in a supervisory group (which
can be defined to include only a small and bounded fraction of the
total number of agents in the system) and d be the dimensionality
of the context feature vector computed by f. Under mild assump-
tions4 it is possible to show that the complexity of Algorithm 1 is
O(dn3). In practical terms, the time-complexity is dominated by
the inversion of an (n× n) matrix, needed in order to compute dis-
tances according to the metric proposed in Section 6. If other dis-
tance metrics are used (e.g., Euclidean distances) the complexity of
the method becomes quadratic in n and linear in d. Importantly,
notice that because this process is executed separately and inde-
pendently by each supervisor, the overall complexity of the process
is independent of the number of supervisors in the system -- it de-
pends crucially only on the number of agents being overseen by
each supervisor. The communication complexity of the method is
linear in the number k of potential sharing groups, linear in the
number of agents in each potential sharing group (i.e., at most n)
and linear in the reporting interval K: O(kKn). Empirically, the
communication costs of Algorithm 1 seem to scale linearly with the
supervisor-to-subordinate ratio (see Section 7.2 for more details).
7. EXPERIMENTS
We evaluate our algorithm on large network-distributed task al-
location problems (Figure 1). An agent maintains two queues of
tasks: a processing queue, with tasks that it has committed to work
on; and a routing queue, with tasks that are not actively being
worked on and that can be forwarded to a neighbor or processed lo-
cally. Each task has a duration s. The reward function is defined as
the reciprocal of the average service time over a time window; ser-
vice time is the time incurred from task creation to completion. In
all experiments, task duration is an exponentially-distributed ran-
dom variable with mean 10. Tasks are generated by the environ-
ment according to patterns that are unknown to the agents, which
(along with the fact that agents cannot observe their neighbors'
states and policies) makes the problem non-stationary. When a task
4e.g., that the number of iterations executed by the clustering al-
gorithm is proportional to n and that the complexity of computing
f is proportional to the number of observations used to construct
such features.
is created, it is associated with some agent v and placed in its rout-
ing queue. Upon executing an action (to either process or forward
a task) agents receive a reward of 1
d , where d is the estimated ser-
vice time of the agent receiving the task. To estimate service time,
agents keep track of the time taken to complete past tasks. Agents
learn policies using an extension of Q-Learning to the multi-agent
case with stochastic policies, which is known to outperform related
methods in domains similar to ours [30].
In our experiments, context features for agent i are composed
of three quantities: i's load relative to the mean load of its neigh-
bors, and the rate at which each of its neighbors receives tasks from
the environment and from other agents. Since agents with differ-
ent neighborhood sizes have different actions spaces, their obser-
vations have different dimensionality; we therefore restrict context
comparisons to agents with the same number of neighbors. Expe-
rience sharing between agents with different action spaces is be-
yond the scope of this paper and would require learning inter-task
mappings (e.g. see [27]). Supervisory groups in these experiments
were defined according to the criterion discussed in Section 7.1.
When applying Algorithm 1, we used the K-means algorithm with
Mahalanobis distance. We automatically set the number k of clus-
ters based on the gap statistic [28]. The task-allocation networks
used in our experiments are lattices of up to 729 agents, where
each agent directly interacts with 4 neighbors. Different network
instances were obtained by varying two parameters regulating the
type of task distribution to be tackled by the agents in the system:
• Task Concentration/Pattern: This parameter regulates
whether tasks originate at the outer edges of the network or at
central nodes. Each pattern requires a qualitatively different
system behavior. A policy for the border concentration re-
quires boundary agents to forward tasks inward, and central
agents to accept tasks; a policy for the center concentration
requires the opposite arrangement;
• Task Frequency: Tasks are generated with frequency gov-
erned by a Poisson distribution. For agents that do not re-
ceive tasks from the environment, λ = 0. For all others,
a fixed λ > 0 is used. We consider a set of 11 λ values
selected uniformly along the range [0.25, 0.35]. We do not
consider λ < 0.25 since even random policies perform well
in this case, nor λ > 0.35, since this leads to queues that
grow indefinitely even under optimal policies.
7.1 Performance under Experience Sharing
We first examine the impact of the number of supervisors on sys-
tem performance. On one hand, a single-supervisor configuration
results in a nearly centralized system which benefits significantly
from sharing opportunities. This corresponds to the case where all
agents are placed in a same potential sharing group and may un-
dergo experience sharing. Alternatively, no supervisors could ex-
ist, in which case the system corresponds to a conventional MAS
with no information sharing. Intermediate sharing configurations
are possible, with different numbers of supervisors and correspond-
ing subordinate agents. Note that the single-supervisor configu-
ration is often infeasible in real environments, as it is burdened
with high communication costs (see Section 7.2). Four alternative
supervisory structures were considered in our experiments. First,
we evaluated two baseline configurations: one with no supervision,
corresponding to a conventional MAS with no information sharing;
and one with a single supervisor, corresponding to a system where
all agents may share information. Intermediate sharing configura-
tions, with 4 and 9 supervisors, were also investigated. The single-
supervisor configuration has a supervisor-subordinate ratio of 1:99,
the 4-supervisor configuration 1:24, and the 9-supervisor configu-
ration roughly 1:10. Subordinate agents were assigned to supervi-
sors in a way that minimizes the network distance between pairs of
subordinates. Results discussed in this section correspond to 440
runs of our algorithm; in particular, we executed five trials of each
combination of task concentration pattern, value of λ, and supervi-
sory structure were performed, for a total of 2 × 11 × 4 × 5 = 440
runs.
To appreciate the difference between the least challenging task
allocation setting (λ = 0.25) and the most challenging one (λ =
0.35), we analyze the average system-wide service time obtained
by the single-supervisor configuration throughout 10,000 steps,
with tasks concentrated on the border of a 100-agent lattice. Fig-
ure 3 shows the evolution of service time as time progresses. At
first, poor policies lead to a heavily saturated system, which de-
grades service times, with a peak of approximately 100 steps per
task occurring about 25% of the way into the simulation. As agents
learn appropriate policies, they more rapidly complete tasks, ulti-
mately converging to a service time of about 25 steps per task. This
level of performance is reached regardless of λ, though the amount
of time taken to reach it, and the performance of the system during
learning, are both of central importance.
Figure 3: Performance under different difficulty settings λ.
In all experiments that follow we define performance as the area
under the curve of service time as a function of time. When the
system converges quickly, this area is small. We treat the mini-
mum service time ever attained by any configuration as zero, so
that running the system at the optimal performance does not accu-
mulate area; i.e., performance of an optimally-performing system
is invariant with respect to simulation duration (see Figure 4 for
an example). Figure 5 shows that the single-supervisor configura-
information-sharing agents accumulating nearly half the area un-
der the curve compared to agents that do not share experiences. As
additional supervisors are introduced, this benefit diminishes, since
there are fewer experience sharing opportunities within each su-
pervisory group. Note, however, that even with a high supervisor-
subordinate ratio of 1:10 (which corresponds, in this experiment,
to having approximately as many supervisors as agents in each su-
pervisory group), experience sharing still allows us to reduce the
learning curve area by more than 25%.
Figure 5: Performance of different supervisory configurations
in a 100-agent network; smaller values correspond to faster
learning.
7.2 Scalability and Communication Over-
head
We intuitively expect that information sharing becomes more
beneficial as the size of the system grows: larger systems typically
have a more diverse pools of agents which may benefit from shar-
ing. To test this hypothesis, we constructed simulations sweeping
across a large number of settings for task concentration and fre-
quency, and varied the number of agents through {100, 324, 729}
(i.e., lattices of dimension 10, 18, and 27). Two supervisory config-
urations were considered: a 9-supervisor configuration and a base-
line (or no-sharing) arrangement. Our goal is to characterize how
a 9-supervisor setting fares compared to the baseline as the num-
ber of subordinates per supervisor increases. This was achieved by
varying the network size (see Figure 6). Performance in the 100-
agent network was roughly 30% higher than the baseline. As net-
work size increased to 729 agents, performance median improved
by 40% compare to the baseline.
Figure 4: Performance of the single-supervisor configuration
vs. no-sharing. Smaller areas under the curve indicate faster
convergence.
tion far outperforms the baseline approach with no transfer, with
Figure 6: Performance of the 9-supervisor configuration as a
function of network size.
These gains come at the cost of increased communication. Note,
however, that the communication overhead of Algorithm 1 scales
with the supervisor-to-subordinate ratio, not with the total num-
ber of agents (see Section 6.2 for a formal complexity analysis);
e.g., the 9-supervisor configuration undergoes 9 times less com-
munication than the single-supervisor configuration. In our experi-
ments we further observed that communication volume was invari-
ant with respect to K: on average 43 bytes per step per subordinate
using a loss-less compression scheme. This suggests 1) that com-
munication costs (i.e., the total amount of bytes exchanged between
agents sharing experiences) scales linearly with the supervisor-to-
subordinate ratio; and 2) that even when accounting for communi-
cation costs, more distributed configurations tend to perform better.
In fact, all evaluated information-sharing configurations surpassed
the baselines while incurring very low communication overhead --
as previously mentioned, on average 43 bytes per step per subor-
dinate using a loss-less compression scheme in a 100-agent net-
work. The fact that communication volume was empirically ob-
served to be invariant with respect to K is not a trivial statement --
in the worst case, communication volume could still increase lin-
early with the number of potential sharing groups within a supervi-
sory group, k, and linearly with the reporting window, K. The fact
that it does not suggests that Algorithm 1 is capable of effectively
identifying and exploiting useful sharing opportunities, instead of
always relaying all K observations to all n agents within a super-
visory group.
We also explored the use of lossy experience compression
schemes, which significantly reduced communication costs and
incurred negligible performance penalties. One lossy compres-
sion technique that we evaluated is a sparse polynomial spline
interpolator -- a method that approximately represents a set of ex-
periences with as few coefficients as possible. Supervisors may
use such a sparse interpolator in order to model how the observed
data (i.e., sequences of states, actions, and rewards within a report-
ing window) vary with time. Because states and rewards usually
change smoothly, the number of coefficients needed to represent the
corresponding set of observations Oi is typically much smaller than
the number of observations (K). Note that actions within the set of
observations Oi of an agent i are categorical features, and therefore
are not compressed. We constructed each compressed model of Oi
according to different compression degrees. Compression degree
refers to the frequency with which we subsample elements of Oi
in order to construct the training set for the interpolator. A com-
pression degree of R typically results in models requiring O( K
R )
coefficients in order to approximate a set of K observations. When
employing a lossy experience compression scheme such as this, su-
pervisors relay not complete sets of experiences to all agents within
a sharing group, but only the coefficients of the corresponding lossy
model. Figure 7 depicts how the use of a compression scheme im-
pacts the communication framework by which subordinate and su-
pervisor agents in a network share experiences.
Figure 7: Relaying compressed experiences through a supervi-
sor.
Figure 8 shows the system-wide communication volume (in
bytes) resulting from the use of different compression degrees. In
particular, this graph presents the average system-wide communi-
cation volume when evaluated over all supervisory structures dis-
cussed in Section 7.1 and tested in a network with 100 agents. The
reporting interval in this experiment was K = 100. When per-
forming these experiments observed an interesting trend: the use
of lossy models with compression degree up to 15 had negligi-
ble effect on the performance of the method (smaller than error
bars in Figure 5). This occurs because the set of observations of
an agent (states and rewards) is highly temporally correlated, and
can, therefore, be efficiently compressed via a sparse model and re-
constructed with very little information loss. Compression degrees
higher than 15, on the other hand, resulted in negligible positive
impact on the overall system-wide communication volume, since
the size of the (uncompressed) action time series begins to domi-
nate. These observations suggest that in systems where states and
rewards vary smoothly over time, it is possible to deploy effective
compression schemes for lowering the overall communication costs
of the method -- in this application, resulting in a 5-fold decrease
when compared to an architecture that uses loss-less compression.
Figure 8: System-wide communication volume resulting from
the use of different lossy compression degrees.
7.3 Robustness
In the previous experiments, unless noted otherwise, we used a
reporting interval of K = 115 steps, selected by cross-validation
to minimize a balance between performance and communication
overhead. Smaller values of K lead to more frequent communi-
cation, whereas larger values of K decrease the likelihood that an
agent's transition and reward models will remain static across the
K-timestep interval. The latter case results in reports containing
mixed observations arising from multiple underlying local learn-
ing contexts, which makes sharing less effective. We evaluate the
robustness of our algorithm by studying the effect of using subopti-
mal reporting intervals K. We ran 10 trials of the single-supervisor
and baseline configurations for each of eight reporting intervals,
using λ = 0.3 in a 100-agent network with boundary-based task
distribution (Figure 9). As larger reporting intervals are used, per-
formance degrades, as heterogeneity is induced in transition and
reward samples and the agent learns a policy that averages obser-
vations from different local learning contexts.
We also analyzed our method's robustness by studying the im-
pact of using corrupted or suboptimal context features. Context
SupervisorSubordinate ASubordinate BCompressed ExperiencesCompressed ExperiencesDecompressConstruct Context FeaturesAssessSimilarityCompressSubordinate CCompressed Experiencespolicy, Q-function or model similarity as proxies of environment
similarity. Although other transfer mechanisms are possible, to our
knowledge no other methods exist that address our particular set-
ting and scale. We believe this is the first algorithm that allows ex-
perience sharing in a concurrent and interacting MAS with ∼1000
agents while undergoing low communication and computational
overhead. Importantly, the time complexity of our method scales
with the number of agents within each local supervisory group, not
with the total number of agents in the network. Experiments further
suggest that the method provides significant improvements over
baseline settings with no experience sharing, and quantitative anal-
yses demonstrate that sharing becomes increasingly advantageous
as the system size grows. Finally, we have shown that our method is
robust to noise-corrupted or suboptimal context features, that com-
munication costs scale linearly with the supervisor-to-subordinate
ratio, and that sparse lossy compression schemes may be deployed
and provide a 5-fold improvement in communication costs while
inducing negligible negative impact on system-wide performance.
REFERENCES
[1] G. Boutsioukis, I. Partalas, and I. Vlahavas. Transfer learning
in multi-agent reinforcement learning domains. In Recent
Advances in Reinforcement Learning, pages 249 -- 260.
Springer, 2012.
[2] J. L. Carroll and K. Seppi. Task similarity measures for
transfer in reinforcement learning task libraries. In
Proceedings of the International Joint Conference on Neural
Networks, pages 803 -- 808. IEEE, 2005.
[3] R. M. De Jong and J. Davidson. The functional central limit
theorem and weak convergence to stochastic integrals i:
weakly dependent processes. Econometric Theory, pages
621 -- 642, 2000.
[4] T. G. Dietterich. State abstraction in maxq hierarchical
reinforcement learning. In Advances in Neural Information
Processing Systems 12, pages 994 -- 1000. MIT Press, 2000.
[5] D. Garant, B. C. da Silva, V. Lesser, and C. Zhang.
Accelerating multi-agent reinforcement learning with
dynamic co-learning. Technical Report UM-CS-2015-004,
School of Computer Science, University of Massachusetts
Amherst, 2015.
Figure 9: Effect of varying reporting intervals K on system
performance.
features that do not properly abstract the underlying local learning
environment make it difficult to identify appropriate sharing oppor-
tunities. To evaluate the sensitivity of our algorithm to this issue
we added different levels of normally-distributed noise to context
features. Noise degrades the quality of the signal encoded in the
features, up to a point where they are entirely uncorrelated with
the underlying system dynamics. The magnitude of the noise was
varied relative to the standard deviation of context features; when
noise level is 1, the standard deviation of the normally-distributed
noise term is greater than (or equal) to the standard deviation of
any context feature, effectively eliminating any signal that they en-
coded. Figure 10 shows that when noise dominates (approaches 1),
performance becomes increasingly volatile. The performance dis-
tribution, with mean approximately 1, suggests that as context fea-
tures become less meaningful, the sharing mechanism is equally
likely to achieve a 50% reduction in the area under the learning
curve as it is to increase this area by 100%. In other words, as the
information-sharing process tends to be guided by biased or incor-
rect features, there is no consistent positive or negative impact on
performance; the most prominent impact is on performance vari-
ability.
[6] C. Guestrin, D. Koller, and R. Parr. Multiagent planning with
factored mdps. In Proceedings of Advances in Neural
Information Processing Systems, pages 1523 -- 1530, 2001.
[7] Y. Hu, Y. Gao, and B. An. Learning in multi-agent systems
with sparse interactions by knowledge transfer and game
abstraction. In Proceedings of the International Conference
on Autonomous Agents and Multiagent Systems, pages
753 -- 761. IFAAMAS, 2015.
Figure 10: Robustness of experience sharing to the use of sub-
optimal/corrupted context features.
8. DISCUSSION
We have presented a solution for experience transfer among
RL agents in large multi-agent systems. Our method adaptively
identifies opportunities to transfer experiences between context-
compatible agents, where contexts provide abstract characteriza-
tions of local learning environments. By explicitly identifying
context-compatible groups, we avoid issues arising from the use of
[8] P. W. Keller, S. Mannor, and D. Precup. Automatic basis
function construction for approximate dynamic
programming and reinforcement learning. In Proceedings of
the 23rd International Conference on Machine Learning,
pages 449 -- 456, New York, NY, USA, 2006. ACM.
[9] H. Kitano, S. Tadokoro, I. Noda, H. Matsubara, T. Takahashi,
A. Shinjou, and S. Shimada. Robocup rescue: Search and
rescue in large-scale disasters as a domain for autonomous
agents research. In Systems, Man, and Cybernetics, 1999.
IEEE SMC'99 Conference Proceedings. 1999 IEEE
International Conference on, volume 6, pages 739 -- 743.
IEEE, 1999.
[10] G. Konidaris and A. G. Barto. Efficient skill learning using
abstraction selection. In Proceedings of the 21st
[27] M. E. Taylor, S. Whiteson, and P. Stone. Transfer via
inter-task mappings in policy search reinforcement learning.
In Proceedings of the 6th International Joint Conference on
Autonomous Agents and Multiagent Systems, May 2007.
[28] R. Tibshirani, G. Walther, and T. Hastie. Estimating the
number of clusters in a data set via the gap statistic. Journal
of the Royal Statistical Society: Series B (Statistical
Methodology), 63(2):411 -- 423, 2001.
[29] S. J. Witwicki and E. H. Durfee. Influence-based policy
abstraction for weakly-coupled dec-pomdps. In Proceedings
of the International Conference on Automated Planning and
Scheduling, pages 185 -- 192, 2010.
[30] C. Zhang and V. Lesser. Multi-Agent Learning with Policy
Prediction. In Proceedings of the 24th AAAI Conference on
Artificial Intelligence, pages 927 -- 934, Atlanta, 2010.
[31] C. Zhang and V. Lesser. Coordinating Multi-Agent
Reinforcement Learning with Limited Communication. In
Proceedings of the 12th International Conference on
Autonomous Agents and Multiagent Systems, pages
1101 -- 1108. IFAAMAS, 2013.
[32] C. Zhang, V. Lesser, and S. Abdallah. Self-Organization for
Coordinating Decentralized Reinforcement Learning. In
Proceedings of the 9th International Conference on
Autonomous Agents and Multiagent Systems, pages 739 -- 746,
2010.
International Joint Conference on Artificial Intelligence,
pages 1107 -- 1112, 2009.
[11] R. M. Kretchmar. Parallel reinforcement learning. In
Proceedings of the 6th World Conference on Systemics,
Cybernetics, and Informatics, 2002.
[12] A. Lazaric, M. Restelli, and A. Bonarini. Transfer of samples
in batch reinforcement learning. In Proceedings of the
International Conference on Machine Learning, pages
544 -- 551. ACM, 2008.
[13] L. Li, T. J. Walsh, and M. L. Littman. Towards a unified
theory of state abstraction for mdps. In Proceedings of the
Ninth International Symposium on Artificial Intelligence and
Mathematics, pages 531 -- 539, 2006.
[14] M. L. Littman. Value-function reinforcement learning in
markov games. Cognitive Systems Research, 2(1):55 -- 66,
2001.
[15] S. Mahadevan. Proto-value functions: Developmental
reinforcement learning. In Proceedings of the 22nd
International Conference on Machine Learning, pages
553 -- 560, New York, NY, USA, 2005. ACM.
[16] V. Mnih, A. P. Badia, M. Mirza, A. Graves, T. P. Lillicrap,
T. Harley, D. Silver, and K. Kavukcuoglu. Asynchronous
methods for deep reinforcement learning. CoRR,
abs/1602.01783, 2016.
[17] K. P. Murphy. Machine learning: a probabilistic perspective.
MIT press, 2012.
[18] R. Nair, P. Varakantham, M. Tambe, and M. Yokoo.
Networked distributed pomdps: A synthesis of distributed
constraint optimization and pomdps. In Proceedings of the
National Conference on Artificial Intelligence, volume 5,
pages 133 -- 139, 2005.
[19] F. A. Oliehoek, M. T. Spaan, S. Whiteson, and N. Vlassis.
Exploiting locality of interaction in factored dec-pomdps. In
Proceedings of the 7th international joint conference on
Autonomous agents and multiagent systems-Volume 1, pages
517 -- 524. International Foundation for Autonomous Agents
and Multiagent Systems, 2008.
[20] G. Owen. Game Theory. Academic Press, 2nd edition, 1982.
[21] R. Parr, C. Painter-Wakefield, L. Li, and M. Littman.
Analyzing feature generation for value-function
approximation. In Proceedings of the Twenty-Fourth
International Conference on Machine Learning, page
737â A¸S744, 2007.
[22] B. Price and C. Boutilier. Accelerating reinforcement
learning through implicit imitation. Journal of Artificial
Intelligence Research, 19:569 -- 629, 2003.
[23] B. Ravindran and A. G. Barto. SMDP homomorphisms: An
algebraic approach to abstraction in semi-markov decision
processes. In Proceedings of the Eighteenth International
Joint Conference on Artificial Intelligence, pages
1011 -- 1018, 2003.
[24] H. A. Simon. The sciences of the artificial, volume 136.
1996.
[25] A. Taylor, I. Duparic, E. Galván-López, S. Clarke, and
V. Cahill. Transfer learning in multi-agent systems through
parallel transfer. In Theoretically Grounded Transfer
Learning at the International Conference on Machine
Learning, 2013.
[26] M. E. Taylor and P. Stone. Transfer learning for
reinforcement learning domains: A survey. The Journal of
Machine Learning Research, 10:1633 -- 1685, 2009.
|
1506.05154 | 1 | 1506 | 2015-06-16T21:17:05 | SNA-based reasoning for multiagent team composition | [
"cs.MA",
"cs.AI",
"cs.SI"
] | The social network analysis (SNA), branch of complex systems can be used in the construction of multiagent systems. This paper proposes a study of how social network analysis can assist in modeling multiagent systems, while addressing similarities and differences between the two theories. We built a prototype of multi-agent systems for resolution of tasks through the formation of teams of agents that are formed on the basis of the social network established between agents. Agents make use of performance indicators to assess when should change their social network to maximize the participation in teams | cs.MA | cs | International Journal of Artificial Intelligence & Applications (IJAIA) Vol. 6, No. 3, May 2015
SNA-BASED REASONING FOR MULTI-
AGENT TEAM COMPOSITION
André Filipe de Moraes Batista1 and Maria das Graças Bruno Marietto2
1Metropolitan-United Faculty (FMU), São Paulo, Brazil.
2Federal University of ABC (UFABC), São Paulo, Brazil.
ABSTRACT
The social network analysis (SNA), branch of complex systems can be used in the construction of multi-
agent systems. This paper proposes a study of how social network analysis can assist in modeling multi-
agent systems, while addressing similarities and differences between the two theories. We built a prototype
of multi-agent systems for resolution of tasks through the formation of teams of agents that are formed on
the basis of the social network established between agents. Agents make use of performance indicators to
assess when should change their social network to maximize the participation in teams.
KEYWORDS
Multi-Agent Systems, Social Network Analysis, Complex Systems, Reasoning, Task Resolvers
1. Introduction
One of the research topics in the Multi-Agent Systems (MAS) area is the definition of models that
represents social structures, such as organizations and alliances, in order to analyze more
objectively the emergent behavior of open systems. Individuals who are related to each other by
different types of relationships, such as dependencies on goals, conflicts over resources, similar
beliefs and so on compose organizations and alliances.
Since the 80s several studies were carried out using the theory of MAS to represent models of
social phenomena. Axelrod in [1] argues that the object of these studies is the use of the theory of
MAS to break up simplistic definitions on a particular subject, due to the need of the model be
mathematically tractable. Thus, social phenomena models normally used concepts such as
homogeneity, ignoring interactions.
With the use of agent-based models, this research area has been benefited by being able to
represent most of the behaviors of autonomous agents and the interactions between them. Agent-
based models are in the most cases suitable for decentralized processing and decision making,
particularly when individual interactions lead to the emergence of collective patterns, as well as
complex systems. Therefore, there is a close relationship between MAS and Complex Systems
Theory, and this relationship can be represented in the Social Network context.
An important question is how to represent these relationships, characterized by a high degree of
dynamism. Dealing with social issues, MAS area was inspired mainly by the economic
organizational theory and legal theory. Although, there is a lack of attention in the area of
research that describes the relationships between individuals within human organizations and
their dynamics. To this area, we give the name of Social Network Analysis (SNA). The social
network analysis has emerged as a key technique in modern sociology, anthropology, social
DOI : 10.5121/ijaia.2015.6305 51
International Journal of Artificial Intelligence & Applications (IJAIA) Vol. 6, No. 3, May 2015
psychology, communication studies, information science, organizational studies, and economics,
among others.
This work aims to integrate the techniques of multi-agent systems and social network analysis,
allowing an agent society make use of SNA metrics in the decision-making process considering
attributes such as the position in the network and the value and the importance of an agent in the
network. Since both techniques use the social element, the agent, the synergy between them will
allow easy use of models based on social network analysis, so that the multi-agent systems
become more reliable in the representation of social phenomena. For this, an application was
developed representing process of selecting teams for solving tasks in a multi-agent society, in
which agents have specific skills and their position in the social network will influence their
performance in the multi-agent society.
This work is structured as follows: in Section presents a review of the issues of multi-agent
systems and social network analysis area, while Section presents prospects of integration between
both techniques. Section presents and discuss about the prototype of multi-agent system for a
task-solving problem by agents teams making use of SNA technique. Section presents the final
considerations of this work.
2. Background
In this section, we present a review of the literature on multi-agent systems (MAS) and social
network analysis (SNA) research areas.
2.1. Multi-Agents Systems
Multi-agent systems consists in multiple agents that interact to each other in order to perform a
specific set of tasks. The metaphor of intelligence used by these systems is the intelligent
community in which social behavior is the basis for the system intelligence. From this, we can
distribute the agents in areas of specialization and with the interaction among them a complex
problem can be solved in a faster and more dynamically way[2].
The metaphor often used to structure the agents society is the human social groups, where expert
teams can solve problems cooperatively, and the complexity exceeds the individual capacities of
each of their members [3].
The autonomy of an agent allows it to take its own decisions to achieve its goals [4]. Thus, agents
can get in and get out of the society, change their rules, roles, inter-dependent relationships with
other agents, etc. This feature leads to a new generation of systems and distributed applications
intrinsically dynamic, open and complex.
The notion of agents and multi-agent systems have been adopted in the modeling of various
complex systems involving urban planning, biology, logistics and production, and many others [5,
6, 7, 8, 9, 10, 11, 12, 13]. Lynne and Nigel [14] propose a model based on agents for social
networks. At the same step that the proposed model is simplistic, it can represent a wide variety
of social networks. Teresa and Nina [15] implemented a Java tool that presents the dynamic
model of social behavior associated with the recruitment of terrorists based on prescriptive
models. They used concepts of MAS and SNA to represent this dynamic. Ronald et al. [16]
proposed a model based on agents to analysis the social influence in the travel activities decision
process. The agents have a travel schedule, and interact with each other in order to schedule social
activities, in particular trade based on the nature of the activity, who will participate, time and
52
International Journal of Artificial Intelligence & Applications (IJAIA) Vol. 6, No. 3, May 2015
location. The structure formed between the agents described as a complex social network is the
core of the decision process.
2.2. Social Network Analysis
Social Network Analysis (SNA) is a scientific research area derived from areas such as
Sociology, Social Psychology and Anthropology. This area studies the relational links
(a.k.arelational tie) between social actors. An actor in the SNA can be both individuals and
companies, analyzed as individual units, or collective social units such as, for example,
departments within an organization, public service agencies in a city, nation-states of the
continent, among others. The SNA fundamentally differs from other studies in that the emphasis
is not on the attributes (characteristics) of the actors, but the links between them.
Relations between actors pairs are made by relational ties or linkages. The most common types of
links are: individual assessment (eg, friendship or respect); the transaction and the transfer of
material resources (a purchase and sale transaction between two companies); the transfer of
nonmaterial resources (the exchange of electronic messages) or not; the association or affiliation
that occurs when actors participate in joint events (parties); interaction (sitting next to another
person); the movement and the physical and social connection; links between formal roles (boss-
subordinate authority loop in a company); biological relationships (father and son) and so on.
SNA is a method for enhancing the sharing of knowledge by analyzing the position and structure
between actors, i.e their relationships. According to [17], the network analysis process considers
basically two analytical perspectives that complement each other:
other nodes/actors in the network with others ego nodes that it maintains relations.
Therefore, the number, the magnitude and the diversity of the direct or indirectly
connections established with the ego define the other network nodes;
1. Egocentric - this type of analysis has attention in facing the particular node/actor (ego) and
2. Socio centric - in this type of analysis, information about the pattern of links between all
1. Individual positions - from the viewpoint of the actors;
2. Whole network - from the viewpoint of the assembly of links forming the network;
3. clusters and components - from the viewpoint of the groups formed due to some kind of
The interpretation of the results obtained with the SNA metric can be made from three points of
view, namely:
nodes/actors in the network is used broadly to identify reticulated subgroups with high
degree of internal cohesion and the nodes that have similar positions on the network.
relationship.
The social network analysis metrics provides mathematical mechanisms to analyze a given
society or group. Among the most significant metrics for understanding the role of an actor in the
network, we can cite:
• Centrality Degree: it indicates the prestige and power that the author has in that particular
• Betweenness Degree: it shows how much an actor is between others actors on the network.
community. In the SNA context, the power dimension is derived from the relational ties of
an actor. The more relationship an actor makes, the more power it has.
It helps to locate actors in positions of influence, those with the network information, etc.
An actor with a high degree of betweenness may be functionally operating as a broker in
the network;
53
International Journal of Artificial Intelligence & Applications (IJAIA) Vol. 6, No. 3, May 2015
• Closeness Centrality: shows the closeness of an actor to others on the network and thus its
access to resources circulating in the network, based on the evaluation of the shortest path
within the network.
Many of these metrics can be used in a multi-agent scenario, since it is composed of independent
individuals who interact with each other. However, there is still a gap on the theory and practice
on this issue, that is, how to implement and model a MAS with many different relationships
between agents in order to capture and analyze them.
3. Social Network Analysis and Multi-Agent Systems
One of the biggest questions about the social network analysis is“it is known that social networks
can be used to analyze human societies. But these can also be used for societies of agents?”. An
inconvenient and often questionable point, on social network analysis is that normally a
transcription of the human social structures in sociological meanings is made from a clear and
artificial manner, due to the complexities of individuals and their relationships. On the opposite
side the simplicity in social terms of multi-agents systems suggests that the analysis of social
networks can be applied to these, including may get even better results.
In the interconnection of two areas of study, one of the points of attention is the level of approach
to be carried out. A multi-agent system is built from the specification of the smallest entity: the
agent. The behavior and the structures are emerging consequences of their interactions. The same
is true for Social Networks; the interaction of the actors will result in the emergence of the
structure of the social network.
Many MAS consist of a complex network of autonomous and interdependent agents. In most of
these systems, agents must select a set of other agents with whom will interact, based on factors
such as limited resources, exchange of interests of knowledge, etc.
[18] Showed that the structure of existing artificial social network in multi-agent society, when
used to govern the actions of the agents, is extremely connected with the performance of the
multi-agent society.
Modeling scenarios in which agents are geared to social networks presents a set of challenges.
First, agents must make adaptations in the network by decisions made based on local system
information. This local information can give the agent a figure partially or completely wrong
about the current environment. In this case, it is said that an agent has a limited horizon of the
system. Since agents are organized as networks, and how various agents perform their local
decisions (adapting your social network), these simultaneous changes may neglect the benefits of
adaptation made by an agent.
Focusing on the social network adaptation strategy of an agent in a cooperative MAS (the agents
cooperate towards a single goal), the following questions should be considered when modeling
such agents, which are
• Local perception of overall performance: how an agent can estimate the collective
performance of the organization? These estimates may be unreliable, since they are each
based on partial views of the organization. A possible solution to this difficulty is to explore
the communication skills of the agents. With use of some communication protocols, an
agent can estimate whether its perception of overall performance is correct, or if it can use
the perception of neighboring agents to improve it;
54
International Journal of Artificial Intelligence & Applications (IJAIA) Vol. 6, No. 3, May 2015
• Triggers of adaptation: when an agent must decide to adapt its structure of local
• Network adaptation: how an agent decides which has to be removed connection and how it
connectivity? There are many possibilities of these triggers be fired. An agent, for example,
may decide to adapt its structure based on estimates of performances in relation to the
attendance of its goal;
selects a new agent to establish a new social connection. A good strategy advocated by [18]
is the adaptation based on reference where an agent asks for a reference about another agent
for one of your neighbors.
Social Network Analysis’ based Reasoning for Multi-Agent Team
4.
Composition
Based on [18], the proposed prototype on this work is a simple but intuitive multi-agent
cooperative system. It is a multi-agent society for dynamic team formation of task resolvers.
This prototype presents a model of dynamic formation of teams, where teams of agents are
formed spontaneously and in the decentralized form, as soon as the decision of an agent in
adhering to a team is done by base in its local social network.
In the proposed model, a set of tasks are generated periodically and are globally advertised to the
multi-agent society. The role of agents in this society is forming teams to solve these tasks. The
participating agents of this society are involved for a social network. For an agent to be on a team,
it must possess a social connection (that is, an edge in the network) with at least one member of
the team.
Once this prototype focuses on the team formation process, when these teams are complete the
task is considered done. Thus, in this model the multi-agent society consists of N agents, A =
{a1,a2,...,aN}, where each agent can be considered as a single node on the social network. The
network is modeled as an adjacency matrix E, where each adjacency matrix elements eij= 1if there
is an edge between the agents ai and aj, or eij= 0 otherwise. The degree (number of connections) of
an agent ai is defined by
In multi-agent society, each agent has a single ability, σi∈ [1,σ], where σ is the number of different
types of abilities present in the society. During the process of forming teams, each agent can be in
one of three states: uncommitted, committed, active. An agent is in the state uncommitted if it is
available to join teams and therefore is not in any team. When an agent selects a task in which it
is able to perform, this is in the committed state. When this agent effectively is accepted for the
team, the same is in the active state.
Agents that are in the active state can no longer get out of the team until it is complete or a
timeout is reached. In this case, the team was not formed in the required time to resolve the task.
The tasks are advertised in multi-agent society in a fixed interval of time µ. Each task is a vector
Tk of size k with required skills. Each task is announced by a finite number of time γ, ensuring
that resources (i.e., agents) linked to a task become available if the team is not formed.
The requirement of a team be an induced connected subgraph of the social network means that for
any agent on the team, ai∈ Mk - where Mk is the k team of this society, there
55
International Journal of Artificial Intelligence & Applications (IJAIA) Vol. 6, No. 3, May 2015
should be at least some other agent aj∈ Mk,i≠j such that eij= 1. This implies that an agent in the
Figure 1: Process of forming teams of agents to task resolution, making use of social network metrics.
uncommitted state is only eligible to enter in the committed state in two situations: 1) team
startup, when the team is empty, and 2) joining a team, when at least one of the neighbors of the
agent is in committed state related to this task.
Unlike the model presented by cite [18], in this model all agents in the uncommitted state can try
to belong to a team when they receive a task in which its ability is being requested. At this point,
a Scheduler agent should coordinate the multi-agent society. It is up to this agent accepts or not
the agents making use of SNA heuristics. Figure 1 presents an indicative flow chart of the multi-
agent process, highlighting where the techniques and metrics from social network analysis are
used.
In the flow shown in Figure 1 interactions, the role of the manager agent is generating tasks (skill
set) and send them to the scheduler agent. The scheduler agent has the following set of functions:
receive tasks sent by the manager agent and transmit them to all task agents; receive the proposals
from task agents; select the agents to composition of the teams and check the conclusion
(satisfactory or not) of the tasks.
Task agents receive tasks and if they have the necessary skills, send an application to the
scheduler agent. Right now, they are awaiting a confirmation or a rejection message. If it is
rejected then returns to receive tasks. If accepted, goes to the team and so it is waiting for the
complete formation of the team.
Social strategies are implemented as follows:
56
1. Scheduler Agent: it knows the entire network of agents. When an agent task sends a
message stating the interest in participating in the team, the scheduler agent checks whether
the team is empty (in this case the agent is starting the team), or if the agent knows other
agents that make up the team. This strategy that how the structure of social networks can be
used for decision-making. Such approach can be used to solve problems of allocation in a
general way. These problems have a high degree of complexity, and this occurs for two
main reasons. First, find the optimal scheduling is a NP-hard problem. In addition, each
scheduling problem has particular details, involving changes in the search algorithm of the
International Journal of Artificial Intelligence & Applications (IJAIA) Vol. 6, No. 3, May 2015
solutions. Thus, it becomes necessary to use some type of heuristic to reduce the search
space. SNA metrics can be a valid heuristic in this situation;
2. Task Agent: each task agent has a local measure of performance. This measure will be the
gear adaptation of the agent’s social network strategy. This strategy is based on
performance and reference [18]. The trigger of this adaptation is the measure of local
performance Y (ai), which each agent ai has. This measure is the ratio between the number
of times the agent participated effectively in a team (it was accepted for a team) by the
number of attempts to participate. The measure of performance is considered valid when
the agent tried to enter a team at least v times. With each iteration, the agent ai chooses
adapt their social network if this has a measure of performance valid, and if the measure of
performance is below the average of the sum of the performance of all its neighbors. That
is, an agent chooses adapt its social network if:
If an agent decides to adapt its network based on the performance value, this adaptation is
given both by performance and by reference. The agent will remove the connection to its
immediate neighbor aj which has the smallest measurement of performance:
(2)
The agent asks for a reference to the neighbor with the highest performance. Similarly, this
agent will refer to its neighbor with the highest performance. Is al the agent to whom the
agent ai calls for reference, the agent will establish a new connection with ak, the neighbor
of greater performance of al:
Such strategy represents how the knowledge of the network can be used in a MAS. In this
case, the task agent is making use of the centralization degree of the SNA theory. This is a
measure of power, influence, and which in this case is a measure of performance. Thus, an
agent is able to adapt its social network site so that this attempt to get more success in being
a member of a team.
4.3. Communication Protocols
All SNA-based reasoning may be mapped using a set of communication protocols in order to
establish a standard mechanism for establishing team for solving tasks. This protocol consists of a
set of messages with ACL (Agent Communication Language) perfomatives that indicate what
actions are being performed on the social network of agents.
The process begins when the manager agent sends a propose message to the scheduler agent. The
scheduler agent sends this message to all task agents. If a particular task agent has one of the
skills required by the task, this sends an accept-proposal message to the scheduler agent.
After receiving all the proposals, the scheduler agents reasons using SNA metrics and sends
accept-proposal messages for the agents that were accepted, and reject-proposal
57
International Journal of Artificial Intelligence & Applications (IJAIA) Vol. 6, No. 3, May 2015
Figure 2: Prototype developed in JADE platform: social network dynamically built by agents, monitoring of
messages exchanged and log of actions.
for those that were rejected. Agents who received the acceptance, are now committed to a team
and will no longer respond to the proposals made by the scheduler. The scheduler agent checks
after a time γ if the team was complete. If it is not complete, this sends a failure message to staff
agents of this team, stating the fact. When a team is complete, the scheduler agent considers that
the task was performed with success, sending a message confirm, releasing the agents in order to
be a member of new teams.
The mechanism of adaptation by performance and reference was implemented as follows: when
an agent reaches a valid value of performance (for example, after 10 attempts of formation of
teams), it sends a query-if message questioning to its neighbors about their values of performance.
The neighbors receive this message and respond to the agent with the value of its respective
performances, with a inform-if message. After receiving all the performances, the agent checks if
is advantageous to perform the change. If yes, this sends a proxy message to its neighbor with
higher performance by asking another agent by reference. After receiving this referenced agent
the agent adds it to its network, removing the neighbor with the lowest performance.
Figure 2 shows the control screen developed in JADE platform, allowing to observe in real-time
the changes in the structure of the social network, the messages exchanged between them, as well
as a detailed action log, which enables us to analyzing the SNA metrics used for decision-making
by each agent.
5. Final Considerations
Multi-agent systems and social networks are closely united. These two theories help to shape and
understand social phenomena in many different ways. This work was concerned to understand
how social networks could improve the multi-agent system modeling process.
58
International Journal of Artificial Intelligence & Applications (IJAIA) Vol. 6, No. 3, May 2015
The integration between the two areas can be in two ways: macro and micro modeling. The macro
modeling consists in using the existing metrics in SNA to analyze multi-agent behaviors. Given
the inherent distribution of multi-agents systems and the high degree of interaction in the MAS
society, it is important to have a tool that assists in validation of proposed model.
On the other hand, in the micro modeling agents are built making use of social networking
metrics in their behavior. With this, the interaction between the agents can generate new social
phenomena, as well as allow them to take a decision based on your social network. The prototype
used this approach and showed how an agent society can be built to solve a set of tasks where
teams are formed based on the social network structure.
As future work, we intend to improve the modeling of new social behaviors, such as anarchy, lack
of collaboration, and new strategies of relationship between agents that allow a multi-agent
society to act on non-cooperative scenarios.
References
[1] Axelrod, R.: Advancing the art of simulation in the social sciences. Working Papers 97-05-048, Santa
Fe Institute (May 1997)
[2] dasGraças Bruno Marietto, M.: DefiniçãoDinâmica de EstratégiasInstrucionaisemSistemas de
TutoriaInteligente: Uma AbordagemMultiagentesna WWW. PhD thesis, InstitutoTecnol´ogico de
Aeron´autica (2000)
[3] de Lira Lino, N.: Modelo de percep¸cao de agentesbaseados no sistema de emo¸coes (2006)
[4] Castelfranchi, C., Falcone, R.: From automaticity to autonomy: The frontier of artificial agents. In
Hexmoor, H., Castelfranchi, C., Falcone, R., eds.: Agent Autonomy. Volume 7 of Multiagent
Systems, Artificial Societies, and Simulated Organizations. Springer US (2003) 103–136
Jiang, Y., Jiang, J.: Understanding social networks from a multiagent coordination perspective. IEEE
Transactions on Parallel and Distributed Systems 99(PrePrints) (2013) 1
[6] Sless, L., Hazon, N., Kraus, S., Wooldridge, M.: Forming coalitions and facilitating relationships for
completing tasks in social networks. In: Proceedings of the 2014 International Conference on
Autonomous Agents and Multi-agent Systems. AAMAS ’14, Richland, SC, International Foundation
for Autonomous Agents and Multiagent Systems (2014) 261–268
[5]
[7] Pujol, J.M., Sanguesa, R., Delgado, J.: Extracting reputation in multi agent systems by means of
social network topology. In: Proceedings of the First International Joint Conference on Autonomous
Agents and Multiagent Systems: Part 1. AAMAS ’02, New York, NY, USA, ACM (2002) 467–474
[8] Pitt, J., Ramirez-Cano, D., Draief, M., Artikis, A.: Interleaving multi-agent systems and social
networks for organized adaptation. Comput. Math. Organ. Theory 17(4) (November 2011) 344–378
[9] Hu, X., Zhao, J., Zhou, D., Leung, V.C.: A semantics-based multi-agent framework for vehicular
social network development. In: Proceedings of the First ACM International Symposium on Design
and Analysis of Intelligent Vehicular Networks and Applications. DIVANet ’11, New York, NY,
USA, ACM (2011) 87–96
[10] Aziz, A.A., Ahmad, F.: A multi-agent model for supporting exchange dynamics in social support
networks during stress. In: Proceedings of the International Confer-
ence on Brain and Health Informatics - Volume 8211. BHI 2013, New York, NY, USA, Springer-
Verlag New York, Inc. (2013) 103–114
[11] Heppenstall, A.J., McFarland, O.E., Evans, A.J.: Application of multi-agent systems and social
network theory to petrol pricing on uk motorways. In: Proceedings of the 4th International Central
and Eastern European Conference on Multi-Agent Systems and Applications. CEEMAS’05, Berlin,
Heidelberg, Springer-Verlag (2005) 551–554
[12] Ma, L., Zhang, X.: Hierarchical social network analysis using a multi-agent system: A school system
case. Int. J. Agent Technol. Syst. 5(3) (July 2013) 14–32
[13] Kumokawa, S., Kryssanov, V.V., Ogawa, H.: Sona: A multi-agent system to support human
navigation in a community, based on social network analysis. In: Proceedings of the 8th International
Conference on Intelligent Virtual Agents. IVA ’08, Berlin, Heidelberg, Springer-Verlag (2008) 509–
510
59
International Journal of Artificial Intelligence & Applications (IJAIA) Vol. 6, No. 3, May 2015
[14] Hamill, L., Gilbert, N.: A simple but more realistic agent-based model of a social network. The Centre
for Research in Social Simulation (2008)
[15] Ko, T.H., Berry, N.M.: Agent-based modeling with social networks for terrorist recruitment. In
McGuinness, D.L., Ferguson, G., eds.: AAAI, AAAI Press / The MIT Press (2004) 1016–1017
[16] Ronald, N., Arentze1, T., Timmermans, H.: An agent-based framework for modelling social influence
on travel behaviour. In: MODSIM. (2009) 2955–2961
[17] Wellman, B.: The persistence and transformation of community: From neighbourhood groups to
social networks (2001)
[18] Gaston, M.E., Desjardins, M.: Agent-organized networks for dynamic team formation. In: In
Proceedings of clustering diameter the Fourth International Joint Conference on Autonomous Agents
and Multiagent Systems. (2005)
60
|
cs/0605032 | 1 | 0605 | 2006-05-08T12:27:59 | A framework of reusable structures for mobile agent development | [
"cs.MA",
"cs.AI",
"cs.SE"
] | Mobile agents research is clearly aiming towards imposing agent based development as the next generation of tools for writing software. This paper comes with its own contribution to this global goal by introducing a novel unifying framework meant to bring simplicity and interoperability to and among agent platforms as we know them today. In addition to this, we also introduce a set of agent behaviors which, although tailored for and from the area of virtual learning environments, are none the less generic enough to be used for rapid, simple, useful and reliable agent deployment. The paper also presents an illustrative case study brought forward to prove the feasibility of our design. | cs.MA | cs | A framework of reusable structures for mobile agent development
Bogdan Dumitriu
Tudor Marian
Computer Science Dept.
Computer Science Dept.
Tech. Univ. of Cluj-Napoca Tech. Univ. of Cluj-Napoca
26-28, G. Baritiu St.
26-28, G. Baritiu St.
400027 Cluj-Napoca
400027 Cluj-Napoca
Romania
Romania
[email protected]
[email protected]
Mihaela Dinsoreanu
Computer Science Dept.
Tech. Univ. of Cluj-Napoca
26-28, G. Baritiu St. 400027
Cluj-Napoca
Romania
[email protected]
Ioan Salomie
Computer Science Dept.
Tech. Univ. of Cluj-Napoca
26-28, G. Baritiu St.
400027 Cluj-Napoca
Romania
[email protected]
Abstract – Mobile agents research is clearly aiming towards
imposing agent based development as the next generation of
tools for writing software. This paper comes with its own
contribution to this global goal by introducing a novel
unifying framework meant to bring simplicity and
interoperability to and among agent platforms as we know
them today. In addition to this, we also introduce a set of
agent behaviors which, although tailored for and from the
area of virtual learning environments, are none the less
generic enough to be used for rapid, simple, useful and
reliable agent deployment. The paper also presents an
illustrative case study brought forward to prove the feasibility
of our design.
Keywords: mobile agents, agent behavior, unifying agent
platform framework
I. INTRODUCTION
Although agent platforms are becoming increasingly
widespread and powerful these days, although they are
evolving rapidly towards what some call a “second
generation” and although they are the centerfold of
extensive research all around the world, there still appears
to be something which prevents them from being
universally adopted as a natural evolution of the object
oriented world. In our opinion, there are actually two
things, not just one, which can be held responsible for the
current situation: lack of simplicity and lack of
interoperability.
Let us discuss lack of simplicity first. Most agent
platforms nowadays find themselves in one of the two
extremes: they either offer enormous flexibility at the cost
of usability (the user gets tangled in aspects that are
completely irrelevant to her application, thus losing
perspective) or they offer extended built-in functionality at
the price of interoperability and extensibility (the user has
plenty of predefined agent services to choose from and
plug into her application, but is confined to the specific
agent platform). The JADE [7] and the ADK [8] agent
platforms both fall into one of the two above categories.
Neither of these extremes can completely satisfy the user's
requirements. Ideally, an agent platform should offer the
means for the user to easily set up and run her agents (if so
required) and also the flexibility of changing virtually
everything about an agent if the need arises.
We also mentioned lack of interoperability in the
argument above. This is a bit more difficult to see,
especially for the untrained eye, due to the standardization
efforts such as those of FIPA [6] which allow a certain
degree of interoperability between agents built on top of
different agent platforms, or due to included semantic
support, such as that provided by ontologies. The catch,
however, is that compatibility among agents belonging to
different frameworks which are FIPA-compliant is virtually
restricted to what FIPA defines. This is a serious drawback,
if one cares to analyze it, because FIPA defines nothing in
terms of components which can be used for rapid agent
development and deployment. The implication of this fact
is that implementation efforts employed by various agent
platform developers are not reusable outside their own
platform (at least not without serious adaptations efforts).
The ultimate goal should be for the user to be able to
simultaneously benefit not only from a single, but from all
development work conducted by researchers and
implementors all around the globe.
These are the two main deficiencies which we have tried
to address with our work. Our idea was to overcome such
limitations by defining an abstract, platform independent,
framework which would allow the user to easily:
•
•
•
define her agents in terms of high level abstractions;
be able to “plug in” various common predefined
behaviors;
switch from one platform to another as the need arises.
Given that the area where we make use of agents falls
roughly into the category of computer based education, the
idea described before was primarily focused on the
development of a framework which would allow us to
benefit from all the aforementioned improvements in our
line of work. As a consequence, we narrowed our agent
directed research down to field of virtual learning
environments (VLE). This does not mean, however, that we
didn't design our framework to be as general as possible. It
merely implies the fact that the behaviors we have
identified and introduced into our implementation were
drawn mainly from the VLE field. Even so, by reading the
paper, it will become obvious that most of behaviors
described are equally applicable to a variety of other fields
as well.
In short, a virtual learning environment represents a
space available on-line where both students and teachers
are brought together to interact similarly to the way they do
in reality. There are a few things pertaining to a VLE which
allowed us to make certain simplifying assumptions in our
work. In the first place, a VLE is usually what one calls a
“closed environment”, meaning it has few (if any)
interactions with other systems. This has a direct
consequence in that our agents will usually be confined to
using “interior” (as opposed to “border”) protocols only.
Secondly, strong security requirements are normally absent
from a VLE, which makes concerns for agent
communication security a rather unimportant issue in our
case. Finally, the tasks our agents need to perform are
generally simple ones and can easily be achieved by the
composition of two or more basic behaviors, thus enabling
us to disregard some of the more advanced behaviors
(which might indeed be appropriate for other
environments) from our analysis.
We have based our agent work on that explained in [4].
What we have done was pick up where the authors of [4]
left off and change the agents employed in the assessment
service (AS) described there in order to make it benefit
from the advantages of our agent framework. This was
actually a means to prove the feasibility of our research.
In the first part of our paper we introduce and justify the
need for simple agent based reusable structures, especially
in an environment such as a VLE. We do this by describing
our vision of a unifying agent platform framework that puts
more (sample) real platforms all under the confines of the
same abstraction. We also bring forward a behavior
taxonomy which, in our opinion, can successfully be used
both in a VLE and in other environments to create
significantly useful agents “on the fly”. The detailed
description of such a behavior (namely, the Itinerary
behavior) is also addressed in last subsection of this part.
Since we have also made use of our platform in practice
as well, the second part of this article is dedicated to a case
study which covers the realization of a VLE assessment
service based on the agent technology. The study places the
service within the virtual university we have created,
defines the technical challenges that we have encountered
and discusses the solutions we have proposed. We close up
with some conclusions and ideas we still intend to pursue in
this area.
II. AGENT BASED REUSABLE STRUCTURES IN
VLE
Reusable structures [5] are indeed a very powerful tool
aiding the rapid and well-structured development of
applications, and it is our belief that agent-based software
should benefit of such mechanisms too. We have tried to
extract the behavioral patterns that agents are enacting
while deployed in their environment, namely the virtual
learning environment (VLE).
It is well known that complexity severely compromises
the usability of models, therefore reducing the chances of
adoption. Indeed, simple things have the reputation of
offering a better solution, if applicable, since they are both
easier for the user to understand and, therefore, use and for
developers to implement. The actual challenge was to find
the balance between expressive power and simplicity. This
required the analysis of the VLE domain we have
previously explored in [3] and [4] in order for us to:
•
•
determine the set of adequate abstractions for our
conceptual model
avoid artificial inclusion of complex abstractions,
especially of those that may easily be composed on
top of the basic ones, as well as ones that may be
needed on rare, possibly particular, occasions
To achieve this goal we strived to find the minimal set of
features and abstractions that would be both useful and
powerful enough to naturally describe the complex
behaviors of coexisting agents working together to perform
an assigned task.
A. Unifying Agent Platform Framework
Recurrently occurring patterns in the use of agent-based
development led us to pinpoint certain behaviors
encountered on numerous occasions, enforcing the idea of
reusable structures when handling this paradigm as well.
These structures were embodied into a comprehensive
agent behavioral model shaped on top of a unifying
framework. By means of such a framework we managed to
make the agent platform transparent to the user and, in the
same time, decouple the reusable patterns from the
underlying mobile agent platform. It thus becomes clear
that the model was structured to be highly independent,
encompassing a handful of abstract features that allow it to
be equally expressive regardless of the underlying agent
support.
Entities common to every agent platform (location,
agent, message, behavior, agent identifier along with other
relevant ones) provide the context within which we were
able to define the reusable patterns. These patterns produce
an environment that ultimately separates the behavioral
model from the actual skeleton upon which the patters are
enacted (i.e. the JADE agent platform) and, as such, once
they are created, rewriting them will not be necessary for
every new platform. Simply put, one has only to write new
adapters if needed, or use the available ones along with the
already existing framework items to integrate (coalesce)
the component she requires.
Adapters were employed to provide the bridge between
the framework and agent platforms. In this way, adding
support for a new system only requires the writing of the
appropriate wrappers. The following diagrams (Fig. 1 and
Fig. 2) illustrate the most relevant adapter hierarchies and
their position in the system.
Fig. 1. Agent framework class diagram – agent adapters
Fig. 2. Agent framework class diagram - location adapters
Other components are adapted similarly, following the
general line of the architectural pattern. We have refrained
from including more diagrams due to space issues.
The ultimate purpose of the framework was to provide a
fast and easy method of deploying agents by connecting
together the necessary pieces, in our case behavior
patterns. These patterns are to be presented in a more
detailed manner during the following section.
B. Agent Behavior Pattern Taxonomy
The basic patterns we have identified can be grouped under
headings such as creation-based (Role Factory, Clone),
task-oriented (Observer, Task), communicational (Client-
Server, Listener) and mobility-related patterns (Itinerary).
Extending this hierarchy should be a fairly easy task, and
one that we encourage as well, given that we only provide
those concepts related to the VLE context – but their
overall level of generalization should not be overlooked
when developing a particular solution. The following figure
(Fig. 3) shows the hierarchical structure of the behaviors.
Role Factory: It allows adding a behavior to an agent
dynamically, at runtime, the agent being unaware of the
concrete behavior type it will enact.
This particular
behavior can be used to provide additional behaviors to
various agents, behaviors that these agents should be
unaware of at the time of their creation. It can be used, for
example, in a scenario where a social group of agents is
created, performs some sort of initial task and later awaits
to be assigned a distinct behavior by this factory.
Itinerary: It provides the agent with the ability to
perform given tasks at several locations along its route.
Basically, it enables the agent to travel from one
destination to another, attempting to best meet a
preestablished schedule at the same time. For example, this
kind of behavior can be used in route discovery scenarios.
Although some could argue that it is rather VLE domain
specific, we believe that this pattern is useful throughout
various scenarios, and our assessment service provides a
pertinent example in this direction. It is why it shall be
detailed in the later sections.
Observer: This pattern allows the given agent to check
periodically for the occurrence of various events. Should
any such event occur before the next time quanta has
elapsed, an event handler will be triggered, performing the
required action. It can be used when a number of tasks have
to be performed preconditioned by particular events. For
example, consider a VLE assessment service and the agent
that is given the task of delivering the mandatory tests to
recipients at given dates (the midterm date). Such an agent
can use this behavior in the following manner: if the time
has come (the trigger in this case would be the reaching of
a certain date) the action to be taken is the delivery of tests
to students (one could use the Itinerary behavior for such a
task).
Listener: It is a communication pattern - it brings the
agent it belongs to in a state of waiting for a message. The
message is set up with a type, thus enabling the agent to be
awoken only when a message with the expected type
arrives (naturally, one can use a generic type to grab every
message received). Only then will all the registered event
callbacks be fired. Such a behavior can be used in a large
number of scenarios, for instance when a message
addressed to an agent is supposed to originate a certain
action (or sequence of actions). Multiple event listeners can
be registered in order to be fired on the arrival of a
message; this behavior can be used either cyclically or in a
“one shot” manner.
Fig. 3. Agent framework behavior hierarchy
Client – Server: The two roles are connected, since both
require their counterpart to properly perform its task within
the communication protocol. Since the messages are
considered to have a high degree of reliability, the protocol
requires only one acknowledgment from the server
(actually a server worker thread) towards the client. Both
the sever and the client take turns in communicating with
each other, and the semantic is as follows:
• The Client, knowing the location of the server, initiates
the communication protocol, by sending a request. This
request encapsulates a task the server is required to
perform (and a container for the result of the operation).
The client blocks awaiting an acknowledgment
message, and, if received, it awaits the result of the task
performed by the server worker. Timeout is used to
detect a possible failure and the agent terminates the
behavior (to emphasize the flexibility of our framework
let us mention that one could, for example, use this
behavior together with the Observer to retry connecting
after a certain period of time has elapsed). The
acknowledgment message is required in this phase
because it it the most vulnerable period within the
sequence, when the server could not be available due to
different adversities.
• The Server behavior, when started, awaits requests from
its clients. Upon the arrival of a valid message a new
server worker thread is spawned (enabling multi
threaded server response policy) which takes over all
further communication with that particular calling
client. Each server worker sends an acknowledge
message back to the originator of the message, namely
the corresponding client, starts processing the task he
was given, again by the client along with the initial
message, and sends back the result. This result message
is the one that brings the client behavior to its end, thus
terminating the current communication session with the
server (the thread).
This pattern is susceptible to variations and further
adaptations; we tried to reach a fair level of functionality
without imposing too many bounds to the model, as that
would most likely discourage the user from its
employment.
Task: This is the standard “one shot” behavior expiring
after the assigned job has completed. It is a very general,
simple pattern one can use in every situation, and should be
considered when extending simple behaviors.
While we have tried to identify the main abstractions one
could use, surely there are others we have failed to
recognize, or that may become relevant in the future. In
addition, since these abstractions are extracted solely from
the VLE context, horizontal as well as vertical domains
may recognize the need for adding several other relevant
components, whether they are more general or more
domain-specific. Consequently, the model was devised to
be extensible in that it allows the adding of any newly
identified property (or behavior for that matter) to the
framework with very little effort and no modifications.
Clearly, one can infer the need for composition when
handling such basic behaviors in order to increase the
complexity and also the power of the model. As a response
to this, three such types of behaviors have been introduced:
sequential, parallel and Finite State Machine (FSM), and
more can be added as the circumstances require it.
• Sequential behavior deploys its elements one at a time,
following a predefined, dynamically changeable, order;
• Parallel behavior deploys all its elements on separate
“threads”. The components are enacted in a parallel
manner;
• FSM conforms to a somewhat sophisticated description
of state machines (the composite branch can be
observed in Fig. 4 as well). States and transitions are
the main concepts used when deploying this behavior,
while the Task pattern is used to model the activity per
state.
C. Itinerary Pattern Description
To better comprehend the inner workings of the
behaviors, in the following we shall provide a more
thorough description of one such entity, namely the
Itinerary Behavior, that was deliberately under-described in
the above section to avoid redundancy. It is meant to
provide agents with the ability to travel along a path
following a time schedule and perform assigned tasks at
each location, the locations being part of its initial route
description.
Basically, to deploy this pattern one has to initially
Route,
configure the behavior with a
several
ObjectiveReachedListener
items,
and
an
ObjectiveMissedBehavior. None of these elements can be
changed at any time after the behavior has been enacted.
The sequence diagram and the state-chart diagram (Fig. 4
and Fig. 5) offer a graphical representation of the entities,
relations, flow of messages and main states defining this
behavior. Hopefully they will provide enough insightful
ancillary information for one to better understand our
design approach.
The Route is a list of objectives; each objective contains
a location that must be reached and a pair of time
indicatives, the earliest and the latest possible time of
arrival at that given location. The time units are increments
to a base value established when the behavior is initially
created. This solution was adopted due to the nature of the
agent environment's possible distribution (since one agent
could be required to travel at different locations, possibly
on different time zones to perform its assigned task) and
also due to the need to consider the variable travel delay
and the delay raised by the deactivation and reactivation of
the agent before and after the migration process. Should the
agent reach one location on schedule, i.e. at some time
between the two above mentioned time indicatives, the
ObjectiveReachedListener registered listeners are fired.
Upon completion the agent migrates to the next location,
chosen to best meet the deadline of arrival. If the agent
reaches one location early it enters a wait state until enough
time elapses, awakes and performs the assignments, then
continues along its path. If, on the contrary, one location
has not been reached on time (the delays are considered,
although ways of properly computing them are still under
development) the agent is free to enact the
ObjectiveMissedBehavior if one exists (otherwise the agent
falls into a complete stop).
The ObjectiveMissedBehavior is what the agent
performs if it misses a location (arrives late). The outcome
of the overall action depends on this behavior, for example
one could code it to abruptly terminate the agent's
endeavor, or to simply skip to the next location and
possibly register the failure using some logging facilities.
When the last location has been reached, the agent stops
after fulfilling all assignments.
Fig. 4. Itinerary behavior sequence diagram
III. CASE STUDY: VLE ASSESSMENT SERVICE
Nowadays e-learning virtual environments emerge as
useful domains available on the Internet. In exploring the
bounds and expressive power of the behavioral patterns
presented in the previous section we chose to approach one
specific aspect related to VLE, namely the student
assessment service (AS). Its design and implementation
were employed within the context of an already existing
VLE system we had previously created - a web-based
virtual university [3].
one particular test to assess all students' knowledge
level. The test results shall be stored by the system.
From a multi-tier architectural perspective the agents and
their behavioral patterns are part of the business process
management layer, while tests and all other persistent
objects are stored into a repository and accessed via a
database management layer. Presentation components
include the GUI and user interaction capabilities agents are
capable of.
Embracing a concise tone, in the following few
paragraphs we shall confine ourselves to presenting the
student oriented part of the AS, leaving aside the teaching
authority's interaction with the system. Consequently, the
agents' social order and their bearing behaviors for the self-
assessment and for the compulsory exam scenarios shall be
portrayed next. We believe that these two examples are
sufficient for the reader to grasp the features offered by the
reusable agent structures.
Throughout the explanations (regarding agents and
behaviors) to follow, one should keep in mind that we are
dealing with the case of an unbalanced distribution of
computational resources due to the locality of the persistent
data stores. Hence, a server side is defined as the host
where the data is, while a client side is any host where an
agent platform has been deployed. Agents are found on
both sides, and there are some that migrate from one to
another. On both sides we have tried to minimize the
number of all-time active agents, managing to reach the
point where there are no such objects on the client side.
This is a fairly good thing since dormant, all-time active
agents on client machines are unacceptable (due to
resources overhead and inadequate schedule). Thus, clients
activate solely the agent platform and even that only when
needed (taking a self-assessment) or required (awaiting for
an exam).
For the mandatory tests (i.e. midterms), agents bearing
the Observer behavior exist on the server side for each
exam planned by the teaching authorities (sure enough, one
professor can schedule several tests that will ultimately be
handled by the same agent, but we shall not approach such
details). The pattern allows one such agent to check
periodically if the time for the evaluation has come. If so,
an Itinerary behavior is enacted (by the same agent or by
the newly created one) and the agent starts its journey to
deliver the tests. This solution is used to release the client
platforms from the overhead of dormant agents (see above).
Once the agent has reached a location in good time it
spawns a new user agent, sets it up with a Task behavior
that takes over the delivery of the test to the user, detaches
and starts its migration towards the next objective. After
the last location is visited, the agent returns at the starting
point where it awaits test solutions. Data concerning
missed/unreachable objectives is gathered as well. The test
related material (questions, choices and answers) is packed
and carried along, ultimately being copied to each user
agent that stays behind to trigger and conduct the
assessment. Upon completion of the last action the user
agent's Task behavior stipulates that it is to send the
student's answers back to the server agent that spawned it,
and then terminate itself. Once the test solutions arrive
from all valid clients and are safely stored in the data
repository, the server agent ceases its existence. Note that
the client agent is the one that interacts with the user
Fig. 5. Itinerary behavior state chart
One of the major problems of creating a virtual
environment involves traditional domain modeling and
implementing such abstractions using the most suitable
technologies [4].
Our approach models a closed
organization (no alien/rogue agents are allowed),
containing benevolent, cooperative agents that are
deployed in a particular configuration and working
together to enact the AS.
In what follows we try to prove that employing
behavioral patterns is a facile, elegant and fast
development agent based solution. Some adjacent design
considerations are included as well (i.e. the data source),
though we shall not insist on presenting them thoroughly
since that would be beyond the scope of our case study and
would impair conciseness. Moreover, we want to
emphasize the fact that the solution is bound to no specific
platform, thus making its porting to another environment a
fairly quick and easy task, which implies modifications
only at the adapter level (or even just adapter usage, if such
adapters already exist for the desired platform). In our case
the JADE [7] agent platform has been chosen as supporting
mobile agent platform for the assessment service.
The AS provides a means for evaluating a learning
entity's (i.e. a student) acquired knowledge and, at the same
time, for providing feed-back on her progress. The
teaching authority is the one responsible for providing the
tests, while the learning entity is the one the tests are
addressed to. A test comprises of a number of questions,
each having a weight within the total score. To enable
automatic evaluation, we use only questions with exact
answers, whether they are single choice, multiple choice,
true/false, or filling in the blank space (numeric and text
are treated separately). A key issue is that the AS is
independent from the counterpart system that provides the
student with the learning material, thus offering a great deal
of flexibility in deploying integrated VLE solutions.
Although tests can have various types, yet they all fall
into one of the two approaches considered below:
•
•
a pull scenario, the self-assessment approach, when the
learning actor is initiating the assessment to poise her
current level of knowledge. The test results are not to
be stored within the system, yet for individual progress
monitoring, some data is stored.
a push scenario, i.e. the compulsory exam, initiated by
the teaching authority (directly or indirectly) enforcing
through the GUI and also the one containing the evaluation
engine, thus performing the assessment on the spot.
Since the self-assessment scenario requires a user to
commence the interaction, on the client side there is no
issue regarding permanent dormant agents. It is only the
server side that has to start a permanently active agent (with
a Server behavior deployed on top) that delegates the initial
requests from clients (to server workers). It does so by
creating a new agent for every requesting entity and
handing the responsibility of continuing to serve the client
over to them. All subsequent communication between the
client and the server is taken care of by the newly spawned
agent from this moment on. By contrast, the learning actor
initially creates an agent with a Client behavior that
initiates the communication with the server, revealing the
self-assessment intention. Once the communication is
established, two virtual channels are created between the
two counterparts, one for commands and one for data. To
support this, a pair of Server and Listener behaviors are
composed within a Parallel behavior on server side, while
a Client and a Task behavior are deployed in the same
concurrent manner on the client side. The client-server pair
deals with data communication, while the listener-task pair
handles the commands (the task is responsible for
triggering the listener with a message containing the
command). Amongst the valid commands we mention the
retrieval of the list of possible valid self-assessment tests,
the retrieval of one test, the sending back of the results, and
the termination of the session. Actions are performed
accordingly employing the necessary data structures. The
evaluation engine is integrated within the client and the
results are computed on the spot.
In what was previously presented no details concerning
how the behaviors are actually deployed were included due
to space limitations. One must imagine that the event
listeners, triggers and other collaborating parts are coded
together throughout each scheme very naturally once the
necessary behaviors to endow the agent with are chosen.
Hence, the problem faced by the developer has shifted
towards the proper orchestration of behavioral patterns,
since it is known that computation is orthogonal to
coordination [13].
IV. CONCLUSION AND FUTURE WORK
In this paper we have tried to present how we envision
ways of unifying mobile agent platforms through the use of
reusable patterns. A new vocabulary of abstractions had to
be enforced, one broad enough to encompass the major
concepts required by all possible underlying environments.
Since one of the initial requirements was that one should be
able to change almost everything about agents
instantaneously, behaviors are employed to enact agent
activity. Our reusable structures are thus behavioral
patterns that can be the building blocks of even more
complex composite objects. We have identified a number
of basic patterns, provided composition mechanisms for
these patterns, and created a model that is extensible
enough for enabling the developer to add new structures
with a minimal amount effort. The framework ensures low
coupling between its high abstractions (the patterns) and
the sustaining agent platforms through the use of adapters.
Since the starting point of our analysis was a VLE, it is
only natural that the strengths and weaknesses of the
framework were eventually tested within this context (by
means of the described assessment service, to be exact). So
far, the model has proved itself to be both fairly flexible
and usable, thus adding a significant building block to the
path towards different design approaches in the world of
mobile agents (though we are aware that using it can be
somewhat cumbersome, at least until some “hands on”
experience is gained).
We are aware that many improvements are possible and,
in the future, we intend to enhance the behavioral patterns
and make them easier to use. Also we shall try to provide
support for more agent platforms as well. Another
important step would be a quality-oriented enhancement of
each pattern, with the most stringent aspect being that of
better delay computation at the time of agent migration (an
issue that appears particularly in the case of the Itinerary
behavior).
V. REFERENCES
[1] M. N. Huhns and M. P. Singh, Agents and multiagent
systems: Themes, approaches, and challenges,
chapter 1 in [2], pp. 1-23, 1998.
[2] M. N. Huhns and M. P. Singh, Readings in Agents,
Morgan Kaufmann, San Francisco, 1998.
[3] T. Marian and B. Dumitriu, “Web based virtual
university,” Technical University of Cluj-Napoca,
2003. Technical Report.
[4] M. Dinsoreanu, C. Godja, C. Anghel, I. Salomie and T.
Coffey, “Mobile Agent Based Solutions for
Knowledge Assessment in eLearning Environments”,
in Proceedings of the 2003 Euromedia Conference,
[5] E. Gamma, R. Helm, R. Johnson and J. Vlissides,
Design Patterns, Addison Wesley Longman
Publishing, 1994.
[6] The Foundation of Intelligent Physical Agents (FIPA),
http://www.fipa.org/
[7] The Java Agent Development Framework (JADE),
http://sharon.cselt.it/projects/jade/
[8] The Agent Development Kit (ADK),
http://www.tryllian.com/technology/product1.html
[9] DeLoach S.A. 2000, “Specifying agent Behavior as
Concurrent Tasks: Defining the Behavior of Social
Agents”, AFIT/EN-TR-00-03. Technical Report.
[10] F . Zambonelli, N.R. Jennings, A. Omicini, M.
Wooldridge, “Agent-Oriented Software Engineering
for Internet Applications”, in Coordination of Internet
Agents: Models, Technologies and Applications,
2000, Springer-Verlag.
[11] F . Zambonelli, N.R. Jennings, M. Wooldridge,
„Organisational abstractions for the Analysis and
Design of Multi-Agent Systems”, in P. Ciancarini and
M. Wooldridge, editors, Agent-Oriented Software
Engineering, Springer-Verlag Lecture Notes in AI
Volume 1957, January 2001.
[12]Weiss G, Multi-Agent Systems, A Modern Approach to
DAI, MIT Press, 1999.
[13] D. Gelernter, and N . Carriero, “Coordination
Languages and their Significance”, Communication of
the ACM, 35(2), 1992, pp. 97-107.
|
1607.05540 | 2 | 1607 | 2016-09-20T14:26:12 | Exploiting Vagueness for Multi-Agent Consensus | [
"cs.MA",
"cs.AI"
] | A framework for consensus modelling is introduced using Kleene's three valued logic as a means to express vagueness in agents' beliefs. Explicitly borderline cases are inherent to propositions involving vague concepts where sentences of a propositional language may be absolutely true, absolutely false or borderline. By exploiting these intermediate truth values, we can allow agents to adopt a more vague interpretation of underlying concepts in order to weaken their beliefs and reduce the levels of inconsistency, so as to achieve consensus. We consider a consensus combination operation which results in agents adopting the borderline truth value as a shared viewpoint if they are in direct conflict. Simulation experiments are presented which show that applying this operator to agents chosen at random (subject to a consistency threshold) from a population, with initially diverse opinions, results in convergence to a smaller set of more precise shared beliefs. Furthermore, if the choice of agents for combination is dependent on the payoff of their beliefs, this acting as a proxy for performance or usefulness, then the system converges to beliefs which, on average, have higher payoff. | cs.MA | cs | Exploiting Vagueness for Multi-Agent Consensus
Michael Crosscombe and Jonathan Lawry
Department of Engineering Mathematics,
University of Bristol,
[email protected] · [email protected]
BS8 1UB, United Kingdom
6
1
0
2
p
e
S
0
2
]
A
M
.
s
c
[
2
v
0
4
5
5
0
.
7
0
6
1
:
v
i
X
r
a
Abstract. A framework for consensus modelling is intro-
duced using Kleene's three valued logic as a means to express
vagueness in agents' beliefs. Explicitly borderline cases are
inherent to propositions involving vague concepts where sen-
tences of a propositional language may be absolutely true,
absolutely false or borderline. By exploiting these intermedi-
ate truth values, we can allow agents to adopt a more vague
interpretation of underlying concepts in order to weaken their
beliefs and reduce the levels of inconsistency, so as to achieve
consensus. We consider a consensus combination operation
which results in agents adopting the borderline truth value as
a shared viewpoint if they are in direct conflict. Simulation
experiments are presented which show that applying this op-
erator to agents chosen at random (subject to a consistency
threshold) from a population, with initially diverse opinions,
results in convergence to a smaller set of more precise shared
beliefs. Furthermore, if the choice of agents for combination is
dependent on the payoff of their beliefs, this acting as a proxy
for performance or usefulness, then the system converges to
beliefs which, on average, have higher payoff.
Keywords: Agent-Based Modelling · Many-Valued Logics ·
Belief Aggregation · Consensus
1 Introduction
Reaching a consensus by agreeing a shared viewpoint or posi-
tion is a fundamental part of many multi-agent decision mak-
ing and negotiation scenarios. In this paper we argue that
by exploiting vagueness in the form of explicitly borderline
cases we can define an operator for belief combination which
not only allows a population of agents to reach consensus but
also results in them adopting, on average, a more useful set
of beliefs. The basic intuition underlying this operator is that
conflicting agents can agree to allocate borderline truth values
to propositions about which they hold inconsistent beliefs. For
example, two individuals, one of which believes that 'Cameron
is an effective prime minister' whilst the other believes that
'Cameron is ineffective', may agree, in some circumstances,
to adopt the shared view that 'Cameron is borderline effec-
tive/ineffective'.
Of course, beliefs about the world do not exist in isolation
but inform and influence our decisions and actions. From this
perspective, some sets of beliefs are more positive or useful
than others, resulting in better long term performance, per-
haps by making the individuals concerned richer, happier or
just better able to survive. More generally, in a multi-agent
context, different beliefs result in different actions, collecting
different payoffs. In this paper we present simulation studies
which show that implementing our proposed operator across
a population of agents, initially holding diverse beliefs, re-
sults in convergence to a smaller subset of more precise shared
opinions. Furthermore, under the assumption that better per-
forming agents, i.e. those with higher payoff, are more likely
to interact to reach consensus, we show that the range of be-
liefs obtained at steady state are on average better, i.e have
higher payoff, than the agents' initial beliefs. The formalism
adopted here is that of Kleene's three valued logic and the op-
erator investigated has been proposed for single propositions
in [10] and extended to multi-propositional languages in [6].
An outline of the paper is as follows: Section 2 gives a brief
overview of consensus modelling. Section 3 introduces Kleene
logic and the three valued consensus combination operator.
Section 4 describes simulation experiments in which agents
are selected at random to form a consensus provided that they
are sufficiently consistent with one another. In section 5 we
introduce a payoff function for beliefs, so that the payoff of a
particular set of beliefs acts as a proxy for the performance of
an agent holding those beliefs. We then adapt the experiments
described in section 4 so that the probability of an agent being
selected for consensus is proportional to their payoff. Finally,
in section 6 we give some discussions and conclusions.
2 Background and Related Work
A number of models for consensus have been proposed in
the literature which have influenced the development of the
framework described in this paper. [3] introduced a model for
reaching a consensus involving a weighted, global updating of
beliefs, iterating until an agreement is reached. In DeGroot's
model, agents assign a weight distribution to the population
before forming a new opinion. By applying their assigned
weights to the other agents' beliefs, an agent can control the
influence that others have on their own beliefs.
As an alternative to DeGroot's model, the Bounded Con-
fidence (BC) model introduced in [5] provides agents with a
confidence measure. An agent quantifies their level of confi-
dence in their own opinions and are then able to limit their
interactions to those agents who possess similar beliefs if
they are highly confident (small bounds), or extend the range
of possible interactions if the agents possess low confidence
(large bounds). In this model agents do not a priori assign
weights to the beliefs of others, but instead determine such
weightings based on similarity and on their own confidence
levels. This is similar in essence to the inconsistency threshold
that we introduce in section 3, but applied on an individual
basis.
The Relative Agreement (RA) model [2] then extends the
Bounded Confidence model to allow agents to assign weights
to the beliefs of others by quantifying the extent of the over-
lap of their respective confidence bounds. By having agents
declare a confidence interval for their beliefs, the model then
restricts interactions to those pairs of agents with overlap-
ping intervals. Consequently, agents are only required to as-
sess their own beliefs and are not required to make explicit
judgements about those of other agents. [2] also moved to a
model of pair-wise interactions to better capture social in-
teractions of individuals, the latter being a setting in which
group-wide updates to beliefs are unintuitive in that they do
not reflect typical social behaviour.
A fundamental difference between our approach and the
above models is that we use Kleene's three valued logic to
represent beliefs in a propositional logic setting, rather than
identify opinions with real values or intervals. [10] have shown
that through use of a three-state model for networked consen-
sus of complete graphs, nodes converge to a consensus much
faster and with greater accuracy when compared to a restric-
tive binary model. In the sequel we extend this approach to a
more general setting involving larger languages and incorpo-
rating a measure of payoff for beliefs.
3 A Three Valued Consensus Model
In this section we introduce Kleene's three valued logic [4]
as a model of explicitly borderline cases resulting from the
inherent vagueness of propositions. We adopt a propositional
logic setting as follows: Let L be a finite language of propo-
sitional logic with connectives ∧, ∨ and ¬, and propositional
variables P = {p1, . . . , pn}. Also, let SL denote the sentences
of L generated by recursively applying the connectives to the
propositional variables in the usual manner. A Kleene valua-
tion then allocates truth values 0 (false), 1
2 (borderline) and
1 (true) to the sentences of L as follows:
Definition 1. Kleene Valuations
such that ∀θ, ϕ ∈ SL the following hold:
• v(¬θ) = 1 − v(θ)
• v(θ ∧ ϕ) = min(v(θ), v(ϕ))
• v(θ ∨ ϕ) = max(v(θ), v(ϕ))
A Kleene valuation v on L is a function v : SL → {0, 1
2 , 1}
The truth table for Kleene valuations are shown in table 1.
¬
1
1
2
0
0
1
2
1
∧
1
1
2
0
1
1
1
2
0
1
2
1
2
1
2
0
0
0
0
0
∨
1
1
2
0
1
1
1
1
1
2
1
1
2
1
2
0
1
1
2
0
Table 1. Kleene truth tables.
v(pi) = 1} and N = {pi ∈ P : v(pi) = 0}. Notice that P ∩
N = ∅ and that (P ∪ N )c corresponds to the set of borderline
propositional variables.
Kleene valuations have been proposed as a suitable formal-
ism in which to capture explicitly borderline cases as resulting
from inherent flexibility in the definition of vague concepts in
natural language [8, 7]. For example, consider the proposition
'Ethel is short'. For the concept short, we might identify a
lower height threshold h below which any height is classed as
being absolutely short, and similarly there may be an upper
threshold h above which any height is absolutely not short. If
Ethel's height lay between h and h then this would result in
a borderline truth value for the statement 'Ethel is short'.
It is important to note that the middle truth value 1
2 is not
intended to represent epistemic uncertainty, but rather explic-
itly borderline cases resulting from the inherent vagueness of
natural language propositions. Hence, if we say that the state-
ment 'Ethel is short' is borderline true/false we are not saying
that the truth or falsity of this proposition is unknown. In-
stead we are indicating that Ethel's height is a borderline case
of the predicate short. In order to emphasise the difference be-
tween the epistemic and the borderline interpretation of three
valued logic it is helpful to think in terms of conditioning. For
instance, if we learn that it is unknown whether or not Ethel
is short, then this provides us with no new information about
her height. In contrast, learning that Ethel is borderline short
does provide us with new information about Ethel's height,
namely that it lies on the borderline between short and not
short. A more comprehensive discussion of these issues can
be found in [1]. A consequence of using this interpretation of
the middle truth value is that in the current paper we only
model consensus for sets of propositions which admit bor-
derline cases. In other words, our approach can be used for
propositions such as 'Ethel is short' but not, for example, for
the proposition 'Ethel is strictly less that 1.4 metres tall'.
The following three valued consensus operator was de-
scribed in detail in [6]:
Definition 2. Consensus Operator
Let v1 and v2 be Kleene valuations on L with associated
orthopairs (P1, N1) and (P2, N2). Then the consensus v1 (cid:12) v2
is the Kleene valuation with the orthopair
((P1−N2) ∪ (P2−N1), (N1−P2) ∪ (N2−P1))
The corresponding truth table for this operator is shown
in table 2. From this we can see that the operator preserves
the non-borderline truth values 0 or 1 except in the case of
a direct conflict i.e. when one agent has truth value 1 and
the other 0. In this case both agents adopt the middle truth
value 1
as an operator which initially weakens both opinions so as to
remove direct inconsistencies, before then combining them.
2 . Alternatively, from definition 2 we can think of (cid:12)
(cid:12)
1
1
2
0
1
1
1
1
2
1
2
1
1
2
0
0
1
2
0
0
I
1
1
2
0
1
0
0
1
1
2
0
0
0
0
1
0
0
It is sometimes convenient to represent a Kleene valuation
v by its associated orthopair (P, N ) [6], where P = {pi ∈ P :
Table 2. Truth table for the
consensus operator.
Table
truth table.
3.
Inconsistency
We now introduce two measures that will be used through-
out the subsequent simulation experiments.
Definition 3. A Measure of Vagueness
Let v be a Kleene valuation on L with orthopair (P, N ) and
n propositional variables. Then we measure the vagueness of v
by the proportion of propositional variables which it classifies
as being borderline. That is:
V (v) =
(P ∪ N )c
n
Definition 4. Inconsistency Measure
Let v1 and v2 be Kleene valuations on L with corresponding
orthopairs (P1, N1) and (P2, N2). Then we define the incon-
sistency measure of v1 and v2 to be the proportion of propo-
sitional variables which are in direct conflict between the two
valuations i.e. v1(pi) (cid:54)= 1
2 and v1(pi) = 1 − v2(pi).
That is:
2 , v2(pi) (cid:54)= 1
I(v1, v2) =
(P1 ∩ N2) + (P2 ∩ N1)
n
Table 3 shows the inconsistency truth table of two valua-
tions for a propositional variable, highlighting the cases where
two valuations are inconsistent, and consistent otherwise. We
can see that there is a probability of 2
9 that two valuations
will be inconsistent for each propositional variable in the lan-
guage. In the sequel we will propose a threshold γ ∈ [0, 1] on
inconsistency so that valuations v1 and v2 can be combined
only if I(v1, v2) ≤ γ.
4 Simulation Experiments based on
Random Selection of Agents
We introduce simulation experiments in order to investigate
the convergence properties of the three valued logic operator
when implemented across a multi-agent system. The experi-
mental set up is loosely based on those proposed in [2] and
[9], although our representation of opinions is quite different
with beliefs taking the form of Kleene valuations on L, rather
than vectors of bounded real numbers.
We will consider two distinct initialisations of the beliefs of
a population of agents. The random three valued initialisation
allocates the truth values 0, 1
2 and 1 to each agent and each
propositional variable at random i.e. with probability 1
3 for
each truth value. In contrast, the random Boolean initialisa-
tion only allocates the binary truth values 0 and 1, each with
a probability of 1
2 . This latter initialisation will be required
in section 5 in order to directly compare the proposed three
valued combination operator with a similar two valued op-
erator. In this section we will use the random three valued
initialisation in order to investigate the extent to which the
three valued operator results in convergence to a shared set
of opinions across the population of agents.
We set a fixed maximum number of 50, 000 iterations1. At
each time step a pair of agents are selected at random from
the population. An inconsistency threshold value γ ∈ [0, 1] is
set, so that for any pair of agents with respective valuations v1
and v2, if I(v1, v2) ≤ γ then both agents replace their beliefs
1 In preliminary experiments we found that 50, 000 was an upper
bound on the number of iterations required for the system to
reach steady state across a range of parameter settings.
with the consensus valuation v1 (cid:12) v2, while if I(v1, v2) > γ
then no combination is performed and both agents retain their
original beliefs. For γ = 1 we obtain what is equivalent to the
totally connected graph model described in [10], in which any
pair of agents can combine their beliefs, whilst taking γ = 0
corresponds to the most conservative scenario in which only
absolutely consistent beliefs can be combined. The parameters
for the simulation experiments are then as follows:
• Population size: 100
• Language size i.e P = n: 5, 10, 50, 100
• Initial beliefs: Random three valued.
• Inconsistency threshold: γ ∈ [0, 1].
Figures 1 and 2 show the results for the experiments after
50, 000 iterations. In each case the plots show mean values
with error bars representing standard deviation across 100
independent runs of the simulation. Figure 1 shows the aver-
age vagueness determined by taking the mean value of V (v)
(definition 3) across the population. Note that for a random
three valued initialisation of beliefs we expect a mean vague-
ness value of 1
3 at the start of the simulation. As the threshold
γ increases then the average vagueness decreases to zero, so
that for γ ≥ 0.3 we are left with almost entirely crisp (i.e.
Boolean) opinions. In general the more conservative the com-
bination rules (i.e. requiring higher levels of consistency) then
the more it is that vague beliefs are maintained in the popu-
lation. Figure 2 shows the number of distinct valuations (i.e.
different opinions) remaining in the population after 50, 000
iterations. Again this decreases with γ and for γ > 0.4 agents
have on average converged to a single shared belief. This is
consistent with the analytical results presented in [10] for the
single propositional, γ = 1 case.
5 Simulation Experiments Incorporating a
Payoff Model
In this section we extend the simulation framework described
in section 4 to allow for different payoffs for different beliefs.
As outlined in section 1, payoff is introduced as a proxy for
performance, and is motivated by the intuition that different
beliefs result in different actions which then, over time, lead
to different levels of performance. Here we adopt an abstract
simplification of this process in which each Kleene valuation is
allocated a real valued payoff. Then, instead of being selected
at random for combination, an agent is picked from the pop-
ulation according to a probability which is proportionate to
the payoff value of their beliefs. The idea, then, is that agents
with better or more useful opinions will be more successful
and furthermore, it will be these successful agents who will
be most likely to need to reach a consensus between them.
Here the underlying intuition is that, in real systems it is the
most successful agents, with the highest payoff values, who are
most likely to find themselves in conflict with one another, and
who will most benefit from reaching an agreement. We adopt
a simple summative payoff model in which each propositional
variable pi is allocated a value in the range [−1, 1], denoted
f (pi), and the payoff for a valuation with orthopair (P, N ) is
then calculated as follows:
(cid:88)
pi∈P
f (pi) − (cid:88)
pi∈N
f (P, N ) =
f (pi)
Figure 1. Average vagueness after 50, 000 for varying inconsistency thresholds γ and language sizes.
Figure 2. Number of distinct valuations after 50, 000 iterations for varying inconsistency thresholds γ and language sizes.
Another perspective on this type of payoff function is as fol-
lows: For each propositional variable pi, a truth value of 1
results in a payoff f (pi) (which can be either positive or neg-
ative), a truth value of 0 results in the opposite signed payoff
−f (pi), and a borderline truth value 1
2 results in a neutral
payoff of 0. The payoff value for a Kleene valuation v is then
simply taken to be the sum of the payoffs for each proposi-
tional variable under the truth values allocated by v.
Based on payoff values we define a probability distribution
over the agents in the population according to which the prob-
ability that an agent with beliefs (P, N ) is selected for possible
consensus combination is proportional to f (P, N )+n. At each
iteration a pair of agents are selected at random according to
this distribution. For each such pair the inconsistency mea-
sure (definition 4) is evaluated and either both the valuations
are replaced with the consensus valuation, or both are left
unchanged, depending on the threshold γ as in section 4. The
parameters for the simulation experiments are as follows:
• Population size: 100
• Language size: 5
• Initial beliefs: Random Boolean.
• Inconsistency threshold: γ ∈ [0, 1]
binary operator
0
0
1
0
2 , 1 : 1
2
0 : 1
0 : 1
1
2 , 1 : 1
1
2
Table 4. The truth table for the stochastic Boolean consensus
operator
Notice that here we are initialising the beliefs as random
Boolean valuations (see section 4)2. This allows us to make a
direct comparison between the performance of the three val-
ued combination operator and a similar two valued operator.
For the latter we assume that only binary truth values are
available to represent an agent's beliefs. In this context, in
order for two agents with conflicting truth values for pi (i.e.
one 0 and the other 1) to reach consensus, we propose that
they simply agree to pick one of the truth values at random
e.g. by tossing a fair coin. Table 4 gives the truth table for
the operator in which directly conflicting truth values leads
to a stochastic outcome.
The focus on simulations with 5 propositional variables is
intended to increase the number of opinions relative to the
size of the population, in order to achieve a good distribu-
2 As a result of this Boolean initialisation, a language size of 5 now
produces a total of 25 (32) possible valuations, as opposed to 35
(243) possible valuations.
0.00.10.20.30.40.5Threshold γ0.050.000.050.100.150.200.250.300.350.40Average Vagueness510501000.00.10.20.30.40.5Threshold γ020406080100120Distinct Valuations51050100Figure 3. Average payoff after 50, 000 iterations for varying inconsistency thresholds γ, shown as a percentage of the maximal payoff.
Figure 4. Number of distinct valuations after 50, 000 iterations for varying inconsistency thresholds γ.
tion of valuations. For example, a language size of 5 allows
for 32 possible Boolean valuations. With a population of 100
agents, it is therefore very likely that each opinion will occur
at least once. In comparison, a language size of 10 produces
1, 024 possible Boolean valuations which severely decreases
the probability of an opinion being present in a population of
the same size.
Figures 3, 4 and 5 show the results for simulation experi-
ments with agent selection based on payoff. The results shown
are mean values with error bars taken over 100 independent
runs of the simulation. Figure 3 shows the average popula-
tion payoff after 50, 000 iterations given as a percentage of the
maximal possible payoff value i.e. the payoff for the valuation
(P, N ) where P = {pi : f (pi) > 0} and N = {pi : f (pi) < 0}.
For both the binary and the three valued operators we show
results for simulations in which agents are selected according
to payoff (three-valued, Boolean) and at random as in section
4 (three-valued random, Boolean random). We see that for all
values of γ, the three valued operator with payoff based selec-
tion outperforms all of the other approaches. For the former
we can also see that average payoff increases with γ. In con-
trast, for the other approaches, including the payoff operator
with payoff based selection, the mean of the average popula-
tion payoff remains close to 0 after 50, 000 iterations. Figure
4 shows the mean number of distinct valuations across the
population of agents after 50, 000 iterations. All four versions
of the operators converge on a small set of shared beliefs for
sufficiently large γ. For γ ≥ 0.4 the mean number of distinct
valuations is less than 5 while for γ ≥ 0.8 it is 1. Figure 5
shows a trajectory of how the number of distinct valuations
varies with each iteration when γ = 0.7. We can see that
both the three-valued models converge quickly (in just over
2000) iterations while the Boolean models require consider-
ably longer to converge (over 20, 000 iterations).
6 Conclusions
In this paper we have explored the use of Kleene's three valued
logic as a framework in which to model multi-agent consensus
formation. We have proposed a three valued combination op-
erator, the intuition behind which is that conflicting binary
truth values are replaced with a borderline (middle) truth
value. A number of simulation experiments have been pre-
sented employing this operator. These can be divided into
two main categories. For the first type of experiments, agents
are selected at random from the population and form a con-
sensus valuation providing that the level of inconsistency of
their respective opinions is below a threshold parameter γ.
0.00.20.40.60.81.0Threshold γ604020020406080100Average PayoffThree-ValuedThree-Valued randomBooleanBoolean random0.00.20.40.60.81.0Threshold γ05101520253035Distinct ValuationsThree-ValuedThree-Valued randomBooleanBoolean randomFigure 5. Trajectory showing the number of distinct valuations plotted against iterations for γ = 0.7.
Otherwise they do not form a consensus and instead retain
their current opinions. For these experiments we found that
there is convergence to a smaller subset of shared opinions
across the population. For higher γ values there is conver-
gence on average to a single shared opinion and furthermore
this opinion is crisp i.e. it admits no borderlines. For inter-
mediate values of γ the system convergences to a small set of
opinions which to some extent remain vague.
In the second type of experiments a payoff function over
beliefs is introduced, and agents are selected for possible com-
bination with probability proportional to the payoff value of
their current beliefs. Here we compare the three value opera-
tor with a similar stochastic Boolean operator. We find that
the three valued operator with payoff based agent selection
results in convergence to a smaller shared set of beliefs with
significantly higher average payoff than that of the initial pop-
ulation. The Boolean operator does not perform well in this
context and does not result in a significant increase in av-
erage payoff, which instead remains close to 0 after 50, 000
iterations.
The results of the payoff based experiments show how a
three valued model for consensus provides a number of im-
provements over a traditional Boolean model. Firstly, we have
shown that the introduction of Kleene valuations to capture
the inherent vagueness of propositions does not, in the long
run, lead to the mass adoption of borderline truth values as
a result of conflict occurring in the population. Instead, we
have seen how vagueness is reduced at lower γ values, and at
higher γ values the population converges towards completely
crisp opinions on average, admitting no borderline cases. In
addition to this, we can see that the introduction of a payoff
based model drives consensus towards those valuations which
result in higher payoff on average. By selecting pairs of agents
based on their perceived success, we can achieve an increase
to overall payoff in a small number of iterations, compared
to no significant increase in payoff for the Boolean model.
Therefore, we have shown that the three valued approach in-
corporating a payoff model can drive convergence across the
population towards more successful opinions.
We suggest that the experiments presented in this paper
show the potential of using three valued logic in consen-
sus modelling. There is also significant scope to extend the
research presented in several new directions. For example,
the above studies concern consensus defined at the level of
propositional variables. However, in many cases agents will
be most concerned to reach agreement about a relevant set of
compound statements. For example, they may need to reach
agreement about a particular set of conditional statements,
or equivalences. Hence, an important question is that of how
best to extend our proposed consensus model so as to be ap-
plicable to compound logical expressions. Another significant
question concerns uncertainty. Suppose that in addition to
vagueness agents also quantify their uncertainty about be-
liefs. [6] propose an extension of the three valued framework
in which agents' beliefs are represented by a probability distri-
bution over Kleene valuations. Ongoing research concerns the
design of simulation studies in which to evaluate the conver-
gence and payoff based performance of this extended model.
Finally, it would be interesting to consider extensions to the
operator which allows for consensus between groups rather
than just pairs of agents.
Acknowledgements
This research is partially funded by an EPSRC PhD stu-
dentship as part of a doctoral training partnership (grant
number EP/L504919/1).
All underlying data is included in full within this paper.
REFERENCES
[1] D. Ciucci, D. Dubois, and J. Lawry. Borderline vs. unknown:
comparing three-valued representations of imperfect informa-
tion. In International Journal of Approximate Reasoning. 55.
pp 1866-1889. Elsevier, 2014.
[2] G. Deffuant, F. Amblard, G. Weisbuch, and T. Faure. How
can extremism prevail? a study based on the relative agree-
ment interaction model. In Journal of Artificial Societies and
Social Simulation. 5(4). JASSS, 2002.
[3] M. H. DeGroot. Reaching a consensus.
In Journal of the
American Statistical Association. 69(345). pp 118-121. JS-
TOR, 1974.
[4] S. C. Kleene.
Introduction to Metamathematics. North-
Holland, The Netherlands, 1st edition, 1952.
[5] U. Krause. A discrete nonlinear and non-autonomous model
In Communications in Difference
of consensus formation.
01000020000300004000050000Iterations05101520253035Distinct Valuations3-Valued3-Valued randomBooleanBoolean randomEquations: Proceedings of the Fourth International Con-
ference on Difference Equations, pp 227-237. Gordon and
Breach, 1998.
[6] J. Lawry and D. Dubois. A bipolar framework for combining
beliefs about vague propositions. In Proceedings of the Thir-
teenth International Conference on the Principles of Knowl-
edge Representation and Reasoning. pp 530-540. AAAI, 2012.
[7] J. Lawry and I. Gonzlez-Rodrguez. A bipolar model of as-
sertability and belief. In International Journal of Approxi-
mate Reasoning. 52(1). pp 76-91. Elsevier, 2011.
[8] J. Lawry and Y. Tang. On truth-gaps, bipolar belief and the
assertability of vague propositions. In Artificial Intelligence.
191. pp 20-41. Elsevier, 2012.
[9] M. Meadows and D. Cliff. Reexamining the relative agreement
model of opinion dynamics. In Journal of Artificial Societies
and Social Simulation. 15(4). JASSS, 2012.
[10] E. Perron, D. Vasudevan, and M. Vojnovic. Using three states
for binary consensus on complete graphs. In Proceedings of
IEEE Infocom. pp 2527-2535. IEEE Communications Society,
2009.
|
1312.5941 | 1 | 1312 | 2013-12-20T13:51:11 | Developing a model of evacuation after an earthquake in Lebanon | [
"cs.MA"
] | This article describes the development of an agent-based model (AMEL, Agent-based Model for Earthquake evacuation in Lebanon) that aims at simulating the movement of pedestrians shortly after an earthquake. The GAMA platform was chosen to implement the model. AMEL is applied to a real case study, a district of the city of Beirut, Lebanon, which potentially could be stricken by a M7 earthquake. The objective of the model is to reproduce real life mobility behaviours that have been gathered through a survey in Beirut and to test different future scenarios, which may help the local authorities to target information campaigns. | cs.MA | cs | Developing a model of evacuation after an earthquake in Lebanon
Hong Van Truong, Elise Beck, Julie Dugdale, and Carole Adam
Abstract— This article describes the development of an
agent-based model (AMEL, Agent-based Model for
Earthquake evacuation
in Lebanon) that aims at
simulating the movement of pedestrians shortly after an
earthquake. The GAMA platform was chosen to
implement the model. AMEL is applied to a real case
study, a district of the city of Beirut, Lebanon, which
potentially could be stricken by a M7 earthquake. The
objective of the model is to reproduce real life mobility
behaviours that have been gathered through a survey in
Beirut and to test different future scenarios, which may
help
the
local authorities
to
target
information
campaigns.
I. INTRODUCTION
Every year earthquakes cause many victims. Although the
survival of people is largely related to the resilience of
buildings, the way that people behave after an earthquake
also influences the number of fatalities (Rojo, Beck, Lutoff
and Schoeneich, 2011), especially for low magnitude
earthquakes. The rareness of strong earthquakes and the
impossibility of forecasting them prevent us from assessing
the effect that behaviours may have on survival rates. In this
context, computer simulation is an appropriate and powerful
tool that helps us to assess different scenarios, thus helping
local authorities to develop their risk management policies
and information campaigns.
The objective of the AMEL model (Agent-based Model
for Earthquake evacuation in Lebanon) is to simulate
pedestrians’ mobility shortly after an earthquake. Although
many victims in buildings are generally killed during the
main shock, the mobility of any survivors can greatly affect
their chances of surviving any aftershocks. We want to
understand whether a better knowledge of the safety
procedures and the location of safe places in a city could
decrease people’s vulnerability. Firstly of all, the model aims
at reproducing the behaviours adopted by individuals.
Secondly, the simulation tests some optimistic or pessimistic
fictive scenarios, in order to evaluate the impact of individual
behaviours on the number of fatalities or on the number of
people in exposed and dangerous situations. This work is
applied to the real case of a district of Beirut, Lebanon. This
article presents a work in progress and focuses on explaining
the model and how it was developed. Section 2 presents the
H. V. Truong is with the Institut de la Francophonie pour l’Informatique,
Hanoi, Vietnam. (e-mail: [email protected]).
E. Beck is with the University of Grenoble-Alpes. France (e-mail:
[email protected])
J. Dugdale is with the University of Grenoble-Alpes, France and
affiliated
to
the University
of Agder, Norway.
(e-mail:
[email protected])
C. Adam is with the University of Grenoble-Alpes, France (e-mail:
[email protected])
overall approach and gives the state of the art, whilst section
3 describes the methodology used for developing AMEL.
The model is described in section 4 and our first attempts at
validation are detailed in section 5. Section 6 concludes the
paper and presents future work.
II. APPROACH AND STATE OF THE ART
Agent-based social simulation (ABSS) is a branch of
distributed artificial intelligence and multi-agent systems
whose focus is on understanding, modelling and simulating
social behaviours. Rather than purely focusing on cognition,
this approach recognises the social complexity of a society
and looks at how social phenomena, such as cooperation,
emerge through human behaviours.
The use of agents in modelling human systems has several
advantages over other approaches (Bonabeau, 2002). Firstly,
agent based systems are able
to capture emergent
phenomena that are so representative of complex adaptive
systems. Secondly, they provide a natural description of a
system, which as Bonabeau notes makes the agent based
approach much closer to reality. Finally, they are flexible,
allowing us to study social systems at different levels of
abstraction by varying the complexity of our agents or by
aggregating agents into subgroups.
Hundreds of agent-based social simulators have been
developed. These have been used for predicting future
situations, as training tools, for developing and formalizing
theories, or for testing new technological designs or new
ways of organizing work (Gilbert and Troitzsch, 1999). Here
we focus on the use of a simulator for understanding and
predicting human behaviour when faced with an earthquake,
depending on their level of vulnerability.
Using agent based simulation as a way to assess
emergency situations has become increasingly popular in
recent years. The RoboCup Rescue Agents Simulation
project has attracted many researchers who are interested in
using the specially developed platform to develop intelligent
agents that undertake the role of Police Forces, Fire Brigades,
and Ambulance Teams in a disaster response scenario
(Skinner and Ramchurn, 2010). Likewise, other works, such
as the REScUE research project (Hawe, Coates, Wilson and
Crouch, 2011) and EQ-Rescue (Fiedrich, 2006) have been
developed to evaluate different rescue plans, or to optimize
resource allocation during an emergency. These works, like
many of this kind of simulation, focus specifically on the
response and rescue aspects, with the main accent being on
modelling rescue agents, on coordination between different
teams, or on the allocation of resources. Our work differs in
this respect since we do not look at response activities, but
just the behavior of the potential victims.
Pelechano and Badler present a model of building
evacuation
to
study
the
influence of
inter-agent
communication and the effect of training (Pelechano and
Badler, 2006). The movements of agents in rooms are
modelled by acceleration equations. The authors show that
the evacuation may be made more efficient by introducing
communication between agents to share their knowledge of
blocked routes. Similarly the evacuation is also more
efficient if there are a small number of leaders (trained staff)
in the crowd that the other dependent agents group around
and follow. Although we have designed AMEL to take into
account leader/follower behaviours, our work is still in
progress and therefore we have not yet experimented with
this aspect. Concerning inter-agent communication, we hope
to build on
this work by considering neighbourhood
evacuation.
Nguyen et al. present a hybrid model of the pedestrian
flow on road networks, applied to the evacuation of Nhatrang
(Vietnam) in case of a tsunami (Nguyen, Zucker, Nguyen,
2011). This model combines micro (agent-based, fine-grained
but slow) and macro (equation-based, fast) models of
pedestrians’ movement, in order to improve the efficiency
(speed) of simulations involving a large number of agents.
This hybrid model was shown to be more efficient than a
micro-model, and of better quality than a macro-model.
III. METHODOLOGY
A controversy in ABSS concerns the fundamental
question of how to develop useful models of real-life social
situations. Broadly there are two schools of thought. One
follows the KISS (Keep It Simple, Stupid) philosophy where
the aim is to develop simplistic models and where much of
the real world detail has been abstracted away. Although
there are obvious benefits, e.g. in terms of ease of
constructing the models, the approach has been widely
criticised. The arguments can be reduced to the idea that
models that are too simple only address simplistic problems
that are not representative of the real world. The other
extreme is a KIDS (Keep It Descriptive Stupid) approach
(Edmonds and Moss, 2004) where the model is constructed
by taking into account the widest possible range of evidence,
including anecdotal accounts and expert opinion. Although
we obtain a much truer representation of reality it may be
very difficult to obtain the data to build the model,
implementation is more complicated, and validation of the
model and simulator are problematic. The approach adopted
in this work falls in between these two extremes and follows
that proposed by Rosaria Conte: “Keep it Simple as Suitable”
(Conte, 2000). Here models are abstract enough to achieve an
adequate level of generality, but no less complex than what is
required by the purpose of the simulation. Whilst the original
KISS, KIDS, and reformulated KISS approaches provide
advice on designing models it is very general and somewhat
vague, and the approaches lack a complete modelling
method. In response, several methods and modelling
techniques have been proposed,
for example GAIA
(Wooldridge, Jennings and Kinny, 2000), VOWELS
(Demazeau, 1995), CoMoMAS (Glaser, 1996), MMTS
(Kinny, Geogeff and Rao, 1996), and Unified Approach
(Sabas, Delisle and Badr, 1996). These all provide the
standard framework for modelling the agent dimension, some
taking into account the deliberative behaviour of agents.
However, they are largely intended for developing general
multi-agent systems and are not specifically focused on
modelling the social elements that are required in ABSS.
Furthermore, they fail to provide a structure for analysing
human agents in the design phase and for validating the
model with respect to the observed human behaviour. Some
methods have been developed that focus particular on agent
based simulation. Notably the ODD protocol by Grimm and
his colleagues aimed to standardising descriptions of models
to aid understanding and ensure reproducibility (Grimm,
Berger, Bastiansen, Eliassen, Ginot, Giske, Goss-Custard,
Grand, Heinz, Huse, Huth, Jepsen, Jørgensen, Mooij, Müller,
Pe’er, Piou, Railsback, Robbins, Robbins, Rossmanith,
Rüger, Strand, Souissi, Stillman, Vabø, Visser and DeAngelis
DL. 2006; Grimm, Berger, DeAngelis, Polhill, Giske and
Railsback, 2010). Although very useful, the protocol only
concerns model description and does not suggest how the
model itself may be developed.
The methodology adopted in this work is shown in figure
1 and is adapted from that of Edmonds (Edmonds, 2000).
However it has several important differences. Firstly, it
focuses on analysing human behaviour in the real world
situation through the use of extensive field studies. This
provides a solid corpus of empirical data through video
recordings and observations, etc. Secondly, it puts validation
at the heart of the process ensuring that the results of the
simulator can be more readily trusted (Dugdale, Bellamine-
Ben Saoud, Pavard, Pallamin, 2001). Finally, it reinforces
iteration; this allows us to revisit previous steps such as
undertaking additional targeted field studies and refining the
model and code as necessary.
Field
Model
Studies
design
and
data
collection
Validation
Simulation
(experimen
tation
and
analysis)
Develop-‐
ment
Figure 1. Methodology adopted for AMEL
Following figure 1, the first step covers performing
detailed field studies of the real situation in order to assess
the human behaviours and their underlying motivations. The
second step, Model design, involves developing the formal
model, for example by using UML, of what has been
obtained through the analysis of field studies data. Validation
has been put at the heart of the methodology and relies
heavily on the data obtained via field studies in the analysis
phase. The final step, Simulation, covers experimentation.
The bi-directional arrows ensure that iteration plays a major
role. The above methodology was first described in 1999
(Dugdale, Pavard and Soubie, 1999; Dugdale, Pavard and
Soubie 2000) and has been used for designing and
developing agent-based simulators in several works over the
years, for example in (Bellamine-Ben Saoud, Ben Mena,
Dugdale, Pavard and Ahmed, 2006; Kashif, Binh, Dugdale
and Ploix, 2001; Kasif, Ploix, Dugdale and Binh, 2013).
IV. FIELD STUDIES AND DATA COLLECTION
The studied district is characterized by a high density of
buildings that have a differing number of storeys, date and
construction material. Several types of data were collected
using a multidisciplinary approach, involving the disciplines
of geography, psychology and geotechnics. Concerning the
geographic aspect, the buildings, streets, and green spaces
correspond to spatial data represented by polygons and
polylines. These objects correspond to geographic layers and
were processed through geographic information systems.
The data first comes from a national reference database
(such as the French Geographic Institute database) and was
corrected and updated using high spatial resolution satellite
imaging. Concerning demographic data, the last Lebanon
population census was carried out in 1932. Therefore, the
population was estimated at 3.8 persons per apartment.
Because of the high heterogeneity of the building types,
which leads to high variations of physical vulnerability to
earthquakes, each of the 357 buildings was documented
through a field survey that aimed at characterizing its
vulnerability. For example,
the survey form
included
information such as number of storeys, year of construction,
construction material. Some geotechnical data was collected
with material samples for different types of construction.
This data was then computed with the FEMA’s method
called HAZUS (Kircher, Whitman and Holmes, 2006) in
order to estimate the damage rate for each building in case of
an M7 earthquake on the Yammouneh fault.
Finally, the model requires social data concerning the
behaviours of individuals. This data was collected through a
field sociological survey that interviewed 88 persons of the
studied district (Beck, Colbeau-Justin, Cartier and Saikali,
2011). The questionnaire focused on several subjects
including knowledge about earthquakes, risk perception,
earthquake experience and associated behaviours, etc. The
statistical analysis of the survey allowed us to define several
categories of behaviours. Some extra behaviours, that were
not observed in the survey but have been reported in similar
cases, were also considered and implemented into the model
(leader-follower behaviour, for example).
V. MODEL DESIGN
As a first step, the purpose of the simulation is to
reproduce, based on the survey information, the mobility of
people and their behaviours following an earthquake in
Lebanon. In an earthquake, natural and artificial obstacles
(e.g. escarpments and stairways), and obstacles induced by
the earthquake itself, can injure people and constrain their
movement towards safe zones. The simulator will provide
information concerning the physical and human damage
incurred (the number of damaged buildings, blocked streets,
number of victims, number of people in dangerous zones,
evacuation time, etc.).
Once we have reproduced mobility behaviours that align to
the survey information, as a second step, we experiment with
difference scenarios by changing the ways that people behave
and analysing the results. We want to see what happens
(damages, number of fatalities and exposure to danger) if
people act in different ways. These results can serve to
inform people about how to improve their behaviours, for
example by forming the basis of an information campaign.
A. Entities and their attributes
The model consists of six entities: Human, Street,
Building, Green space, Quake, and Obstacle (figure 2). Their
attributes are divided
into
three
types: position and
visualization (location, colour, etc.), entity characteristics
(e.g. Human entity has attributes about age, sex, profession,
etc., and the Building entity has attributes about height,
capacity, etc.). Finally there are special attributes concerning
the
entity’s
behaviours
(e.g.
target
to
reach,
street_knowledge, etc. of the Human entity).
Figure 2. Class diagram
B. Human agent
Since the Human agent is the most important entity we
focus on describing this agent in detail. Human agents
represent people in the district. After an earthquake, agents
can decide to move, on roads that are not blocked, or stay at
their current location. They can become informal leaders
who know the safe areas and can guide other agents to their
targets. Agents can also become followers by searching for a
leader in their perception zones and then following that
agent. If a follower cannot find a leader, it wanders around.
Human agents can observe obstacles and other agents
inside its perception radius (attribute radius_perception).
After meeting a big obstacle, the Human agent can act in
different ways. If it is a leader, it will choose another way to
reach target. If it is a wanderer, it will choose another target
to go to. Each Agent update their street knowledge,
remembering which streets are blocked so that they may be
avoided in future.
C. Obstacle agent
Obstacle agents can affect the behaviour of Human
agents. In this work, we focus on the obstacles induced by an
earthquake itself, particularly by the buildings damaged by
the earthquake. Based on the damage level of buildings, we
can group obstacles into three levels: big, medium and small.
The big obstacles destroy all the streets and people in those
zones, so no agent can pass these obstacles. In the zone of
medium and small obstacles, people are exposed to the
danger (attribute exposed); this means that the agent is in the
danger zone and there is a high risk of being injured. Medium
obstacles can constrain the movement of agents in their zone,
making them move more slowly.
D. Other agents
The Quake agent has attributes for the intensity and time
of the earthquake. Building agents have attributes for
damage level of the building. Street agents are considered as
a weighted graph where each street is an edge and each
intersection is a vertex. Each unaffected street has a small
weight (e.g. the length of street), but blocked streets have a
much higher weight than normal streets (e.g. a billion). By
using this weighted graph approach each agent has their own
representation (beliefs) about the state of the streets.
The spatial scale in our model is in meters and each
simulation cycle lasts one second. The simulation begins
after all human agents have decided upon their target, and
ends when all the leaders have reached their targets.
E. Agent behaviours
Human behaviours:
How people behave in reality is very complex. In our
model, we just focus on the mobility of people and do not
consider more complex behaviours. From the survey, we
synthesize 6 behaviours:
1. Move without changing activity. This covers
people that had intended to move and do not
change
their activity as a result of
the
earthquake (e.g. people who are on their way to
work)
2. Stay in place without changing activity. This
covers people who remain where they are and
continue doing the same activity (e.g. those
who are at home and do not have employment).
3. Change activity in order to go to a safe place.
This covers people who intentionally move to a
safe place just after an earthquake.
4. Change activity in order to go to an unsafe
place. This covers peoples who intentionally
move to an unsafe place (e.g. someone who
goes to a relative’s home even though it may
be unsafe).
5. Change activity and stay in place. This covers
people who had planned to go somewhere, but
because of the earthquake they remain where
they are.
Imitate others. This addresses leader-follower
behaviours.
6.
The simulation begins when all of the agents have
determined where to go. Thus, from a mobility point of
view, behaviours 1, 3 and 4 are equivalent (the agent
moves), and behaviours 2 and 5 are also equivalent (the
agent does not move).
Human behaviours are synthesized into three groups:
movement, obstacle perception and
imitation. While
movement behaviour concerns the mobility of people,
obstacle perception and imitation relate to determining and
updating target locations and knowledge of the blocked
streets.
• Movement behaviour
The streets are considered as a weighted graph on which
the Human agent moves and determines the shortest path
to reach its target. Moreover, the street knowledge of agent
is considered as list of weights applied for the graph. Each
agent has a different knowledge of the streets, so the
weights applied for the graph are different according to
each agent. Thus the shortest path to the target depends on
two factors: the agent’s target and the agent’s street
knowledge (figure 3).
Figure 3. The movement process
• Obstacle perception behaviour
Agents within the zone of medium and small
obstacles are considered to be exposed to danger. In
addition, medium obstacles constrain the movement of
agents, making them move along their route more
slowly.
Agents can observe obstacles in their zone of
perception and when they encounter a big obstacle they
cannot proceed. However, they remember blocked
streets so that they may be avoided in the future when
finding another path to the target. The difference
between the behaviour of leaders and followers is that
if they meet an obstacle, leaders will find other ways to
reach their target, while followers will find another
target to go to. In our model, we consider 5 blocked
streets configurations (Fig. 4).
repeatedly doesn’t have success it will eventually give up.
Figure 6 shows the obstacle perception behaviour.
Figure 4. Blocked street configurations (with damages)
In figure 4 the red circle is an obstacle and a blue square is
the Human agent. In (1) the Agent is in the area with no exit.
In (2) there is a long street section before the agent moves
towards the obstacle. In (3) there is a short street section
before the agent moves towards the obstacle. In (4) the
Agent is in the street with two obstacles on both sides. In (5)
the Agent sees an obstacle on another street.
The simplest method to implement this behaviour is to
update an agent’s knowledge of blocked streets and target
path when the agent encounters an obstacle. However, this
leads to several problems.
First, with configuration (2), the agent is still in the
blocked street, it must go back to choose another street, but
the street section to go back to is longer than the rest of the
street, so the agent often chooses to enter into the obstacle.
To overcome this problem we make all agents update their
street knowledge and go back to the previous intersection
after meeting an obstacle (Figure 5). After that, the weights
of blocked streets are updated, leader agents build other paths
to reach their targets, and wandering agents choose other
targets and build paths to go. If an agent encounters an
obstacle as in the configuration (5), figure 4, then it will
normally update the weights.
•
Figure 6. Obstacle perception process
Imitation behaviour
For the followers and wanderers, at the beginning, they
search randomly around them for a leader. If they find a
leader, then they become followers. They update their
targets to the position of leader and update paths to follow
it. Figure 7 shows the process of imitation.
Figure 7. Imitation process for followers and wanderers
For the leaders, every 10 cycles of the simulation, they
perceive their followers and adjust their speeds to the
slowest follower (figure 8).
Figure 5. Agent moves to the previous intersection to update its street
knowledge
Secondly, with configurations (1) and (4), the agent has no
choice but to pass over obstacles to get out. In order to fix
this problem we add a parameter concerning the maximum
number of times that the agent encounters an obstacle (2-3
times). After this, the agent stops and stays where it is. This
feature relates to the psychological aspect of people in the
evacuation. If a person tries to find a way to its target but
Figure 8. Speed adjustment process for leader
• Obstacle behaviours
The Obstacle agent has two behaviours: street damage
and human damage. With street damage, each agent finds
all the streets around it that it overlaps and updates the
“blocked” attribute of that Street agent to “true”. With
human damage, each Obstacle agent finds all of the
Human agents with which it overlaps and destroys them.
VI. DEVELOPMENT
The AMEL model has been implemented on the GAMA
platform
(Grignard, Taillandier, Gaudou, Huynh and
Drogoul, 2013); GAMA is an open-source generic agent-
based modelling and simulation platform. It provides an
intuitive modelling language with high-level primitives to
define agents and their environment. GAMA includes a
powerful Integrated Development Environment to help non-
computer scientists
to develop complex models with
powerful features in terms of Geographical Information
Systems (GIS)
integration and high-level
tools (e.g.
decision-making or clustering algorithms). In addition, both
the language and the software have been designed to allow
the development of big models with a huge number of
agents (with various architectures from reflex-based to
belief-desire-intention architectures). GAMA also allows
modellers to manage various kinds of complex environments
such as square, hexagonal or irregular grids, networks, or
continuous environments linked to GIS data.
GAMA enables a hierarchical and dynamic organization
of agents. The platform is also easily extensible to add new
features to models (e.g. to give the possibility of integrating
equation-based (ODE) models into agents) or new agent
architectures or features. GAMA has been successfully used
to develop various large-scale applications that share the
need for a tight integration and management of huge GIS
data, and for strong
interactions between a complex
environment and the agents. It was used for instance in the
MAELIA platform for simulating water management
problems (Gaudou, Sibertin-Blanc, Thérond, Amblard,
Arcangeli, Balestrat, Charron-Moirez, Gondet, Hong,
Mayor, Panzoli, Sauvage, Sanchez-Perez, Taillandier,
Nguyen, Vavasseur and Mazzega, 2013).
Figure 9 shows a screenshot of the simulation. The main
display represents the district with the streets in black, green
space in green, and the buildings in yellow. Human agents
are represented by small circles of different colours: hot
colours (red, pink) for agents who stay where they are; cold
colours (blue, purple) for agents who move; and the colour
cyan for imitating agents. We also created other displays:
charts of the different behaviours; charts about the number of
victims, people exposed, leaders and followers, etc; and a
chart about the total exposition time. On the right, we can see
the parameters of the simulator; these concern the location of
the human agents and their behaviours, as well as some
global simulator parameters. By varying the value of these
parameters we can create different scenarios which may help
to see the effect of the different information campaigns. For
example, if we want to see the effect on the number of
victims if an earthquake occurs during the night, we can set
the value for the “people in buildings” parameter (probability
of people who are in the buildings) equal to 100 (percent),
indicating that at night everyone is inside a building.
Figure 9.
Screenshot of the simulation
VII. VALIDATION
Once the model has been implemented, it must be
validated. This is current work in progress. Every newly
implemented “brick” of the model is tested individually and
all the associated scenarios are evaluated in order to
understand the impact of the new brick. As we developed the
simulator incrementally it eventually becomes increasingly
complex. The challenge is to understand the impact of any
new changes on the global model. For example, once human
exposure to hazards is implemented, we have to verify that
the fatalities figures are realistic. For these kinds of
validations we ask the experts who collected the data and
those that have real life experience of the consequences of
earthquakes. This process of validation involves all other
steps of the methodology and is central to the development
process. In practice we have found this to be a highly
iterative step where we frequently request validation from
experts when changing our model and after implementation.
This validation constitutes a major step that should not be
underestimated.
VIII. FIRST RESULTS
Although we are currently in the validation stage, we
provide some first results so that the reader may see the type
of results that may be achieved with the simulator. The
results concern two scenarios: 1. The survey scenario, this is
the real situation where most people stay where they are and
do not go to the safe place; 2. An optimistic scenario where
everyone goes to a safe place (e.g. green space, schools,
outside of the city, or even just into the streets).
We can see in the graphs below that the number of
exposed people in the optimistic scenario is less than that in
the survey scenario. Also the number of ‘others’ (i.e. those
who are not exposed and injured, in other words they are in
the safe places) and those who go to outside of the city
(considered as a safe place) in the optimistic scenario is more
than in the survey scenario.
to many small earthquakes, a significant number of them do
not change their behaviours during an earthquake and
continue to do their originally planned activities. Whilst in
small earthquakes this is not problematic, the consequences
of being unprepared in the case of a large one could be
devastating.
We have developed a model and first prototype of a
simulator that shows pedestrians’ movements following
different human behaviours after an earthquake. Using
GAMA we were able to incorporate the actual map of the
neigbourhood in Beirut, including current streets and actual
buildings. This allowed us to develop a realistic simulator
with agents moving from known buildings along current
streets. One particular feature of how we have designed the
model is that each agent has its own personal view of the
state of the road infrastructure. This replicates the real
situation where people are only aware of the routes open to
them after an earthquake as
they move around
the
neigbourhood towards their target. As agents explore their
neigbourhood,
their knowledge of
the
streets
is
incrementally updated.
We are currently in the process of validating the model
and simulator. In particular we are addressing the problem of
an agent’s exposure to danger and how fatalities may be
quantified given the different severities of building damage.
Validation is a long process since we need to interact with
local experts from different domains and the data required is
not always available. Nevertheless, despite some difficulties
with validation, the results of the simulator are encouraging.
ACKNOWLEDGEMENTS
This study is funded by the French National Research
Agency (ANR RISKNAT 2009 LIBRIS). The authors would
like to thank the different persons involved in the collection
of data: Jocelyne Adjizian-Gérard, Rita Zaarour, Nada
Saliba, Pierre-Charles Gérard and the students involved in
the
survey
for
the building
inventory
(Geography
Department of
the Saint Joseph University, Beirut,
Lebanon); Jacques Harb for the damages modelling (Notre
Dame University, Beirut, Lebanon); Maud Saikali and
Carine Azzam (Saint Joseph University, Beirut, Lebanon),
Ludvina Colbeau-Justin and Stéphane Cartier (CNRS-
PACTE Laboratory, Grenoble, France)
for
the
risk
perception survey. The authors also thank Patrick Taillandier
(Rouen University, France), Nicolas Marilleau (Institute for
Research and Development, France) and Benoit Gaudou
(Toulouse University, France) for their precious help on
GAMA. Julie Dugdale would like to acknowledge the
support of the University of Agder, to which she is affiliated.
REFERENCES
[1] N. Bellamine-Ben Saoud, T. Ben Mena, J. Dugdale, B. Pavard and B.
Ahmed, “Assessing large scale emergency rescue plans: an agent
based Approach. Special Issue on Emergency Management Systems.
International Journal of Intelligent Control and Systems. Vol. 11, No.
4, Dec. 2006. 260-271.
[2] M. Bertran Rojo, E. Beck, C. Lutoff and Ph. Schoeneich, "Exposition
sociale face aux séismes : la mobilité en question. Le cas de Lorca
(Espagne) – May 2011”. Géorisques.
Figure 10. Fatality and exposure graphs. On the left, the survey
scenario. On the right an optimistic scenario
Concerning the total exposure time, we can see that in the
current situation (survey scenario) there are more people who
are exposed for a long time, whereas in the optimistic
scenario there are more people who are exposed for the short
time.
Figure 11. Number of agents exposed. On top, the survey scenario.
On the bottom the optimistic scenario. The horizontal axis shows time slot
periods and the vertical axis shows the number of exposed people in a
corresponding time period.
IX. SUMMARY
Lebanon is an earthquake prone area, lying on the Mount
Lebanon Thrust Fold and the Yamouneh faults, which have
the capacity to generate a 7.5 magnitude earthquake.
Although major earthquakes are rare, minor ones occur
frequently and there is a deep concern that a large
earthquake could destroy the city, as it did in 551 AD.
Despite this threat the study conducted as part of this project
showed that, possibly because people are constantly exposed
Agent World (MAAMAW). LNAI, 1996, Volume 1038, 56-71.
Springer-Verlag.
[20] T.N.A. Nguyen, J.-D. ZuckerD., H.D. Nguyen., A. Drogoul. and D.-
A. Vo, “A Hybrid Macro-Micro Pedestrians Evacuation Model to
Speed Up Simulation in Road Networks”, In Advanced Agent
Technology workshop at AAMAS 2011, Taipei, Taiwan, May 2-6,
2011. Revised selected papers. Pp 371-383. Lecture Notes in
Computer Science, volume 7068. Springer Berlin Heidelberg. 2012.
[21] N. Pelechano and N. I. Badler. “Modeling Crowd and Trained Leader
Behavior during Building Evacuation”, IEEE Computer Graphics and
Applications, Volume 26, Issue 6, November-December 2006, pages
80-86.
[22] A. Sabas, S. Delisle and M. Badri, “A Comparative Analysis of
Multiagent System Development Methodologies: Towards a Unified
Approach”, In Proceedings of the Third International Symposium
From Agent Theory to Agent Implementation, 16th European Meeting
on Cybernetics and Systems Research, 1996.
[23] Skinner, C. and Ramchurn, S. (2010) The RoboCup Rescue
simulation platform, Proceedings of the 9th International Conference
on Autonomous Agents and Multiagent Systems, pp. 1647-1648,
Toronto, Canada.
[24] M. Wooldridge, N.R. Jennings. and D. Kinny, “The GAIA
Methodology for Agent-Oriented Analysis and Design”, Journal of
Autonomous Agents and Multi-Agent Systems, 2000, 3(3) 285-312.
[6]
[8]
[7]
[3] Bonabeau E. “Agent-based modeling: Methods and techniques for
simulating human systems”. In: Adaptive Agents, Intelligence, and
Emergent Human Organization: Capturing Complexity
through
Agent-Based Modeling. Proceedings of the National Academy of
Sciences (PNAS) U S A. 2002 May 14; 99(Suppl 3): pp. 7280–7287.
[4] R. Conte, “The necessity of intelligent agents in social simulation”. In
Ballot, G. and Weisbuch, G. (eds.), Applications of Simulation to
Social Sciences. Paris: Hermes Science, 2000.
[5] Y. Demazeau, “From interactions to collective behaviour in agent
based-systems”. In Proceedings of the First Conference on Cognitive
Science. Saint-Malo, France, 1995.
J. Dugdale, N. Bellamine-Ben Saoud, B. Pavard and N. Pallamin,
“Simulation and Emergency Management”.In Van de Walle, B.,
Turoff, M. and Hiltz, R.H. (eds) Information Systems for Emergency
Management. Series: Advances in Management Information Systems.
Sharp, 2001.
J. Dugdale, B. Pavard and J.L. Soubie, “Design Issues in the
Simulation of an Emergency Call Centre”. In Proceedings of the 13th
European Simulation Multiconference (ESM 99). June 1-4, 1999.
Warsaw, Poland.
J. Dugdale, B. Pavard and J.L. Soubie, “A Pragmatic Development of
a Computer Simulation of an Emergency Call Centre”. In Dieng, R.
(ed) Designing Cooperative Systems. Frontiers
in Artificial
Intelligence and Applications. IOS Press, 2000.
[9] B.Edmonds, “The Use of Models - making MABS actually work”. In.
Moss, S. and Davidsson, P. (eds.), Multi Agent Based Simulation,
2000. Lecture Notes in Artificial Intelligence, 1979:15-32.
[10] B. Edmonds and S. Moss, “From KISS to KIDS: An “anti-simplistic”
In Proceedings of Multi-Agent Based
modelling approach”.
Simulations (MABS) Conference, 2004, pp. 130-144.
[11] F. Fiedrich, An HLA-based multiagent system for optimized resource
allocation after strong earthquakes. Winter Simulation Conference
2006, 486-492.
[12] B. Gaudou, C. Sibertin-Blanc, O. Thérond, F. Amblard, J.-P.
Arcangeli, M. Balestrat, M.-H. Charron-Moirez, E. Gondet, Y. Hong,
Th. Louail, E. Mayor, D. Panzoli, S. Sauvage, J.-M. Sanchez-Perez, P.
Taillandier, V.B. Nguyen, M. Vavasseur and P. Mazzega,
"The MAELIA multi-agent platform for integrated assessment of low-
water management issues” (regular paper). In International Workshop
on Multi-Agent-Based Simulation (MABS 2013), Saint-Paul, MN,
USA, 06/05/2013-07/05/2013, 2013 (to appear).
[13] N. Gilbert and K.G. Troitzsch, Simulation for the Social Scientist.
Open University Press, London, 1999.
[14] N. Glaser, Contribution to Knowledge Acquisition and Modelling in a
Multi-Agent Framework — The CoMoMAS Approach, PhD Thesis
Universite Henry Poincare, Nancy, F, December 1996.
[15] A. Grignard., P. Taillandier, B. Gaudou, N.Q. Huynh, D.-A. Vo and
A. Drogoul A. GAMA v. 1.6: Advancing the art of complex agent-
based modeling and simulation. PRIMA 2013.
[16] Grimm V, Berger U, Bastiansen F, Eliassen S, Ginot V, Giske J,
Goss-Custard J, Grand T, Heinz S, Huse G, Huth A, Jepsen JU,
Jørgensen C, Mooij WM, Müller B, Pe’er G, Piou C, Railsback SF,
Robbins AM, Robbins MM, Rossmanith E, Rüger N, Strand E,
Souissi S, Stillman RA, Vabø R, Visser U, DeAngelis DL. 2006. A
standard protocol for describing individual-based and agent-based
models. Ecological Modelling 198:115-126.
[17] Grimm V, Berger U, DeAngelis DL, Polhill G, Giske J, Railsback SF.
2010. The ODD protocol: a review and first update. Ecological
Modelling 221: 2760-2768
[18] Hawe, G.I., Coates, G., Wilson, D.T. & Crouch, R.S. (2011). Design
Decisions in the Development of an Agent-Based Simulation for
Large-Scale Emergency Response. 8th International Conference on
Information Systems for Crisis Response and Management, Lisbon,
Portugal.
[19] D. Kinny, M. Georgeff and A. Rao, “A Methodology and Modeling
Technique for Systems of BDI agents”. In Proceedings of the Seventh
European Workshop on Modelling Autonomous Agents in a Multi-
|
cs/0510089 | 1 | 0510 | 2005-10-30T16:06:56 | Automata-based adaptive behavior for economic modeling using game theory | [
"cs.MA",
"cs.DM"
] | In this paper, we deal with some specific domains of applications to game theory. This is one of the major class of models in the new approaches of modelling in the economic domain. For that, we use genetic automata which allow to buid adaptive strategies for the players. We explain how the automata-based formalism proposed - matrix representation of automata with multiplicities - allows to define a semi-distance between the strategy behaviors. With that tools, we are able to generate an automatic processus to compute emergent systems of entities whose behaviors are represented by these genetic automata. | cs.MA | cs |
AUTOMATA-BASED ADAPTIVE BEHAVIOR FOR ECONOMIC
MODELING USING GAME THEORY
R. Ghnemat, K. Khatatneh, S. Oqeili
C. Bertelle(1), G.H.E. Duchamp(2)
Al-Balqa' Applied University,
Al-Salt, 19117
Jordan
(1) LIH - University of Le Havre,
(2) LIPN - University of Paris XIII,
France
ABSTRACT
this way a good tool to modelize such adaptive strategy.
In this paper, we deal with some specific domains of ap-
plications to game theory. This is one of the major class
of models in the new approaches of modelling in the eco-
nomic domain. For that, we use genetic automata which
allow to buid adaptive strategies for the players. We ex-
plain how the automata-based formalism proposed - ma-
trix representation of automata with multiplicities - allows
to define a semi-distance between the strategy behaviors.
With that tools, we are able to generate an automatic pro-
cessus to compute emergent systems of entities whose be-
haviors are represented by these genetic automata.
1. Introduction: Adaptive Behaviour Modeling for Ga-
me Theory
Since the five last decades, game theory has become a ma-
jor aspect in economic sciences modelling and in a great
number of domains where strategical aspects has to be in-
volved. Game theory is usually defined as a mathematical
tool allowing to analyse strategical interactions between
individuals.
Initially funded by mathematical researchers, J. von
Neumann, E. Borel or E. Zermelo in 1920s, game theory
increased in importance in the 1940s with a major work
by J. von Neumann and O. Morgenstern and then with
the works of John Nash in the 1950s [9]. John Nash has
proposed an original equilibrium ruled by an adaptive cri-
terium. In game theory, the Nash equilibrium is a kind of
optimal strategy for games involving two or more players,
whereby the players reach an outcome to mutual advan-
tage. If there is a set of strategies for a game with the prop-
erty that no player can benefit by changing his strategy
while the other players keep their strategies unchanged,
then this set of strategies and the corresponding payoffs
constitute a Nash equilibrium.
We can understand easily that the modelization of a
player behavior needs some adaptive properties. The com-
putable model corresponding to genetic automata are in
The plan of this paper is the following. In the next sec-
tion, we present some efficient algebraic structures, the au-
tomata with multiplicities, which allow to implement pow-
erful operators. We present in section 3, some topological
considerations about the definition of distances between
automata which induces a theorem of convergence on the
automata behaviors. Genetic operators are proposed for
these automata in section 4. For that purpose, we show
that the relevant "calculus" is done by matrix represen-
tions unravelling then the powerful capabilities of such al-
gebraic structures. In section 5, we focus our attention on
the "iterated prisonner dilemma" and we buid an original
evolutive probabilistic automaton for strategy modeling,
showing that genetic automata are well-adapted to model
adaptive strategies. Section 6 shows how we can use the
genetic automata developed previously to represent agent
evolving in complex systems description. An agent behav-
ior semi-distance is then defined and allows to propose an
automatic computation of emergent systems as a kind of
self-organization detection.
2. Automata from boolean to multiplicies theory (Au-
tomata with scalars)
Automata are initially considered as theoretical tools. They
are created in the 1950's following the works of A. Tur-
ing who previously deals with the definition of an abstract
"machine". The aim of the Turing machines is to define
the boundaries for what a computing machine could do
and what it could not do.
The first class of automata, called finite state automata
corresponds to simple kinds of machines [21]. They are
studied by a great number of researchers as abstract con-
cepts for computable building. In this aspect, we can re-
call the works of some linguist researchers, for example N.
Chomsky who defined the study of formal grammars.
In many works, finite automata are associated to a rec-
ognizing operator which allows to describe a language [2,
10]. In such works, the condition of a transition is simply
a symbol taken from an alphabet. From a specific state S,
the reading of a symbol a allows to make the transitions
which are labeled by a and come f romS (in case of a
deterministic automaton - a DFA - there is only one tran-
sition - see below). A whole automaton is, in this way,
associated to a language, the recognized language, which
is a set of words. These recognized words are composed
of the sequences of letters of the alphabet which allows to
go from a specific state called initial state, to another spe-
cific state, called final state.
A first classification is based on the geometric aspect :
DFA (Deterministic Finite Automata) and NFA (Nonde-
terministic Finite Automata).
• I : Q 7→ K is a function over the set of states, which
associates to each initial state a value of K, called
entry cost, and to non- initial state a zero value ;
• F : Q 7→ K is a function over the set states, which
associates to each final state a value of K, called
final cost, and to non-final state a zero value;
• T is the transition function, that is T : Q×A×Q 7→
K which to a state Si, a letter a and a state Sj as-
sociates a value z of K (the cost of the transition) if
it exist a transition labelled with a from the state Si
to the state Sj and and zero otherwise.
• In Deterministic Finite Automata, for each state there
is at most one transition for each possible input and
only one initial state.
• In Nondeterministic Finite Automata, there can be
none or more than one transition from a given state
for a given possible input.
Remark 1 Automata with multiplicities are a generalisa-
tion of finite automata.
In fact, finite automata can be
considered as automata with multiplicities in the semiring
K, the boolan set B = {0, 1} (endowed with the logical
"or/and"). To each transition we affect 1 if it exists and 0
if not.
Besides the classical aspect of automata as machines
allowing to recognize languages, another approach con-
sists in associating to the automata a functional goal. In
addition of accepted letter from an alphabet as the condi-
tion of a transition, we add for each transition an infor-
mation which can be considered as an output data of the
transition, the read letter is now called input data. We de-
fine in such a way an automaton with outputs or weighted
automaton.
Such automata with outputs give a new classification
of machines. Transducers are such a kind of machines,
they generate outputs based on a given input and/or a state
using actions. They are currently used for control appli-
cations. Moore machines are also such machines where
output depends only on a state, i.e.
the automaton uses
only entry actions. The advantage of the Moore model is
a simplification of the behaviour.
Finally, we focus our attention on a special kind of au-
tomata with outputs which are efficient in an operational
way. This automata with output are called automata with
multiplicities. An automaton with multiplicities is based
on the fact that the output data of the automata with out-
put belong to a specific algebraic structure, a semiring
[13, 22]. In that way, we will be able to build effective
operations on such automata, using the power of the alge-
braic structures of the output data and we are also able to
describe this automaton by means of a matrix representa-
tion with all the power of the new (i.e. with semirings)
linear algebra.
Definition 1 (Automaton with multiplicities)
An automaton with multiplicities over an alphabet A and
a semiring K is the 5-uple (A, Q, I, T, F ) where
• Q = {S1, S2 · · · Sn} is the finite set of state;
Remark 2 We have not yet, on purpose, defined what a
semiring is. Roughly it is the least structure which allows
the matrix "calculus" with unit (one can think of a ring
without the "minus" operation). The previous automata
with multiplicities can be, equivalently, expressed by a ma-
trix representation which is a triplet
• λ ∈ K 1×Q which is a row-vector which coefficients
are λi = I(Si),
• γ ∈ K Q×1 is a column-vector which coefficients are
γi = F (Si),
• µ : A∗ 7→ K Q×Q is a morphism of monoids (in-
deed K Q×Q is endowed with the product of matri-
ces) such that the coefficient on the qith row and qjth
column of µ(a) is T (qi, a, qj)
3. Topological considerations
If K is a field, one sees that the space A(n) of automata
of dimension n (with multiplicities in K) is a K-vector
space of dimension k.n2 + 2n (k is here the number of
letters). So, in case the ground field is the field of real
or complex numbers [3], one can take any vector norm
(usually one takes one of the Holder norms (xi)i∈I α :=
α for α ≥ 1, but any norm will do) and the
1
(cid:0)Pi∈I xiα(cid:1)
distance is derived, in the classical way, by
d(A1, A2) = norm(V (A1) − V (A2))
(1)
where V (A) stands for the vector of all coefficients of
A = (λ, µ, γ) arranged in some order one has then the
result of Theorem 1. Assuming that K is the field of real or
complex numbers, we endow the space of series/behaviours
with the topology of pointwise convergence (Topology of
F. Treves [23]).
Theorem 1 Let (An) be a sequence of automata with limit
L (L is an automaton), then one has
5. Applications to competition-cooperation modeling
using prisoner dilemma
Behaviour(L) = lim
n→∞
Behaviour(An)
(2)
where the limit is computed in the topology of Treves.
4. Genetic automata as efficient operators
We define the chromosome for each automata with multi-
plicities as the sequence of all the matrices associated to
each letter from the (linearly ordered) alphabet. The chro-
mosomes are composed with alleles which are here the
lines of the matrix [6].
In the following, genetic algorithms are going to gener-
ate new automata containing possibly new transitions from
the ones included in the initial automata.
The genetic algorithm over the population of automata
with multiplicities follows a reproduction iteration broken
up in three steps [14, 18, 17]:
We develop in this section how we can modelize competition-
cooperation processes in a same automata-based represen-
tation. The genetic computation allows to make automatic
transition from competition to cooperation or from coo-
peartion to competition. The basic problem used for this
purpose is the well-known prisoner dilemma [1].
5.1. From adaptive strategies to probabilistic automata
The prisoner dilemma is a two-players game where each
player has two possible actions: cooperate (C) with its ad-
versary or betray him (C). So, four outputs are possible
for the global actions of the two players. A relative payoff
is defined relatively to these possible outputs, as described
in the following table where the rows correspond to one
player behaviour and the columns to the other player one.
C
C (3,3)
C (5,0)
C
(0,5)
(1,1)
• Duplication: where each automaton generates a clone
of itself;
Table 1. Prisoner dilemma payoff
• Crossing-over: concerns a couple of automata. Over
this couple, we consider a sequence of lines of each
matrix for all. For each of these matrices, a permu-
tation on the lines of the chosen sequence is made
between the analogue matrices of this couple of au-
tomata;
• Mutation: where a line of each matrix is randomly
chosen and a sequence of new values is given for
this line.
Finally the whole genetic algorithm scheduling for a
full process of reproduction over all the population of au-
tomata is the evolutionary algorithm:
1. For all couple of automata, two children are cre-
ated by duplication, crossover and mutation mech-
anisms;
2. The fitness for each automaton is computed;
3. For all 4-uple composed of parents and children, the
performless automata, in term of fitness computed
in previous step, are suppressed. The two automata,
still living, result from the evolution of the two ini-
tial parents.
Remark 3 The fitness is not defined at this level of ab-
stract formulation, but it is defined corresponding to the
context for which the automaton is a model, as we will do
in the next section.
In the iterative version of the prisoner's dilemma, suc-
cessive steps can be defined. Each player do not know
the action of its adversary during the current step but he
knows it for the preceding step. So, different strategies
can be defined for a player behaviour, the goal of each one
is to obtain maximal payoff for himself.
In Figures 1 and 2, we describe two strategies with
transducers. Each transition is labeled by the input cor-
responding to the player perception which is the prece-
dent adversary action and the output corresponding to the
present player action. The only inital state is the state 1,
recognizable by the incoming arrow labeled only by the
output. The final states are the states 1 and 2, recognizable
with the double circles.
In the strategy of Figure 1, the player has systemati-
cally the same behaviour as its adversary at the previous
step. In the strategy of Figure 2, the player chooses defini-
tively to betray as soon as his adversary does it. The previ-
ous automaton represents static strategies and so they are
not well adapted for the modelization of evolutive strate-
gies. For this purpose, we propose a model based on a
probabilistic automaton described by Figure 3 [5].
This automaton represents all the two-states strategies
for cooperation and competitive behaviour of one agent
against another in prisoner's dilemma.
The transitions are labeled in output by the probabili-
ties pi of their realization. The first state is the state reached
C:C
C:C
2
C:C
C
1
C:C
Figure 1. Tit-for-tat strategy automaton
C
1
C:C
C:C
2
C:C
C:C
Figure 2. Vindictive strategy automaton
C:1−p4
C:p5
C:p4
C:1−p2
p1
1
2
1−p1
C:p3
C:1−p5
C:p2
C:1−p3
Figure 3. Probabilistic multi-strategies two-states au-
tomaton
after cooperation action and the second state is reached af-
ter betrayal.
For this automaton, the associated matrix representa-
tion, as described previously, is:
I = ( p1
1 − p1 ) ;
1 − p6(cid:19) ;
F = (cid:18) p6
T (C) = (cid:18) p2
T (C) = (cid:18) p4
p5
p3
1 − p2
1 − p3(cid:19) ;
1 − p5(cid:19)
1 − p4
(3)
(4)
(5)
(6)
5.2. From probabilistic automata to genetic automata
With the matrix representation of the automata, we can
compute genetic automata as described in previous sec-
tions. Here the chromosomes are the sequences of all the
matrices associated to each letter. We have to define the
fitness in the context of the use of these automata. The
fitness here is the value of the payoff.
5.3. General Genetic Algorithm Process for Genetic
Automata
A population of automata is initially generated. These au-
tomata are playing against a predefined strategy, named
S0.
Each automaton makes a set of plays. At each play, we
run the probabilistic automaton which gives one of the two
outputs: (C) or (C). With this output and the S0's output,
we compute the payoff of the automaton, according with
the payoff table.
At the end of the set of plays, the automaton payoff is
the sum of all the payoffs of each play. This sum is the
fitness of the automaton. At the end of this set of plays,
each automaton has its own fitness and so the selection
process can select the best automata. At the end of these
selection process, we obtain a new generation of automata.
This new generation of automata is the basis of a new
computation of the 3 genetics operators.
This processus allows to make evolve the player's be-
havior which is modelized by the probabilistic multi-stra-
tegies two-states automaton from cooperation to compe-
tition or from competition to cooperation. The evolution
of the strategy is the expression of an adaptive computa-
tion. This leads us to use this formalism to implement
some self-organisation processes which occurs in complex
systems.
6. Extension to Emergent Systems Modeling
In this section, we study how evolutive automata-based
modeling can be used to compute automatic emergent sys-
tems. The emergent systems have to be understood in the
meaning of complex system paradigm that we recall in the
next section. We have previously defined some way to
compute the distance between automata and we use these
principles to define distance between agents behaviours
that are modeled with automata. Finally, we defined a spe-
cific fitness that allows to use genetic algorithms as a kind
of reinforcement method which leads to emergent system
computation [15].
6.1. Complex System Description Using Automata-Ba-
sed Agent Model
According to General System Theory [4, 19], a complex
system is composed of entities in mutual interaction and
interacting with the outside environment. A system has
some characteristic properties which confer its structural
aspects, as schematically described in part (a) of Figure 4:
• The set elements or entities are in interactive depen-
dance. The alteration of only one entity or one in-
teraction reverberates on the whole system.
• A global organization emerges from interacting con-
stitutive elements. This organization can be identi-
fied and carries its own autonomous behavior while
it is in relation and dependance with its environ-
ment. The emergent organization possesses new prop-
erties that its own constitutive entities don't have.
"The whole is more than the sum of its parts".
• The global organization retro-acts over its constitu-
tive components. "The whole is less than the sum of
its parts" after E. Morin.
The interacting entities network as described in part
(b) of Figure 4 leads each entity to perceive informations
or actions from other entities or from the whole system
and to act itself.
A well-adapted modeling consists of using an agent-
based representation which is composed of the entity called
agent as an entity which perceives and acts on an environ-
ment, using an autonomous behaviour as described in part
(c) of Figure 4.
To compute a simulation composed of such entities,
we need to describe the behaviour of each agent. This one
can be schematically described using internal states and
transition processes between these states, as described in
part (d) of Figure 4.
There are several definitions of "agents" or "intelligent
agents" according to their behaviour specificities [11, 24].
Their autonomy means that the agents try to satisfy a goal
and execute actions, optimizing a satisfaction function to
reach it.
For agents with high level autonomy, specific actions
are realized even when no perception are detected from
the environment. To represent the process of this delib-
eration, different formalisms can be used and a behaviour
decomposed in internal states is an effective approach. Fi-
nally, when many agents operate, the social aspects must
also be taken into account. These aspects are expressed
as communications through agent organisation with mes-
sage passing processes. Sending a message is an agent ac-
tion and receiving a message is an agent perception. The
previous description based on the couple: perception and
action, is well adapted to this.
6.2. Agent Behavior Semi-Distance
We describe in this section the bases of the genetic algo-
rithm used on the probabilistic automata allowing to man-
age emergent self-organizations in the multi-agent simula-
tion.
For each agent, we define e an evaluation function of
its own behaviour returning the matrix M of values such
that Mi,j is the output series from all possible successive
perceptions when starting from the initial state i and end-
ing at the final state j, without cycle. It will clearly be 0
if either i is not an initial state or j is not a final one and
the matrix Mi,j is indeed a matrix of evaluations [2] of
subseries of
M ∗ := (Xa∈A
µ(a)a)∗
(7)
Notice that the coefficients of this matrix, as defined,
are computed whatever the value of the perception in the
alphabet A on each transition on the successful path1. That
means that the contribution of the agent behaviour for col-
lective organization formation is only based, here, on prob-
abilities to reach a final state from an initial one. This al-
lows to preserve individual characteristics in each agent
behaviour even if the agent belongs to an organization.
Let x and y two agents and e(x) and e(y) their respec-
tive evaluations as described above. We define d(x, y) a
semi-distance (or pseudometrics, see [3] ch IX) between
the two agents x and y as e(x) − e(y), a matrix norm
of the difference of their evaluations. Let Vx a neighbour-
hood of the agent x, relatively to a specific criterium, for
example a spatial distance or linkage network. We define
f (x) the agent fitness of the agent x as :
f (x) =
card(Vx)
d(x, yi)2
Xyi∈Vx
∞
d(x, yi)2 6= 0
if Pyi∈Vx
otherwise
1A succesful path is a path from an initial state to a final state
Global Dynamics
and structures
Global structures
Agent
Interacting Entities
Agent
Agent
(a) Global complex system
(b) Interacting entities network
Agent
behaviour
Agent
behaviour
perceptions
actions
Environment
perceptions
actions
Environment
(c) Agent−based model for entity
(d) automata−based model for agent behaviour
Figure 4. Multi-scale complex system description: from global to individual models
6.3. Evolutive Automata for Automatic Emergence of
Self-Organized Agent- Based Systems
In the previous computation, we defined a semi-distance
between two agents. This semi-distance is computed using
the matrix representation of the automaton with multiplic-
ities associated to the agent behaviour. This semi-distance
is based on successful paths computation which needs to
define initial and final states on the behaviour automata.
For specific purposes, we can choose to define in some
specific way, the initial and final states. This means that
we try to compute some specific action sequences which
are chararacterized by the way of going from some spe-
cific states (defined here as initial ones) to some specific
states (defined here as final ones).
Based on this specific purpose which leads to define
some initial and final states, we compute a behaviour semi-
distance and then the fitness function defined previously.
This fitness function is an indicator which returns high
value when the evaluated agent is near, in the sense of
the behaviour semi-distance defined previously, to all the
other agents belonging to a predefined neighbouring.
Genetic algorithms will compute in such a way to make
evolve an agent population in a selective process. So dur-
ing the computation, the genetic algorithm will make evolve
the population towards a newer one with agents more and
more adapted to the fitness. The new population will con-
tain agents with better fitness, so the agents of a population
will become nearer each others in order to improve their
fitness. In that way, the genetic algorithm reinforces the
creation of a system which aggregates agents with similar
behaviors, in the specific way of the definition of initial
and final states defined on the automata.
The genetic algorithm proposed here can be consid-
ered as a modelization of the feed-back of emergent sys-
tems which leads to gather agents of similar behaviour,
but these formations are dynamical and we cannot predict
what will be the set of these aggregations which depends
of the reaction of agents during the simulation. Moreover
the genetic process has the effect of generating a feed-
back of the emergent systems on their own contitutive ele-
ments in the way that the fitness improvement lead to bring
closer the agents which are picked up inside the emergent
aggregations.
[11] J. Ferber, Multi-agent system, Addison-Wesley,
1999.
[12] L.J. Fogel, A.J. Owens, M.J. Welsh, Artificial intelli-
gence through simulated evolution, John Wiley, 1966.
[13] J.S. Golan, Power algebras over semirings, Kluwer
Academic Publishers, 1999.
[14] D.E. Goldberg, Genetic Algorithms, Addison-
Wesley, 1989.
[15] J. H. Holland, Hidden Order - How adaptation builds
complexity, Persus books ed., 1995.
[16] J.E. Hopcroft, R. Motwani, J.D. Ullman, Introduc-
tion to automata theory, Languages and Computation,
Addison-Wesley, 2001.
[17] J. Koza, Genetic programming, Encyclopedia of
Computer Sciences and Technology, 1997.
[18] M. Mitchell, An introduction to Genetic Algorithms,
The MIT Press, 1996.
[19] J.-L. Le Moigne, La mod´elisation des syst`emes com-
plexes, Dunod, 1999.
[20] I. Rechenberg, Evolution strategies, Fromman-
Holzboog, 1973.
[21] M.P. Schutzenberger, "On the definition of a fam-
ily of automata", Information and Control 4, 245-270
(1961).
[22] R.P. Stanley, Enumerative combinatorics, Cam-
bridge University Press, 1999.
[23] F. Treves, Topological Vector Spaces, Distributions
and Kernels, Acad. Press 1967.
[24] G. Weiss, ed., Multiagent Systems, MIT Press, 1999.
For specific problem solving, we can consider that the
previous fitness function can be composed with another
specific one which is able to measure the capability of the
agent to solve one problem. This composition of fitness
functions leads to create emergent systems only for the
ones of interest, that is, these systems are able to be de-
veloped only if the aggregated agents are able to satisfy
some problem solving evaluation.
7. Conclusion
The aim of this study is to develop a powerful algebraic
structure to represent behaviors concerning cooperation-
competition processes and on which we can add genetic
operators. We have explained how we can use these struc-
tures for modeling adaptive behaviors needed in game the-
ory. More than for this application, we have described
how we can use such adaptive computations to automat-
ically detect emergent systems inside interacting networks
of entities represented by agents in a simulation.
8. References
[1] R. Axelrod, The complexity of cooperation, Princeton
University Press, 1997.
[2] J. Berstel and G. Reutenauer, Rational series and their
language, EATCS, 1988.
[3] Bourbaki N., Elements of Mathematics: General
Topology, Chapters 5-10, Springer-Verlag Telos (dec.
1998).
[4] L. von Bertalanffy, General System Theory, Georges
Braziller Ed., 1968.
[5] C. Bertelle, M. Flouret, V. Jay, D. Olivier, and J.-
L. Ponty "Adaptive behaviour for prisoner dilemma
strategies based on automata with multiplicities." In
ESS 2002 Conf., Dresden (Germany), October 2002.
[6] C. Bertelle, M. Flouret, V. Jay, D. Olivier, and J.-L.
Ponty "Genetic algorithms on automata with multi-
plicities for adaptive agent behaviour in emergent or-
ganizations" In SCI'2001, Orlando, Florida, USA, 22-
25th July 2001.
[7] G. Duchamp, Hatem Hadj-Kacem and Eric
Laugerotte, "Algebraic elimination of ǫ-transitions",
DMTCS, Volume 7 n. 1 (2005), pp. 51-70.
[8] G. Duchamp, J-M Champarnaud, Derivatives of ra-
tional expressions and related theorems, Theoretical
Computer Science 313 (2004).
[9] N. Eber, Th´eorie des jeux, Dunod, 2004.
[10] S. Eilenberg, Automata, languages and machines,
Vol. A and B, Academic press, 1976.
|
1206.6866 | 1 | 1206 | 2012-06-27T16:28:53 | Stochastic Optimal Control in Continuous Space-Time Multi-Agent Systems | [
"cs.MA",
"eess.SY",
"math.OC"
] | Recently, a theory for stochastic optimal control in non-linear dynamical systems in continuous space-time has been developed (Kappen, 2005). We apply this theory to collaborative multi-agent systems. The agents evolve according to a given non-linear dynamics with additive Wiener noise. Each agent can control its own dynamics. The goal is to minimize the accumulated joint cost, which consists of a state dependent term and a term that is quadratic in the control. We focus on systems of non-interacting agents that have to distribute themselves optimally over a number of targets, given a set of end-costs for the different possible agent-target combinations. We show that optimal control is the combinatorial sum of independent single-agent single-target optimal controls weighted by a factor proportional to the end-costs of the different combinations. Thus, multi-agent control is related to a standard graphical model inference problem. The additional computational cost compared to single-agent control is exponential in the tree-width of the graph specifying the combinatorial sum times the number of targets. We illustrate the result by simulations of systems with up to 42 agents. | cs.MA | cs | Stochastic Optimal Control in Continuous Space-Time Multi-Agent
Systems
Bart van den Broek
Wim Wiegerinck
SNN, Radboud University Nijmegen
6525 EZ Nijmegen, The Netherlands
{w.wiegerinck,b.vandenbroek,b.kappen}@science.ru.nl
Bert Kappen
Abstract
ronment and limitations of its resources.
Recently, a theory for stochastic optimal con-
trol in non-linear dynamical systems in con-
tinuous space-time has been developed (Kap-
pen, 2005). We apply this theory to col-
laborative multi-agent systems. The agents
evolve according to a given non-linear dy-
namics with additive Wiener noise. Each
agent can control its own dynamics. The goal
is to minimize the accumulated joint cost,
which consists of a state dependent term and
a term that is quadratic in the control. We fo-
cus on systems of non-interacting agents that
have to distribute themselves optimally over
a number of targets, given a set of end-costs
for the di(cid:11)erent possible agent-target com-
binations. We show that optimal control is
the combinatorial sum of independent single-
agent single-target optimal controls weighted
by a factor proportional to the end-costs
of the di(cid:11)erent combinations. Thus, multi-
agent control is related to a standard graphi-
cal model inference problem. The additional
computational cost compared to single-agent
control is exponential in the tree-width of the
graph specifying the combinatorial sum times
the number of targets. We illustrate the re-
sult by simulations of systems with up to 42
agents.
1
INTRODUCTION
A collaborative multi-agent system (MAS) is a collec-
tion of agents that autonomously control their behav-
ior to achieve a common goal or to maximize the per-
formance of the group. Examples are teams of soccer-
robots and teams of unmanned rescue vehicles in a
hazardous disaster area.
In practical applications, a
MAS often has to deal with uncertainty in the envi-
In this paper, we are interested in optimal control in
such systems. We focus on systems in which agents
in a stochastic environment have to distribute them-
selves e(cid:14)ciently over a number of targets. For exam-
ple, consider a system of n (cid:12)re(cid:12)ghter-agents and (cid:12)res.
The agents are at some initial positions and should
reach the (cid:12)res positions in the most e(cid:14)cient way, such
that each (cid:12)re is reached by an agent (see (cid:12)gure 1). In
this problem, the (cid:12)nal con(cid:12)guration, i.e., which agent
has reached exactly which (cid:12)re is not of importance
for the end performance. The MAS should continu-
ously control itself such that in the end one of these n!
con(cid:12)gurations is realized at minimal expected e(cid:11)ort.
The additional complexity is that due to the noise in
the dynamics, a con(cid:12)guration that seems optimal from
the initial positions may become suboptimal in a later
stage.
A common approach is to model such a system as a
Markov Decision Process (MDP) in discrete space and
time: the optimal actions in an MDP optimization
problem are in principle solved by backward dynamic
programming. Since both the joint action space and
the joint state space of the agents are assumed to be
large in the discretization, and increase exponentially
in the number of agents, simply taking a basic dy-
namic programming approach to solve the MDP will
generally be infeasible [1].
Typically one can describe the system more compactly
as a factored MDP. In such systems both the transition
probabilities and reward functions have some struc-
ture. Unfortunately, this structure is not conserved
in the value functions and exact computation remains
exponential in the system size. Recently, a number
of advanced and powerful approximate methods have
been proposed. The common denominator of these ap-
proaches is that they basically assume some prede(cid:12)ned
approximate structure of the value functions [2, 3].
In this paper, we take a di(cid:11)erent starting point.
Rather than discretizing, we will consider the stochas-
tic optimal control problem in continuous space and
time. As in discrete MDPs, this optimization prob-
lem is in principle solved by backward dynamic pro-
gramming. Usually this optimization is intractable.
However, if (1) both the noise and the control are ad-
ditive to the (nonlinear) dynamics, (2) the increment
in cost is quadratic in the control, and (3) the noise
satis(cid:12)es certain additional conditions, then it can be
shown that the stochastic optimization problem can be
transformed into a linear partial di(cid:11)erential equation,
which can be solved by forward stochastic integration
of a di(cid:11)usion process [4, 5]. This formalism contains
linear-quadratic control as a special case [6].
An interesting observation in [4, 5] is the phenomenon
of symmetry breaking in multi-modal systems, i.e, in
problems where several local minima of the cost co-
exist. This symmetry breaking manifests itself as a
delayed choice, keeping options open and using the
fact that the noise may help to come closer to one of
the options at no additional cost.
Formally the extension of this formalism to coopera-
tive MAS is straightforward. The question that we ask
ourselves, is how the formalism scales from the single-
agent single-target situation (e.g. one (cid:12)reman has to
go to a given (cid:12)re) to a collaborative system of n agents
and m targets. Although the dynamics of the agents is
assumed to be independent, with optimal control the
behavior of the agents will be coupled in a non-trivial
way in order to reach an end-con(cid:12)guration at minimal
cost.
The paper is organized as follows. In section 2 we pro-
vide a review of the general (single-agent) framework.
As an example, we will rederive linear quadratic con-
trol from control theory. In this system a single agent
has to control itself to a single target. Next, in sec-
tion 3 we show how the framework easily allows the
modeling of an agent that has to control itself to one
of m possible targets. It turns out that optimal con-
trol for this case can be written as a weighted sum of
m optimal controls in the presence of the single tar-
gets. This result will form the basis of the multi-agent
analysis later in the paper.
In section 4 we will consider the framework in the
multi-agent setting.
In general, the solution of this
type of problem consists of a sum of mn terms due
to a contribution from each agent-target combination.
For small problems, this summation can be performed
explicitely. For large n and m, the solution is generally
intractable.
Next, we consider models in which the end-costs of
agents-targets con(cid:12)gurations are factored as a sparse
graph. We show that the structure of the graph is con-
Figure 1: The (cid:12)remen problem. A number of (cid:12)remen
go to a number of (cid:12)res, each to a di(cid:11)erent one. How
should the agents coordinate when it is not yet de-
cided to which (cid:12)re each agent should go, and when
the actions of the agents are sub ject to noise?
served in the mn terms. Therefore this summation can
be performed more e(cid:14)ciently using e.g. the junction
tree algorithm [7]. The computation time is exponen-
tial in the induced tree-width of the graph times the
number of targets m, and is linear in the number of
agents n. This is in contrast to discrete MDPs, where,
as remarked earlier, sparsity in the reward function is
not retained in the value function and does not help
to reduce the computation costs.
In section 5, we illustrate the framework by simula-
tion results of stochastic optimal control in the two
toy problems considered in this paper.
2 STOCHASTIC OPTIMAL
CONTROL OF A SINGLE AGENT
In this section, we review the framework developed
in [4, 5].
We consider an agent moving in IRk .
obeys the stochastic dynamics
Its position x
dx = (b(x; t) + u)dt + d(cid:24) ;
(1)
with d(cid:24) a Wiener process with hd(cid:24)id(cid:24)j i = (cid:23)ij dt, b(x; t)
an arbitrary function of x and t, modeling the dynam-
ics due to the environment. The agent can in(cid:13)uence
the dynamics by the control u.
Given x at initial time ti , the problem is to (cid:12)nd a
control tra jectory u(ti ! T ) such that the expected
cost-to-go
C (x; ti ; u(ti ! T )) =
(cid:28)(cid:30)(x(T )) + Z T
u(t)>Ru(t) + V (x(t); t)(cid:17)(cid:29) (2)
dt(cid:16) 1
2
ti
is minimal. The expectation is taken over all noise re-
alizations, resulting in di(cid:11)erent tra jectories in state
space x(ti ! T ) that start in x. (cid:30)(x(T )) is the
end cost, depending only on the end state x(T ).
V (x(t); t)dt is the cost of being at position x(t) during
the time interval [t; t + dt], dt u(t)>Ru(t) is the cost
of the control during the same time interval. R is a
constant k (cid:2) k matrix.
The expected cost-to-go at time t needs to be min-
imized over all strategies u(t ! T ), this yields the
optimal (expected) cost-to-go
the cost to go fol lows from a Gaussian convolution with
e(cid:0)(cid:30)=(cid:21) , resulting in
jx (cid:0) (cid:22)j2
2(cid:23) (T (cid:0) t + R=(cid:11)) (cid:21) :
Z (x; t) / exp (cid:20)(cid:0)
The optimal control fol lows from (6) and (5) resulting
in
u(x; t) =
(cid:22) (cid:0) x
T (cid:0) t + R=(cid:11)
:
J (x; t) = min
u(t!T )
C (x; t; u(t ! T )):
(3)
This result is wel l known from control theory [6].
In the appendix, it is brie(cid:13)y explained that due to the
linear-quadratic form of the optimization problem
the dynamics (1) is linear in the action u, the cost
(2) is quadratic in the actionthe minimization can
be performed explicitly, yielding a non-linear partial
di(cid:11)erential equation in J . If, in addition, the matrices
(cid:23) and R can be linked via a scalar (cid:21) such that (cid:23) =
(cid:21)R(cid:0)1 , the optimal cost-to-go is re-expressed as the log
of an ordinary integral (equation (15) in the appendix),
J (x; t) = (cid:0)(cid:21) log Z (x; t)
(4)
(5)
with \partition function"
Z (x; t) = Z dy(cid:26)(y ; T jx; t)e(cid:0)(cid:30)(y)=(cid:21)
in which (cid:26)(y ; T jx; t) is the probability of arriving in
state y at time T , when starting in x at time t, under
the dynamics (14) in the appendix. This dynamics(14)
equals the stochastic system dynamics without control,
i.e., u = 0, with in addition the probability V (x;t)
(cid:21) dt of
being removed from the system between t and t + dt
and thus not arriving in state y . (cid:30)(y) is the end cost
in the state y .
The optimal control of the agent is directly obtained
from the optimal cost-to-go, by taking its gradient
(equation (10) in the appendix), which implies the fol-
lowing result
u(x; t) = (cid:23) @x log Z (x; t) :
(6)
Example 1 The running example is a system with
linear dynamics, b = 0, and zero potential V (x; t) = 0.
R and (cid:23) are proportional to the identity and are con-
sidered as scalars. Regard less the end costs, the di(cid:11)u-
sion process results in a Gaussian distribution
jy (cid:0) xj2
(cid:26)(y ; T jx; t) / exp (cid:20)(cid:0)
2(cid:23) (T (cid:0) t) (cid:21) :
If we take a quadratic end cost around a target (cid:22),
(cid:30)(x) =
(cid:11)
2
jx (cid:0) (cid:22)j2
Example 2 Now b and V are arbitrary, such that the
di(cid:11)usion process results in a distribution (cid:26)(y ; T jx; t).
To enforce an end state close to target (cid:22), a quadratic
end cost with a large (cid:11) can be chosen. The e(cid:11)ect
is that the factor e(cid:0)(cid:30)(y)=(cid:21) becomes proportional to a
delta-function centered around (cid:22), and Z fol lows di-
rectly from the value of (cid:26) at the target,
Z (x; t) / Z dy(cid:26)(y ; T jx; t)(cid:14)(y (cid:0) (cid:22)) / (cid:26)((cid:22); T jx; t)
from which J and u fol low directly.
3 MULTIPLE TARGETS
In this section, we apply the framework of the previous
section to the case where an agent has to reach one of
a number of possible end states. We show that the
optimal control can be constructed from a weighted
combination of single-target optimal controls.
When the agent has to reach one of a number of states
(cid:22)1 ; : : : ; (cid:22)m at the end time, this can be modeled by
letting e(cid:0)(cid:30)(y)=(cid:21) be a linear combination of functions
which each are peaked around a single target (cid:22)s (with
s = 1; : : : ; m), like e.g. a delta function (cid:14)(y (cid:0) (cid:22)s ) or
a Gaussian centered around (cid:22)s with small width. We
denote these functions as (cid:8)(y ; (cid:22)s ) (cid:17) (cid:8)(y ; s). If we put
an additional cost E (s) when target (cid:22)s is reached, this
combination becomes
e(cid:0)(cid:30)(y)=(cid:21) =
m
m
Xs=1
Xs=1
Substitution into (5) gives the partition function
e(cid:0)E (s)=(cid:21)(cid:8)(y ; s) (cid:17)
w(s)(cid:8)(y ; s);
Z (x; t) =
w(s)Z (x; t; s)
m
Xs=1
which is a weighted combination of single-target par-
tition function
Z (x; t; s) = Z dy(cid:26)(y ; T jx; t)(cid:8)(y ; s):
The optimal action is obtained from (6) and reads
4.1
INDEPENDENT DYNAMICS, JOINT
TASK
u(x; t) =
m
Xs=1
with single-target optimal controls
p(sjx; t)u(x; t; s);
u(x; t; s) = (cid:23) @x log Z (x; t; s)
and p(sjx; t) the probability
p(sjx; t) =
w(s)Z (x; t; s)
Pm
s0=1 w(s0 )Z (x; t; s0 )
Example 3 In the running example, optimal control
with multiple targets is
:
u(x; t) =
(cid:22)(cid:22) (cid:0) x
T (cid:0) t + R=(cid:11)
with (cid:22)(cid:22) the ‘expected target’
(cid:22)(cid:22) =
m
Xs=1
which is the expected value of the target according to
the probability
p(sjx; t)(cid:22)s
p(sjx; t) =
2(cid:23) (T (cid:0)t+R=(cid:11)) i
w(s) exp h(cid:0) jx(cid:0)(cid:22)s j2
2(cid:23) (T (cid:0)t+R=(cid:11)) i
s=1 w(s) exp h(cid:0) jx(cid:0)(cid:22)s j2
Pm
4 STOCHASTIC OPTIMAL
CONTROL OF A MAS
We now turn to the issue of optimally coordinating a
multi-agent system of n agents. In principle, a multi-
agent system can be considered as a system with a joint
state x = (x1 ; : : : ; xn ), where xa is the state of agent
a, a joint dynamics (1), and a joint cost (2) which is to
be minimized by a joint action u = (u1 ; : : : ; un ), where
ua is the control of agent a. The optimal control by
agent a follows from the appropriate components of
the gradient
ua (x1 ; : : : ; xn ; t) = (cid:23) @xa log Z (x1 ; : : : ; xn ; t):
(7)
We remark that in continuous space-time, the opti-
mal controls can be determined independently for each
agent, and coordination does not have to be imposed
explicitly. This is in contrast to discrete multi-agent
MDP models, in which coordination may be needed
since more than one optimal joint action can exist [1].
The reason is that in continuous time control results
in actions that are in(cid:12)nitesimal within an in(cid:12)nitesi-
mal time increment. This allow agents to adapt their
control immediately to each other.
In the remainder of the paper, we consider agents with
independent dynamics ba (x; t) = ba (xa ; t) and inde-
pendent noise (cid:23)ab = (cid:23)a (cid:14)ab with (cid:23)a a noise matrix re-
stricted to the domain of agent a. We also assume
individual contributions to the costs during the pro-
cess: Rab = Ra (cid:14)ab with Ra a matrix restricted to a,
and V (x; t) = Pa Va (xa ; t). We (cid:12)nally assume that
(cid:23) = (cid:21)R(cid:0)1 holds globally. Under these assumptions,
the agents behave like ‘non-interacting particles’, e.g.,
they can freely move through each other without costs
for collisions. Under these assumptions, the joint solu-
tion of the di(cid:11)usion process factorizes into a product of
solutions of independent (single agent) di(cid:11)usion pro-
cesses.
(cid:26)a (ya ; T jxa ; t) :
(cid:26)(y ; T jx; t) = Ya
The agents optimal control and the resulting dynamics
will be coupled by their joint task, expressed in the
end-costs (cid:30)(y). We consider the problem where the
agents have to distribute themselves over a number of
targets (cid:22) = (cid:22)1 ; : : : ; (cid:22)m .
The trivial case where each agent a has to go to a single
target (cid:22)sa is equivalent with a single control problem,
with joint target (cid:22)s = ((cid:22)s1 ; : : : ; (cid:22)sn ). Now s is the
vector of labels, s = (s1 ; : : : ; sn ). Of course, control by
the agents is independent of each other. The partition
function factorizes in single agent partition functions
Z (x; t; s) = Ya Z dya(cid:26)a (ya ; T jxa ; t)(cid:8)a (ya ; sa )
(cid:17) Ya
Za (xa ; t; sa ) :
More interesting is the case where the system has more
choices in how to distribute itself. Like in the single-
agent case, this is described by de(cid:12)ning e(cid:0)(cid:30)(y)=(cid:21) to be
a positive linear combination of peaked (multi-agent)
single-target functions, (cid:8)(y ; s) = Qa (cid:8)a (ya ; sa ), as in
section (3), with the di(cid:11)erence that in this sum s runs
over mn states (for all the possible distributions of
agents over targets). The partition function of this
system then reads
Z (x; t) = Xs
w(s) Ya
The optimal control of an individual agent a is ob-
tained using (7), and leads again to an average of
single-target optimal controls,
m
Xsa=1
p(sa jx; t)ua (xa ; t; sa );
Za (xa ; t; sa ) :
ua (x; t) =
where ua (xa ; t; sa ) = (cid:23)a@xa Za (xa ; t; sa ) and p(sa jx; t)
is the probability
p(sa jx; t) = Psnsa w(s) Qb Zb (xb ; t; sb )
Ps w(s) Qb Za (xb ; t; sb )
which can be interpreted as the probability that agent
a has to go to target sa given the joint state x of the
MAS and time t.
;
Example 4 The (cid:12)remen problem. We consider n
identical agents, and m targets modeled as in exam-
ples 1 and 3. The aim of the agents is to distribute
themselves with minimal action such that each target
is reached at time T by about n
m agents. We model the
system by an additional cost of
Xf =1 (cid:18) n
m
= c(cid:18) n
m (cid:19)2
n2
m (cid:19)
n
Xa=1
Xa;b=1
in which c > 0 is a constant indicating the costs of
suboptimal distributions. Optimal control of agent a is
given by
E (s) = c
(cid:14)sa ;sb (cid:0)
(cid:14)f ;sa (cid:0)
ua (x; t) =
(cid:22)(cid:22)a (cid:0) xa
T (cid:0) t + R=(cid:11)
(8)
with (cid:22)(cid:22) the expected target for agent a,
(cid:22)(cid:22)a = Xsa
p(sa jx; t)(cid:22)sa ;
where
p(sa jx; t) / Xsnsa
exp (cid:20)(cid:0)
E (s)
(cid:21)
(cid:0)
jx (cid:0) (cid:22)s j2
2(cid:23) (T (cid:0) t + R=(cid:11)) (cid:21) :
(9)
The additional computation e(cid:11)ort in multi-agent con-
trol compared to single agent control is the computa-
tion of p(sa jx; t), which involves a sum over mn states.
For small systems this is feasible. For large systems,
this is only feasible if the summation can be performed
e(cid:14)ciently.
4.2 FACTORED END-COSTS
in which (cid:11) are subsets of agents, we can apply the junc-
tion tree algorithm from probabilistic graphical models
to make inference more e(cid:14)cient [7]. The complexity is
then exponential in the induced tree-width of the un-
derlying graph. In the case of the (cid:12)remen problem, this
approach does not really help. The clusters (cid:11) contain
only two agents. However all pairs of agents appear in
a factor, which makes the graph fully connected, sim-
ilar to the fully connected Boltzmann machine. The
tree-width of the graph is n. Non-trivial tree width
(smaller than n) can be expected in systems where the
contribution of an agent to the end cost only depends
on the states of a limited number of other agents.
Example 5 Holiday resort problem. We consider a
set of n agents with identical dynamics, and m targets
(a few holiday resorts) modeled as in examples 1 and 3.
Each agent has relations with only a few other agents,
and only cares for related agents whether or not to have
holiday in the same resort (depending on the sign of the
relation). If two agents are unrelated they are indi(cid:11)er-
ent whether they end up in the same resort. Relations
are assumed to be symmetric. The aim of the agents
is that they have optimal ly distributed themselves with
minimal e(cid:11)ort over the resorts at time T . A way to
model such a system is to de(cid:12)ne for each related pair
of agents a and b a cost
Eab (sa ; sb ) = (cid:0)cab (cid:14)sa ;sb
with cab to weight the relevance of the relation. The
sign of cab is equal to the sign of the relation. The op-
timal control is again as in (8), with the current E (s)
substituted into (9). Note that the (cid:12)remen problem is a
special case, with a ful ly connected network of negative
relations of strength c.
Inference of graphical models is in general linear in
the number of variables n and exponential in the num-
ber of states in the cliques of the underlying junction
tree [7]. The number of states in the largest clique is
equal to the treewidth of the graph times the num-
ber of states per node. This implies that models with
sparse graphs and a limited number of targets are
tractable.
The issue is the computational complexity of the prob-
ability distribution
5 NUMERICAL EXAMPLES
1
Z (x; t)
p(sjx; t) =
Za (xa ; t; sa ) :
w(s) Ya
The complexity comes from the weights w(s) of the
end costs, which couples the agents. In the case that
the weights w(s) allow a factored representation
#
w(cid:11) (s(cid:11) ) = exp "X(cid:11)
w(s) = Y(cid:11)
E(cid:11) (s(cid:11) )
(cid:21)
(cid:0)
In this section we illustrate the optimally controlled
stochastic MASs by numeric simulations results.
In all simulations, we modeled agents in 1-d (for ex-
posure purposes). The models were as in the running
examples, with b = 0 and V = 0. In numerical simu-
lations, time is to be discretized. This has to be done
with a bit of care. In continuous time, udt should be
in(cid:12)nitesimal, regardless the size of u. In the discrete
1
0
s
n
o
i
t
i
s
o
p
−1
0
1
0
s
t
e
g
r
a
t
d
e
t
c
e
p
x
e
−1
0
time
time
1
1
s
n
o
i
t
i
s
o
p
1
0
−1
0
s
t
e
g
r
a
t
d
e
t
c
e
p
x
e
1
0
−1
0
time
time
1
1
Figure 2: Simulation of (cid:12)remen problem. Two agents
start in x = 0 at t = 0 and should reach at t = 1 the
two targets located at x = (cid:0)1 and x = 1 in a noisy
environment with minimal cost of control.
(a) The
positions xa of the agents as a function of time. (b)
The expected targets (cid:22)a of the agents as a function of
time.
Figure 3: Simulation of (cid:12)remen problem with 6 agents
start in x = 0 at t = 0 and should reach at t = 1 the
three targets located at x = (cid:0)1; 0; 1, preferably two
agents per target. (a) The positions xa of the agents
as a function of time. (b) The expected targets (cid:22)a of
the agents as a function of time.
approximation this implies that u(cid:1)t should be small
compared to typical scales in the system. For the run-
ning examples, in particular (8), this means that
u(cid:1)t = (cid:15)( (cid:22)(cid:22) (cid:0) x)
with a small (cid:15) (cid:28) 1. From (8) we solve
(cid:1)t = (cid:15)(T (cid:0) t + R=(cid:11))
which yields a (cid:12)nite discretization for (cid:12)nite (cid:11). In the
simulations, we took (cid:11) = 103 and (cid:15) = 0:01. Further-
more we took noise parameter (cid:23) = 1, and R = 1. We
started all agents at t = 0 at x = 0. End time is T = 1.
In the (cid:12)rst simulation, we have the (cid:12)remen problem
with two agents and two (cid:12)res located at (cid:0)1 and 1.
We model a preference of one agent per (cid:12)re in the end
situation. This is achieved by using the weight rep-
resentation w(s1 ; s2 ) = exp((cid:0)E (s1 ; s2 )=(cid:21)) and setting
E (1; 2) = E (2; 1) = 0 and E (1; 1) = E (2; 2) = 2. In
(cid:12)gure 2, the positions of the 2 agents x1 and x2 are
plotted, as well as the expected target locations (cid:22)(cid:22)1 and
(cid:22)(cid:22)2 . We see that the MAS reached a preferred goal: at
the end time each target is reached by exactly one
agent. During the whole tra jectory, (cid:22)(cid:22)1 (cid:25) (cid:0) (cid:22)(cid:22)2 since
the MAS mostly aim at an end-con(cid:12)guration with one
agent per (cid:12)re. Furthermore, note that in the (cid:12)rst part
of the tra jectory, the expected targets are close to zero,
while only after about t = 0:6 the agents seem to make
a clear choice for their targets. This delayed choice is
due to a symmetry breaking in the cost-to-go as time
increases. Before the symmetry breaking, it is bet-
ter to keep options open, and see what the e(cid:11)ect of
the noise is. After the symmetry breaking, time is too
short to wait longer and a choice has to be made. This
phenomenon is typical for multi-modal problems. For
more details we refer to [4, 5].
In the second simulation, we have the (cid:12)remen prob-
lem with six agents and three (cid:12)res located at (cid:0)1, 0
and 1. We modeled the end cost as in example 4. In
(cid:12)gure 3, the positions of the 3 agents are plotted, as
well as the expected target locations. From the (cid:12)gure
it can be concluded that the MAS has successfully dis-
s
n
o
i
t
i
s
o
p
2
1
0
−1
−2
0
1
0
s
t
e
g
r
a
t
d
e
t
c
e
p
x
e
−1
0
time
time
1
1
Figure 4: Simulation of holiday resort problem. 42
agents start in x = 0 at t = 0 and should reach at t = 1
the three targets located at x = (cid:0)1; 0; 1, preferably
together with positively related agents and not with
negatively related agents (relations are not shown in
the (cid:12)gure). (a) The positions xa of the agents as a
function of time. (b) The expected targets (cid:22)a of the
agents as a function of time.
tributed itself with two agents at each target. In this
simulation, two (local) symmetry breakings are clearly
visible. At about t=0.5, 2 agents seem to choose for
target (cid:22) = (cid:0)1 and the other four agents for an ex-
pected target of (cid:22)(cid:22) = 0:5. Then at about t = 0:8
there is a second symmetry breaking, where these four
agents make their (cid:12)nal choice.
In the last simulation, we have the holiday resort prob-
lem with 42 agents and three resorts located at (cid:0)1, 0
and 1. We modeled the end cost as in example 4. To
model the relations between the agents we generated
a random graph with 42 nodes, in which each node is
coupled to exactly three randomly chosen neighbors.
The relation strengths were randomly chosen cab = (cid:6)1
with equal probability.
In (cid:12)gure 4, the positions of the 42 agents are plotted,
as well as the expected target locations. From the
results it can be seen that each agent reached a target.
Actually, target (cid:0)1 is reached by 10 agents, target 0
by 23 agents, and target 1 is reached by 9 agents. In
this simulation, the coordination in terms of cluster
formation in (cid:22)(cid:22) is profound, despite the fact that the
positions of the agents seem to be quite chaotic.
In the graph in this simulation, there were 34 positive
and 29 negative relations. The treewidth is 7. Among
the agents that ended at target (cid:0)1, there were 5 pos-
itive relations and 0 negative ones. At target 0, there
were 18 positive relations and 1 negative one. At tar-
get 1, there were 6 positive relations and 0 negative
ones. So within the targets, there were a total of 29
positive relations and 1 negative one. Between agents
at di(cid:11)erent targets, there were 5 positive relations and
28 negative ones.
6 DISCUSSION
We studied optimal control
in collaborative multi-
agent systems in continuous space-time. A straightfor-
ward approach to discretize the system in space and
time would make the n agent MAS intractable due
to the exponential blow-up of the state-space. In this
paper, we took the approach developed in [4, 5]. We
showed that under given model assumptions, optimal
distributed control can be solved analytically and that
this solution is tractable in large sparsely connected
systems.
In dense multi-agent systems, however, the exact infer-
ence is intractable. A natural approach would be the
use of message passing algorithms for approximate in-
ference. This is currently studied and will be reported
in near future.
There are many possible model extensions that need
to be explored in future research. Obvious extensions,
such as a non-(cid:12)xed end-time, or systems with more
realistic environments, such as allowing for obstacles
are already of interest to study in the single agent sit-
uation. Others apply typically to the multi-agent sit-
uation, such as penalties for collisions between agents.
Typically, these types of model extensions will prohibit
an analytical solution of the control, and approximate
numerical methods will be required. Some proposals
can be found in [4, 5].
Finally we would like to stress, that although the
model class is quite speci(cid:12)c and maybe not generally
applicable, we think that the study of this class is in-
teresting because it is one of the few \exactly solvable"
multi-agent systems, allowing the study of non-trivial
collective optimal behaviour in large distributed sys-
tems, both analytically as well as in simulations, and
possibly providing insights that might help to develop
approximating methods for more general systems.
Acknowledgments
This research is part of the Interactive Collaborative
Information Systems (ICIS) pro ject, supported by the
Dutch Ministry of Economic A(cid:11)airs, grant BSIK03024.
A STOCHASTIC OPTIMAL
CONTROL
In this appendix we give a brief derivation of (4), (5)
and (6), starting from (3). Details can be found in
[4, 5].
The optimal cost-to-go J in a state x at time t is found
by minimizing C (x; t; u(t ! T )) over all sequences of
controls over the time interval [t; T ],
J (x; t) = min
u(t!T )
C (x; t; u(t ! T )):
It satis(cid:12)es the stochastic Hamilton-Jacobi-Bellman
(HJB) equation
xJ (cid:1)(cid:19);
u (cid:18) 1
u>Ru+V +(cid:0)b+u(cid:1)>
Tr(cid:0)(cid:23) @ 2
(cid:0)@tJ = min
2
with boundary condition J (x; T ) = (cid:30)(x). The mini-
mization with respect to u yields
@xJ +
1
2
u = (cid:0)R(cid:0)1@xJ;
(10)
which de(cid:12)nes the optimal control. Substituting this
control in the HJB equation gives a non-linear equa-
tion for J . We can remove the non-linearity by using
a log transformation: de(cid:12)ne (x; t) through J (x; t) =
(cid:0)(cid:21) log (x; t), with (cid:21) a constant to be de(cid:12)ned, then
1
2
1
2
(cid:21)2 (cid:0)2 (@x )>R(cid:0)1@x ;
u>Ru + u>@xJ = (cid:0)
Tr(cid:0)(cid:23) @ 2
xJ (cid:1) =
1
2
(cid:21) (cid:0)2 (@x )> (cid:23) @x
(cid:21) (cid:0)1Tr(cid:0)(cid:23) @ 2
x (cid:1):
The terms quadratic in vanish if there exists a scalar
(cid:21) such that
1
2
1
2
(cid:0)
(cid:23) = (cid:21)R(cid:0)1 :
(11)
In the one dimensional case, such a (cid:21) can always be
found.
In the higher dimensional case, this restricts
the matrices R(cid:0)1 / (cid:23) . When (11) is satis(cid:12)ed, the
HJB equation becomes
@t = (cid:18) V
(cid:21)
= (cid:0)H ;
x (cid:1)(cid:19)
Tr(cid:0)(cid:23) @ 2
where H a linear operator acting on the function .
Equation (12) must be solved backwards in time with
(cid:0) b>@x (cid:0)
(12)
1
2
(x; T ) = e(cid:0)(cid:30)(x)=(cid:21) . However, the linearity allows us
to reverse the direction of computation, replacing it by
a di(cid:11)usion process, as we will now explain.
The solution to equation (12) is given by
(x; t) = Z dy(cid:26)(y ; T jx; t)e(cid:0)(cid:30)(y)=(cid:21) ;
the density (cid:26)(y ; #jx; t) (t < # (cid:20) T ) satisfying a forward
Fokker-Planck equation
(13)
@#(cid:26)(y ; #jx; t) = H y(cid:26)(y ; #jx; t);
(14)
1
2
V
(cid:21)
H y(cid:26) = (cid:0)
(cid:26) (cid:0) @>
y b(cid:26) +
where H y the Hermitian adjoint of H ,
Tr(cid:0)(cid:23) @ 2
y (cid:26)(cid:1):
The potential V in H y implies an annihilation, the
di(cid:11)usion process is \killed" with a rate V
(cid:21) dt.
Finally we (cid:12)nd the optimal cost-to-go from equation
(13),
J (x; t) = (cid:0)(cid:21) log Z dy(cid:26)(y ; T jx; t)e(cid:0)(cid:30)(y)=(cid:21) :
References
(15)
[1] C. Boutilier. Planning, learning and coordination in
multiagent decision processes.
In TARK, volume 6,
pages 195{210, 1996.
[2] C. Guestrin, D. Koller, and R. Parr. Multiagent plan-
ning with factored MDPs. In NIPS, volume 14, pages
1523{1530, 2002.
[3] C. Guestrin, S. Venkataraman, and D. Koller. Context-
speci(cid:12)c multiagent coordination and planning with fac-
tored MDPs.
In AAAI, volume 18, pages 253{259,
2002.
[4] H. J. Kappen.
Linear theory for control of non-
linear stochastic systems. Physical Review Letters,
95(20):200201, November 2005.
[5] H. J. Kappen. Path integrals and symmetry breaking
for optimal control theory. Journal of statistical me-
chanics: theory and experiment, page P11011, Novem-
ber 2005.
[6] R. Stengel. Optimal Control and Estimation. Dover,
New York, 1993.
[7] S.L. Lauritzen and D.J. Spiegelhalter. Local compu-
tations with probabilties on graphical structures and
their application to expert systems (with discussion).
J. Royal Statistical Society Series B, 50:157{224, 1988.
|
1911.10055 | 1 | 1911 | 2019-11-22T14:13:36 | Towards a Goal-oriented Agent-based Simulation framework for High-Performance Computing | [
"cs.MA"
] | Currently, agent-based simulation frameworks force the user to choose between simulations involving a large number of agents (at the expense of limited agent reasoning capability) or simulations including agents with increased reasoning capabilities (at the expense of a limited number of agents per simulation). This paper describes a first attempt at putting goal-oriented agents into large agent-based (micro-)simulations. We discuss a model for goal-oriented agents in High-Performance Computing (HPC) and then briefly discuss its implementation in PyCOMPSs (a library that eases the parallelisation of tasks) to build such a platform that benefits from a large number of agents with the capacity to execute complex cognitive agents. | cs.MA | cs |
Towards a Goal-oriented Agent-based
Simulation framework for
High-Performance Computing
Dmitry GNATYSHAK a, Luis OLIVA-FELIPE a, Sergio ´ALVAREZ-NAPAGAO b,
Julian PADGET c, Javier V ´AZQUEZ-SALCEDA a, Dario GARCIA-GASULLA b and
Ulises CORT ´ES a,b
a Universitat Polit`ecnica de Catalunya - BarcelonaTECH (UPC)
C/Jordi Girona 1-3, E-08034 , Barcelona, Spain
b Barcelona Supercomputer Centre (BSC)
C/Jordi Girona 1-3, E-08034 , Barcelona, Spain
c Department of Computer Science
University of Bath, BATH BA2 7AY , United Kingdom
Abstract. Currently, agent-based simulation frameworks force the user to choose
between simulations involving a large number of agents (at the expense of lim-
ited agent reasoning capability) or simulations including agents with increased rea-
soning capabilities (at the expense of a limited number of agents per simulation).
This paper describes a first attempt at putting goal-oriented agents into large agent-
based (micro-)simulations. We discuss a model for goal-oriented agents in High-
Performance Computing (HPC) and then briefly discuss its implementation in Py-
COMPSs (a library that eases the parallelisation of tasks) to build such a platform
that benefits from a large number of agents with the capacity to execute complex
cognitive agents.
Keywords. agent-based simulation, high-performance computing, agent platform,
multi-agent system, goal-oriented agent
1. Introduction
Agent-based simulation (ABS) faces the conflicting demands of providing larger simu-
lations (in terms of the number of agents) and providing agents with better cognitive and
decision-making capabilities (which tend not to scale well in large simulations). This
paper is a first attempt at addressing this friction, through the use of High-Performance
Computing (HPC), with the aim of enabling scenarios in which large populations of in-
dividuals (e.g. traffic simulation, industrial and urban areas along geographical areas)
have the ability to perform normative reasoning, planning or even BDI-like behaviour,
in order to explore the analysis of phenomena resulting from more detailed behavioural
modelling. On the one hand, current HPC-based approaches[12] seem to focus on large
simulations with limited interaction or perception or with reactive-like agents. In some
cases, planning is even hard-coded. On the other hand, [2] lists a wide range of ABS
1
(a) PyCOMPSs runtime structure
(b) PyCOMPSs object handling scheme
Figure 1. Aspects of PYCOMPSs
which seem to hardly offer scalability and agents with high cognitive capabilities. This is
an indication of an existing trade-off between scalability and agents with complex delib-
eration processes. In Section 2, we discuss a model for goal-oriented agents in HPC and
briefly outline its implementation in PyCOMPSs (a library that eases task parallelisation
through annotation) to build such a platform. In Section 3, we present the test scenarios
used to evaluate the performance of the platform and demonstrate its capabilities and
potential. In Section 4, we summarise the main results, the contributions and we identify
the next steps.
2. Proposed Model
This section provides background about the COMPSs HPC framework and the corre-
sponding Python package, and then presents the proposed agent-based simulation model.
2.1. COMPSs and PyCOMPSs
COMPSs [15] is a framework based on the Grid Component Model (GCM)[1] and Ser-
viceSs model[17] developed by the Barcelona Supercomputing Center. Its main purpose
is to allow the development of distributed cloud- or grid-based applications without the
need to deal with the specifics of underlying execution systems. Thus, it provides an
abstraction layer, allowing the development of hardware-configuration-agnostic applica-
tions. These applications can be distributed automatically, saving effort in accounting
for low-level aspects of the target hardware. COMPSs analyses the data dependencies
among the user-specified functions (called tasks as in the GCM model) of a sequential
program and runs as many of those tasks in parallel as it is safe to do. A set of additional
commands and parameters can be used to fine-tune the runtime execution and paralleli-
sation. The core of this runtime is written in Java, but C/C++ and Python interfaces are
also available. As all of these commands are language-specific, for the purpose of this
work we choose to focus on the Python version: PyCOMPSs[16].
From a coding perspective, the COMPSs interface takes the form of annotations
(decorators) in the Python code and several API functions and procedures. The main
annotation is @Task(...), where the user specifies the return type (a type or class name)
and the data direction of inputs (in, out) for mutable types and classes.The following
code shows an example of a PyCOMPSs task annotation:
2
1 @Task ( par1 = INOUT , par3 = OUT , returns = list )
2 def my_func ( par1 , par2 , par3 ) :
By means of such annotations, we may mark global functions, class methods, and in-
stance methods as tasks to be automatically parallelised.
2.2. Conceptual Model: Multi-agent system elements
We define a Multi-agent System M as the tuple M = {E, A +, C} where:
1. E is an environment, in which the agents are situated, that they can perceive, and
on which they can act
2. A + is a non-empty set of agents
3. C is a controller that maintains the environment and handles communications be-
tween agents
An Agent Ai is defined as Ai = {ID,msgQs,Bh,B,G, P,outAcs} where:
2. msgQs = {I , O} is a set of the Ai's message queues
1. ID = {AgID,AgDesc} is Ai's identity data
(a) AgID is the unique identifier for Ai
(b) AgDesc is an arbitrary description of Ai
(a) I = {. . . ,msgi, . . .} is the inbox, a set of messages sent to Ai
(b) O = {. . . ,msgi, . . .} is the outbox, a set of messages sent by Ai
(c) msgi = {AgIDs,AgIDr, per f ormative,content, priority} is a message from
agent Ags to agent Agr with the given performative, content, and priority.
per f ormatives are FIPA-compliant.
3. Bh = {MendR,RG} is Ai's role behaviour
(a) MendR is a means-ends reasoner used to generate plans (see Section 2.5)
(b) RG is a set of goals associated with this role behaviour
4. B is the set of Ai's beliefs
5. G is the set of Ai's goals
6. P = {. . . ,abi, . . .} is the current plan of Ai
7. abi =(cid:8). . . ,ai j, . . .(cid:9) is an action block, an ordered set of agent actions, for which
we distinguish three types: internal actions executed by the agents and intended
to change their beliefs external actions sent to the controller to be executed by it
on the environment, and message actions to generate messages to other agents
(a) outAcsi = {senderID,ae} is a tuple of sender ID and an external action
8. outAcs is a set of external actions to be executed on the environment
The Controller C is defined by the tuple C = {I ,inAcs} where I is an inbox for
the reception of messages from all the agents and inAcs is the set of all the actions to be
applied on the environment.
2.3. Operational semantics of the Agents' deliberation cycle: agent transition rules
In the previous section we have defined the different elements that compose our frame-
work. Using these definitions, we can introduce the operational semantics of our model
by means of a set of transition rules. The model assumes that M evolves as a set of
simulation steps. These transition rules describe how the agents' internal states are trans-
3
B perceive(E)
−−−−−−−→ B(cid:48)
Ai{·,·,·,B,·,·,·} ,E →
Ai{·,·,·,B(cid:48),·,·,·} ,E
G goal check(B,G)
−−−−−−−−−−→ G(cid:48)
Ai{·,·,·,·,G,·,·} ,· →
Ai{·,·,·,·,G(cid:48),·,·} ,·
P (h,t)
−−−−−−→ P(cid:48) (t)
execute(h)
Ai{·,{I , O} ,·,B,·, P,outAcs} ,· →
Ai{·, (I , O(cid:48)) ,·,B(cid:48),·, P(cid:48),outAcs(cid:48)} ,·
(1)
(3)
(5)
−−−−−−→ B(cid:48),G(cid:48), O(cid:48)
B,G, O process(h)
Ai{·,{{h,t} , O} ,·,B,G,·,·} ,· →
Ai{·,{{t} , O(cid:48)} ,·,B(cid:48),G(cid:48),·,·} ,·
(2)
P = ∅∨ P = Fail MendR(B,G,RG)
−−−−−−−−−−→ P(cid:48)
Ai{·,·,·,·,·, P,·} ,· →
Ai{·,·,·,·,·, P(cid:48),·} ,·
(4)
(6)
Bh role check(B,G,RG)
−−−−−−−−−−−−→ Bh(cid:48)
Ai{·,·,Bh,·,·,·,·} ,· →
Ai{·,·,Bh(cid:48),·,·,·,·} ,·
Figure 2. Definitions for the agent transition (rules 1 to 6). We use · to denote elements in the agent tuple that
are not modified in the transition.
formed over each single step of the simulation. They show the part of the state that is
changed, the function that changes it, and a summary of the transformation.
Agents in our model are goal-oriented deliberative agents inspired by the Beliefs-
Desires-Intentions (BDI) Model[11]. Therefore, the agents' reasoning cycle is split into
a perception phase (where beliefs are updated), a deliberation phase (where goals are
updated and prioritised), a means-ends reasoning phase (where plans are selected/built)
and an actuation phase. As in many modern BDI-inspired agent languages (e.g., JADEX,
2APL, GOAL), in our model plans are selected directly from beliefs and goals without
the need for intermediate intention selection (which forces, in the theoretical BDI model,
to only pursue one goal at a time).
The first sub-step in the agent deliberation cycle happens when the agent perceives
the current state of the environment. This perception only modifies the agent's beliefs
which are then used in the following sub-steps. Formally, this sub-step is formalised in
Rule 1 (formulae are provided in Figure 2):
Rule 1: Perceiving the environment, where perceive (. . . ) is a user-defined function that
transforms the agent A 's beliefs based on the environment state E.
During the second sub-step, the agent processes the incoming messages. This is done
sequentially, in an arbitrary order. Message processing may modify the agent's beliefs,
as well as its goals. This is formalised in Rule 2:
Rule 2 Message processing, where process (. . . ) is a user-defined message processing
function that can modify the agent A 's beliefs, goals, and outbox.
In the third sub-step of the deliberation cycle, the agent gets an opportunity to reeval-
uate and change its own goals. The decision is based on its beliefs and current goals, and
only the latter is changed during the process. This transition is defined in Rule 3:
4
Rule 3 Goal check, where goal check (. . . ) is a user-defined function that may change
the agent A 's goals based on its beliefs.
One of the most important sub-steps is the actual reasoning. In this step, the agent
relies on a means-ends reasoner to generate a plan that will be followed by itself after-
wards. This step is only performed if the current plan has failed or finished.1 Formally,
this step is defined in Rule 4:
Rule 4 Means-ends reasoner, where MendR (. . . ) is a means-ends reasoner that gener-
ates plans based on the agent A 's beliefs and goals.
After the plan has been updated, the agent proceeds to execute it. The next action
block is extracted from the plan and the set of its actions are run one after another.
Rule 5 Action execution, where execute (. . . ) is the action execution function for action
h. If h is an internal action, execute runs h to modify the set of agent A 's beliefs; if h
is an external action, execute appends h to the set of outgoing external actions; if h is a
message action, execute runs h to generate messages to send.
Finally, the agent has an optional choice to reevaluate its role behaviour (i.e. Bh).
This sub-step is similar to the goal check and its result can be either a new role, or no
changes.
Rule 6 Role check (optional), where role check (. . . ) is a user-defined function that
may modify the agent A 's role behaviour and role goals, based on its beliefs and goals.
2.4. Operational semantics of Controller and Environment: MAS transition rules
After formally defining the internal deliberation process of agents in our framework, we
now describe how the Controller changes the environment on each simulation step.
First of all, there is an optional sub-step during which the controller can modify the
environment before agents' actions are applied to it. These actions are considered to be
commutative. Formally, we can express it in the following way:
Rule 7 Pre-action execution step (optional), where pre step () is a user-defined function
that modifies the environment before the agents' actions are collectively applied to it.
After that, the controller acts as a message dispatcher, processing all the outgoing
messages and passing them to the corresponding recipients in a sequential manner.
Rule 8 Message forwarding, where f wdmsh (. . . ) is a function that moves the specified
message from the sender's inbox, to the recipient's outbox.
The next sub-step executes, sequentially, all the actions sent by agents.
Rule 9 Action execution, where execute ac (. . . ) is a function that applies the action h
to the environment.
Finally, there is another optional sub-step to modify the environment. It is similar to
the first sub-step, differing only in the function used.
Rule 10 Post-action execution step (optional), where post step () is a user-defined
function that modifies the environment after the agents' actions are applied to it.
1See § 2.5 for more details.
5
E pre step()
−−−−−→ E(cid:48)
M {E,·,·} → M {E(cid:48),·,·}
−−−−−−−→ E(cid:48)
E execute ac(a)
M {E,·,{·,{a,t}}} →
M {E(cid:48),·,{·,{t}}}
(7)
(9)
Ar {·,{{x} , O} ,·,·,·,·,·} f wd msg(h,Ar)
−−−−−−−−→
r {·,{{x,h} , O} ,·,·,·,·,·}
A (cid:48)
M {·,{. . . , Ar, . . .} ,{{h,t} ,·}} →
r , . . .} ,{{t} ,·}}
M {·,{. . . , A (cid:48)
(8)
E post step()
−−−−−−→ E(cid:48)
M {E,·,·} → M {E(cid:48),·,·}
(10)
Figure 3. Definitions for the MAS transition rules (rules 7 to 10)
2.5. Means-ends reasoning: Hierarchical Task Networks planner
In our base model, we choose not to specify any fixed means-to-ends reasoning model
(MendR (B,G,RG) in agent Rule 4), leaving it to the user to select one (and to pro-
vide the required specification). However, for our implementation of the base model,
we choose a planner based on Hierarchical Task Networks (HTN)[8] to instantiate the
MendR function, on the grounds that HTN planners are a good fit to the means-end stage
of the BDI reasoning process[14].There are several HTN-based models, with different
representation and planning procedures. As most of these models deal only with high-
level planning, at a distance from the practical planning and following task execution,
we considered HTN planner models used for actual computer games. These models have
been adapted not only for effective abstract-to-concrete facts mapping, but also for re-
planning during execution.
We slightly modified [9] to suit both our needs and the COMPSs requirements.
These modifications cover the difference in the perception models (the original algorithm
used active sensors), and allow the partial sets of method sub-tasks to be accepted as
parts of the plan to gain flexibility. In this model, abstract tasks are divided into com-
pound tasks and methods. A compound task consists only of an ordered set of methods
while each method consists of an ordered set of compound or primitive tasks, conditions
and some additional information. Primitive tasks contain action blocks to be executed,
consisting of action of various types, and also some preconditions.
To connect the output of the deliberation sub-step with the HTN planner, we consider
the goals provided by the goal check function (rule 3) as tasks to be searched in the HTN.
By following the model planning rules associated with the (abstract) task [9], we can
easily obtain a sequence of actions to be executed based on the current beliefs and goals.
After the current plan has finished, we generate a new one, as per rule 4. Thus, the only
explicit goal type supported currently is the maintain goal[7], but other types of goals
(for example, achieve goals or perform goals) can be simulated by the appropriate use
of the goal check function. In the case of HTN as a means-ends reasoner, goal check ()
can easily switch between different compound tasks in HTN (or select a new HTN) as
6
a method of goal revision. This can be done either by traversing the graph of the HTN,
or by generating a new HTN and replacing the old one, although one should always be
careful about the belief sets and ontologies used by each planner.
3. Implementation and Results
In the previous section, we introduced the agent-based simulation model and described
its design features. This section describes an instantiation of the framework in a concrete
implementation and provides some preliminary test results.
3.1. Implementation
The whole system is implemented in Python. It is organised as a package with several
modules and a list of main classes that are easily accessible by the user:
Controller: defines the Controller class, the main utility entity in the system, respon-
sible for containing the MAS, running PyCOMPSs tasks, forwarding messages,
and executing all the utility methods.
Agent: defines the Agent class that is a container for the agent description.
Behaviour: defines the Behaviour class, that implicitly provides the agent's workflow;
the user may subclass this for complex behaviours.
Directory: defines the Directory and DirectoryEntry classes that are used by the
built-in directory facilitator.
HTN: defines all the HTN-related classes, as well as some related functionality;
the full list is: CompoundTask, Method, PrimitiveTask, Effect, Action,
ActionBlock, HTNPlanner, BeliefSet and Conditions.
Messaging: defines the Message and Messagebox classes used for agent messaging.
State: defines the State structure, used to transfer and work with persistent states.
The Behaviour class follows the model presented in Section 2.3 with its instance
functions corresponding to the functions in the rules. In complex scenarios, it is expected
that the user redefines the following functions:
1 state . beliefs = self . p e r c e i v e ( environment , state . beliefs )
2 for message in inbox :
3
state . beliefs , state . planner , reply = self . process ( message , state
. beliefs , state . planner )
4 state . planner = self . g o a l _ c h e c k ( state . beliefs , state . planner )
5 role = self . r o l e _ c h e c k ( state . beliefs )
A simulation is run by initialising a Controller object, registering agents in it, and
calling the run method. An example of the latter two:
1 c o n t r o l l e r . g e n e r a t e _ a g e n t ( " Test agent " , b e h a v i o r = M y B e h a v i o r () ,
beliefs = myBeliefs , i n i t _ b l o c k = None , planner = myPlanner ,
d e f a u l t _ b l o c k = None , s e r v i c e s =[ " testing " ] , r e g i s t e r = True )
2 c o n t r o l l e r . run ( n u m _ i t e r =10 , p e r f o r m a n c e = False )
An HTN planner can be generated following the structure defined in Section 2.5.
The user needs to create a structure of PrimitiveTasks, Methods, and CompoundTasks
and use the root CompoundTask as a parameter for the planner's initialisation.
7
Number
of agents
10
50
100
200
300
500
1000
2000
Time, s
Total
29.5460
75.2455
132.4631
308.3213
539.4989
972.8603
1775.0650
2872.2980
Tasks
28.5788
72.3717
128.8426
302.9179
530.3990
959.3281
1747.6440
2834.4890
Table 1. Results for the agent count test. All the results are averages of 5 replications.
3.2. Performance experiments
In order to test the system's performance, we have designed a number of experiment sets
to test different aspects of the system. The overall time performance of the system was
evaluated in accordance to 4 parameters: number of agents (100), number of requested
processing units (246), number of messages sent (10), and size of messages sent (0Kb).
For each series of tests one of the parameters was modified while the others were fixed
at default values (the ones inside the brackets above). Due to space limitations we will
only focus on the first two.
The Agents' behaviours are guided by a trivial HTN with a single compound task,
single method, and single primitive task with 2 actions: send messages and increment
step counter belief. On each turn, each agent sent a specified number of messages con-
taining lists of zeroes of specified length to random agents and incremented its "step"
counter belief. Upon the reception of a message, each agent incremented its "counter"
belief.
All of these experiments, with two exceptions, were performed on the BSC NordIII
cluster using the default setting of 256 processors cores per test.
In the case of the test of number of agents (Table 1), the behaviour of the chart fits
the expectations. The chart increases linearly w.r.t the increase of the total number of
agents (and, correspondingly, the number of PyCOMPSs tasks). Also, even if it is not
clear enough from the plot, the controller time noticeably increases due to the fact that
the controller has to process additional messages and handle these new agents.
But the most interesting results come from the experiments on the number of pro-
cesses (Table 2). For them we have two sets of columns: the left ones show the results
for the default tests with a specific agent behaviour, the right ones are for the slightly
modified version of it, where on each step we have added a one-second delay. We can see
that, in the case without delays, there is only a slight dependency between the number
of processes and the execution time. But as soon as we imitate the harder tasks that take
more time to execute, even just adding one second, the difference becomes massive as
we get a clear exponential dependency.
Also please notice that after the number of processes exceeds the number of tasks,
the changes in the computation time are almost non-existent, as COMPSs has enough
resources to get all the tasks distributed with a minimal delay.
Besides the results on the tested metrics, we have obtained insights about both possi-
ble weaknesses of the system and directions for future research. The main issue we faced
8
Number
of processes
Number
of nodes
2
4
6
8
10
12
14
32
64
96
128
160
192
224
Time, s
(w/o delay)
Time, s
(with delay)
Tasks
223.4435
159.7769
161.5091
179.6115
164.2693
125.6789
128.8578
Total
220.9405
157.7344
159.1821
176.8729
159.5374
122.7972
125.1992
Tasks
829.7442
373.3008
252.5065
194.2150
195.0013
195.0007
196.3293
Total
826.4027
370.3567
250.0795
192.0736
191.9677
192.0937
193.1141
Table 2. Results for the test for the number of processes. 1 second delays were introduced to each task in the
second case.
was disk space usage. As COMPSs transforms custom objects into files for transfer, this
puts a strain on the data transfer infrastructure. This may result in exceeding cluster disk
space quotas. This limits the scale of the results we are able to achieve (although they
still exceed the standard capabilities of the non-HPC BDI platforms).
4. Conclusions
This paper has presented a model for agent-based simulation in HPC and its implemen-
tation in PyCOMPSs. Our simulation model is driven by the controller, which can be
effectively considered as the synchronisation point for the simulation, following the Bulk
Synchronous Parallel model[18]. The main advantage of our model when compared to
the closest works in literature[4,6,5,13] is that our model would benefit from simulation
domains that require goal-driven agents being able to perform more complex reasoning
or planning. Another limitation of these frameworks (except for [4]) is that the agent
communication is very limited, based on direct method calls. This kind of communica-
tion only works properly within agents executed on the same processor or in the over-
lapping zones, but not with agents in other processors. We are starting to test our model
with a real scenario base on wastewater management of a full river basin with hundreds
of pollutant producers and dozens of pollutant processors coordinating their effort to en-
sure pollution levels are law-compliant. Future research lines include other simulation
problems and implementing normative reasoning by incorporating a norm monitor [3] or
deontic sensors [10], which would also facilitate the introduction of normative contexts.
Acknowledgements
This work is partially supported by the BSC-IBM Deep Learning Center agreement, the Spanish
Government through Programa Severo Ochoa (SEV-2015-0493), the 11th call on the Severo Ochoa
Mobility Program in BSC, the Spanish Ministry of Science and Technology through TIN2015-
65316-P project and the Generalitat de Catalunya (contract 2017-SGR-1414).
References
[1] Basic features of the grid component model (assessed). CoreGRID Deliverable D.PM.04, 2007.
9
[2] Sameera Abar, Georgios K. Theodoropoulos, Pierre Lemarinier, and Gregory M.P. O'Hare. Agent based
modelling and simulation tools: A review of the state-of-art software. Computer Science Review, 24:13
-- 33, 2017.
[3] Sergio ´Alvarez Napagao. Bringing social reality to multiagent and service architectures: practical
reductions for monitoring of deontic-logic and constitutive norms. PhD thesis, Universitat Polit`ecnica
de Catalunya, 2016.
[4] S. Coakley, M. Gheorghe, M. Holcombe, S. Chin, D. Worth, and C. Greenough. Exploitation of high
performance computing in the flame agent-based simulation framework. In 2012 IEEE 14th Interna-
tional Conference on High Performance Computing and Communication 2012 IEEE 9th International
Conference on Embedded Software and Systems, pages 538 -- 545, June 2012.
[5] Nicholson Collier and Michael North. Repast hpc: A platform for large-scale agent-based modeling.
Large-Scale Computing, pages 81 -- 109, 04 2012.
[6] Gennaro Cordasco et al. A framework for distributing agent-based simulations. In Michael Alexander et
al., editor, Euro-Par 2011: Parallel Processing Workshops, pages 460 -- 470, Berlin, Heidelberg, 2012.
Springer Berlin Heidelberg.
[7] Mehdi Dastani, M. Birna van Riemsdijk, and John-Jules Ch. Meyer. Goal types in agent programming.
In Proceedings of the Fifth International Joint Conference on Autonomous Agents and Multiagent Sys-
tems, AAMAS '06, pages 1285 -- 1287, New York, NY, USA, 2006. ACM.
[8] Kutluhan Erol, James Hendler, and Dana Nau. Htn planning: Complexity and expressivity. Proceedings
of the National Conference on Artificial Intelligence, 2, 05 1994.
[9] Troy Humphreys. Exploring HTN Planners through Example, chapter Architecture, pages 149 -- 167.
[10]
CRC Press, September 2013.
In Proceedings of the 27th
Julian Padget, Marina De Vos, and Charlie Ann Page. Deontic sensors.
International Joint Conference on Artificial Intelligence, IJCAI'18, pages 475 -- 481. AAAI Press, 2018.
[11] Anand S. Rao and Michael P. Georgeff. Modeling rational agents within a BDI-architecture. In James
Allen, Richard Fikes, and Erik Sandewall, editors, Proceedings of the 2nd International Conference on
Principles of Knowledge Representation and Reasoning, pages 473 -- 484. Morgan Kaufmann publishers
Inc.: San Mateo, CA, USA, 1991.
[12] Alban Rousset, B´en´edicte Herrmann, Christophe Lang, and Laurent Philippe. A survey on parallel
and distributed multi-agent systems for high performance computing simulations. Computer Science
Review, 22:27 -- 46, 2016.
[13] Xavier Rubio-Campillo. Pandora: A versatile agent-based modelling platform for social simulation.
Proceedings of SIMUL, pages 29 -- 34, 2014.
[14] Sebastian Sardina and Lin Padgham. A bdi agent programming language with failure handling, declar-
ative goals, and planning. Autonomous Agents and Multi-Agent Systems, 23:18 -- 70, 07 2011.
[15] Enric Tejedor and Rosa M. Badia. Comp superscalar: bringing grid superscalar and gcm together. In
2008 Eighth IEEE International Symposium on Cluster Computing and the Grid (CCGRID), pages 185 --
193. IEEE, 06 2008.
[16] Enric Tejedor, Yolanda Becerra, Guillem Alomar, Anna Queralt, Rosa M. Badia, Jordi Torres, Toni
Cortes, and Jes´us Labarta. Pycompss: Parallel computational workflows in python. The International
Journal of High Performance Computing Applications, 31(1):66 -- 82, 2017.
[17] Enric Tejedor, Jorge Ejarque, Francesc Lordan, Roger Rafanell, Javier ´Alvarez Cid-Fuentes, Daniele
Lezzi, Raul Sirvent, and Rosa M. Badia. A cloud-unaware programming model for easy development
of composite services. In 2011 IEEE Third International Conference on Cloud Computing Technology
and Science, pages 375 -- 382. IEEE, 11 2011.
[18] Leslie G. Valiant. A bridging model for parallel computation. Commun. ACM, 33(8):103 -- 111, August
1990.
10
|
1910.02591 | 1 | 1910 | 2019-10-07T03:32:41 | Multi-Agent Reinforcement Learning for Order-dispatching via Order-Vehicle Distribution Matching | [
"cs.MA",
"cs.LG"
] | Improving the efficiency of dispatching orders to vehicles is a research hotspot in online ride-hailing systems. Most of the existing solutions for order-dispatching are centralized controlling, which require to consider all possible matches between available orders and vehicles. For large-scale ride-sharing platforms, there are thousands of vehicles and orders to be matched at every second which is of very high computational cost. In this paper, we propose a decentralized execution order-dispatching method based on multi-agent reinforcement learning to address the large-scale order-dispatching problem. Different from the previous cooperative multi-agent reinforcement learning algorithms, in our method, all agents work independently with the guidance from an evaluation of the joint policy since there is no need for communication or explicit cooperation between agents. Furthermore, we use KL-divergence optimization at each time step to speed up the learning process and to balance the vehicles (supply) and orders (demand). Experiments on both the explanatory environment and real-world simulator show that the proposed method outperforms the baselines in terms of accumulated driver income (ADI) and Order Response Rate (ORR) in various traffic environments. Besides, with the support of the online platform of Didi Chuxing, we designed a hybrid system to deploy our model. | cs.MA | cs | Multi-Agent Reinforcement Learning for Order-dispatching via
Order-Vehicle Distribution Matching
Ming Zhou1, Jarui Jin1, Weinan Zhang1, Zhiwei Qin2, Yan Jiao2,
Chenxi Wang2, Guobin Wu3, Yong Yu1, Jieping Ye2
1Shanghai Jiao Tong University, 2DiDi AI Labs, 3DiDi Research
{zhouming,yyu}@apex.sjtu.edu.cn,[email protected],[email protected],{qinzhiwei,yanjiao,wangchenxi,
wuguobin,yejieping}@didiglobal.com
9
1
0
2
t
c
O
7
]
A
M
.
s
c
[
1
v
1
9
5
2
0
.
0
1
9
1
:
v
i
X
r
a
ABSTRACT
Improving the e(cid:129)ciency of dispatching orders to vehicles is a re-
search hotspot in online ride-hailing systems. Most of the existing
solutions for order-dispatching are centralized controlling, which
require to consider all possible matches between available orders
and vehicles. For large-scale ride-sharing platforms, there are thou-
sands of vehicles and orders to be matched at every second which is
of very high computational cost. In this paper, we propose a decen-
tralized execution order-dispatching method based on multi-agent
reinforcement learning to address the large-scale order-dispatching
problem. Di(cid:130)erent from the previous cooperative multi-agent re-
inforcement learning algorithms, in our method, all agents work
independently with the guidance from an evaluation of the joint
policy since there is no need for communication or explicit co-
operation between agents. Furthermore, we use KL-divergence
optimization at each time step to speed up the learning process and
to balance the vehicles (supply) and orders (demand). Experiments
on both the explanatory environment and real-world simulator
show that the proposed method outperforms the baselines in terms
of accumulated driver income (ADI) and Order Response Rate (ORR)
in various tra(cid:129)c environments. Besides, with the support of the
online platform of Didi Chuxing, we designed a hybrid system to
deploy our model.
CCS CONCEPTS
•Computing methodologies→ Multi-agent reinforcement learn-
ing; •(cid:135)eory of computation → Multi-agent reinforcement learn-
ing; •Applied computing → Transportation;
KEYWORDS
Deep Reinforcement Learning; Multi-agent Reinforcement Learn-
ing; Ride-Hailing; Order-Dispatching
ACM Reference format:
Ming Zhou1, Jarui Jin1, Weinan Zhang1, Zhiwei Qin2, Yan Jiao2,
Chenxi Wang2, Guobin Wu3, Yong Yu1, Jieping Ye2. 2019. Multi-Agent
Reinforcement Learning for Order-dispatching via
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for pro(cid:128)t or commercial advantage and that copies bear this notice and the full citation
on the (cid:128)rst page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permi(cid:138)ed. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior speci(cid:128)c permission and/or a
fee. Request permissions from [email protected].
CIKM '19, Beijing, China
© 2019 ACM. 978-1-4503-6976-3/19/11...$15.00
DOI: 10.1145/3357384.3357799
Order-Vehicle Distribution Matching. In Proceedings of (cid:138)e 28th ACM In-
ternational Conference on Information and Knowledge Management, Beijing,
China, November 3 -- 7, 2019 (CIKM '19), 9 pages.
DOI: 10.1145/3357384.3357799
1 INTRODUCTION
With the booming of mobile internet, it becomes feasible and
promising to establish the modern large-scale ride-hailing systems
such as Uber, Didi Chuxing and Ly(cid:137) which allow passengers book
routes with smartphones and match available vehicles to them
based on intelligent algorithms. To some extent, these ride-hailing
systems improve the e(cid:129)ciency of the transportation system.
In ride-hailing systems, a key point is how to dispatch orders
to vehicles to make the system work more e(cid:129)ciently and generate
more impact. We illustrate the order-dispatching in Figure. 1, where
one can see that the algorithm used by the decision maker is critical
for (cid:128)nding suitable matches because the result of order-dispatching
has direct in(cid:131)uences on the platform e(cid:129)ciency and income.
(cid:140)e general strategies of automatically order-dispatching sys-
tems are to minimize the waiting time and taxi cruising time through
route planning or matching the nearest orders and vehicles [4, 5,
11, 23]. In recent research, another approach to solve the order-
dispatching problem is to leverage combinatorial optimization [25]
to improve the success rate of order-dispatching [39]. It makes
a signi(cid:128)cant improvement in the online test, but it su(cid:130)ers from
high computational cost, and strongly relies on appropriate feature
engineering. More importantly, the above strategies are myopic:
they may (cid:128)nd suitable matches in the current stage, but ignore the
potential future impact.
In this paper, we focus on developing a method to maximize the
accumulated driver income (ADI), i.e., the impact of orders served
in one day, and the order response rate (ORR), i.e., the proportion
of served orders to the total orders in one day. Intuitively, match-
ing vehicles with high-price orders can receive high impact at a
single order-dispatching stage. However, if the served orders re-
sult in the mismatch between the orders and vehicles in the near
future, it would harm the overall service quality in terms of ORR
and the long-term ADI. Hence, in order to (cid:128)nd a balance between
the long-term ADI and ORR, it is necessary to develop an order-
dispatching algorithm which takes the future supply and demand
into consideration.
Xu et al. [37] proposed a planning and learning method based on
decentralized multi-agent deep reinforcement learning (MARL) and
centralized combinatorial optimization to optimize the long-term
ADI and ORR. (cid:140)e method formulates the order-dispatching task
into a sequential decision-making problem and treats a vehicle as
an agent. However, for centralized approaches, a critical issue is
the potential "single point of failure" [18], i.e., the failure of the cen-
tralized authority control will fail the whole system [16]. Another
two related work using multi-agent to learn order-dispatching is
based on mean-(cid:128)eld MARL [13] and knowledge transferring [35].
(cid:140)ere are some challenges to be solved when we apply the MARL
to the real-time order-dispatching scenario. First, handling the non-
stationary environment in MARL is a major problem, which means
that all agents learn policies concurrently, while each individual
agent does not know the policies of other agents [10]. (cid:140)e state
transition in a multi-agent environment is driven by all agents
together, so it is important for agents to have knowledge about
other agents' policies. In the order-dispatching scenario, we only
care about the idle status of a vehicle since they are available for
order-dispatching. However, as the duration of each order is non-
deterministic, compared to the traditional multi-agent scenarios
which have deterministic time interval, it is di(cid:129)cult to learn the
interactions between agents in successive idle states, which makes
many MARL methods including opponent modeling [2, 26] and
communication mechanism [7] hard to work well. Second, the
number of idle vehicles keeps changing during the whole episode,
i.e., there will always be some vehicles ge(cid:138)ing o(cid:132)ine or online,
thus the general MARL methods which require (cid:128)xed agent number
cannot be directly applied in such a case [6, 40].
In addition, we believe that a higher ORR usually means a higher
ADI, and if we can maintain a higher long-term ORR, we will get
a higher long-term ADI. With regard to the correctness of this
point, we also conducted a corresponding experimental analysis in
Section 4.2.2.
To the best of our knowledge, this is the (cid:128)rst work that utilizes
this character to improve both ORR and ADI. In detail, we propose a
centralized learning and decentralized execution MARL method to
solve the above challenges with an extension of Double Q-learning
Network [20] with Kullback-Leibler (KL) divergence optimization.
Besides, the KL-based backward learning optimization method also
speeds up the agents learning process with the help of others'.
Considering the large scale of agents, and they are homogeneous,
we learn only one network using parameter sharing, and share
learning experiences among all agents at the training stage, as that
in [30, 40]. To address the non-stationary action space problem, in
our implementation, the input of deep Q-learning network consists
of the state and selected action.
Extensive experiments with di(cid:130)erent tra(cid:129)c and order condi-
tions and real-world simulation experiments are conducted. (cid:140)e
experimental results demonstrate that our method yields a large im-
provement on both ADI and ORR compared to the baseline methods
in various tra(cid:129)c environments. We also claim the proposed method
is highly feasible to be deployed on the existing order-dispatching
platform.
2 RELATED WORK
Taxi-order Dispatching. (cid:140)ere have been several GPS-based
order-dispatching systems to enhance the accuracy, communica-
tions, and productivity of taxi dispatching [14, 15, 23]. (cid:140)ese sys-
tems do not o(cid:130)er detailed dispatching algorithms, which means
Figure 1: Ride-hailing order-dispatching process
these platforms are more like information sharing platforms, help-
ing vehicles choose orders to serve by o(cid:130)ering orders information.
Other automatic order-dispatching methods [12, 19] focus on re-
ducing the pick-up distance or waiting time by (cid:128)nding the nearest
orders. While these methods usually fail to reach a high success
rate on order-dispatching and ignore many potential orders in the
waiting list which may be more suitable for vehicles. Zhang et
al. [39] proposed a centralized control dispatching system based
on combinatorial optimization. Although it is a simple method,
the requirement of computing all available order-vehicle matches
can be of much high computational cost in a large-scale taxi-order-
dispatching situation. Moreover, it requires appropriate feature
engineering. (cid:140)us it greatly increases the system implementation
di(cid:129)culty and human e(cid:130)orts of applying the method in a practical
situation.
Multi-agent Reinforcement Learning. Multi-agent reinforce-
ment learning has been applied in domains like collaborative deci-
sion support systems. Di(cid:130)erent from the single agent reinforcement
learning (RL), multi-agent RL needs the agents to learn to cooper-
ate with others. It is generally impossible to know other policies
since the learning process of all agents is simultaneous. (cid:140)us for
each agent, the environment is non-stationary [3]. It is problem-
atical that directly apply the independent reinforcement learning
methods into the multi-agent environment. (cid:140)ere are several ap-
proaches proposed to relieve or address this problem, including
sharing the policy parameters [8], training the Q-function with
other agents' policy parameters [31], centralized training [17] and
opponent modeling [2, 26]. Besides, there are also some methods
which use explicit communication to o(cid:130)er a relatively stationary
environment for peer agents [7, 9, 30]. In the large-scale multi-
agent systems, the non-stationary problem will be ampli(cid:128)ed. To
address this problem, Yang et al. [38] proposed a novel method
which converts multi-agent learning into a two-player stochastic
game [28] by applying mean (cid:128)eld theory in multi-agent reinforce-
ment learning to make it possible in large-scale scenarios. Since the
mean-(cid:128)eld MARL method only takes a mean (cid:128)eld on states/actions
input into consideration, it ignores the agent interactions. Our
proposed method provides another way to enable large-scale multi-
agent learning and retain the interactions between agents, which
makes agents receive global feedback from the next moments and
adjust their strategies in time. Furthermore, our proposed method
matchidle vehiclespassengersvehicle listorder listpack updecision-making platformprovides a backward stationary learning method and has a rapid
reaction to the feedback from the environment.
Multi-agent Taxi Dispatching. A lot of previous work models
the taxi dispatching into multi-agent learning, like [1], it divides
the city into many dispatching areas, and regards an area as an
agent, then uses self-organization techniques to decrease the total
waiting time and increase the taxi utilization. NTuCab [27] is a
collaborative multi-agent taxi dispatching system which a(cid:138)empts
to increase custom satisfaction more globally, and it can dispatch
multiple orders to taxis in the same geographical regions. NTuCab
thinks that it is not feasible to compute the shortest-time path for
each of a possibly large number of available taxis nearby a customer
location since it is computationally costly. We follow these se(cid:138)ings
in our proposed model and divide the city into many dispatching
regions. Each dispatching region is controlled in a given distance,
which indirectly limits the maximum waiting time. (cid:140)e NTuCab
achieves a signi(cid:128)cant improvement in reducing the wait time and
taxi cruising time, but it is also a computational cost method. Xu et
al. [37] proposed a learning and planning method based on MARL
and combinatorial optimization recently, and some other methods
[16, 24, 36] focus on (cid:131)eet management to improve the ADI or de-
crease the waiting time. But considering the current operational
ride-sharing scenarios, it is hard to perform (cid:131)eet management for
it is impossible to force drivers to designated regions. (cid:140)e men-
tioned MARL method[37] is an independent MARL method, which
ignores the interactions between agents. However, it is a consensus
to consider that the agent interactions have a positive impact on
making optimal decisions. Our proposed method considers the
interaction between agents by applying constraints on the joint
policies using KL-divergence optimization, and the experiments
demonstrate that the proposed method outperforms baselines on
all metrics in di(cid:130)erent tra(cid:129)c environments.
3 METHODOLOGY
In this section, we (cid:128)rst give a de(cid:128)nition of order-dispatching from
a perspective of multi-agent reinforcement learning process, and
then discuss the main challenges when applying the MARL method
for order-dispatching, and give our methods.
3.1 Order-dispatching as a Markov Game
We regard the order-dispatching task as a sequential decision task,
where the goal is to maximize the long-term ADI and ORR per
day. According to the characters of the practical environment, each
vehicle can only serve the surrounding orders, thus we model the
order-dispatching task using Partially Observable Markov Decision
Process (POMDP) [29] in multi-agent se(cid:138)ings. With the multi-agent
se(cid:138)ings, we can decompose the original global order-dispatching
task into many local order-dispatching tasks, and transform a high-
dimensional problem into multiple low-dimensional problems.
(cid:140)e POMDP framework to the multi-agent order-dispatching
problem can be formulated as a tuple (cid:104)S, P, A, R, G,N, γ(cid:105), where
S, P, A, R, G, N, γ represent the sets of states, state transition
probability function, sets of action spaces, reward functions, set of
grids, the number of agents and the future reward discount factor
respectively.
For each agent i, Si ∈ S, Ai ∈ A, Ri ∈ R represent the state
space, action space and reward function respectively, and Gi ∈ G
represents the grid which the agent in. (cid:140)e state transition occurs
a(cid:137)er the decision making, i.e. agents executed their actions, then
the state St of environment at time t transform to St +1 at time
t + 1, and agents will get rewards given by the environment. Based
on the above de(cid:128)nitions, the main purpose of each agent is to learn
to maximize the cumulative reward Gt:T from t to T
T
t =0
max Gt:T = max
γ t rt(st , at) , where at ∼ πθ(st) .
sents the policy with respect to the state at time t.
In reinforcement learning, the πθ(·) parameterized with θ repre-
It is common to divide the city into regional dispatch areas
[16, 27]. In our se(cid:138)ings, we use a grid-world to represent the real
world and divide the real world into several order-dispatching re-
gions. Each grid represents an individual order-dispatching region
which contains some orders and vehicles, and we regard vehicles as
agents here. Based on the above MARL se(cid:138)ings, we specify the de(cid:128)-
nitions of the order-dispatching task as follows from a mathematical
perspective.
• State: (cid:140)e state input used in our method is expressed as
a four elements tuple, namely, S = (cid:104)G, N , M, Ddest(cid:105). Ele-
ments in the tuple represent the grid index, the number of
idle vehicles, the number of valid orders and the distribu-
tion of orders' destinations respectively. (cid:140)e distribution of
order's destination is a mean over the destination vectors
of orders in grid G, which roughly re(cid:131)ects the overall the
orders information. In our se(cid:138)ings, agents in the same grid
share the same state.
• Action: (cid:140)e action input used in our method is expressed
as A = (cid:104)Gsource, Gdest,T , C(cid:105). Elements in the tuple repre-
sent the source grid index, target grid index, order duration,
and price respectively. We regard the set of orders in the
grid j at time t as the candidate actions of the agent i. Since
agents are homogeneous, so agents in grid j share the same
action space. In practice, sometimes there is no order in
some regions. Under the se(cid:138)ing of MARL, agents need to
select orders at each timestep, but some grids may not have
orders, so in order to ensure the feasibility and sustainabil-
ity of the MDP, we arti(cid:128)cially add some virtual orders
whose Gsource = Gdest, and set the price C to 0. When idle
vehicles select these virtual orders, it means they will stay
where they are.
• State Transition: (cid:140)e agent which serves one order will
migrate to the destination grid given by the taken order
a(cid:137)er T time step, where T is de(cid:128)ned with the served order
duration, then the state of agent will be updated to the
newest state, namely, the stage of destination grid.
• Reward: (cid:140)e reward function is very important for rein-
forcement learning to a great extent which determines the
direction of optimization. Because of the goal of learning
is to (cid:128)nd a solution which maximizes the ADI with high
ORR, so we design a reward function which is proportional
to the price of each order.
3.2 Non-stationary Action Space
Traditional deep Q-learning network accepts a state input and out-
puts a vector of Q values whose dimension is equal to the dimension
of action space, i.e.,
dim(cid:16)
Q(s, A)(cid:17)
= dim(cid:16)A(cid:17)
.
(1)
It is correct when the action space is (cid:128)xed, while it is problematic
in our se(cid:138)ings. (cid:140)ere is a fact that for the grid j, the orders produced
at time t are always di(cid:130)erent from the orders produced at other
moments. It cannot ensure that the action space is consistent along
with the whole episode, so it is problematical to regard the orders
as an action while ignoring the distribution of the variant action
space. In our proposed method, we use the tuple (cid:104)S, a(cid:105) to represent
the input of Q-learning, then evaluate all available state-order pairs.
3.3 Action Selection Q-learning
For convenience, we name the Q-learning network with a state-
action input as action selection Q-learning shown in Figure 2.
For agent i, supposing there are M available orders, which re-
quires M state-action evaluation. In the case of N agents, the com-
putational complexity will be O(N · M). To decrease the original
complexity to O(M), we use parameter sharing and state sharing
mentioned in previous sections to achieve it.
From the perspective of agent i, we suppose that st denotes
the state at time t, at denotes the set of orders, then the Bellman
Equation in our se(cid:138)ings can be expressed as
Q(st , at) = αQ(st , at)+
(1 − α)(cid:104)
rt + γ · Eat +1∼π(st +1)[Q(st +1, at +1)](cid:105)
,
(2)
where γ ∈ [0, 1] is the discount factor, α is the step size. (cid:140)e value
of the next timestep is a expectation of all available state-order
pairs. When the policy π(st +1) is greedy, then Eq. (2) represents
the traditional Q-learning algorithm.
To balance the exploitation and exploration, the Q values related
to the same orders set are converted into a biased strategy Boltzman
exploration
π(a
j
t st) =
eQ(st ,a j
t ∈Ai
a j
t)/τ
eQ(st ,a j
t)/τ
,
(3)
where τ is the temperature to balance the exploitation and explo-
ration.
3.4 KL Divergence Optimization
In the multi-agent system, the main method to relieve or overcome
the non-stationary problem is learning multi-agent communication
[6, 7, 9, 30], while most of them require a (cid:128)xed agent number or
observations from other agents before making decisions. In the
order-dispatching case, explicit communication occurs between
agents is o(cid:137)en time-consuming and di(cid:129)cult to adapt. As illustrated
in Figure 3, supposing that triangles in each grid represent orders,
and dots represent vehicles. It shows that the order-dispatching pro-
cess of each grid at time t, and di(cid:130)erent order has di(cid:130)erent duration
of d, so the vehicles will arrive at the destination grids at di(cid:130)erent
time, and vehicles serve di(cid:130)erent orders will be assigned to di(cid:130)erent
Figure 2: Action selection Q-learning. Di(cid:130)erent from the tra-
ditional Q-learning network, our model accepts both state
input and action feature vector. A(cid:133)er embedding them re-
spectively, there is a concatenation followed by 2 dense lay-
ers which follows the embedding layers. (cid:135)en the network
outputs a scalar value Q(s, a).
Figure 3: Grid-based order-dispatching. Supposing that tri-
angles in each grid represent orders, and dots represent ve-
hicles. It shows that the order-dispatching process of each
grid at time t, and di(cid:130)erent order has di(cid:130)erent duration of d,
so the vehicles will arrive at the destination grids at di(cid:130)er-
ent time, and vehicles serve di(cid:130)erent orders will be assigned
to di(cid:130)erent grids, then it is hard to form continuous interac-
tions and communication between vehicles. For these two
reasons, applying the communication mechanism or learn-
ing others' policies is not a good choice.
grids, then it is hard to form continuous interactions and communi-
cation between vehicles. Also, it o(cid:137)en su(cid:130)ers from computational
cost, especially in large-scale se(cid:138)ings. Taking the aforementioned
reasons, we introduce a centralized training method using KL diver-
gence optimization, which aims to optimize the agents' joint policy
and try to match the distribution of vehicles with the distribution
of orders.
Notice that we have two goals need to achieve in our proposed
method: (1) maximize the long horizontal ADI; (2) optimize the
order response rate.
If there are always enough vehicles in the
ReLU%(s,a)State sAction0ReLUReLUReLUGrid iGrid jGrid pGrid qt+d1t+d2t+d3dispatching grid, it is easy to decrease the rate of idle vehicles and
improve the order response rate, also the long horizontal ADI, while
there is a fact that we cannot control the distribution of orders. So
we want to make the order and vehicle distribution as similar as
possible through (cid:128)nding feasible order-vehicle matches. We do not
require explicit cooperation or communication between agents, but
an independent learning process with centralized KL divergence
optimization.
Supposing at time t, the agents (cid:128)nd a feasible order set Ot by
executing their policies, namely,
Ot ∼ {πθ, j(st) j = 1, . . . , N} .
(4)
Our purpose is to (cid:128)nd an optimal order set O∗
t . Focusing on
a certain grid j, it supposes that the policy πθj
at time t is param-
eterized by θj. A(cid:137)er all policies have been executed, we get the
newest distribution of vehicles Dv
t +1, and the newest distribution
of orders is Do
t +1 shows
the margin between the joint policy Π at time t and Do
t +1, so the KL
optimization is actually (cid:128)nding an optimal joint policy Π∗ which
has a minimal margin:
t +1. (cid:140)e KL divergence from Dv
t +1 to Do
∗ = arg
Π
Π
min DKL(Do
t +1 (cid:107) Dv
t +1(Π)) ,
(5)
where Π = {πθ, j
j = 1, ..., N}. For the convenience, we replace
t +1(Π)) with DK L. We want to decrease the KL
t +1 (cid:107) Dv
DKL(Do
divergence from the distribution of vehicles to the distribution of
orders to balance the demand and supply at each order-dispatching
grid. Formally, our KL policy optimization can be wri(cid:138)en as:
L =(cid:107) Qθ(s, a) − Q
min
θ
s.t . DK L ≤ β ,
∗ (cid:107)2
where β ∈ R. (cid:140)en the objective function can be expressed as
L =(cid:107) Qθ(s, a) − Q
∗ (cid:107)2 +λDK L ,
min
θ
(6)
(7)
(8)
t +1 =N
where Q∗ is the target Q-value, λ ∈ R parameterizes the contribu-
tion of KL item. To formulate the relationship between min L and
θj, we make some de(cid:128)nitions of notations in advance. Considering
that there is N grids in total, ni
t +1 represents the number of idle
vehicles in grid i at time step t + 1, which can be formulated as
t · πj→i, where c
represents the idle driver number
j
ni
t
at last time step t, πj→i represents the probability of dispatching
orders which from grid j to grid i to idle vehicles at time t, and these
vehicles will arrive at grid i at time t +1. q
t +1 is the rate of idle vehi-
j
cles in grid j which can be formulated into q
t +1.
t +1 represents the rate of orders in grid i at time t + 1 here. Using
pi
t +1/N
j
t +1 = n
k =1 nk
j=1 c
j
j
i =1
i =1
pi
t +1
pi
i =1
=
=
=
log
k =1
log
πj→k c j
t
1
qi
t +1
t +1∇πj
pi
i =1
t +1∇πj
pi
(cid:17) · ∇θi πj
chain rule, we can decompose the gradient of DKL to θ as
∇θj DKL = ∇πj DK L · ∇θj πj
log qi
t +1
pi
t +1
· ∇θj πj
= −(cid:16) N
N
(cid:104)∇πj
N
N
N
N
(cid:104) ∇πj
N
N
k =1N
(cid:104)
N
N
k =1N
(cid:104)
N
where Nvehicle =N
(cid:105) · ∇θj πj
N
N
(cid:105) · ∇θj πj
N
(cid:105) · ∇θj πj
t − ∇πj
t)
l (cid:44)j cl
l =1 πl→k cl
t
1
l =1 πl→k cl
t
− 1
(9)
ni
t +1
t +1. (cid:140)e gradient of πj to θj is ∇Qj(s,a)πj(a
j
s) · ∇θ Q(s, a). We use the δ =(cid:107) Q − Q∗ (cid:107)2, then the (cid:128)nal gradient
of Lθ(s, a) to θ is calculated as
N
(cid:105) · ∇θj πj ,
l =1
k =1 πj→k(c j
+N
k =1 πj→k c j
t
k =1 πj→k c j
t
k =1 πj→k c j
t
k =1
∇πj
(10)
For convenience, we give a summary for some important nota-
∇θj L = ∇θj δ + λ∇θj DKL .
i =1
i =1
= c j
t
= c j
t
pi
t +1
pi
t +1
1
Nvehicle
−
1
j=1 n
πl→k cl
t
−
log
tions in Table 1.
Table 1: Important notations
N
ni
t +1
j
c
t
πj→i
j
q
t +1
pi
t +1
the number of grids
the number of idle vehicles in grid i at time t + 1
the number of idle vehicles in grid j at time t
the probability of dispatching orders which from grid
j to grid i to idle vehicle at time t
the rate of idle vehicles in grid j
the rate of orders in grid i at time t + 1
4 EXPERIMENTS
We examine the correctness of our model in a toy grid-based order-
dispatching environment and the practicality of our model using
real-world data from three cities. Considering the constraint of a
grid-based environment, we did not compare with order-dispatching
algorithms based on coordinate systems. To compare with existing
methods, and investigate the e(cid:130)ectiveness of our method on the
metrics of ORR and ADI, we select three typical algorithms as base-
lines, namely, Independent Deep Q-learning Network (IL), Nearest
order-dispatching (NOD) and MDP respectively, and we will give a
brief description at the (cid:128)rst.
• IL: A variant of Double DQN [33] which takes a tuple of
state and action as an input. Compared with our method,
the only di(cid:130)erence in IL is that KL optimization is not used.
• NOD: Nearest-distance Order Dispatching (NOD) algo-
rithm, which dispatches orders to idle vehicles with consid-
ering the shortest distance. (cid:140)e reason why we use NOD
as one of the baselines is that it is a fairly representative
algorithm which is used frequently and easy to implement
in practice. However, in our environment se(cid:138)ing, because
there are reasonable regional division strategies (for ex-
ample, in our later real-world data experiments, the size
of the division area guarantees the maximum order wait-
ing time is 10 minute), we have no need to distinguish
the speci(cid:128)c position of vehicles in the same dispatching
region. (cid:140)at is to say, the principle of matching orders
based on distance is equivalent to random matching in our
environment se(cid:138)ing.
• MDP: Proposed by Xu et al. [37], a planning and learning
method based on decentralized multi-agent deep reinforce-
ment learning and centralized combinatorial optimization.
Considering the fairness of experiments, we use the same reward
function for the reinforcement learning methods.
4.1 Model Settings
Our model is an extension of Double DQN with so(cid:137) update. All
neural-based models used in our experiments are implemented by
the MLP with 2 hidden layers, and the active function used here
for all neural-based algorithm is recti(cid:128)ed linear unit (ReLU). (cid:140)e
replay bu(cid:130)er stores experience tuples, which can be formulated into
(cid:104)st , at , At , st +1, At +1, ∇π DKL(cid:105). Elements of the tuple represent
the state of time t, action selected at time t, the action set at time
t, state at time t + 1, action set at time t + 1 and the (cid:128)rst gradient
item of ∇θ DKL, respectively. (cid:140)e temperature is 1.0, discount factor
γ = 0.95 and learning rate is α = 10−4.
4.2 Particle Order-dispatching Experiment
(cid:140)e grid-based order-dispatching environment showed in Figure 4
is implemented based on the multi-agent particle environment sup-
ported by Mordatch et al. [21]. (cid:140)is toy environment abstracts
the real-world order-dispatching, where one grid represents one
dispatching region, and orders have the same duration. (cid:140)e blue
particles and the red particles represent vehicles and orders respec-
tively. All of the blue particles and red particles sca(cid:138)er in a 10 × 10
grid world. Each of the red particles owns a direction vector v and
a reward r, the direction vector v = (cid:104)#source, #tar❕et(cid:105) denotes a di-
rection from the source grid to the target grid. In this environment,
the order price is simpli(cid:128)ed with Euler distance between grids, so
reward r is proportional to the Euler distance between #source and
#tar❕et, i.e.,
r = 0.1× (cid:107) #source − #tar❕et (cid:107)2 .
(11)
(cid:140)e blue particles will get reward by picking red particles in
the same grid, one blue particle can only pick one red particle at
each time-step. Blue particles will migrate to the target grids given
by the red particles at the next timestep. In our se(cid:138)ings, the time
horizon is T = 144. At t = 0, we produce the reds and blues using
speci(cid:128)c distributions respectively. At the next timesteps from t = 1
to t = T − 1, there are some new red particles born with a speci(cid:128)c
distribution with respect to the grid position and time, while there
is no new blue particles born expect t = 0, that means all blue
particle movements fully dependent on picking red particles. In
order to match the real world situation, the amount of blues is less
than the reds in our se(cid:138)ings.
(a)
(b)
Figure 4: (cid:135)e toy order-dispatching environment.
(a) (cid:135)e
10x10 toy order-dispatching environment. Red particles and
blue particles represent orders and vehicles. (b) (cid:135)e migrate
process of blue particles, where the dotted arrow indicates
that the red one is dispatched to the blue one, the solid ar-
row indicates that the blue one will migrate to another grid
at the next timestep. For the red particles in each grid, the
surrounding 8 grids are feasible destinations.
4.2.1
Influence of KL Divergence. In order to verify the feasibil-
ity of KL-divergence optimization, we adopt three cases correspond
to di(cid:130)erent degree of order distribution changes. (cid:140)e degree of
order distribution changes means the margin between two adjacent
order distributions. In the particle order-dispatching environment,
we generate orders with a given 2-dimensional Gaussian distribu-
tion N(µt , σt) at each timestep. To quantify and explicitly compare
the margin between order distributions at di(cid:130)erent timesteps, we
can change µt at each timestep. (cid:140)e degree of order distribution
changes is equivalent to the distance between adjacent order distri-
butions. Farther distance means a higher degree, that is, the greater
the degree of changes. In our experiment se(cid:138)ings, the degree of
changes from low to high orders correspond to a distance of 1, 2, 4
grids respectively, Figure 5 shows an example of order distribution
changes, the distance between µt and µt +1 is 8 grid. Since the desti-
nations of orders are random, if we want to let vehicles serve more
orders at the next timestep, we need to let the algorithm learns to
pick suitable orders at current decision stage to assign the vehicles
to suitable grids, so that we can ensure that there is a be(cid:138)er ORR at
next timestep. Intuitively, a long-term higher ORR corresponds to
a higher long-term ADI. Table 2 shows the performance at metrics
of ORR and ADI at di(cid:130)erent degree of order distribution changes.
Influence of λ. λ plays an important role in our method,
so it is necessary to investigate how it a(cid:130)ects the performance at
di(cid:130)erent degree of order distribution changes. In our experiments,
the value of λ ranges from 0.0 to 0.6 with stepping 0.05. When
λ = 0.0, it means our method is equivalent to IL. Figure 6 shows
curves at di(cid:130)erent degree of order distribution changes.
4.2.2
4.2.3 Result Analysis. We train 300 episodes for all algorithms
in the three cases which are related to di(cid:130)erent degrees of KL-
divergence. We compare the three baselines from metrics of ADI
and ORR. As shown in Table 2, it shows the average experimen-
tal results of 5 groups with di(cid:130)erent random seeds. (cid:140)e particle
Table 2: Performance comparison in terms of ADI and ORR with respect to NOD. We compare against with baselines in
three di(cid:130)erent order distribution changes degree, namely, low, medium and high. KL-Based is our proposed method, which
outperforms all baselines on all metrics.
Order Distribution Divergence
Metrics
IL
MDP
KL-Based
Low
Medium
High
ADI
ORR
ADI
ADI
+11.5%
+6.68% +2.32%
+12.5%
+14.5%
+13.3% +6.69% +7.28% +3.42%
+25.12% +13.40% +20.94% +7.89% +13.47% +4.61%
ORR
+6.94%
+8.94%
ORR
+6.3%
Table 3: Performance comparison in terms of ADI and ORR
with respect to NOD. We compare against baselines using dif-
ferent datasets from three cities. KL-Based is our proposed
method, which outperforms all baselines on all metrics.
City
Metrics
City A
City B
City C
ADI
ORR
ORR
ADI
+4.69% +1.68% +2.96% +1.11% +4.72% +2.05%
+5.80% +1.89% +3.69% +2.63% +5.98% +2.14%
KL-Based +6.46% +3.07% +4.94% +3.30% +6.12% +3.01%
IL
MDP
ORR
ADI
(a)
(c)
(b)
(d)
Figure 5: Order distribution changes. From (a) to (d), the or-
der distribution of four consecutive timesteps in the 10 × 10
grid world is shown. (cid:135)e distance of µt and µt +1 is 8 grids.
order-dispatching environment generates orders with random desti-
nations, that is, the probabilities of long and short orders appear are
equivalent in a grid. Although choosing long orders means higher
ADI, the degree of order distribution changes we set requires the
algorithm to choose more non-longest orders, thus ensuring both
higher ORR and long-term ADI. In the three di(cid:130)erent degrees of
order distribution changes, our KL-based outperforms all baselines
on all metrics. It means our method can be(cid:138)er counterweight the
margin of order distribution.
Figure 6 shows the learning curve of λ at di(cid:130)erent degree of
order distribution changes. In the three cases of order dispatching
changes, our method achieves highest ORR at λ = 0.05, λ = 0.45,
λ = 0.5 respectively. (cid:140)e results in Figure 6 also show that higher
ORR o(cid:137)en corresponds to higher ADI. In practice, if there is a low
degree of order distribution changes, in order to achieve a higher
ORR, the algorithm needs to pick shorter orders, so that in the
future, agents in the closer regions can still serve more orders,
namely, higher ORR. When it comes to a high degree of order
distribution changes, the dispatching algorithm needs to perform
more greedy to achieve a higher ORR, that is, it prefers to pick
longer orders. Also, the result of Figure 6c shows our algorithm
achieves be(cid:138)er performance on ORR and ADI than IL in the case of
a high degree of order distribution changes. (cid:140)erefore, combined
with the results of Table. 2 and Figure 6, our method can (cid:131)exibly
choose long or short orders.
4.3 Real World Data Experiments
4.3.1 Dispatching Simulator. Since our model is implemented
on the se(cid:138)ing of dividing the city into many order dispatching
regions, so we conduct experiments on an open source grid-based
environment simulator provided by Didi Chuxing [16]. (cid:140)e simula-
tor divides the city into N hexagonal grids which depends on the
size of the city. At each time t, the simulator provides a set of idle
vehicles and a set of available orders. Each order is featured with
its origin, destination, and duration, and vehicles in the same re-
gion share the same state. (cid:140)e travel distance between neighboring
regions is approximately 2.2km and the time interval is 10min.
4.3.2 Data Description. (cid:140)e real-world datasets provided by
Didi Chuxing include order and trajectories of vehicles informa-
tion of three cities in one month. (cid:140)e order information includes
price, origin, destination, and duration. (cid:140)e trajectories contain
the positions (latitude and longitude) and status (on-line, o(cid:130)-line,
on-service). We divide the three cities into 182, 126, 112 hexagonal
grids respectively.
Result Analysis. We compare our model with three baselines
a(cid:137)er 300 episodes training. As shown in Table 3, it lists the average
results of 5 groups experiments with di(cid:130)erent random seeds. (cid:140)e
real datasets contain more changes in the order distribution. From
the results, our method can still be(cid:138)er discover the changes of
order distribution and improve the ORR and ADI via order-vehicle
distribution matching.
5 DEPLOYMENT
Taking both model se(cid:138)ing in this paper and online platforms of
Didi Chuxing, we design a hybrid system and incorporate with
other components including routing planning technique [32] and
estimating time of arrival (ETA) [34] as illustrated in Figure 7.
02468100246810Heatmap(µ=(1,0))51015202502468100246810Heatmap(µ=(9,0))51015202502468100246810Heatmap(µ=(9,8))51015202502468100246810Heatmap(µ=(1,8))510152025(a) (cid:107) µt − µt +1 (cid:107)2= 1
(b) (cid:107) µt − µt +1 (cid:107)2= 2
(c) (cid:107) µt − µt +1 (cid:107)2= 4
Figure 6: ORR and ADI performance under di(cid:130)erent λ settings. (cid:135)e horizontal axis represents di(cid:130)erent λ, the le(cid:133) and right
vertical axis represent ORR and ADI respectively.
As aforementioned mentioned in Section 3, there are several
assumptions prevent this model from deploying in real-world set-
tings: (i) vehicles in the same grid share the same se(cid:138)ing, and
this isomorphic se(cid:138)ing ignores the intra-grid information; (ii) this
paper adopts the grid-world map to simplify the real-world envi-
ronment which replace coordinate position information with grid
information. To address these issues, we adapt estimate travel time
techniques proposed in and incorporate with our action selection Q-
learning mentioned in Section 3.3. For example, the duration time
of each order in our model is regarded as one of the already known
order features. However, in the real-world scenario, each order's
travel time obtained via the ETA model is dynamic and depends
on current tra(cid:129)c and route conditions. Since coordinate position
information is taken into consideration in the ETA model, this hy-
brid system is able to deal with the assumption (ii) and feasible to
be deployed in real-world.
We extend the Matching System and the Routing System a(cid:137)er
obtaining Q-value via the hybrid system as illustrated in Figure. 7.
Speci(cid:128)cally, in each time slot, the goal of the real-time order dis-
patch algorithm is to determine the best matching between vehicles
and orders (see Figure 1) in the matching system and plan a routine
for drivers to serve the orders. Formally, the principle of Matching
System can be formulated as:
where
(cid:40)1,
0,
aij =
if order j is assigned to driver i
if order i is not assigned to driver i
where i ∈ [1, 2, ..., m] and j ∈ [1, 2, ..., n] present all idle drivers and
available orders at each time step respectively. Q(i, j) is the output
from hybrid system and represents the action-value function driver
i performing an action of serving order j. Note that constraints in
Eq. (13) guarantee that each driver will select one available real
m
n
i =0
j=0
argmaxai j
Q(i, j)aij ,
s.t .
m
n
i =0
j=0
aij = 1, j = 1, 2, 3..., n
aij = 1, i = 1, 2, 3..., m
(12)
(13)
orders or doing nothing while each order will be assigned to one
driver or stay unserved at each time step.
(cid:140)is Matching System used in Xu et al. [37] and Wang et al.
[35] is implemented using Kuhn-Munkres (KM) algorithm [22].
In detail, they formulated Eq. (12) as a bipartite graph matching
problem where drivers and orders are presented as two set of nodes.
(cid:140)en, each edge between order i and driver j is valued with Q(i, j),
and the best matches will be (cid:128)ned using KM algorithm. Di(cid:130)erent
from them, since we implemented our method based on assumption
(i), that is, there is no di(cid:130)erence in the drivers in a same grid. So the
KM algorithm will degenerate into a sorting algorithm here. We
just need to select the top m orders with the highest Q(i, j) values.
Figure 7: Illustration of deployment. (cid:135)e hybrid system con-
sists of two modules, namely, Action Selection Q-learning
(ASQ) and Estimate Travel time modules. (cid:135)e ASQ will inter-
act with simulator periodically, and it will be trained o(cid:130)line
in the simulator. Matching System accepts value estimation
and outputs (cid:104)vehicle, order(cid:105) matches to Routing System.
Once the matching pairs of orders and vehicles has been selected
from the matching system, we then deliver these pairs with co-
ordinate information to the routing system. (cid:140)e routing system
equipped with route planning techniques [32] allows drivers to
serve the order. (cid:140)is process will give feedback, i.e. reward to the
hybrid system and help the whole system training to achieve be(cid:138)er
performance.
6 CONCLUSIONS
In this paper, we proposed a multi-agent reinforcement learning
method for order-dispatching via matching the distribution of or-
ders and vehicles. Results on the three cases in the simulated
0.00.10.20.30.40.50.60.2060.2080.2100.2120.2140.2160.2180.220ORRADI4.354.404.454.504.554.600.00.10.20.30.40.50.60.2480.2500.2520.2540.2560.258ORRADI5.605.655.705.755.805.850.00.10.20.30.40.50.60.2700.2750.2800.2850.290ORRADI6.006.056.106.156.206.256.306.356.40Data: (2,4)Action Selection Q-learningEstimate Travel timeHybrid SystemMatchingSystemRoutingSystemSimulatorOfflineData: (2,4)Q-valueorder-dispatching environment have demonstrated that our pro-
posed method achieves both higher ADI and ORR than the three
baselines, including one independent MARL method, one planning
algorithm, and one rule-based algorithm, in various tra(cid:129)c environ-
ments. (cid:140)e experiments on real-world datasets also show that our
model can obtain higher ADI and ORR. Furthermore, our proposed
method is a centralized training method and can be executed de-
centralized. In addition, we designed the deployment system of the
model with the support of the existing platform of Didi Chuxing. In
future work, we plan to deploy the model to do online tests through
the designed deployment system.
ACKNOWLEDGMENTS
We thank the support of National Natural Science Foundation of
China (61702327, 61772333, 61632017).
[8]
[6]
[7]
REFERENCES
[1] Aamena Alshamsi, Sherief Abdallah, and Iyad Rahwan. 2009. Multiagent self-
organization for a taxi dispatch system. In 8th international conference on au-
tonomous agents and multiagent systems. 21 -- 28.
[2] Darse Billings, Denis Papp, Jonathan Schae(cid:130)er, and Duane Szafron. 1998. Oppo-
nent modeling in poker. Aaai/iaai 493 (1998), 499.
[3] Lucian Busoniu, Robert Babuska, and Bart De Schu(cid:138)er. 2006. Multi-agent rein-
forcement learning: A survey. In Control, Automation, Robotics and Vision, 2006.
ICARCV'06. 9th International Conference on. IEEE, 1 -- 6.
[4] Stephen C Chadwick and Charles Baron. 2015. Context-aware distributive taxi
cab dispatching. (March 19 2015). US Patent App. 14/125,549.
[5] Lee Chean Chung. 2005. GPS taxi dispatch system based on A* shortest path
algorithm. Ph.D. Dissertation. Master's thesis, Submi(cid:138)ed to the Department of
Transportation and Logistics at Malausia University of Science and Technology
(MUST) in partial ful(cid:128)llment of the requirements for the degree of Master of
Science in Transportation and Logistics.
Jakob Foerster, Ioannis Alexandros Assael, Nando de Freitas, and Shimon White-
son. 2016. Learning to communicate with deep multi-agent reinforcement learn-
ing. In Advances in Neural Information Processing Systems. 2137 -- 2145.
Jakob N Foerster, Yannis M Assael, Nando de Freitas, and Shimon Whiteson.
2016. Learning to communicate to solve riddles with deep distributed recurrent
q-networks. arXiv preprint arXiv:1602.02672 (2016).
Jayesh K Gupta, Maxim Egorov, and Mykel Kochenderfer. 2017. Cooperative
multi-agent control using deep reinforcement learning. In International Confer-
ence on Autonomous Agents and Multiagent Systems. Springer, 66 -- 83.
[9] Ma(cid:138)hew John Hausknecht. 2016. Cooperation and communication in multiagent
deep reinforcement learning. Ph.D. Dissertation.
Junling Hu, Michael P Wellman, et al. 1998. Multiagent reinforcement learning:
[10]
theoretical framework and an algorithm.. In ICML, Vol. 98. Citeseer, 242 -- 250.
[11] Der-Horng Lee, Hao Wang, Ruey Cheu, and Siew Teo. 2004. Taxi dispatch
system based on current demands and real-time tra(cid:129)c conditions. Transportation
Research Record: Journal of the Transportation Research Board 1882 (2004), 193 --
200.
[12] Bin Li, Daqing Zhang, Lin Sun, Chao Chen, Shijian Li, Guande Qi, and Qiang
Yang. 2011. Hunting or waiting? Discovering passenger-(cid:128)nding strategies from a
large-scale real-world taxi dataset. In Pervasive Computing and Communications
Workshops (PERCOM Workshops), 2011 IEEE International Conference on. IEEE,
63 -- 68.
[13] Minne Li, Yan Jiao, Yaodong Yang, Zhichen Gong, Jun Wang, Chenxi Wang,
Guobin Wu, Jieping Ye, et al. 2019. E(cid:129)cient Ridesharing Order Dispatching with
Mean Field Multi-Agent Reinforcement Learning. arXiv preprint arXiv:1901.11454
(2019).
[14] Ziqi Liao. 2001. Taxi dispatching via global positioning systems. IEEE Transactions
[15] Ziqi Liao. 2003. Real-time taxi dispatching using global positioning systems.
on Engineering Management 48, 3 (2001), 342 -- 347.
Commun. ACM 46, 5 (2003), 81 -- 83.
[16] Kaixiang Lin, Renyu Zhao, Zhe Xu, and Jiayu Zhou. 2018. E(cid:129)cient Large-Scale
Fleet Management via Multi-Agent Deep Reinforcement Learning. arXiv preprint
arXiv:1802.06444 (2018).
[17] Ryan Lowe, Yi Wu, Aviv Tamar, Jean Harb, OpenAI Pieter Abbeel, and Igor
Mordatch. 2017. Multi-agent actor-critic for mixed cooperative-competitive
environments. In Advances in Neural Information Processing Systems. 6379 -- 6390.
[18] Gary S Lynch. 2009. Single point of failure: (cid:138)e 10 essential laws of supply chain
risk management. John Wiley & Sons.
[19] Fei Miao, Shuo Han, Shan Lin, John A Stankovic, Desheng Zhang, Sirajum Munir,
Hua Huang, Tian He, and George J Pappas. 2016. Taxi dispatch with real-time
sensing data in metropolitan areas: A receding horizon control approach. IEEE
Transactions on Automation Science and Engineering 13, 2 (2016), 463 -- 478.
[20] Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Andrei A Rusu, Joel Veness,
Marc G Bellemare, Alex Graves, Martin Riedmiller, Andreas K Fidjeland, Georg
Ostrovski, et al. 2015. Human-level control through deep reinforcement learning.
Nature 518, 7540 (2015), 529.
Igor Mordatch and Pieter Abbeel. 2017. Emergence of Grounded Compositional
Language in Multi-Agent Populations. arXiv preprint arXiv:1703.04908 (2017).
James Munkres. 1957. Algorithms for the assignment and transportation prob-
lems. Journal of the society for industrial and applied mathematics 5, 1 (1957),
32 -- 38.
[23] David Myr. 2013. Automatic optimal taxicab mobile location based dispatching
[22]
[21]
system. (May 14 2013). US Patent 8,442,848.
[24] Takuma Oda and Yulia Tachibana. 2018. Distributed Fleet Control with Maximum
Entropy Deep Reinforcement Learning. (2018).
[25] Christos H Papadimitriou and Kenneth Steiglitz. 1998. Combinatorial optimiza-
[26] Frederik Schadd, Sander Bakkes, and Pieter Spronck. 2007. Opponent Modeling
tion: algorithms and complexity. Courier Corporation.
in Real-Time Strategy Games.. In GAMEON. 61 -- 70.
[27] Kiam Tian Seow, Nam Hai Dang, and Der-Horng Lee. 2010. A collaborative
multiagent taxi-dispatch system. IEEE Transactions on Automation Science and
Engineering 7, 3 (2010), 607 -- 616.
[28] Lloyd S Shapley. 1953. Stochastic games. Proceedings of the national academy of
sciences 39, 10 (1953), 1095 -- 1100.
[29] Ma(cid:138)hijs TJ Spaan. 2012. Partially observable Markov decision processes. In
Reinforcement Learning. Springer, 387 -- 414.
[30] Sainbayar Sukhbaatar, Rob Fergus, et al. 2016. Learning multiagent communica-
tion with backpropagation. In Advances in Neural Information Processing Systems.
2244 -- 2252.
[31] Gerald Tesauro. 2004. Extending Q-learning to general adaptive multi-agent
systems. In Advances in neural information processing systems. 871 -- 878.
[32] Yongxin Tong, Yuxiang Zeng, Zimu Zhou, Lei Chen, Jieping Ye, and Ke Xu. 2018.
A uni(cid:128)ed approach to route planning for shared mobility. Proceedings of the
VLDB Endowment 11, 11 (2018), 1633 -- 1646.
[33] Hado Van Hasselt, Arthur Guez, and David Silver. 2016. Deep Reinforcement
Learning with Double Q-Learning.. In AAAI, Vol. 2. Phoenix, AZ, 5.
[34] Zheng Wang, Kun Fu, and Jieping Ye. 2018. Learning to estimate the travel time.
In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge
Discovery & Data Mining. ACM, 858 -- 866.
[35] Zhaodong Wang, Zhiwei Qin, Xiaocheng Tang, Jieping Ye, and Hongtu Zhu.
2018. Deep Reinforcement Learning with Knowledge Transfer for Online Rides
Order Dispatching. In 2018 IEEE International Conference on Data Mining (ICDM).
IEEE, 617 -- 626.
[36] Chong Wei, Yinhu Wang, Xuedong Yan, and Chunfu Shao. 2018. Look-Ahead
Insertion Policy for a Shared-Taxi System Based on Reinforcement Learning.
IEEE Access 6 (2018), 5716 -- 5726.
[37] Zhe Xu, Zhixin Li, Qingwen Guan, Dingshui Zhang, Qiang Li, Junxiao Nan,
Chunyang Liu, Wei Bian, and Jieping Ye. 2018. Large-Scale Order Dispatch in
On-Demand Ride-Hailing Platforms: A Learning and Planning Approach. In
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge
Discovery & Data Mining. ACM, 905 -- 913.
[38] Yaodong Yang, Rui Luo, Minne Li, Ming Zhou, Weinan Zhang, and Jun
Wang. 2018. Mean Field Multi-Agent Reinforcement Learning. arXiv preprint
arXiv:1802.05438 (2018).
[39] Lingyu Zhang, Tao Hu, Yue Min, Guobin Wu, Junying Zhang, Pengcheng Feng,
Pinghua Gong, and Jieping Ye. 2017. A taxi order dispatch model based on
combinatorial optimization. In Proceedings of the 23rd ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining. ACM, 2151 -- 2159.
[40] Lianmin Zheng, Jiacheng Yang, Han Cai, Weinan Zhang, Jun Wang, and Yong Yu.
2017. MAgent: A Many-Agent Reinforcement Learning Platform for Arti(cid:128)cial
Collective Intelligence. NIPS Demo (2017).
|
1603.05208 | 3 | 1603 | 2017-06-08T16:47:14 | Safe Sequential Path Planning Under Disturbances and Imperfect Information | [
"cs.MA",
"eess.SY"
] | Multi-UAV systems are safety-critical, and guarantees must be made to ensure no unsafe configurations occur. Hamilton-Jacobi (HJ) reachability is ideal for analyzing such safety-critical systems; however, its direct application is limited to small-scale systems of no more than two vehicles due to an exponentially-scaling computational complexity. Previously, the sequential path planning (SPP) method, which assigns strict priorities to vehicles, was proposed; SPP allows multi-vehicle path planning to be done with a linearly-scaling computational complexity. However, the previous formulation assumed that there are no disturbances, and that every vehicle has perfect knowledge of higher-priority vehicles' positions. In this paper, we make SPP more practical by providing three different methods to account for disturbances in dynamics and imperfect knowledge of higher-priority vehicles' states. Each method has different assumptions about information sharing. We demonstrate our proposed methods in simulations. | cs.MA | cs | Safe Sequential Path Planning Under Disturbances and Imperfect Information
Somil Bansal*, Mo Chen*, Jaime F. Fisac, and Claire J. Tomlin
7
1
0
2
n
u
J
8
]
A
M
.
s
c
[
3
v
8
0
2
5
0
.
3
0
6
1
:
v
i
X
r
a
Abstract- Multi-UAV systems are safety-critical, and guar-
antees must be made to ensure no unsafe configurations occur.
Hamilton-Jacobi (HJ) reachability is ideal for analyzing such
safety-critical systems; however, its direct application is limited
to small-scale systems of no more than two vehicles due to an
exponentially-scaling computational complexity. Previously, the
sequential path planning (SPP) method, which assigns strict
priorities to vehicles, was proposed; SPP allows multi-vehicle
path planning to be done with a linearly-scaling computational
complexity. However, the previous formulation assumed that
there are no disturbances, and that every vehicle has perfect
knowledge of higher-priority vehicles' positions. In this paper,
we make SPP more practical by providing three different
methods to account for disturbances in dynamics and imperfect
knowledge of higher-priority vehicles' states. Each method has
different assumptions about information sharing. We demon-
strate our proposed methods in simulations.
I. INTRODUCTION
Recently, there has been an immense surge of interest in
using unmanned aerial systems (UASs) for civil purposes
[1]–[4]. Many of these applications will involve unmanned
aerial vehicles (UAVs) flying in urban environments. As a
result, government agencies such as the Federal Aviation
Administration (FAA) and National Aeronautics and Space
Administration (NASA) of the United States are trying to
develop new scalable ways to organize an air space in which
potentially thousands of UAVs can fly together [5], [6].
One essential problem that needs to be addressed is how
a group of vehicles in the same vicinity can reach their
destinations while avoiding collision with each other. In some
previous studies that address this problem, specific control
strategies for the vehicles are assumed, and approaches such
as induced velocity obstacles have been used [7]–[9]. Other
researchers have used ideas involving virtual potential fields
to maintain collision avoidance while maintaining a specific
formation [10], [11]. Although interesting results emerge
from these studies, simultaneous trajectory planning and
collision avoidance were not considered.
Trajectory planning and collision avoidance problems in
safety-critical systems have been studied using Hamilton-
Jacobi (HJ) reachability analysis, which provides guarantees
on the success and safety of optimal system trajectories [12]–
[16]. In this context, one computes the reachable set, defined
as the set of states from which the system can be driven
to a target set. HJ reachability has been successfully used
This work has been supported in part by NSF under CPS:ActionWebs
(CNS-931843), by ONR under the HUNT (N0014-08-0696) and SMARTS
(N00014-09-1-1051) MURIs and by grant N00014-12-1-0609, by AFOSR
under the CHASE MURI (FA9550-10-1-0567). The research of J. F. Fisac
has received funding from the "la Caixa" Foundation.
* Both authors contributed equally to this work. All authors are with the
Department of Electrical Engineering and Computer Sciences, University of
California, Berkeley. {somil, mochen72, jfisac, tomlin}@eecs.berkeley.edu
in applications involving systems with no more than two
vehicles [13], [17]–[19]. However, HJ reachability cannot be
directly applied to systems involving multiple vehicles due
to its exponentially scaling computational complexity.
To overcome this problem, [20] presents sequential path
planning (SPP),
in which vehicles are assigned a strict
priority ordering. In SPP, higher-priority vehicles ignore
the lower-priority vehicles, which must take into account
the presence of higher-priority vehicles by treating them
as induced time-varying obstacles. Under this structure,
computation complexity scales just linearly with the number
of vehicles. In addition, a structure like this has the potential
to flexibly divide up the airspace for the use of many UAVs;
this is an important task in NASA's concept of operations
for UAS traffic management [6].
The formulation in [20], however, ignores disturbances and
assumes perfect information about other vehicles' trajecto-
ries. In presence of disturbances, a vehicle's state trajectory
evolution cannot be precisely known a priori; thus, it is
impossible to commit to exact trajectories as required in
[20]. In such a scenario, a lower-priority vehicle needs to
account for all possible states that the higher-priority vehicles
could be in. To do this, the lower-priority vehicle needs to
have some knowledge about the control policy used by each
higher-priority vehicle. The main contribution of this paper
is to take advantage of the computation benefits of the SPP
scheme while resolving some of its practical challenges. In
particular, we achieve the following:
• incorporate disturbances into the vehicle models,
• analyze three different assumptions on information to
which lower-priority vehicles may have access,
• for each information pattern, propose a reachability-
based method to compute the induced obstacles and the
reachable sets that guarantee collision avoidance as well
as successful transit to the destination.
II. PROBLEM FORMULATION
Consider N vehicles, denoted Qi, i = 1, . . . , n, whose
dynamics are described by the ordinary differential equation
t ≤ tSTA
i = 1, . . . , N
i
xi = fi(t, xi, ui, di),
ui ∈ Ui, di ∈ Di,
(1)
where xi ∈ Rni, ui denote the state and control of ith vehicle
Qi respectively, and di denotes the disturbance experienced
by Qi. In general,
the physical meaning of xi and the
dynamics fi depend on the specific dynamic model of Qi,
and need not be the same across the different vehicles. tSTA
in (1) denotes the scheduled time of arrival of Qi.
For convenience, we will use the sets Ui, Di to denote
the set of functions from which the control and disturbance
i
functions ui(·), di(·) can be drawn. Let pi ∈ Rp denote the
position of Qi. Denote the rest of the states hi, so that xi =
(pi, hi). The initial state of Qi is given by xi0. Under the
worst case disturbance, each vehicle aims to get to some set
of target states, denoted Ti ⊂ Rni, by some scheduled time
. On its way to Ti, each vehicle must avoid
of arrival tSTA
the danger zones Aij(t) of all other vehicles j (cid:54)= i for all
time. In general, the danger zone can be defined to capture
any undesirable configurations between Qi and Qj. In this
paper, we define Aij(t) as
i
Aij(t) = {xi ∈ Rni : (cid:107)pi − pj(t)(cid:107)2 ≤ Rc}
(2)
ferential game of dimension (cid:80)
the interpretation of which is that a vehicle is in another
vehicle's danger zone if the two vehicles are within a
Euclidean distance of Rc apart.
The problem of driving each of the vehicles in (1) into
their respective target sets Ti would be in general a dif-
i ni. However, due to the
exponential scaling of the complexity with the problem
dimension, an optimal solution is computationally intractable
even for N > 2, with ni as small as 3.
In this paper, we assume that vehicles have assigned
priorities as in the SPP method [20]. Since the analysis in
[20] did not take into account the presence of disturbances di
and limited information available to each vehicle, we extend
the work in [20] to answer the following:
1) How can each vehicle guarantee that it will reach its
target set without getting into any danger zones, despite
the disturbances it and other vehicles experience?
2) How should each vehicle robustly handle situations
with limited information about the state, control policy,
and intention of other vehicles?
III. BACKGROUND
This section provides a brief summary of [20], in which
the SPP scheme is proposed under perfect information and
absence of disturbances. Here, the dynamics of Qi becomes
where the difference compared to (1) is that the disturbance
di is no longer a part of the dynamics.
In order to make the N-vehicle path planning problem
safe and tractable, a reasonable structure is imposed to the
problem: the vehicles are assigned a strict priority ordering.
When planning its trajectory to its target, a higher-priority
vehicle can disregard the presence of a lower-priority vehicle.
In contrast, a lower-priority vehicle must take into account
the presence of all higher-priority vehicles, and plan its
trajectory in a way that avoids the higher-priority vehicles'
danger zones. For convenience and without lost of generality,
let Qi be the vehicle with the ith highest priority.
Under the above convention, each vehicle Qi must take
time-varying obstacles induced by vehicles
into account
Qj, j < i, denoted Oj
i (t) and represent the set of states
that could possibly be in the danger zone of Qj. Optimal
xi = fi(t, xi, ui),
ui ∈ Ui,
i = 1, . . . , N
t ≤ tSTA
i
max
(3)
safe path planning of each lower-priority vehicle Qi then
consists of determining the optimal path that allows Qi to
reach its target Ti while avoiding the time-varying obstacles
Gi(t), defined by
i−1(cid:91)
j=1
Gi(t) =
Oj
i (t)
(4)
Such an optimal path planning problem can be solved by
computing a backward reachable set (BRS) Vi(t) from a
target set Ti using formulations of HJ variational inequalities
(VI) such as [12], [14], [16], [21]. For example, to compute
BRSs under the presence of time-varying obstacles,
the
authors in [21] augment system with the time variable, and
then applied reachability theory for time-invariant systems.
To avoid increasing the problem dimension and save compu-
tation time, for the simulations of this paper we utilize the
formulation in [16], which does not require augmentation of
the state space with the time variable.
Starting from the highest-priority vehicle Q1, one com-
putes the BRS V1(t), from which the optimal control and
trajectory x1(·) to T1 can be obtained. Under the absence
of disturbances and perfect information, obstacles induced
by a higher-priority vehicle Qj, starting with j = 1, for a
lower-priority vehicle Qi is simply the danger zone centered
around the position pj(·) of each point on the trajectory:
i (t) = {xi : (cid:107)pi − pj(t)(cid:107) ≤ Rc}
Oj
(5)
Given Oj
i (t), j < i, and continuing with i = 2, the optimal
safe trajectories for each vehicle Qi can be computed. All
of the trajectories are optimal in the sense that given the
requirement that Qi must arrive at Ti by time tSTA
, the
i (·) that
and the optimal control u∗
latest departure time tLDT
guarantees arrival by tSTA
can be obtained.
To compute Vi(t) using the method in [16], we solve the
following HJ VI for t ≤ tSTA
(cid:110)
min(cid:8)DtVi(t, xi) + Hi (t, xi, DxiVi) ,
(cid:111)
li(xi) − Vi(t, xi)(cid:9),−gi(t, xi) − Vi(t, xi)
, xi) = max(cid:8)li(xi),−gi(0, xi)(cid:9)
= 0
(6)
:
Vi(tSTA
i
i
i
i
i
Hi (t, xi, λ) = min
ui∈Ui
λ · fi(t, xi, ui)
(7)
where λ is the gradient of the value function, DxiVi, and
li(xi), gi(t, xi), Vi(t, xi) are implicit surface functions rep-
resenting the target Ti, the time-varying obstacles Gi(t), and
the backward reachable set Vi(t), respectively:
xi ∈ Ti ⇔ li(xi) ≤ 0
xi(t) ∈ Gi(t) ⇔ gi(t, xi) ≤ 0
xi(t) ∈ Vi(t) ⇔ Vi(t, xi) ≤ 0
The optimal control is given by
u∗
i (t, xi) = arg min
ui∈Ui
λ · fi(t, xi, ui)
(8)
(9)
IV. DISTURBANCES AND INCOMPLETE INFORMATION
Disturbances and incomplete information significantly
complicate the SPP scheme. The main difference is that the
vehicle dynamics satisfy (1) as opposed to (3). Committing
to exact trajectories is therefore no longer possible, since
the disturbance di(·) is a priori unknown. Thus, the induced
obstacles Oj
i (t) are no longer just the danger zones centered
around positions. We present three methods to address the
above issues. The methods differ in terms of control policy
information that is known to a lower-priority vehicle about a
higher-priority vehicle, and have their relative advantages and
disadvantages depending on the situation. The three methods
are as follows:
• Centralized control: A specific control strategy is en-
forced upon a vehicle; this can be achieved, for example,
by some central agent such as an air traffic controller.
• Least restrictive control: A vehicle is required to arrive
at its targets on time, but has no other restrictions.
• Robust trajectory tracking: A vehicle declares a nom-
inal trajectory which can be robustly tracked.
In general, the above methods can be used in combination
in a single path planning problem, with each vehicle inde-
pendently having different control policies. Lower-priority
vehicles would then plan their paths while taking into ac-
count the control policy information known for each higher-
priority vehicle. For clarity, we will present each method as
if all vehicles are using the same method of path planning.
For simplicity of explanation, we assume that no static
obstacles exist. If static obstacles do exist, the time-varying
obstacles Gi(t) simply become the union of the induced
obstacles Oj
A. Method 1: Centralized Control
i (t) in (4) and the static obstacles.
The highest-priority vehicle Q1 first plans its path by
computing the BRS (with i = 1)
Vi(t) = {xi : ∃ui(·) ∈ Ui,∀di(·) ∈ Di, xi(·) satisfies (1),
∀s ∈ [t, tSTA
], xi(s) /∈ Gi(s),∃s ∈ [t, tSTA
], xi(s) ∈ Ti}
(10)
Since we have assumed no static obstacles exist, we have
that for Q1,G1(s) = ∅ ∀s ≤ tSTA
, and thus the above BRS
is well-defined. This BRS can be computed by solving the
HJ VI (6) with the following Hamiltonian:
i
i
i
Hi (t, xi, λ) = min
ui∈Ui
max
di∈Di
λ · fi(t, xi, ui, di)
(11)
where li(xi), gi(t, xi), Vi(t, xi) are implicit surface functions
representing the target Ti,Gi(t),Vi(t), respectively. From the
BRS, we can obtain the optimal control
u∗
i (t, xi) = arg min
ui∈Ui
max
di∈Di
λ · fi(t, xi, ui, di)
(12)
i
departure time tLDT
Here, as well as in the other two methods, the latest
is then given by arg supt xi0 ∈ Vi(t).
If there is a centralized controller directly controlling each
of the N vehicles, then the control law of each vehicle
can be enforced. In this case, lower-priority vehicles can
safely assume that higher-priority vehicles are applying the
enforced control law. In particular, the optimal controller for
i (t, xi) can be enforced. In this case,
getting to the target, u∗
the dynamics of each vehicle becomes
i (t, xi, di) = fi(t, xi, u∗
xi = f∗
di ∈ Di,
i = 1, . . . , N,
i (t, xi), di)
, tSTA
t ∈ [tLDT
i
i
(13)
]
where ui no longer appears explicitly in the dynamics.
From the perspective of a lower-priority vehicle Qi, a
higher-priority vehicle Qj, j < i induces a time-varying
obstacle that represents the positions that could possibly
be within the capture radius Rc of Qj under the dynamics
f∗
j (t, xj, dj). Determining this obstacle involves computing a
forward reachable set (FRS) of Qj starting from xj(tLDT
) =
xj0. The FRS Wj(t) is defined as follows:
j
Wj(t) = {y ∈ Rnj : ∃dj(·) ∈ Dj,
xj(·) satisfies (13), xj(tLDT
The FRS can be computed using the following HJ VI:
, tSTA
DtWj(t, xj) + Hj
]
j
(cid:0)t, xj, Dxj Wj
) = xj0, xj(t) = y}
(cid:1) = 0, t ∈ [tLDT
j
j
(14)
j
, xj) = ¯lj(xj)
Wj(tLDT
Hj (t, xj, λ) = max
dj∈Dj
λ · f∗
j (t, xj, dj)
j
(15)
where ¯l is chosen to be1 such that ¯l(y) = 0 ⇔ y = xj(tLDT
).
The FRS Wj(t) represents the set of possible states at
time t of a higher-priority vehicle Qj given all possible
disturbances dj(·) and given that Qj uses the feedback
controller u∗
j (t, xj). In order for a lower-priority vehicle Qi
to guarantee that it does not go within a distance of Rc to
Qj, Qi must stay a distance of at least Rc away from the set
Wj(t) for all possible values of the non-position states hj.
This gives the obstacle induced by a higher-priority vehicle
Qj for a lower-priority vehicle Qi as follows:
Oj
i (t) = {xi : dist(pi,Pj(t)) ≤ Rc}
(16)
where the dist(·,·) function represents the minimum distance
from a point to a set, and the set Pj(t) is the set of states in
the FRS Wj(t) projected onto the states representing position
pj, and disregarding the non-position dimensions hj:
Pj(t) = {pj : ∃hj, (pj, hj) ∈ Wj(t)}.
(17)
Finally, taking the union of the induced obstacles Oj
i (t)
as in (4) gives us the time-varying obstacles Gi(t) needed to
define and determine the BRS Vi(t) in (10). Repeating this
process, all vehicles will be able to plan paths that guarantee
the vehicles' timely and safe arrival.
B. Method 2: Least Restrictive Control
Here, we again begin with the highest-priority vehicle
Q1 planning its path by computing the BRS Vi(t) in (10).
However, if there is no centralized controller to enforce the
control policy for higher-priority vehicles, weaker assump-
tions must be made by the lower-priority vehicles to ensure
collision avoidance. One reasonable assumption that a lower-
priority vehicle can make is that all higher-priority vehicles
1In practice, we define the target set to be a small region around the
vehicle's initial state for computational reasons.
follow the least restrictive control that would take them to
their targets. This control would be given by
j (t, xj) given by (12)} if xj(t) ∈ ∂Vj(t),
uj(t, xj) ∈
(cid:40){u∗
Uj otherwise
(18)
Such a controller allows each vehicle to use any controller,
except when it is on the boundary of the BRS, ∂Vj(t), in
which case u∗
j (t, xj) given by (12) must be used to get to
the target safely and on time. This assumption is the weakest
one that could be made by lower-priority vehicles given that
the higher-priority vehicles will get to their targets on time.
Suppose a lower-priority vehicle Qi assumes that higher-
priority vehicles Qj, j < i use the least restrictive control
strategy in (18). From the perspective of Qi, a higher-priority
vehicle Qj could be in any state that is reachable from Qj's
) = xj0 and from which the target Tj can
initial state xj(tLDT
be reached. Mathematically, this is defined by the intersection
of a FRS from the initial state xj(tLDT) = xj0 and the BRS
defined in (10) from the target set Tj, Vj(t) ∩ Wj(t). In
this situation, since Qj cannot be assumed to be using any
particular feedback control, Wj(t) is defined as
j
Wj(t) = {y ∈ Rnj : ∃uj(·) ∈ Uj,∃dj(·) ∈ Dj,
) = xj0, xj(t) = y}
xj(·) satisfies (1), xj(tLDT
j
(19)
This FRS can be computed by solving (15) without
λ · fj(t, xj, uj, dj)
(20)
obstacles, and with
Hj (t, xj, λ) = max
uj∈Uj
max
dj∈Dj
In turn, the obstacle induced by a higher-priority Qj for
a lower-priority vehicle Qi is as follows:
Oj
i (t) = {xi : dist(pi,Pj(t)) ≤ Rc}, with
Pj(t) = {pj : ∃hj, (pj, hj) ∈ Vj(t) ∩ Wj(t)}
(21)
C. Method 3: Robust Trajectory Tracking
Although it is impossible to commit to and track an exact
trajectory in the presence of disturbances, it may still be
possible to robustly track a nominal trajectory with a bounded
error at all times. If this can be done, then the tracking error
bound can be used to determine the induced obstacles. Here,
computation is done in two phases: the planning phase and
the disturbance rejection phase. In the planning phase, we
compute a nominal trajectory xr,j(·) that is feasible in the
absence of disturbances. In the disturbance rejection phase,
we compute a bound on the tracking error.
In the planning phase, planning is done for a reduced
control set U p ⊂ U, as some margin is needed to reject
unexpected disturbances while tracking the nominal trajec-
tory. In the disturbance rejection phase, we determine the
error bound independently of the nominal trajectory. Let
xj and xr,j denote the states of the actual vehicle Qj and
an arbitrary nominal trajectory, respectively, and define the
tracking error ej = xj − xr,j. When the error dynamics are
independent of the absolute state as in (22) (and also (7) in
[13]), we can obtain error dynamics of the form
To obtain bounds on the tracking error, we first conser-
vatively estimate the error bound around any reference state
xr,j, denoted Ej = {ej : (cid:107)pej(cid:107)2 ≤ REB}, where pej denotes
the position coordinates of ej and REB is a design parameter.
We next solve a reachability problem with its complement
E c
j , the set of tracking errors violating the error bound, as
the target in the space of the error dynamics. From E c
j , we
compute the following BRS:
VEB
j (t, 0) = {y : ∀uj(·) ∈ Uj,∃ur,j(·) ∈ Up
ej(·) satisfies (22), ej(t) = y,∃s ∈ [t, 0], ej(s) ∈ E c
j},
where the Hamiltonian to compute the BRS is given by:
λ · fej (ej, uj, ur,j, dj).
HEB
j ,∃dj(·) ∈ Di,
(23)
j (t, 0)(cid:1)c.
:= limt→−∞(cid:0)VEB
(24)
Letting t → −∞, we obtain the infinite-horizon control-
invariant set Ωj
is
nonempty, then the tracking error ej at flight time is guaran-
teed to remain within Ωj ⊆ Ej provided that the vehicle starts
inside Ωj and subsequently applies the feedback control law
λ · fej (ej, uj, ur,j, dj).
(25)
The induced obstacles by each higher-priority vehicle Qj
κj(ej) = arg max
uj∈Uj
min
j ,dj∈Dj
ur,j∈U p
If Ωj
j (ej, λ) = max
uj∈Uj
min
j ,dj∈Dj
ur,j∈U p
can thus be obtained by:
Oj
i (t) = {xi : ∃y ∈ Pj(t),(cid:107)pi − y(cid:107)2 ≤ Rc}
Pj(t) = {pj : ∃hj, (pj, hj) ∈ Ωj + xr,j(t)},
where the "+" in (26) denotes the Minkowski sum.
(26)
Since each vehicle Qj, j < i, can only be guaranteed to
stay within Ωj, we must make sure during the path planning
of Qi that at any given time, the error bounds of Qi and Qj,
Ωi and Ωj, do not intersect. This can be done by augmenting
the total obstacle set by Ωi:
Gi(t) = Gi(t) + Ωi.
(27)
Finally, given Ωi, we can guarantee that Qi will reach its
target Ti if Ωi ⊆ Ti; thus, in the path planning phase, we
modify Ti to be Ti := {xi : Ωi + xi ⊆ Ti}, and compute a
BRS, with the control authority U p
i , that contains the initial
state of the vehicle. Mathematically,
i , xi(·) satisfies (3),
) ={y : ∃ui(·) ∈ Up
Vrtt
i (t, tSTA
i
∀s ∈ [t, tSTA
∃s ∈ [t, tSTA
i
], xi(s) /∈ Gi(s),
], xi(s) ∈ Ti, xi(t) = y}
i
(28)
i
i (t, tSTA
The Hamiltonian to compute Vrtt
) and the optimal
control for reaching Ti are given by (7) and (9) respectively.
The nominal trajectory xr,i(·) can thus be obtained by using
i (·). From
vehicle dynamics (3), with the optimal control urtt
the resulting nominal trajectory xr,i(·), the overall control
policy to reach Ti can be obtained via (25).
V. NUMERICAL SIMULATIONS
ej = fej (ej, uj, ur,j, dj),
uj ∈ Uj, ur,j ∈ U p
j , dj ∈ Dj,
t ≤ 0
(22)
We demonstrate our proposed methods using a four-
vehicle example. Each vehicle has the following model:
px,i = vi cos θi + dx,i
py,i = vi sin θi + dy,i
θi = ωi + dθ,i
v ≤ vi ≤ ¯v,ωi ≤ ¯ω
(cid:107)(dx,i, dy,i)(cid:107)2 ≤ dr,dθ,i ≤ ¯dθ
where pi = (px,i, py,i), θi, d = (dx,i, dy,i, dθ,i) respectively
represent Qi's position, heading, and disturbances in the
three states. The control of Qi is ui = (vi, ωi), where vi is
the speed of Qi and ωi is the turn rate; both controls have a
lower and upper bound. For illustration purposes, we choose
v = 0.5, ¯v = 1, ¯ω = 1; however, our method can easily
handle the case in which these inputs differ across vehicles
and cases in which each vehicle has a different dynamic
model. The disturbance bounds are chosen as dr = 0.1, ¯dθ =
0.2, which correspond to a 10% uncertainty in the dynamics.
The initial states of the vehicles are given as follows:
1 = (−0.5, 0, 0),
x0
3 = (−0.6, 0.6, 7π/4) ,
x0
(29)
Each of the vehicles has a target set Ti that is circular in
their position pi centered at ci = (cx,i, cy,i) with radius r:
(30)
x0
2 = (0.5, 0, π),
x0
4 = (0.6, 0.6, 5π/4) .
Ti = {xi ∈ R3 : (cid:107)pi − ci(cid:107) ≤ r}
(a)
(b)
(c)
(d)
Fig. 1: Initial configuration and simulated trajectories of the
vehicles for the three proposed methods.
i
i
i
For the example shown, we chose c1 = (0.7, 0.2), c2 =
(−0.7, 0.2), c3 = (0.7,−0.7), c4 = (−0.7,−0.7) and r =
0.1. The setup of the example is shown in Fig. 1a.
Using the SPP algorithms presented, we obtain tLDT
, i =
= 0. Note that even though tSTA
1, 2, 3, 4 assuming tSTA
is assumed to be same for all vehicles in this example for
simplicity, our method can easily handle the case in which
tSTA
i
is different for each vehicle.
For each proposed method of computing induced obsta-
cles, we show the vehicles' entire trajectories (colored dotted
lines), and overlay their positions (colored asterisks) and
headings (arrows) at a point in time in which they are in
relatively dense configuration. In all cases, the vehicles are
able to avoid each other's danger zones (colored dashed
circles) while getting to their target sets in minimum time.
In addition, we show the evolution of the BRS over time for
Q3 (green boundaries) as well as the obstacles induced by
the higher-priority vehicles (black boundaries).
Fig. 2: Evolution of the BRS and the obstacles induced by
Q1 and Q2 for Q3 in the centralized control method.
Fig. 1b shows simulated trajectories in the situation where
each vehicle uses u∗
i (t, xi) in (12). In this case, vehicles ap-
pear to deviate slightly from a straight line trajectory towards
their targets, just enough to avoid higher-priority vehicles.
The deviation is small since the centralized controller is quite
restrictive, making the possible positions of higher-priority
vehicles cover a small area. In the dense configuration at
t = −1.0, the vehicles are close to each other but still outside
each other's danger zones.
Fig. 2 shows the evolution of the BRS for Q3 (green
boundary), as well as the obstacles (black boundary) induced
by the higher-priority vehicles. The size of the obstacles re-
mains relatively small. tLDT
numbers for the four vehicles (in
order) in this case are −1.35,−1.37,−1.94 and −2.04. They
are relatively close for the vehicles, because the obstacles
generated by higher-priority vehicles are small and hence do
not affect tLDT of the lower-priority vehicles significantly.
A. Least Restrictive Control
i
Fig. 1c shows the simulated trajectories in the situation
where each vehicle assumes that higher-priority vehicles use
the least restrictive control to reach their targets, as described
in IV-B. Fig. 3 shows the BRS and induced obstacles for Q3.
Q1 (red) takes a relatively straight path to reach its target.
From the perspective of all other vehicles, large obstacles
are induced, since lower-priority vehicles make the weak
assumption that higher-priority vehicles are using the least
restrictive control. Because the obstacles induced are so
large, it is optimal for lower-priority vehicles to wait until
higher-priority vehicles pass. As a result, a dense configura-
tion is never formed, and trajectories are relatively straight.
values for vehicles are −1.35,−1.97,−2.66 and
The tLDT
−3.39. Compared to the centralized control method, tLDT
's
decrease significantly except for Q1, which need not account
for any moving obstacles.
From Q3's (green) perspective, the large obstacles induced
by Q1 and Q2 are shown in Fig. 3 as the black boundaries. As
the BRS (green boundary) evolves over time, its growth gets
inhibited by the large obstacles for a long time, as evident
i
i
-0.500.5-0.500.5t = -0.34-0.500.5-0.500.5t = -1.04Initial pos. and headingObstacleBRSTargets-0.500.5-0.500.5t = -1.94-0.500.5-0.500.5Initial setupVehicle 1Vehicle 2Vehicle 3Vehicle 4-0.500.5-0.500.5Centralized control-0.500.5-0.500.5Least restrictive control-0.500.5-0.500.5Robust trajectory trackingTargetsPositions, HeadingsDanger ZonesTrajectories-0.500.5-0.500.5Initial setupVehicle 1Vehicle 2Vehicle 3Vehicle 4-0.500.5-0.500.5Centralized control-0.500.5-0.500.5Least restrictive control-0.500.5-0.500.5Robust trajectory trackingTargetsPositions, HeadingsDanger ZonesTrajectories-0.500.5-0.500.5Initial setupVehicle 1Vehicle 2Vehicle 3Vehicle 4-0.500.5-0.500.5Centralized control-0.500.5-0.500.5Least restrictive control-0.500.5-0.500.5Robust trajectory trackingTargetsPositions, HeadingsDanger ZonesTrajectories-0.500.5-0.500.5Initial setupVehicle 1Vehicle 2Vehicle 3Vehicle 4-0.500.5-0.500.5Centralized control-0.500.5-0.500.5Least restrictive control-0.500.5-0.500.5Robust trajectory trackingTargetsPositions, HeadingsDanger ZonesTrajectories-0.500.5-0.500.5Initial setupVehicle 1Vehicle 2Vehicle 3Vehicle 4-0.500.5-0.500.5Centralized control-0.500.5-0.500.5Least restrictive control-0.500.5-0.500.5Robust trajectory trackingPositions, HeadingsDanger ZonesTargetsTrajectoriesat t = −0.89. Eventually, the boundary of the BRS reaches
the initial state of Q3 at t = tLDT
3 = −2.66.
made. In all of the methods, all vehicles are guaranteed
to successfully reach their respective destinations without
entering each other's danger zones despite the worst-case
disturbance the vehicles could experience.
REFERENCES
Fig. 3: Evolution of the BRS for Q3 in the least restrictive
control method. tLDT
is significantly lower than that in the
centralized control method (−1.94 vs. −2.66).
B. Robust Trajectory Tracking
3
In the planning phase, we reduced the maximum turn rate
of the vehicles from 1 to 0.6, and the speed range from
[0.5, 1] to exactly 0.75 (constant speed). With these reduced
control authorities, we determined from the disturbance
rejection phase that any nominal trajectory from the planning
phase can be robustly tracked within a distance of 0.075.
Fig. 1d shows vehicle trajectories in the situation where
each vehicle robustly tracks a nominal trajectory. Fig. 4
shows the BRS evolution and induced obstacles for Q3.
Fig. 4: Evolution of the BRS for Q3 in the robust trajectory
tracking method. Note that a smaller target set is used to
ensure target reaching for any allowed tracking error.
i
In this case, the tLDT
values for the four vehicles are
−1.61,−3.16,−3.57 and −2.47 respectively. In this method,
vehicles use reduced control authority for path planning
towards a reduced-size effective target set. As a result,
higher-priority vehicles tend to have lower tLDT compared
to the other two methods, as evident from tLDT
. Because of
this "sacrifice" made by the higher-priority vehicles during
the path planning phase, the tLDT's of lower-priority vehicles
may increase compared to those in the other methods, as
evident from tLDT
will
change for a vehicle compared to the other methods, as the
conservative path planning increases tLDT
for higher-priority
vehicles and decreases tLDT
for lower-priority vehicles.
is unclear how tLDT
. Overall,
it
1
4
i
i
i
VI. CONCLUSIONS
We have proposed three different methods to account
for disturbances and imperfect control policy information
in sequential path planning;
these three methods can be
used independently across the different vehicles in the path
planning problem. In each method, different assumptions
about
the control strategy of higher-priority vehicles are
[1] W. M. Debusk, "Unmanned aerial vehicle systems for disaster relief:
Tornado alley," in Infotech@Aerospace Conferences, 2010.
[2] Amazon.com, Inc. (2016) Amazon prime air. [Online]. Available:
http://www.amazon.com/b?node=8037720011
[3] AUVSI News. (2016) UAS aid in south carolina tornado investigation.
[Online]. Available: http://www.auvsi.org/blogs/auvsi-news/2016/01/
29/tornado
[4] BBC
Technology.
service for 2017.
technology-34704868
(2016) Google
delivery
[Online]. Available: http://www.bbc.com/news/
drone
plans
[5] Jointed Planning and Development Office (JPDO), "Unmanned aircraft
systems (UAS) comprehensive plan – a report on the nation's UAS
path forward," Federal Aviation Administration, Tech. Rep., 2013.
[6] P. Kopardekar, J. Rios, T. Prevot, M. Johnson, J. Jung, and J. E. R.
III, "UAS traffic management (UTM) concept of operations to safely
enable low altitude flight operations," in AIAA Aviation Technology,
Integration, and Operations Conference, 2016.
[7] P. Fiorini and Z. Shillert, "Motion planning in dynamic environments
using velocity obstacles," International Journal of Robotics Research,
vol. 17, pp. 760–772, 1998.
[8] G. C. Chasparis and J. S. Shamma, "Linear-programming-based multi-
vehicle path planning with adversaries," in Proceedings of American
Control Conference, June 2005.
[9] J. van den Berg, M. C. Lin, and D. Manocha, "Reciprocal velocity
obstacles for real-time multi-agent navigation," in IEEE International
Conference on Robotics and Automation, May 2008, pp. 1928–1935.
[10] R. Olfati-Saber and R. M. Murray, "Distributed cooperative control
of multiple vehicle formations using structural potential functions," in
IFAC World Congress, 2002.
[11] Y.-L. Chuang, Y. Huang, M. R. D'Orsogna, and A. L. Bertozzi, "Multi-
vehicle flocking: Scalability of cooperative control algorithms using
pairwise potentials," in IEEE International Conference onRobotics and
Automation, April 2007, pp. 2292–2299.
[12] E. N. Barron, "Differential Games with Maximum Cost," Nonlinear
analysis: Theory, methods & applications, pp. 971–989, 1990.
[13] I. Mitchell, A. Bayen, and C. Tomlin, "A time-dependent Hamilton-
Jacobi formulation of reachable sets for continuous dynamic games,"
IEEE Transactions on Automatic Control, vol. 50, no. 7, pp. 947–957,
July 2005.
[14] O. Bokanowski, N. Forcadel, and H. Zidani, "Reachability and mini-
mal times for state constrained nonlinear problems without any con-
trollability assumption," SIAM Journal on Control and Optimization,
pp. 1–24, 2010.
[15] K. Margellos and J. Lygeros, "Hamilton-Jacobi Formulation for
Reach-Avoid Differential Games," IEEE Transactions on Automatic
Control, vol. 56, no. 8, Aug 2011.
[16] J. F. Fisac, M. Chen, C. J. Tomlin, and S. S. Shankar, "Reach-avoid
problems with time-varying dynamics, targets and constraints," in
18th International Conference on Hybrid Systems: Computation and
Controls, 2015.
[17] J. Ding, J. Sprinkle, S. S. Sastry, and C. J. Tomlin, "Reachability
calculations for automated aerial refueling," in IEEE Conference on
Decision and Control, Cancun, Mexico, 2008.
[18] H. Huang, J. Ding, W. Zhang, and C. Tomlin, "A differential game
approach to planning in adversarial scenarios: A case study on
capture-the-flag," in Robotics and Automation (ICRA), 2011 IEEE
International Conference on, 2011, pp. 1451–1456.
[19] A. M. Bayen, I. M. Mitchell, M. Oishi, and C. J. Tomlin, "Aircraft
autolander safety analysis through optimal control-based reach set
computation," Journal of Guidance, Control, and Dynamics, vol. 30,
no. 1, 2007.
[20] M. Chen, J. Fisac, C. J. Tomlin, and S. Sastry, "Safe sequential path
planning of multi-vehicle systems via double-obstacle hamilton-jacobi-
isaacs variational inequality," in European Control Conference, 2015.
[21] O. Bokanowski and H. Zidani, "Minimal time problems with moving
targets and obstacles," {IFAC} Proceedings Volumes, vol. 44, no. 1,
pp. 2589 – 2593, 2011.
-0.500.5-0.500.5t = -0.39-0.500.5-0.500.5t = -0.89Initial pos. and headingObstacleBRSTargets-0.500.5-0.500.5t = -2.66-0.500.5-0.500.5t = -0.50-0.500.5-0.500.5t = -2.59Initial pos. and headingObstacleBRSTargets-0.500.5-0.500.5t = -3.57 |
1406.7487 | 3 | 1406 | 2015-03-22T21:37:41 | Coalition Formation and Combinatorial Auctions; Applications to Self-organization and Self-management in Utility Computing | [
"cs.MA",
"cs.GT"
] | In this paper we propose a two-stage protocol for resource management in a hierarchically organized cloud. The first stage exploits spatial locality for the formation of coalitions of supply agents; the second stage, a combinatorial auction, is based on a modified proxy-based clock algorithm and has two phases, a clock phase and a proxy phase. The clock phase supports price discovery; in the second phase a proxy conducts multiple rounds of a combinatorial auction for the package of services requested by each client. The protocol strikes a balance between low-cost services for cloud clients and a decent profit for the service providers. We also report the results of an empirical investigation of the combinatorial auction stage of the protocol. | cs.MA | cs |
Abstract
In this paper we propose a two-stage protocol for re-
source management in a hierarchically organized cloud.
The first stage exploits spatial locality for the formation
of coalitions of supply agents; the second stage, a com-
binatorial auction, is based on a modified proxy-based
clock algorithm and has two phases, a clock phase and a
proxy phase. The clock phase supports price discovery;
in the second phase a proxy conducts multiple rounds of
a combinatorial auction for the package of services re-
quested by each client. The protocol strikes a balance
between low-cost services for cloud clients and a decent
profit for the service providers. We also report the re-
sults of an empirical investigation of the combinatorial
auction stage of the protocol.
Coalition Formation and Combinatorial Auctions; Applications to
Self-organization and Self-management in Utility Computing
Dan C. Marinescu and Ashkan Paya
Computer Science Division
Department of Electrical Engineering and Computer Science
University of Central Florida, Orlando, FL 32816, USA
Email: [dcm, apaya]@cs.ucf.edu
John P. Morrison
Computer Science Department
University College Cork. Cork, Ireland
Email: [email protected]
May 22, 2021
Control theory tells us that accurate state informa-
tion and a tight feedback loop are the critical elements
for effective control of a system.
In a hierarchical or-
ganization the quality of state information degrades as
we move from the bottom to the top; only local infor-
mation about the state of a server is by definition accu-
rate. Moreover, this information is volatile, it must be
acted upon promptly because the state changes rapidly.
Our recent results [22] confirm that hierarchical control
has considerably larger overhead than a simple economic
model for cloud resource management. The communi-
cation complexity of hierarchical control based on moni-
toring is more than two orders of magnitude higher and
consumes a significant fraction of the available band-
width at all levels of the interconnection network.
Existing solutions for cloud resource management are
neither effective nor scalable and they require detailed
models of the system and accurate information about
the state of individual servers. The polices for cloud re-
source management must support: (i) admission control;
(ii) capacity allocation; (iii) load balancing; (iv) energy
optimization, and (v) quality of service (QoS) [21]. Some
of the existing and future challenges for cloud resource
management which affect these policies are:
-1. The cloud infrastructure is increasingly more hetero-
geneous; servers with different configurations of multi-
core processors, GPUs, FPGAs, and data flow engines
are expected to become elements of the cloud computing
landscape.
-2. The spectrum of cloud services and cloud applica-
tions widens. For example, AWS added new services,
including Elastic Cache, and Dynamo DB, offers several
types of EC2 (Elastic Cloud Computing) profiles includ-
ing C3 - compute optimized, R3 - memory optimized;
1 Introduction and Motivation
Nowadays large farms of computing and storage servers
are assembled to support several cloud delivery models
including Software as a Service (SaaS), Platform as a
Service (PaaS), and Infrastructure as a Service (IaaS).
In such systems users pay only for computing resources
they use, similarly to other utilities such as electricity
and water.
Computer clouds raise the question of how far we can
push the limits of composability of computing and com-
munication systems, while still being able to support
effective policies for resource management and their im-
plementation mechanisms. The software, the glue al-
lowing us to build increasingly more complex systems,
consists of more and more layers thus, the challenge of
controlling large-scale systems is amplified.
1
each instance type provides different sets of computer
resources measured by vCPUs (vCPU is a hyper-thread
of an Intel Xeon core for M3, C3, R3, HS1, G2, and I2).
This process is expected to continue at a faster pace to
accommodate the so-called Big Data applications.
-3. Cloud over-provisioning demands high initial costs
and leads to a low system utilization; this strategy is
not economically sustainable [10]. Elasticity allows cloud
users to increase or decrease their resource consumption
based on their needs; elasticity is now based on over-
provisioning, assembling pools of resources far larger
than required to satisfy the average needs. As a re-
sult the average cloud server utilization is in the 18% to
30% range [4, 5]. Power consumption of clouds based on
over-provisioning is excessive and has a negative ecolog-
ical impact [4, 26]. A 2010 survey [6] reports that idle
or under utilized servers contribute 11 million tonnes of
unnecessary CO2 emissions each year and that the total
yearly cost for the idle servers is $19 billion.
-4. The cloud computing landscape is fragmented. CSPs
support different cloud delivery models. and this leads
to the vendor lock-in; once becoming familiar and stor-
ing her data on one cloud it is very costly for the user
to migrate to another CSP.
In a large scale-system tensions between local and
global objectives exist. These tensions manifest them-
selves in questions such as: How to balance the individ-
ual cost of autonomous servers with global goals e.g.,
maximizing the CSP payoff? How to adapt the price
for services to the actual demand? How to find an
equilibrium between system reconfiguration and contin-
uous system availability? Moreover, cooperation must
reflect the particular characteristics of the physical or-
ganization. Locality is important; indeed, communica-
tion across multiple layers of the networking infrastruc-
ture is less desirable as the latency increases and the
bandwidth decreases. The hypothesis of our research
is that self-organization and self-management could ad-
dress these challenges and provide effective means for
cloud resource management.
Informally, self-organization means synergetic activ-
ities of elements when no single element acts as a co-
ordinator and the global patterns of behavior are dis-
tributed. Self-management means that individuals can
effectively set their own goals, make decisions on how
to achieve those goals, plan and schedule their activities
independently, and evaluate the progress towards these
goals. Self-management can lead to faster and more ac-
curate resource management decisions.
Self-management as a result of auctions eliminates the
need for a system model and requires only local thus,
more accurate information about the state of individ-
ual components. This approach has the potential of
optimizing the use of resources and allow Cloud Ser-
vice Providers (CSPs) to offer services at a lower cost
for the consumers [13, 19]. Though the virtues of self-
management have long been recognized, there is, to our
knowledge, no cloud computing infrastructure, based on
self-organizing principles and self-management. This is
in itself proof of the difficulties to apply these concepts
in practice.
Self-management has to be coupled with some mech-
anisms for coalition formation allowing autonomous
agents, the servers, to act in concert. Autonomous sys-
tems have to cooperate to guarantee QoS by distribut-
ing and balancing the workload, replicate services to
increase reliability, and implement other global system
policies. Cooperation means that individual systems
have to partially surrender their autonomy.
Self-organization cannot occur instantaneously in an
adaptive system. It is critical to give the autonomous
cloud platforms interconnected by a hierarchy of net-
works the time to form coalitions in response to ser-
vices requests thus, self-management requires an effec-
tive reservation system. Reservations are ubiquitous for
systems offering services to a large customer population,
e.g., airline ticketing, chains of hotels, and so on. Ex-
isting clouds, e.g., the Amazon Web Services, offer both
reservations and spot access, with spot access rates lower
than those for reservations.
The solution discussed in this paper involves concepts,
policies, and algorithms from several well-established ar-
eas of economics and computer science: self-organization
and self-management of complex systems; coalition for-
mation and virtual organizations; auction theory and
practice; and system organization and computer archi-
tecture. We discuss related work and our contributions
in Section 2 and in Section 3 we describe the system
model. Algorithms for the formation of sub-coalitions
and for clock-proxy auction are the subjects of Sections
4 and 5, respectively. The results of a simulation exper-
iment and the conclusions of our work are presented in
Sections 6 and 7.
2 Related Work
The present and future challenges outlined in Section
1 motivate the search for effective and scalable policies
and mechanisms for cloud resource management [7, 9,
18, 23, 25, 29, 36]. In this section we survey some of the
research in this area focused on market mechanisms.
Coalition formation.
Informally, a coalition is a
group of entities which have agreed to cooperate for
achieving a common goal. A virtual organization in-
volves entities that require a communication infrastruc-
ture and dedicated software to support their activities.
Coalition formation is a widely used method for increas-
ing the efficiency of resource utilization and for providing
convenient means to access these resources [24]. In re-
cent years, the emergence of large-scale electronic mar-
kets, grid and cloud computing, sensor networks, and
robotics have amplified the interest in coalition forma-
tion and virtual organizations [16, 17, 31]. For example,
2
self-organization of sensor networks through bottom-up
coalition formation is discussed in [20, 32].
Different aspects of resource management in compu-
tational grids including load balancing, job-allocation,
and scheduling, as well as revenue sharing when agents
form coalitions or virtual organizations are discussed in
[8, 14, 15, 27, 33, 35]. Grid resource allocation is mod-
eled as cooperative games [15] or non-cooperative games
[27]. Resource co-allocation is presented in [35].
There is little surprise that the interest in coalition
formation migrated in recent years from computational
grids to cloud resource management. The vast majority
of on-going research in this area is focused on game-
theoretic aspects of coalition formation for cloud federa-
tions. A cloud federation is of a set of CSPs collaborating
to provide services to a cloud user community.
A stochastic linear programing game model for coali-
tion formation is presented in [25]; the authors analyze
the stability of the coalition formation among cloud ser-
vice providers and show that resource and revenue shar-
ing are deeply intertwined. An optimal VM provisioning
algorithm ensuring profit maximization for CSPs is in-
troduced in [9].
A cloud federation formation described as a hedonic
game and focused on the stability and the fairness of the
game is discussed in [23]. The profit maximization for
each federation is formulated as an integer programming
problem (IP) and the game is augmented with a pref-
erence relation over the set of federations. The paper
assumes that the Virtual Machines (VMs) contributed
by each CSP to a federation are characterized by sev-
eral attributes, a ∈ A including the number of cores,
the amount of memory and of secondary storage. The
IP problem for CSP Ci in federation F is formulated as
j=1 ni,j(pj − ci,j) subject to the set of con-
j ni,j ≤ Ai, ∀a ∈ A and (cid:80)Ci∈F ni,j = rj
with: ni,j - the number of VMs of type j; pj - the price
for a VM running an instance of type j; ci,j - the cost of
an instance of type j provided by Ci; qa
j - the quantity
of resource of type a in a VM of type j; Ai - the total
amount of resource of type a offered by Ci; and rj - the
number of V M s of type j requested. The paper adopts
a payoff division based on the Banzhaf value [23].
max(cid:80)Ci∈F(cid:80)n
ditions (cid:80)n
j=1 qa
A combinatorial coalition formation problem is de-
scribed in [17]. The paper assumes that a seller has a
price schedule for each item. The larger the quantity re-
quested, the lower is the price a buyer has to pay for each
item; thus, buyers can take advantage of price discounts
by forming coalitions. A similar assumption is adopted
by the authors of [16] who investigate systems where
the negotiations among deliberate agents are not feasi-
ble due to the scale of the system. The paper proposes a
macroscopic model and derives a set of differential equa-
tions describing the evolution in time of coalitions with a
different number of participants. The results show that
even a low rate of leaving away participants allows a
coalition to achieve a steady state.
3
An algorithm to find optimal coalition structures in
cooperative games by searching through a lattice like
the one in Figure 2, was introduced by [30]. A more
refined algorithm is described in [28]; in this algorithm
the coalition structures are grouped according to the so-
called configurations reflecting the size of the coalitions.
Auctions. Auctions are a widely used mechanism for
resource allocation [11, 12]. Among the numerous appli-
cations of auctions are: the auctioning of airport take-
off and landing slots, spectrum licensing by the Federal
Communication Commission (FCC), and industrial pro-
curement. An online auction mechanism for resource
allocation in computer clouds is presented in [35].
A combinatorial auction is one where a buyer requires
simultaneous access to a package of goods. An auction
allows the seller to obtain the maximum feasible profit
for the auctioned goods; it is organized by an auctioneer
for every request of a consumer. A proxy is an inter-
mediary who collects individual bids from the buyers
participating at an auction, computes the total cost of
the package from the bids, and communicates this price
to the auctioneer. A vast literature including [1, 2, 3, 34]
covers multiple aspects of combinatorial auctions includ-
ing bidding incentives, stability, equilibrium, algorithm
testing, and algorithm optimality.
Package bidding assumes that a seller offers N differ-
ent types of items. A buyer bids for packages of items.
A package is a vector of integers Z = {z1, z2, . . . , zN}
which indicates the quantity of each item in the package;
the price of items is given by M = {m1, m2, . . . , mN}.
Package bidding can be traced back to generalized
Vickerey auctions based on the Vickerey-Clarke-Groves
mechanisms [11, 12]. In Vickerey auctions a bidder re-
ports its entire demand schedule. The auctioneer then
selects the allocation which maximizes the total value
of the package and requires a bidder to pay the lowest
bid it would have made to win its portion of the final
allocation, considering all other bids.
In an ascending package auction (APA) there are K
participants identified by an index, k = 0 is the seller
and k = 1, 2, . . . ,K are the buyers [1]. Each buyer has
a valuation vector vi = (νi(z), z ∈ [0,M]); νk(z) repre-
sents the value of package z to the bidder k. Some of
the rules for this type of auction are: all bids are firm,
a bid cannot be reduced or withdrawn; the auctioneer
identifies after each round the set of the bids that max-
imize the total price, the so-called provisional winning
bids. The auction ends when a new round fails to elicit
new bids; then the provisional winning bids become the
winers of the auction.
In an ascending package auction a bidder can be de-
terred from bidding for the package she really desires by
the threat that competitors could drive prices up; this
would threaten the equilibrium. This problem does not
exist in ascending proxy auctions when each bidder in-
structs a proxy agent to bid on her behalf [1]. The proxy
accepts as input the bidder's valuation profile and bids
following a "sincere strategy." Nash equilibrium can be
reached when the bid increments are negligibly small [1].
In a clock auction the auctioneer announces prices and
the bidders indicate the quantities they wish to buy at
the current price. When the demand for an item in-
creases, so does its price until the there is no excess de-
mand. On the other hand, when the offering exceeds the
demand, the price decreases [1]. In a clock auction the
bidding agents see only aggregate information, the price
at a given time, and this eliminates collusive strategies
and interactions among bidding agents. The auction is
monotonic, the amounts auctioned decrease continually
and this guarantees that the auction eventually termi-
nates. When the price of a package can be computed as
the sum of products of prices and quantities it is said
that auction benefits from linear pricing.
The clock-proxy-auction is a hybrid auction based on
an iterative process with two phases [3]. A clock phase
is followed by a proxy round. During the proxy round
the bidders report the values they have submitted to
the proxy which in turn submit bids for the package
to the auctioneer. A bidder has a single opportunity
to report the quantity and the price to the proxy, bid
withdrawals are not allowed, and the bids are mutually
exclusive. The auctioneer then selects the winning bids
that maximize the seller's profit.
The contribution of this paper. The reservation
system we propose has two stages; coalitions of servers
are formed periodically during the first and in the sec-
ond the coalitions participate in combinatorial auctions
organized in each allocation slot. To our knowledge this
is the first attempt to address cloud self-organization
and resource management based on coalition forma-
tion and combinatorial auctions when individual servers
learn from past behavior, see Figure 1.
Figure 1: A protocol with two stages; feedback about
past values of individual coalitions is used to determine
the value of individual coalition structures as shown in
Section 4.
We discuss coalition formation for a realistic model of
the cloud infrastructure, hierarchical organization, while
most of the research reported in the literature is focused
on coalition formation for cloud federations. The coali-
tion formation problem has different formulations and
different constraints in the two cases.
At this time individual CSPs believe that they have a
competitive advantage due to the unique value of their
services and are not motivated to disclose relevant infor-
4
mation about the inner working of their systems as we
have re-discovered when investigating the energy con-
sumption of AWS instances [26]. Thus, the practical
realization of cloud federations seems a rather remote
possibility [21].
A rare glimpse at the architecture of a cloud is pro-
vided in [5] and we are taking advantage of it to base
our research on a realistic model of the cloud infrastruc-
ture. We investigate coalition formation subject to the
physical constraints of the hierarchical cloud organiza-
tion model. As more diverse applications, including Big
Data applications, are likely to use computer clouds, the
demand for computing resources allocated to a single ap-
plication will increase and could be considerably larger
than any server can provide; only coalitions of servers
will be capable to offer such resources. It is critical for
the members of a coalition to communicate effectively;
this requires coalition member to be in close proximity
of each other in a system consisting of a hierarchy of net-
works with different bandwidth and latency. This adds
additional constrains to the coalition formation protocol.
To respond to the needs of increasingly more com-
plex applications consisting of multiple phases and re-
quiring workflow management, CSPs are already offer-
ing workflow management services such as SWS (Simple
Workflow Management) and EBS (Elastic Bean Stock)
at AWS. Different phases of an application may require
coalitions of servers with different types of resources and
this is the reason why we decided to investigate combina-
torial auctions where packages of items are auctioned.
3 System Model
System architecture. We assume a hierarchical orga-
nization of the cloud infrastructure similar to the one
described in [5]. A data center consists of multiple
warehouse-scale computers (WSCs), each WSC has mul-
tiple cells, each cell has multiple racks and each rack
houses multiple servers. A WSC connects 50, 000 to
100, 000 servers and uses a hierarchy of networks. The
servers are housed in racks; typically, the 48 servers in a
rack are connected by a 48 port Gigabit Ethernet switch.
The switch has two to eight up-links which go to higher
level switches in the network hierarchy [5]. The band-
width to communicate outside the rack is much smaller
than the one within the rack; this has important impli-
cations for resource management policies and becomes
increasingly difficult to address in systems with a large
number of servers.
Model assumptions. For simplicity we assume that
the racks are homogeneous, they have identical proces-
sors with the same number of cores and an identical con-
figuration of GPUs, FPGAs, workflow engines, or other
hardware, the same amount of main storage, cache, and
secondary storage. We also assume that all servers in
a rack are identically configured and support the same
type of services. The same service may be offered by
Coalition formationCombinatorial auctionsRequests for serviceCoalition values from previous auctionsSuccessful bidsmultiple racks; for example, multiple racks could offer
configurations with GPUs.
The system we envision supports a reservation system
and spot resource allocation. The reservation system has
two stages: (A) coalition formation, and (B) combina-
torial auctions. The spot allocation is done through a
bidding process for each type of service. The time is
quantified, reservations are made as a result of auctions
carried out at the beginning of each allocation slot of
duration τ ; for example, a allocation slot could be one
hour.
Coalition formation. The rational for coalition for-
mation is that applications may need resources beyond
those provided by an individual server. For example, a
Map-Reduce application may require a set of 20 servers
during the Map phase to process a data set of several
PB (Petabytes).
If the algorithm requires the servers
to communicate during this phase then the application
should start at the same time on all servers and run at
the same pace, a condition known as co-scheduling. Co-
scheduling is only feasible if the set of 20 servers form
a coalition dedicated to the application; moreover, the
hardware configuration of the coalition members should
be optimal for the algorithms used by the application,
e.g., have attached GPUs.
Combinatorial auctions. Combinatorial auctions
allow cloud users making the reservations to acquire
packages consisting of coalitions of servers with different
types and amounts of resources. Combinatorial auctions
are necessary because different phases of an application
may require systems with different configurations or sys-
tems supporting different functions. In our previous ex-
ample the Reduce phase of the Map-Reduce application
may require several servers with a very large amount of
secondary storage.
4 Coalition Formation
First, we discuss the formulation of the coalition for-
mation problem as a cooperative game. Then we intro-
duce the algorithms for determining the optimal coali-
tion structure and for coalition formation in the context
of our model.
Coalition formation as a cooperative game. The
coalition formation is modeled as a cooperative game
where the goal of all agents is to maximize the reward
due to the entire set of agents. We consider a set of N
servers {s1, s2, . . . , sN}, located in the same rack.
A coalition Ci is a non-empty subset of N . A coalition
structure is set of m coalitions S = {C1, C2, . . . , Cm}
satisfying the following conditions
Ci = N and i (cid:54)= j ⇒ Ci
(cid:92) Cj = ∅.
m(cid:91)
i=1
(1)
5
Figure 2 shows a lattice representation of the coali-
tion structures for a set of four servers s1, s2, s3 and s4.
This lattice has four levels, L1, L2, L3 and L4 contain-
ing the coalition structures with 1, 2, 3 and 4 coalitions,
respectively. In general, the level k of a lattice contains
all coalition structures with k coalitions; the number of
of coalitions structures at level k for a population of N
agents is given by the Sterling Number of Second Kind:
k(cid:88)
i=0
(cid:18)k
(cid:19)
i
S(N, k) =
1
k!
(−1)i
(k − i)N .
(2)
In the case illustrated in Figure 2 N = 4 and the number
of coalition structures at levels L1 − L4 are 1, 7, 6, 1,
respectively.1 The total number of coalition structures
with N agents is called the Bell number
N(cid:88)
k=0
N(cid:88)
k(cid:88)
1
k!
k=0
i=0
(cid:18)k
(cid:19)
i
B(N ) =
S(N, k) =
(−1)i
(k − i)N .
(3)
The number of coalitions structures increases exponen-
tially with the number of agents. For example, for N =
40, a typical number of servers in a rack, the logarithm
of the number of coalition structures is close to 1035 and
S(40, 14) = 3.5859872255621803491428554E + 34. The
logarithm of number of coalitions is close to E + 10.
Searching for the optimal coalition structure C is com-
putationally challenging due to the size of the search
space. The first step for determining the optimal coali-
tion structure is to assign a value v reflecting the utility
of each coalition. The second step is the actual coalition
formation.
Rack-level coalition formation. Recall from Sec-
tion 3 that in our model a rack is homogeneous, all
servers have an identical configuration. This realistic as-
sumption simplifies considerably the complexity of the
search for an optimal coalition structure as the servers
are indistinguishable from one another.
The second important observation is that we have
a system with two stages and feedback, see Figure 1.
In the second stage the coalitions created during the
first stage are included in successfully auctioned pack-
ages thus, we can determine precisely the value of all
coalitions structures. The third important observation
is that only available servers, servers with no commit-
ments for the current slot, can participate to coalition
formations and then to the auction organized in that
slot; call Na ≤ N the number of available servers.
An elected rack leader collects information about all
successful coalitions - coalitions that have been included
in packages auctioned successfully during a window of w
successive past allocation slots. The current rack-leader
records an entry for the corresponding partial coalition
1For N = 5 and N = 6 the Stirling Numbers of the Second
Kind are respectively 1, 15, 25, 10, 1 and 1, 31, 90, 65, 15, 1.
Figure 2: A lattice with four levels L1, L2, L3 and L4 shows the coalition structures for a set of 4 servers, s1, s2, s3
and s4. The number of coalitions in a coalition structure at level Lk is equal to k.
structure (PCS) including nk - the coalition size, mk -
the multiplicity of occurrence, the value ¯vk calculated as
the average price over all auctions when a PCS including
a coalition of size nk was part of a package successfully
auctioned during the past w allocation slots.
Call L the PCL-list. For a window of size w the list
L is the list of all triplets Lk = [nk, mk, ¯vk] ordered first
by 1 ≤ nk ≤ Na then by mk. The list includes only
entries Lk with ¯vk > 0. Given Na a coalition structure
(CS) Sk among the entries Lk1,Lk2, ... . . . ,Lkn is feasi-
j nk × mk = Na. Then the value of the coalition
j ¯vj. Note that we force the for-
mation of coalitions involving all available servers. An
example of a PCS list L follows
ble if(cid:80)
structure Sk is vk =(cid:80)
----------------------------------------------
a
b
\* 4 PCS of 1-server {s}
\ *15 PCS of 1-server {s}
[1,4,35]
[1,15,682]
.........
[2,3,78]
\* 3 PCS of 2-servers {s,s}
........
[3,2,502]
[3,4,812]
\* 2 PCS of 3-servers {s,s,s}
\* 4 PCS of 3-servers {s,s,s}
.........
[16,1,751] \* 1 PCS of 16-servers {s,...s}
[16,2,740] \* 2 PCS of 16-servers {s,...s}
c
d
e
f
g
.........
-----------------------------------------------
In this example some of the feasible coalitions struc-
tures when Na = 16 are: Sg with vg = 751; Sa,b with
va,b = 35 + 682 = 712; Sa,e with va,e = 35 + 812 = 837;
Sa,c,d with va,c,d = 35 + 78 + 502 = 615, and so on. Note
that the value of a coalition reflects also the length of
time the coalition was active in response to successful
auction. We see that a PCS of 15 coalitions of 1 server
6
have been active for larger number of slots than a PCS
of 4 coalitions of 1 server. The value attributed to a
coalition of k servers is a distributed equally among the
servers; the value of a package of several coalitions auc-
tioned successfully is divided among the coalitions based
on the resource supplied by each one of them.
Coalition formation. The protocol for coalition for-
mation proceeds as follows:
1. Server si sends to the current rack leader:
i , β1
i ], [ν2
i , β2
i , βN
i ], . . . ....[νN
(a) A vector ([ν1
i ]) with
i , 1 ≤ k ≤ N the total value due to the par-
νk
ticipation of si in successful coalitions, of k
servers and βk
i a bit vector with w components
with βk,j
i = 1 if si was included in a successful
coalition of k servers in slot j of window w.
(b) Availability, ai = 1 if available, 0 otherwise.
2. After receiving the information from all servers the
current rack leader:
(a) Determines Na =(cid:80)N
(b) Computes mk =(cid:80)Na
(c) Computes ¯vk =(cid:80) νk
i=1
i
(cid:80)w
i=1 ai.
j=1 βk,j
i
, 1 ≤ k ≤ N .
(d) Computes the optimal coalition structure.
(e) Assigns a server to coalition of size k a based
(f) Chooses the best performer as the next coali-
tion leader. The best performer is the one with
on the values νk
i .
the largest value(cid:80)
j νj
i .
Finding the optimal CS requires at most L operations
with L the size of the PCL-list. The system starts with a
predetermined coalition structure and coalition values.
{s1}{s2}{s3}{s4}{s1}{s2}{s3,s4}{s1}{s3}{s2,s4}{s1}{s4}{s2,s3}{s2}{s3}{s1,s4}{s2}{s4}{s1,s3}{s3}{s4}{s1,s2}{s1}{s2,s3,s4}{s2}{s1,s3,s4}{s3}{s1,s2,s4}{s4}{s1,s2,s3}{s1,s4}{s2,s3}{s1,s2}{s3,s4}{s1,s3}{s2,s4}{s1,s2,s3,s4}L4L3L2L15 A Reservation System Based on a
Combinatorial Auction Protocol
The protocol introduced in this section targets primar-
ily the IaaS cloud delivery model represented by Amazon
Web Services (AWS). Reservation systems are currently
used by CSPs. For example, AWS supports reserva-
tions as well as spot allocation and offers a limited num-
ber of instance families, including M3 (general purpose),
C3 (compute optimized), R3 (memory optimized), I2
(storage optimized), G2 (GPU) and so on. An in-
stance is a package of system resources; for example,
the c3.8xlarge instance provides 32 vCPU, 60 GiB of
memory, and 2× 320 GB of SSD storage. The resources
auctioned are supplied by coalitions of servers in differ-
ent racks and the cloud users request packages of re-
sources.
The combinatorial auction protocol is inspired by the
clock-proxy auction [3]. The clock-proxy auction has a
clock phase, where the price discovery takes place, and a
proxy phase, when bids for packages are entertained. In
the original clock-proxy auction there is one seller and
multiple buyers who bid for packages of goods.
For example, the airways spectrum in the US is auc-
tioned by the FCC and communication companies bid
for licenses. A package consist of multiple licenses; the
quantities in these auctions are the bandwidth allocated
times the population covered by the license.
Individ-
ual bidders choose to bid for packages during the proxy
phase and pay the prices they committed to during the
clock phase.
Our protocol supports auctioning service packages; a
packages consist of combinations of services in one or
more time slots. The items sold are services advertised
by coalitions of autonomous servers and the bidders are
the cloud users. Each service is characterized by
1. A type describing the resources offered and the con-
ditions for service,
2. The time slots when the service is available.
Protocol specification. The terms used to describe
the protocol are discussed next. An allocation slot (AS)
is a period of fixed duration, e.g., one hour, that can be
auctioned. An auction, At, is organized at time t if there
are pending reservation requests which require immedi-
ate attention. Figure 3 shows two consecutive auctions
at times t and s; during the first slot of auction At new
reservation requests are received and the allocation slot
1 for As.
2 is not fully covered; this slot becomes ASs
ASt
A service A is described by a relatively small number
of attributes, {a1, a2, . . . ,}. Each attribute ai can take a
number of distinct values, vi = {vi,1, vi,2, . . .}. The first
attribute is the coalition size or equivalently the number
of vCPS provided; other attributes could be the type of
service and server architecture with two values "32-bit"
and "64-bit;" another attribute could be "organization"
with values "vN" (von Neumann), "DF" (data-flow), or
"vN-GPU" (vN with graphics co-processor).
Call S t the set of services the clients want to reserve
during auction At
S t = {St
1, St
2, . . . , St
νt} with St
A reservation bundle, αt
requested by client i in slot j of auction At
i = [sId, (aj, vj,k)]
(4)
i,j ⊂ S t, is the set of services
i,j = {(St
αt
i,j,1, rt
i,j,1), (St
i,j,2, rt
i,j,2), . . .}
(5)
with rt
i,j,l a measure of the quantity; for example, if the
attribute is "service intensity" the quantity is the num-
ber of vCPUs.
k,j ⊂ S t, is the set of services
An advertised bundle, βt
advertised by coalition k in slot j of auction At
k,j = {(St
βt
k,j,1, qt
k,j,1, pt
k,1), (St
k,j,2, qt
k,j,2, pk,2) . . .}
(6)
with qt
k,j,l a measure of the quantity of service l and pk,l
the price per ECU of service St
l determined by coalition
k. A package, P t
is a set of reservations for services
requested by client i for slots j1, j2, . . . during auction
At.
i
P t
i = {αt
i,j1, αt
i,j2, . . .}
(7)
The clock phase. Figure 4 illustrates the basic idea
of a clock phase: the auctioneer announces prices and
the bidders indicate the quantities they wish to buy at
the current price. When the demand for an item in-
creases, so does its price until there is no excess demand;
on the other hand, when the offering exceeds the de-
mand, the price decreases.
During the clock phase of auction At the price discov-
ery is done for each time slot and for each type of service;
a clock runs for each one of the κt slots and for each one
of the νt services. Next we describe the clock phase for
service St
l in slot j. Assume that there are n coalitions
C = {C1, C2, . . . , Cn} offering the service and m requests
for reservations from clients D = {D1, D2, . . . , Dm}.
A clock auction starts at clock time t = 0 and at price
per unit of service for Sl
(8)
Call C0 the available capacity at this price and D0 the
demand for service St
p0
l = minCk
l in slot j
{pk,l}
n(cid:88)
k=1
C0 =
l offered at price p0
k,j,l and D0 =
qt
m(cid:88)
rt
i,j,l.
i=1
(9)
If C0 < D0 the clock c advances and the next price per
unit of service is
p1
l = p0
l + I
(10)
7
Figure 3: Auctions At and As conducted at times t and s, respectively. τ t
slots, ASt
0 are the start of the first allocation
1 of the two auctions. The number of slots auctioned in each case are κt and κs, respectively.
1 and ASs
0 and τ s
with I the price increment decided at the beginning of
auction. There is an ample discussion in the literature
regarding the size of the price increment; if too small,
the duration of the clock phase increases, if too large, it
introduces incentives for gaming [3].
The process is repeated at the next clock value start-
ing with the new price. The clock phase for service St
l
and slot j terminates when there is no more demand.
Figure 4: The clock phase for service St
l and slot j. The
starting price is p0
l given by Equation 8. The clock ad-
vances and the price increases from pc to pc + I when
the available capacity at that price given by Equation 9
is exhausted; the demand is given by Equation 9.
The proxy phase. In a traditional clock-proxy auc-
tion the bidders do not bid directly, they report to a
proxy the price and the quantity of each item in the
8
package they desire. The proxy then bids in an ascend-
ing package auction.
In our application, the proxy phase of the auction con-
sists of multiple rounds. The auction favors bids for long
runs of consecutive slots when the service is provided by
the same coalition. This strategy is designed to exploit
temporal and spatial locality.
The auction starts with the longest runs and the low-
est price per slot and proceeds with increasingly shorter
runs and diminished incentives. Once a run of consec-
utive slots is the subject of a provisional winning bid,
all shorter runs of slots for that particular service are
removed from the coalition offerings.
During the first round only the longest run of consec-
utive slots for each one of the services offered by the par-
ticipating coalitions is auctioned and only bidders that
have committed to any of the slots of the run are allowed
to bid. The price per slot for the entire run is the lowest
price for any slot of the run the bidder has committed to
during the clock phase of the auction. If there are multi-
ple bids for service St
l the provisional winner is the one
providing the largest revenue for the coalition offering
the service.
If κt
l is the longest run of consecutive slots for service
St
l auctioned in the first round then, in the second round,
l − 1 slots is auctioned. The price for
a shorter run of κt
the entire run equals the second lowest price for any slot
of the run the bidder has committed to during the clock
phase of the auction times the number of the time slots
in the run.
The length of the consecutive slot runs auctioned de-
creases and the incentives diminish after each round.
The preliminary rounds end with the auction of a sin-
gle slot for each service. At the end of the preliminary
round each bidder is required to offer the price for the
slot committed to during the clock phase. Figure 5 de-
picts a plausible snapshot at the end of the preliminary
rounds of the proxy phase when four services S1,S2,S3
and S4, are offered and shows the provisional winners
for service S4.
timetimetsASt1AtAsτ t0τ s0ASt2AStκtASt3ASs1ASs2ASs3AStκsAuctioneerC1C2Cnqt2,j,lpc+ ID1D2Dmqt1,j,lqtn,jlrt1,j,lrt2,j,lrtm,j,lrti,j,lΣ Σ qtk,j,l>cFigure 5: A snapshot at the end of the preliminary rounds of the proxy phase when there are four services offered
and the auction covers 18 allocation slots. Dotted lines represent the quantity of service with provisional winners.
Only the provisional winers for S4 are shown, the clients labeled as C9, C13, C6, C1, C11, C7 and C9.
During the final round the bidders reveal the packages
they want to reserve; these packages include only the
provisional winners from the preliminary slots. Once
all provisional winning bids for services in a reservation
request are known, the auctioneer chooses the package
that best matches the consumer's needs and, at the same
time maximizes the profit for the cloud service provider.
The coalition for a reservation request consists of the
set of coalitions that provide the services in the winning
package.
In this auction all bids are firm, they cannot be with-
drawn. The auction is monotonic, the length of runs of
consecutive slots auctioned decreases continually; this
guarantees that the auction eventually terminates. Lin-
ear pricing guarantees that the price of any package can
be computed with ease.
The effectiveness of the protocol is captured by
several metrics including:
-1. The customer satisfaction index - percentage of reser-
vation requests fully or partially satisfied in each alloca-
tion slot given the total number of requests.
-2. The service mismatch index - percentage of services
requested but not offered in each allocation slot given
the total number of services in that slot.
-3. The service success index - percentage of services
used in each allocation slot given all services offered in
that slot.
-4. The capacity allocation index - percentage of the
capacity offered but not auctioned in each allocation slot
given the capacity offered in that slot.
-5. The overbidding factor - percentage of slots with a
provisional winner that have not been included in any
package given all slots offered at the beginning of the
auction.
-6. The temporal fragmentation index - percentage of
services successfully auctioned in non-consecutive slots
given all services successfully auctioned.
-7. The additional profit index - percentage of additional
profit of coalitions involved in the auction (the differ-
ence of the actual price obtained at the auction and the
price demanded by the coalition) relative to the price
demanded by the coalition.
Limitations and vulnerabilities. The protocol is
fairly complex and has at least one vulnerability. A bid-
der may be the provisional winner of services in slots
not included in its winning package; such services will
remain unassigned during the current auction. A solu-
tion is to penalizeexcess bidding activity and charge the
bidder a percentage of the costs for these services. An-
other alternative is to include, in a reservation request,
a set of "substitute services" for a service Si. Then,
during the last round of the proxy phase, the auctioneer
could try to match services having provisional winners
with unsatisfied requests for services.
The capacity offered, but not auctioned in each slot
is available for spot allocation thus, it has the potential
to be used, rather then being wasted. The capacity of
a coalition left uncommitted at the end of the auction
At for ASt
1, the first slot of the auction, is then available
for spot allocation at a price equal to pk,l, while the free
capacity in slots starting with ASt
2 can be offered at
the next auction if this auction takes place before the
beginning of the slot. This capacity is measured by the
spot allocation opportunity index.
9
AllocationslotsServiceS1ServiceS2ServiceS3ServiceS41234567891113141215161718AuctiontimeC9C13C6C1C11C7C96 Protocol Analysis and Evaluation
We report on the results of our simulation experiments
to gain some insight into the proxy phase of the clock-
proxy auction of the P C2P protocol. The system we
wish to evaluate requires the description of the environ-
ment in which the auction takes place, the reservation
requests, and the services offered:
1. The environment elements: n - the number of coali-
tions offering services in this round; m - the number
of clients; and κ - the number of slots auctioned.
2. The package j requested by client i: αn
i - the num-
ber of services in the package; the slots desired by
the service Sk, ordered by the length of the run of
consecutive slots; rk,j - the intensity of service Sk in
slot j; pi,j - the price per unit of service for slot j if
client i was a provisional winner of that slot during
the clock phase.
3. The service Sk provided by coalition Ck includes: γk
- the largest run of consecutive slots for each offered
service Sk; the profile of the service Sk - the slots
offered ordered by the length of consecutive slots,
when it is available; qk,j - the quantity of service
Sk offered in slot j; and pk - the price per unit of
service offered by coalition Ck.
For simplicity, we assume that a coalition offers one
service only and the number of services is ν < n. We
also assume that all platforms have a maximum capac-
ity of 100 vCPUs and that qk,j, the quantity of service
Sk offered for auction, and rk,j, the quantity of Sk re-
quested in slot j are the same for all the slots of an
offered/requested run. The number of slots auctioned is
fixed, κ = 50.
The range and the distribution of parameters for the
protocol evaluation are chosen to represent typical cases.
The parameters of the simulation are random variables
with a uniform distribution:
-a. The number of coalitions and clients requesting reser-
vations, n and m, respectively; the interval is [200−250].
-b. The number of services offered and requested ν; the
interval is [10 − 20].
-c. The number of clients bidding for each service in a
given slot; the interval is [0 − 4].
-d. The capacity offered for auction for a service in a
given slot; the interval is [60 − 90] vCPUs.
-e. The services offered by a coalition; the interval is
[1 − ν].
-f. The number of consecutive slots a service is offered
in; the interval is [1 − κ].
-g. The number of services in the package requested by
a client; the interval is [1 − 3].
-f. The number of consecutive slots of the services in the
package requested by a client; the interval is [1 − κ].
We also randomly choose the slots when the client is
the provisional winner. The evaluation process consists
of the following steps:
A. Initialization.
B. Preliminary rounds. Carry out γ preliminary rounds
with γ = maxk γk.
• In the first preliminary round auction auction κ1
slots of service S1, κ2 slots of service S2, and so on.
• Identify the first slot of each run and the reservation
request that best matches the offer.
• Identify the provisional winners if such matches ex-
ist and remove the corresponding runs from the set
of available runs. A match exists if the run consists
of the same number of slots or is one slot longer than
requested and if the capacity offered is at least the
one required by the reservation request. For services
without a match, remove the last slot, add both the
shorter run and the last slot to the list of available
runs.
• Continue this process until only single slots are
available.
C. Final round. In this round we:
• Identify the packages for each client and if mul-
tiple packages exist determine the one which best
matches the request.
• Compute the cost for the winning package for each
client.
Figures 6(a)-(e) show several performance metrics in-
cluding the customer satisfaction index, the service mis-
match index, the auction success ratio, the spot oppor-
tunity index, the temporal fragmentation index, and the
capacity allocation index. The simulation covers 50 time
slots.
The 5% confidence intervals for the mean of all per-
formance metrics are computed for 25 batches each one
of 200 realization of each random variable. The simula-
tion times are 6.4 seconds for 2, 000 runs and 11.7 sec-
onds for 5, 000 runs. The confidence intervals are rather
tight; this indicates that the performance of the protocol
is relatively stable for the range of parameters explored
in this evaluation.
The auction success rate is high, typically above 80%.
The initial low auction success rate is an artifact of the
manner we conducted the simulation; we picked up ran-
domly the service start up time. The spot allocation
opportunity index is in turn correlated with the auction
success rate and shows that a significant fraction of the
capacity is available for spot allocation. This result is
correlated with the one in Figure 6(f) which shows that
10
(a)
(b)
(c)
(d)
(e)
(f)
Figure 6: Proxy phase of an auction with 50 time slots. Indices of: (a) Customer satisfaction; (b) Service mismatch;
(c) Auction success; (d) Spot allocation opportunity; (e) Temporal fragmentation; (f) Capacity allocation.
11
01020304050 0%10%20%30%40%50%60%70%80%→ TimeSatisfied vs total number of requests01020304050 0% 5%10%15%20%25%30%35%40%45%50%→ TimeServices not offered but requested01020304050 0% 10% 20% 30% 40% 50% 60% 70% 80% 90%100%→ TimeAuction Success Ratio01020304050 0%10%20%30%40%50%60%70%80%90%→ TimeSpot Allocation Opportunity Index010203040500100200300400500600700800900→ TimeTemporal Fragmentation Index01020304050 0%10%20%30%40%50%60%→ TimeCapacity allocated by the auctionon average some 50% of the server capacity is not allo-
cated by the reservation system and so is available for
spot contention.
A reservation system covering 50% of the server ca-
pacity is probably the most significant result; it shows
that self-management based on auctions can drastically
improve server utilization. We live in a world of limited
resources and cloud over-provisioning is not sustainable
either economically or environmentally.
The service mismatch index is fairly high, typically
in the 50% range and it is above 60% in a few slots.
The customer satisfaction is correlated with the service
mismatch and typically is in the region of 50%.
In a
realistic scenario, when coalitions maintain statistics re-
garding the services offered and avoid offering services
unlikely to be demanded by the cloud users, the service
mismatch would not affect the performance of the algo-
rithm. Temporal fragmentation, though rather low, is
undesirable. The overbidding factor 64 ± 2.93% is an-
other indication that the protocol needs to be fine tuned.
Self-organization cannot occur instantaneously in an
adaptive system and this simple observation has impor-
tant consequences.
It is critical to give autonomous
cloud platforms, interconnected by a hierarchy of net-
works, the time to form coalitions in response to ser-
vices demanded. Thus, self-management requires an ef-
fective reservation system and our results indicate that
the reservation protocol is working well.
7 Conclusions and Future Work
Self-organization and self-management offer an appeal-
ing alternative to existing cloud resource management
policies; they have the potential to significantly al-
ter the cloud computing landscape. So far, pragmatic
means for the adoption of self-organization principles for
large-scale computing and communication systems have
eluded us. A main reasons for this state of affairs is that
self-management has to be coupled with some mecha-
nisms for cooperation; these mechanisms should allow
autonomous servers, to act in concert towards global sys-
tem goals. Cooperation means that individual systems
have to partially surrender their autonomy. Striking a
balance between autonomy and cooperation is a chal-
lenging task, it requires a fresh look at the mechanics of
self-organization and the practical means to achieve it.
Practical implementation of cloud self-organization is
challenging for several reasons including the absence of
a technically suitable definition of self-organization, a
definition that could hint to practical design principles
for self-organizing systems and quantitative evaluation
of the results. Computer clouds exhibit the essential as-
pects of complexity and it is inherently difficult to con-
trol complex systems.
We started our investigation with a realistic model
of the cloud infrastructure, the hierarchical organiza-
tion reported in [5] which seems inherently tied to hi-
erarchical control. First, we compared hierarchical con-
trol which based on monitoring with a market model
in which the servers of a WSC place bids for service
requests and found out that the latter is much more
effective than hierarchical control [22].
In the simple
market model the servers act individually, rather than
cooperating with each other, a fundamental aspect of
self-organization. But cooperation is clearly needed be-
cause individual servers may not be able to supply the
resources demanded by many data-intensive application.
Thus, we concluded that servers have to form coalitions
to offer larger pools of resources. At the same time,
it seemed obvious to us that complex applications with
multiple phases would require packages of resources of-
fered by different coalitions.
Algorithms for coalition formation based on combi-
natorial auctions are at the heart of the cloud ecosys-
tem we propose. The path we chose seems logical as
auctions have been successfully used for resource man-
agement in the past. Auctions do not require a model
of the system, while traditional resource management
strategies do. The auction-based protocol is scalable,
and the computations can be done efficiently, though
the computational algorithms involved are often fairly
complex.
The results reported in Section 6 indicate that the per-
formance of the protocol is relatively stable for the range
of parameters explored in our evaluation. The protocol
leads to a higher server utilization and it seems reason-
able to expect that a fine-tuned version of the protocol
could further improve this critical performance measure.
Two basic strategies for coalition formation are possi-
ble: (1) the one described in this paper, when coalitions
are formed using information from previous combinato-
rial auctions, before knowing what the actual user de-
mands are; (2) the more natural one, when coalitions are
formed in response to user demands and then combinato-
rial auctions are organized. The former strategy, though
simple and elegant, has two obvious drawbacks: (a) it
needs the past history thus, starting from some arbitrary
initial state may not work very well; (b) there may be
cases when coalitions formed based on past history are
not useful to any package and, at the same time, one or
more packages could benefit from the available resources
of the same type, but in coalitions of different sizes. The
latter strategy, creating coalitions in response to known
user requests is more complex. It requires a protocol to
inform supply agents of the atrributes of desirable coali-
tions, a protocol for individual agents to express their
willingness to join a particular coalition, and, finally, a
coalition formation algorithm. Once the coalitions are
formed the bidding for service packages can take place.
These two strategies can be combined, the latter used
during the initial stages, when the historic information is
either missing or incomplete, and the former used when
history data is available. The second drawback of the
strategy described in this paper can be attenuated by
allowing a second round of coalitions formation. In this
12
second round the unsuccessful coalitions are disassem-
bled and new coalitions matching the needs of unsatis-
fied packages are formed. For example, if two coalitions
of size θ1 and θ2 were unsuccessful and a package P re-
quireing a coalition of size θ3 ≤ θ1 + θ2 was unsatisfied,
then a second round will guarantee that P is satisfied
and θ3 servers will be reserved, instead of being left idele
or offered to spot allocations.
Our future work will address this approach, as well
as, other problems revealed by this investigation, e.g.,
the effects of overbidding. Overbidding is the process
allowing a client to become a provisional winner of one
or more service slots and then, in the final round failing
to acquire some of them. This situation is critical for the
first slot of an auction as the next auctions could find
clients for these slots. A more difficult problem is the
temporal fragmentation which does not seem to have an
obvious solution.
References
[1] L. Ausubel and P. R. Milgrom. "Ascending auc-
tions with package bidding." Frontiers of Theoret-
ical Economics, 1(1):1 -- 42, 2002.
[2] L. M. Ausubel and P. Cramton. "Auctioning many
divisible goods." Journal European Economic As-
soc., 2(2-3):480-493, 2004.
[3] L. Ausubel, P. Cramton, and P. Milgrom. "The
clock-proxy auction: a practical combinatorial auc-
tion design." Chapter 5, in Combinatorial Auctions,
P. Cramton, Y. Shoham, and R. Steinberg, Eds.
MIT Press, 2006.
[4] L. A. Barroso and U. Hozle.
"The case for
energy-proportional computing." IEEE Computer,
40(12):33 -- 37, 2007.
[5] L. A. Barossso, J. Clidaras, and U.Hozle. The Dat-
acenter as a Computer; an Introduction to the De-
sign of Warehouse-Scale Machines. (Second Edi-
tion). Morgan & Claypool, 2013.
[6] M. Blackburn and A. Hawkins. "Unused server
www.thegreengrid.org/
survey results analysis."
media/WhitePapers/Unused %20Server%20Study
WP 101910 v1. ashx?lang=en (Accessed on De-
cember 6, 2013).
[7] D. Bruneo. "A stochastic model to investigate data
center performance and QoS in IAAS cloud com-
puting systems." IEEE Trans. on Parallel and Dis-
tributed Systems, 25(3):560 -- 569, 2014.
[9] S. Chaisiri, B. Lee, and D. Niyato. "Optimization
of resource provisioning cost in cloud computing."
IEEE Trans. on Services Computing, 5(2):164 -- 177,
2012.
[10] V. Chang, G. Wills, and D. De Roure. "A review
of cloud business models and sustainability." Proc.
IEEE 3rd Int. Conf. on Cloud Computing, pp. 43 --
50, 2010.
[11] E. H. Clarke. "Multipart Pricing of Public Goods."
Public Choice, IX:13 -- 33, 1971.
[12] T. Groves. "Incentives in teams." Econometrica,
41:617 -- 631, 1973.
[13] J. O. Gutierrez-Garcia and K.- M. Sim.
"Self-
organizing agents for service composition in cloud
computing." Proc IEEE 2nd Int. Conf. on Cloud
Computing Technology and Science, pp. 59 -- 66,
2010.
[14] L. He and T. R. Ioerger. "Forming resource-sharing
coalitions: a distributed resource allocation mech-
anism for self-interested agents in computational
grids." Proc. ACM Symp. on Applied Computing,
pp. 84 -- 91, 2005.
[15] S. U. Khan and I. Ahmad. "A cooperative game
theoretical technique for joint optimization of en-
ergy consumption and response time in computa-
tional grids." IEEE Trans. on Parallel and Dis-
tributed Systems, 20(3): 346-360, 2009.
[16] K. Lerman and O. Shehory. "Coalition formation
for large-scale electronic markets." Proc. ICMAS
2000 - 4th Int. Conf on Multiagent Systems, pp.
167 -- 174, 2000.
[17] C. Li and K. Sycara. "Algorithm for combinatorial
coalition formation and payoff division in an elec-
tronic marketplace." Proc. AAMAS02 - First Joint
Int. Conf. on Autonomous Agents and Multiagent
Systems, pp. 120 -- 127, 2002.
[18] H. Li, C. Wu, Z. Li, and F. Lau. "Profit-maximizing
virtual machine trading in a federation of selfish
clouds." Proc. of the IEEE INFOCOM, pp. 25 -- 29,
2013.
[19] H C. Lim, S. Babu, J. S. Chase, and S. S. Parekh.
"Automated control in cloud computing: challenges
and opportunities." Proc. First Workshop on Auto-
mated Control for Datacenters and Clouds,, ACM
Press, pp. 13 -- 18, 2009.
[8] T. E. Carroll and D. Grosu. "Formation of virtual
organizations in grids: a game-theoretic approach."
Concurrency and Computation: Practice and Expe-
rience, 22(14):1972 -- 1989, 2010.
[20] D. C. Marinescu, C. Yu, and G. M. Marinescu.
"Scale-free, self-organizing very large sensor net-
works." Journal of Parallel and Distributed Com-
puting (JPDC), 50(5):612 -- 622, 2010.
13
[21] D. C. Marinescu. Cloud Computing; Theory and
Practice. Morgan Kaufmann, a division of Elsevier,
Amsterdam, New York, 2013.
[22] D. C. Marinescu, A. Paya, J. P. Morrison, and
P. Healy.
"Distributed hierarchical control ver-
sus an economic model for cloud resource man-
agement." http://arxiv.org/pdf/1503.01061v1.pdf,
March 2015.
[23] L.Mashayekhy, M.M. Nejad, and D. Grosu. "Cloud
federations in the sky: formation game and mech-
anisms." IEEE Trans. on Cloud Computing, 2015
(to appear).
[24] I. Muller, R. Kowalczyk, and P. Braun. "Towards
agent-based coalition formation for service compo-
sition." Proc. IEEE/WIC/ACM Int. Conf. on In-
telligent Agent Technology, pp. 73-80, 2006.
[25] D.Niyato, A.Vasilakos, and Z.Kun.
"Resource
and revenue sharing with coalition formation of
cloud providers: Game theoretic approach." Proc.
IEEE/ACM Intl. Symp. on Cluster, Cloud and Grid
Comp., pp. 215 -- 224, 2011.
[26] A. Paya and D. C. Marinescu.
"Energy-aware
load balancing and application scaling for the cloud
ecosystem."
IEEE Trans. on Cloud Computing.
doi:10.1109/TCC.2015.2396059.
[27] S. Penmatsa and A. T. Chronopoulos.
"Price-
based user-optimal job allocation scheme for grid
systems." Proc of Parallel and Distributed Process-
ing Symposium, pp. 8-16, April 2006.
[28] T. Rahwan, S. D. Ramchurn, N. R. Jennings, and
A. Giovannucci. "An anytime algorithm for optimal
coalition structure generation." Journal of Artifi-
cial Intelligence Research, 34:521 -- 567, 2009.
[29] N. Samaan. "A novel economic sharing model in a
federation of selfish cloud providers." IEEE Trans.
on Parallel and Distributed Systems, 25(1):12 -- 21,
2014.
[30] T. W. Sandholm, K. S. Larson, M. Andersson, O.
Shehory, and F. Tohm. "Coalition structure gener-
ation with worst case guarantees." Artificial Intel-
ligence, 111(1-2):209 -- 238, 1999.
[31] S. Sen and P. S. Dutta. "Searching for optimal
coalition structures." Proc. ICMAS 2000 - 4th Int.
Conf on Multiagent Systems, pp. 287 -- 295, 2000.
[32] M. Sims, C. V. Goldman, and V. Lesser. "Self-
organization through bottom-up coalition forma-
tion." Proc. Int. Conf. on Autonomous Agents and
Multi Agent Systems, pp. 867 -- 874, 2003.
[33] R. Subrata, A. Y. Zomaya, and B. Landfeldt.
"Game-theoretic approach for load balancing in
computational grids." IEEE Trans. on Parallel and
Distributed Systems, 19(1):66 -- 76, 2008.
[34] S de Vries and R. Vohra.
"Combinatorial auc-
tions; a survey." INFORMS Journal of Computing,
15(3):284 -- 309, 2003.
[35] H-J. Zhang, Q-H. Li, and Y-L. Ruan. "Resource
co-allocation via agent-based coalition formation in
computational grids." Proc Second Int. Conf. on
Machine Learning and Cybernetics,, pp. 1936 -- 1940,
2003.
[36] G. Wei, A. Vasilakos, Y. Zheng, and N. Xiong. "A
game-theoretic method of fair resource allocation
for cloud computing services." The Journal of Su-
percomputing, 54(2):252 -- 269, 2010.
Dan C. Marinescu. During the period 1984-2001 Dan
Marinescu was an Associate and the Full Professor in
the Computer Science Department at Purdue University
in West Lafayette, Indiana. Since August 2001 he is
a Provost Professor of Computer Science at University
of Central Florida. He has published more than 220
papers in referred journals and conference proceedings
and several books including: Cloud Computing: Theory
and Practice, Morgan Kaufmann, 2013.
Ashkan Paya is a Ph.D. candidate in the Electrical
Engineering and Computer Science Department at Uni-
versity of Central Florida pursuing his degree in Com-
puter Science. He graduated from Sharif University of
Technology in Tehran, Iran, with a BS Degree in the
same major in 2011. His research interests are in the
area of resource management in large-scale systems and
cloud computing.
John Morrison is the founder and director of the Cen-
tre for Unified Computing. He is a co-founder and di-
rector of the Boole Centre for Research in Informatics, a
principle investigator in the Irish Centre for Cloud Com-
puting and Commerce and a co-founder and co-director
of Grid-Ireland. Prof. Morrison has held a Science Foun-
dation of Ireland Investigator award and has published
widely in the field of Parallel Distributed and Grid Com-
puting. He is a principle investigator in the Irish Centre
from Cloud Computing and Commerce, where he leads
the Service LifeCycle Group. He has been the guest
editor on many journals including the Journal of Super
Computing and the Journal of Scientific Computing. He
is on the Editorial Board of Multi-Agent and Grid Sys-
tems: An International Journal, published by ISO Press,
and the International Journal of Computational Intelli-
gence: Theory and Practice (IJCITP). He is a senior
member of the ACM and a senior member of the IEEE.
14
|
1110.3961 | 1 | 1110 | 2011-10-18T12:50:26 | A Dynamic Framework of Reputation Systems for an Agent Mediated e-market | [
"cs.MA",
"cs.AI",
"cs.IT",
"cs.SI",
"cs.IT"
] | The success of an agent mediated e-market system lies in the underlying reputation management system to improve the quality of services in an information asymmetric e-market. Reputation provides an operatable metric for establishing trustworthiness between mutually unknown online entities. Reputation systems encourage honest behaviour and discourage malicious behaviour of participating agents in the e-market. A dynamic reputation model would provide virtually instantaneous knowledge about the changing e-market environment and would utilise Internets' capacity for continuous interactivity for reputation computation. This paper proposes a dynamic reputation framework using reinforcement learning and fuzzy set theory that ensures judicious use of information sharing for inter-agent cooperation. This framework is sensitive to the changing parameters of e-market like the value of transaction and the varying experience of agents with the purpose of improving inbuilt defense mechanism of the reputation system against various attacks so that e-market reaches an equilibrium state and dishonest agents are weeded out of the market. | cs.MA | cs | IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, July 2011
ISSN (Online): 1694-0814
www.IJCSI.org
1
A Dynamic Framework of Reputation Systems for an
Agent Mediated e-market
Vibha Gaur1, Neeraj Kumar Sharma2
1 Department of Computer Science, University of Delhi
Delhi, India
[email protected]
2 Department of Computer Science, University of Delhi
Delhi, India
[email protected]
Abstract
The success of an agent mediated e-market system lies in the
underlying reputation management system to improve the quality
of services in an information asymmetric e-market. Reputation
provides an operatable metric for establishing trustworthiness
between mutually unknown online entities. Reputation systems
encourage honest behaviour and discourage malicious behaviour
of participating agents in the e-market. A dynamic reputation
model would provide virtually instantaneous knowledge about
the changing e-market environment and would utilise Internets’
capacity for continuous interactivity for reputation computation .
This paper proposes a dynamic reputation framework using
reinforcement
theory that ensures
learning and fuzzy set
judicious use of information sharing for inter-agent cooperation.
This framework is sensitive to the changing parameters of e-
market like the value of transaction and the varying experience of
agents with the purpose of improving inbuilt defense mechanism
of the reputation system against various attacks so that e-market
reaches an equilibrium state and dishonest agents are weeded out
of the market.
Keywords: Reputation, Reinforcement Learning, Fuzzy
attribute weights, e-market.
1. Introduction
With the growing popularity of e-commerce and amount of
information on WEB, users expect automated techniques
to assure the trustworthiness of information available on
internet. Software agents offer a promise to change e-
commerce trading by helping internet traders to purchase
products from online distributed resources based on their
interests and preferences [16]. Assuring the trustworthiness
of web products and services in such an environment
where actual traders may never meet each other is a
reputation systems.
challenging
task performed by
Reputation systems have a high utility
in
those
environments where entities are long lived, feedback about
the current interactions is captured and distributed, and
past feedback/experience guides buyer decisions [22].
These systems are oriented to develop trustworthiness or
the degree to which one agent has confidence in another
within the context of a given purpose or decision.
The definition and meaning of reputation varies with
applications and contexts. From an objective view,
reputation is expressed as “a quantity derived from the
underlying social network which is globally visible to all
members of the network” [25] or, “a perception that an
agent has of another’s intentions and norms” [17].
Reputation and Trust are often used in complementary
fashion as an agent expects positive outcomes when
interacting with another agent that has a reputation for
being trustworthy [8]. Some systems are described as trust
systems as therein agents determine whether another agent
will do what it says it will, whereas others are best
described as reputation systems because therein agents
compute and propagate their beliefs about other agents.
The e-market environment in which these agents operate is
generally open, that means agents can join or leave the
marketplace at any time; uncertain, i.e. the true worth of a
good can be judged only after its purchase; and un-trusted,
that is the e-market comprises of honest and dishonest
agents. The e-market is populated with self interested
buyer and seller agents that try to maximise their
respective gains. The e-market environment is itself
dynamic in nature as it undergoes continuous changes with
different agents joining and leaving the e-market at will.
The power of a reputation system in an agent mediated e-
commerce can be realized to the optimum if different
process models inherent to the e-transactions like deciding
about pricing of goods, computing and distributing
reputation of participants and selection of a seller for
purchasing a good are also dynamic [29]. A truly dynamic
the changing e-market
to
model must be sensitive
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, July 2011
ISSN (Online): 1694-0814
www.IJCSI.org
2
environment and must adapt to changing experience of
buyer/seller agents with each transaction. Dynamic e-
market models would provide virtually instantaneous
knowledge about the changing e-market environment and
would utilise
Internets’
capacity
for
continuous
interactivity. Designing efficient and robust reputation
systems that satisfy both the buyers as well as sellers is a
challenge for the research community.
The objective of this paper is to propose a framework for a
dynamic reputation system that is sensitive to the changing
parameters of the dynamic e-market environment like the
experience of agents involved in transactions, value of a
transaction and number of transactions between the same
buyer-seller pair. In the proposed model, each of the
individual process model of the dynamic reputation
framework is itself dynamic as selection of a seller for
buying a good depends on the changing experience
between a buyer-seller pair; computing sellers’ reputation
by a buyer depend on the experience of an agent in the e-
market, mutual experience of a buyer-seller pair and the
value of transaction. Further, incorporating value of
transaction in reputation computation affects the amount of
reputation that is to be enhanced or reduced after each
transaction. This makes the reward/penalty proportional to
the size of the transaction in which honest/dishonest
behavior is exhibited by seller agents, and negates any
benefit of a Value Imbalance attack where a seller agent
gains reputation by showing honesty for small value
transactions and then cheats for a large value transaction.
Making
the
reputation updation dependent on
the
experience of agents, by varying
the weightage of
individual experience and shared opinion from others,
reduces the effect of Ballot Stuffing attack where a number
of malicious agents artificially enhance or reduce the
reputation of another agent. Also, by making the reputation
updation sensitive to the fact that whether reputation is
earned from a single buyer or multiple buyers minimizes
the effect of collusion between a buyer-seller pair. The
proposed framework employs judicious use of information
sharing and thus reduces the associated cost by using
effective inter-agent communication.
The reputation computation strategy proposed in this paper
uses reinforcement learning (RL) techniques which provide
a general framework for sequential decision making
problems [10]. RL deals with what an agent should do in
every state that it can be and how to map situations to
action, in order to maximize the long term reward. The
learner must discover which actions yield the maximum
reward by trying them. Sometimes, actions may affect not
only the immediate reward, but also all subsequent
rewards. Hence, trial-and-error search and delayed reward
are the two most important distinguishing features of RL.
In the proposed strategy, for purchasing a good, the buyer
chooses a seller offering the highest expected value of the
good i.e. good with highest expected utility for the buyer .
Expected buyers’ requirement from a good constitutes
buyers’ estimation of goods’ attributes and is subjective
and fuzzy in nature. It is subjective as relative priority of
attributes of a good would vary with each good and with
each buyer. It is fuzzy as generally buyers’ expectations of
a particular attribute are specified in fuzzy terms like “low”
or “high”. Similarly, a buyer has to map linguistic
assessment of goods being offered by different sellers
based on their attributes to the fuzzy scale. Hence this
paper uses fuzzy set theory to allow a buyer agent to
compute attribute weights of a good and to select a seller
that offers the good with highest expected value.
The rest of this paper is organized as follows. Various
reputation models from literature and in commercial use
are introduced in section 2. Section 3 presents the
proposed dynamic reputation framework. To address
existing problems, section 4 illustrates the performance of
the proposed system against known attacks. A case study is
presented in section 5. Section 6 concludes the paper.
2. Related Work
Reputation models are an important component of e-
market, help building trust and elicit cooperation among
loosely connected and geographically dispersed economic
agents [12]. A number of reputation models described in
literature are discussed below.
The evidential model [2, 3] for reputation computation
assumes a distributed reputation environment and is based
on Dampster Shafer Theory. An agent
finds
the
trustworthiness of another agent [3] based on its direct
interaction and testimonies of other trustworthy agents.
Some reputation models [21, 26] from literature employ
reinforcement
individual
learning and are based on
experience only. In reputation model for increasing user
satisfaction [26], seller agents adjust the price and quality
of goods to maximise their profit. A multi-facet reputation
model [21] involves reputation computation of both buyer
and seller agents using quality, price and delivery time of
goods. But, these systems [21, 26] suffer heavily from re-
entry and multi-identity attacks as these use negative
reputation and new sellers do not start from minimum
reputation.
TRAVOS [15] employs Bayesian probability analysis and
computes trust of an agent by taking into account past
experience between two agents, and in case of lack of past
experience, this model utilizes the information collected
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, July 2011
ISSN (Online): 1694-0814
www.IJCSI.org
3
from third parties. To filter out unfair opinions, TRAVOS
uses an endogenous approach to filter out unfair opinions.
PeerTrust [19] is a reputation model that uses techniques
for resilient reputation management against vulnerabilities
like feedback sparsity and feedback manipulation. It talks
about dynamism in electronic communities from the
perspective of honest and dishonest behaviour of actors.
Reputation in Gregarious societies (REGRET) [16, 17]
employs fuzzy rules to find reliability of witness agents
based on their relationship with the target agent. REGRET
is a multi-facet reputation mechanism that models the
reliability of
reputation based on
the number of
interactions of witness agents with the target agent.
Another model “Trunits” [24] is based on accumulation of
trust units (trunits). A seller must possess sufficient number
of trunits before executing a transaction. To engage in a
transaction, seller must risk a particular quantity of trunits
which is put into an escrow with the market operator. After
a transaction, if buyer is satisfied, seller gets more trunits,
otherwise it loses risked ones.
Broker assisting TRS [4] is a flexible model based on
Artificial Neural Networks
(ANN)
that
employs
backpropagation algorithm. Use of ANN helps to reduce
noise data and supports incremental training, so each agent
requests for information only from those having a similar
reputation evaluation criterion.
In Reputation Dynamics and Convergence [8], authors
formalize the desiderata that from a dynamic systems’
perspective a reputation system should have the properties
of Monotonicity and Accuracy. As an example of
Monotonicity, agents who provide high quality goods at
low price should acquire better reputation and, in systems
with focus on Accuracy, the buyer should quickly learn
the accurate reputation value for the seller. The Dynamic
Framework proposed
in
this paper
incorporates
Monotonicity as the process of seller selection and also
updation of reputation are based on the presence of
favourable goods’ attribute like low price and high quality.
Further, a fraudulent seller is penalised immediately to
keep the reputation estimate accurate.
The P4P (Pervasive Platform for Privacy Preferences) [20]
system concentrates on privacy control in case of e-
transactions. The paper acknowledges the property of e-
market environment being dynamic and, the need that the
existing systems in this environment should also be
dynamic. It emphasizes importance of reputation by
allowing the clients, the freedom to not disclose personal
data according to the level of reputation.
A number of simple online reputation systems are in
commercial use. eBay [14] is the most popular auction site
that has feedback forum as a reputation system in which
after each transaction, a buyer rates a seller as positive,
negative or neutral i.e. +1, -1 or 0 respectively. The
reputation of a user is computed by subtracting total
number of negative feedbacks from the total number of
positive feedbacks obtained from distinct users [23].
Amazon [13] is America’s largest online retailer where
reviews include star ratings from 1 to 5 and a prose text.
Average of all ratings is used to assign reputation.
A limitation of the existing systems from literature [1, 3, 4,
8, 15, 16, 19, 20, 21] is that, during the process of
computing or updating of reputation values, these do not
take
into consideration
the changing parameters of
dynamic e-market environment like the varying experience
of agents and the value of a transaction which make them
vulnerable to different attacks. The proposed reputation
framework incorporates value of a transaction in the
strategy of reputation computation to remove the problem
of Value Imbalance attack and, varies the weightage of
individual and shared
reputation components with
changing experience of agents to minimise the effect of
Ballot Stuffing attack.
3. Dynamic Reputation System Framework
Reputation systems are oriented to encourage trustworthy
behaviour, increase user satisfaction and deter dishonest
participants by providing means through which reputation
could be computed and disseminated [22]. The e-market
environment in which reputation systems operate is
dynamic as it changes continuously in terms of agents
freely entering/exiting the market and also with the varying
experience of agents. Therefore, as a buyer gains
experience of a sellers’ behaviour with each repeated
transaction, the weightage of the individual experience of a
buyer-seller pair should increase as compared to the
opinion shared by other buyer agents. Moreover, economic
worth of being honest or dishonest in a transaction cannot
be judged without taking into account the value of a
transaction as honest behaviour in a large transaction is
more important than in a small transaction.
the
framework should base
A dynamic
reputation
reputation computation methodology
the
itself on
dynamics of the e-market environment to infuse some
inbuilt defense capability against possible attacks. In order
to have a robust and high utility reputation system,
different activities belonging to reputation computation
methodology it should be adaptive to the changing
environment and the experience of agents involved in a
transaction. The next section describes the proposed
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, July 2011
ISSN (Online): 1694-0814
www.IJCSI.org
4
dynamic reputation computation strategy that employs
reinforcement learning and fuzzy set theory.
3.1 Buyers’ Strategy for Reputation Computation
The proposed buyers’ strategy is based on the e-market
model having a set of buyers and sellers. In this model,
sellers are divided into four categories, namely, reputed,
non-reputed, dis-reputed and new sellers. The reputation of
seller s being computed by buyer b is composed of two
components: individual reputation and shared reputation.
These two components are combined to represent overall
reputation of a seller agent.
In this model, B represents the set of buyers, S represents
the set of sellers and, G the set of goods. Let
[0,1)
represents
individual
reputation
(IR)
component,
[0,1) represents shared reputation (SR) i.e. the
opinion of other buyers for seller s, and
[0,1)
represents overall reputation of seller s at time t, for the
buyer b. At time t+1, buyer b stores/remembers the overall
, with whom buyer b
reputation
of all sellers
has interacted at time t in the past. Each buyer maintains
four categories of sellers as defined below.
(i)
(ii)
: Sellers in the reputed list of buyer b, i.e.
, where
,
is the reputation
threshold of buyer b and
.
: Sellers in the non-reputed list of buyer b, i.e.
.
where
(iii)
: Sellers in the dis-reputed list of buyer b, i.e.
, where
,
is the dis-
reputation threshold and
.
(iv)
: Sellers that are new to buyer b in the market,
initially
A new seller s remains in this
list until its reputation crosses the dis-reputation
threshold
. Before crossing
, if a seller cheats
than it is moved to the list of dis-reputed sellers
and is never considered again for business.
The process of choosing a seller for purchasing a good
based on its expected value uses three important algebraic
operations on fuzzy numbers: inverse, addition and multi-
plication. If
and
are two positive trapezoidal fuzzy numbers then, the fuzzy
is given in (1) and inverse of a fuzzy
addition of
and
number
represented as
is shown in (2) below.
(1)
(2)
Unlike addition and subtraction, product of two trapezoidal
fuzzy numbers may not result into a trapezoidal number
[6, 7]. Therefore, this paper uses an approximation of the
product of two trapezoidal fuzzy numbers to a new
trapezoidal fuzzy number [7]. The product of
two
trapezoidal fuzzy numbers, A and B given above is
trapezoidal
approximated
by
the
fuzzy
number
as proposed in [6, 7] where,
,
,
,
(3)
For defuzzifying, Centre Of Area (COA) or Centroid
method is used. For a fuzzy number
, its
COA is computed as:
.
The proposed reputation computation methodology based
on the concept of reinforcement learning and fuzzy set
theory is divided into three phases. In Phase I, a buyer
expresses its willingness to buy a good and the set of
sellers’ who respond for selling that good are elicited and a
seller selection methodology using fuzzy arithmetic is
applied to select a seller for purchasing that good. Phase II
includes
reputation computation using reinforcement
learning. It begins after purchasing the good, where the
buyer updates
the sellers’ reputation based on
the
experience of the current transaction and the opinion from
others. Finally in Phase III, the buyer updates its list of
reputed, non-reputed, dis-reputed and new sellers. A
detailed description of this methodology divided into
Phase I, Phase II and Phase III is given below.
Phase I:
1. The process of buying and selling starts with a buyer b
announcing the need to buy a good g by sending
broadcast request to all sellers. Those sellers who are
willing to sell good g respond by submitting their bids.
At any given time, buyer b preferably purchases a
good from a reputed seller. If no seller from the
reputed list offers good g then the buyer b selects a
seller from the set of non-reputed sellers but in no case
the buyer would choose a dis-reputed seller [27]. In
addition, with a small probability ρ, buyer b would
choose a seller from the list of new sellers’ i.e.
.
Initially the value of ρ is 1 and it decreases over time
to some minimum value defined by buyer b.
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, July 2011
ISSN (Online): 1694-0814
www.IJCSI.org
2. After receiving sellers’ bids for good g, buyer b first
computes the expected value
of good g’s offer
from each seller and then selects a seller s that is
offering good g with highest expected value i.e. max.
based on the following strategy by computing
goods’ attribute weights using extent analysis method
[5, 28] and combining it with fuzzy AHP technique.
i. Obtain
the buyers’ assessment of pairwise
comparison of different attributes of a good in
linguistic
(E),
important
like Equally
terms
Moderately Important (M), Highly Important (H),
Very Highly
Important
(VH) or Extremely
Important (EI) as illustrated in Fig. 1.
Fig. 1 Fuzzy Scale for Relative Importance of Attributes
Using fuzzy scale of Fig. 1, map these linguistic
terms to trapezoidal fuzzy values. For example,
Highly Important (H) is mapped to trapezoidal
fuzzy number (3,5,5,7).
ii. Compute subjective fuzzy weights of different
attributes of good g from the buyer’s perspective by
combining extent analysis method [5] with fuzzy
AHP. Let
(Fuzzy Pairwise Matrix) represents
the fuzzy reciprocal n x n matrix representing all
pairwise comparisons
for all
as
illustrated in Eq (4) below.
Where
and all
and their inverse
are trapezoidal fuzzy numbers. The subjective
weight computation of attribute
denoted as
is given in Eq. (5).
Further, compute
for i = 1,2 ..., n, i.e. for all
attributes of a good represented by
Eq. (6).
is shown in
5
(6)
iii. Compute the empirical weight component
, i.e.
the average of fuzzy weight of each attribute, for i =
1, 2,..., n, in a maximum of k number of previous
transactions by the same buyer for the same good
represented by
below.
(7)
iv. Obtain the overall fuzzy attribute weight
of a
good by using Eq. (8) given below.
(8)
Similarly, compute
for i = 1,2,..,n, represented
by
as shown in Eq. (9).
(9)
In Eq. (8), the value of δ is zero in the case of a
buyer purchasing a good for the first time. With
each subsequent purchase of the same good by a
buyer, the value of δ increases by a small fraction.
This ensures that initially when a buyer has no
experience of buying a good, the overall weight of a
goods’ attributes depends only on subjective weight
component of each attribute of the good i.e.,
.
As buyer gains experience by buying a good
repeatedly, the importance of its empirical weight
component i.e.
increases and the importance
decreases
of subjective weight component i.e.
(4)
proportionately. This means that after participating
in sufficiently large number of transactions, say k
=100 transactions for an δ increment rate of 0.01,
by the same buyer for a particular good, it is not
necessary for a buyer to incur the overhead of
computing the subjective weights of the goods’
attributes
and
instead utilise
the previous
transactions weight information.
(5)
v. Solicit the buyers’ assessment of each seller’s offer
for the good in linguistic terms like Poor (P),
Average (A), High(H), Very High (VH) or
Excellent (EX) based on trapezoidal fuzzy scale of
Fig. 2.
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, July 2011
ISSN (Online): 1694-0814
www.IJCSI.org
6
computing the difference between the actual value and
the expected value of the good as given in Eq. (12)
below.
Δ =
(12)
5. If Δ > 0, then using reinforcement learning technique,
buyer b updates reputation of the seller s at time t+1 i.e.
with a value greater than its current value as
shown in Eq. (13) below.
(13)
Where μ represents effective reputation value increase
factor as shown in Eq. (14).
(14)
and,
(15)
Fig. 2 Fuzzy Scale for Linguistic Performance of Sellers
vi. Using fuzzy scale of Fig. 2, map these linguistic
terms into fuzzy performance ratings of good g’s
offers by different sellers. Let
represents fuzzy
performance ratings of seller i for attribute j. Fuzzy
performance of each seller i, for i = 1,2..,m and for
each attribute j, for j = 1,2,..,n is represented by
fuzzy attribute performance matrix
in Eq. (10).
As per Fig. 3, if seller 1’s goods’ performance for
attribute 2 is “VH” then its fuzzy performance
rating as per Eq. (10) is
.
vii. Compute the fuzzy value of the seller i’s good
as:
. The fuzzy value
matrix of each seller i’s good, for i = 1, 2, ..., m
represented by
is shown in Eq. (11) below.
Eq. (15) is used to map the value of a transaction x in
(10)
the range from 0 to 1 which in case of a single good
being purchased is equal to the price p of the good g.
Also λ is a constant in the range 0 to 1, and e is a
constant with a value of 1.01. The function to compute
η in Eq. (15) ensures that the value of μ in Eq. (14) and
hence the reputation
increases monotonically
with the value of transaction. In Eq. (14), β is a
constant with initial value 0 and its value increases by a
small
factor, say 0.001, with each successive
transaction between the same buyer seller pair. This
ensures that with increase in mutual experience of a
buyer-seller pair, reputation value i.e.
increases
at a relatively smaller rate for the same value
transaction according to the convention that reputation
earned from different buyers is more important than the
reputation earned from large number of repeated
transactions with the same buyer as shown in Table 1
below.
(11)
μ
Value of
Transaction
(x)
Table 1: Monotonic Increase of Reputation with value of transaction
but discounted with increase in number of transactions between the
same buyer-seller pair (For previous reputation i.e.
= 0.37)
For β = 0.5
For β = 0
% increase
Updated
% increase
Updated
Reputa-
in
Reputa-
in
Reputation
Reputation
tion
tion
0.113
0.169 0.0007 0.37
0.001 0.371
100
0.563
0.003 0.372
0.845
0.005 0.373
500
2.237
0.013 0.378
3.355
0.02 0.3824
2000
0.049 0.401
8.264
0.032 0.39
5.509
5000
0.063 0.4098 10.751
10000 0.095 0.4297 16.127
20000
0.18 0.4837
30.726 0.12 0.446
20.484
μ
It can also be observed from Eq. (13) that individual
reputation at time t+1 is based on overall reputation at
time t to impress upon the fact that in the next
viii. viii. Perform defuzzification on the fuzzy matrix
to
obtain crisp value matrix CVS using Centre of Area
approach (COA). CVS contains the crisp expected
value i.e.
of good g’s offer from each
seller.
ix. Select the seller s with the highest crisp expected
of the good g for placing
value i.e. max.
purchase order for the good g.
Phase II:
3. Once the buyer receives a good after purchase, it
computes the actual value of that good i.e.
,
reflecting whether the received good is satisfactory or
not as per the buyers’ assessment of the actual good by
again using step 2 of Phase I.
4. After computing the actual value of a good, buyer
updates the individual reputation of seller by first
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, July 2011
ISSN (Online): 1694-0814
www.IJCSI.org
7
Value of
Transaction
μ
(x)
Table 2: Monotonic Decrease of Reputation with value of a
transaction but discounted with increase in number of transactions
between the same buyer-seller (Previous reputation,
= 0.37)
For β = 0.5, γ = 2
For β = 0, γ = 2
% increase
Updated
% increase
Updated
Reputa-
in
Reputa-
in
Reputation
Reputation
tion
tion
-0.226
-0.339 0.0013 0.3692
0.002 0.3687
100
-1.127
0.006 0.3658
-1.69
500
0.01 0.3637
-4.473
-6.71
2000 0.039 0.3452
0.026 0.3534
5000 0.097 0.3088
-16.53 0.064 0.3292
-11.02
-21.5
-32.25 0.126 0.2904
10000 0.189 0.2507
20000 0.361 0.1426
-61.45
0.24 0.2184
-40.97
μ
The use of the penalty factor γ = 2 applied during
reputation computation ensures that the reputation
drops at
the
to
rate as compared
the
twice
corresponding rate of its increase for the same value
transaction. Comparison of relative
increase and
decrease in reputation corresponding to the changes in
the value of transaction and number of transactions
between a particular buyer-seller pair is shown in Fig. 4
below.
transaction, the overall reputation of a seller computed
by a buyer at the end of previous transaction becomes
the individual experience of that buyer agent. On
comparing the relative increase in percentage of
reputation in case of a buyer-seller pair having no
previous transaction represented by β = 0 and after
gaining experience of 500 transactions represented by β
= 0.5, it is found that relative increase in reputation is
less in case of β = 0.5 as compared to the situation
where β = 0 as illustrated in Fig. 3.
Fig. 3 Monotonic increase of reputation with value of transaction
but this increase is discounted/reduced with increase in number of
transactions between the same buyer-seller pair to minimise the
effect of collusion between a particular buyer and seller
6. If Δ < 0, which represents the fact that the purchased
good g has not been satisfactory as per buyer b’s
assessment, then using reinforcement learning, buyer b
updates the reputation of the seller s at time t+1 i.e.
by a value less than its current value as
described by Eq. (16).
(16)
Fig. 4 Reputation drops faster than its increase
to discourage dishonest sellers
Where ξ represents effective reputation value decrease
factor due to unsatisfactory or dishonest behaviour of a
seller agent and is illustrated in Eq. (17) below.
(17)
Where γ is the Penalty Factor and value of γ is kept
greater than 1 to ensure that reputation decreases at a
faster pace as compared to the rate of its increase. This
property is based on the convention that reputation is
difficult to build but easy to tear down. The underlying
purpose is to discourage dishonest behavior of seller
agents in e-market by slapping a higher penalty on
fraudulent sellers. Like μ, ξ is also dependent on the
value of a
transaction and the number of past
transactions between a particular buyer-seller pair.
Hence there is steep reputation drop for a large value
transaction as compared to a small value transaction as
described in Table 2.
7. After computing the individual reputation of a seller,
this model combines it with the shared reputation about
the seller s from other buyers to compute the overall
reputation of the seller agent s. The equation to
compute overall reputation function
is given
below in Eq. (18).
(18)
is the individual reputation of seller s
Where
that is computed by the buyer b itself and
is
the aggregate of the reputation rating of seller s that is
received from other buyer agents. Further, α is the
experience gain factor and
. The initial value
of α before the first transaction between a buyer-seller
pair is 0 and with each successive transaction, it is
incremented by a small factor of say 0.01 to ensure
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, July 2011
ISSN (Online): 1694-0814
www.IJCSI.org
8
To summarize, the main functions of dynamic reputation
framework are illustrated using flowcharts in Fig. 5 and
Fig. 6.
that with each successive transaction between a buyer-
seller pair, relative weight of Individual Reputation
increases and that of
(IR) component i.e.
Shared Reputation (SR) component i.e.
decreases. This implements the dynamic property that
with increasing mutual transactional experience, a
particular buyer-seller pair would depend more on their
past mutual experience and less on the opinion from
other agents. The actual rate at which the value of α
should increase depends on the good to be purchased
and is to be decided by domain experts. After
sufficiently large number of transactions, as value of α
would depend only on
approaches 1,
and the weightage of
would effectively
become zero. This ensures that initially when a buyer
agent has no experience of a seller, its dependence is
greater on the opinion from other buyers although it
means incurring some communication overhead. Once
a buyer gains sufficient experience of past transactions
with a particular buyer, it can avoid the overhead of
inter-agent communication as the computation of
overall reputation depends only on the individual
reputation component. Hence, this framework employs
judicious use of information sharing and thus reduces
its cost with effective inter-agent communication.
If a seller is new to a buyer b i.e.
then,
(19)
And, if a seller is new in the marketplace, i.e.
then,
(20)
Phase III:
8. Finally, on the basis of the overall reputation rating of a
seller s, sets of reputed, non-reputed, dis-reputed and
new sellers i.e. SR, SNR, SDR and SNewR are updated as:
If s is not a reputed seller, and
, then
. (21)
Fig. 5 Dynamic Reputation Framework for Reputation System
If s is a reputed seller, and
, then
the algorithm of seller
The flowchart summarizing
selection strategy for computing expected/actual value a
. (22)
product is given in Fig. 6 ahead.
If s is not a dis-reputed seller, and
, then
. (23)
If s is not non-reputed, and
,
. (24)
Finally, if s is a new seller, and, if
, then
. (25)
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, July 2011
ISSN (Online): 1694-0814
www.IJCSI.org
9
An attack in which two agents mutually rate each other
with abnormally high ratings is called RECiprocity (REC)
whereas in RETaliation (RET) both the agents rate each
other with abnormally low ratings.
Reputation-Lag (RL) takes advantage of the lag i.e. time
gap, before cheating results in reduced reputation. During
this period, an agent gets unlimited opportunities to cheat
before other agents become aware of its loss of reputation
due to malicious behaviour.
In Value-IMbalance (VIM) attack, reputation earned or
lost during a transaction is not related to value of a
transaction. The effect of showing honest behaviour by
selling a large number of high quality but low value goods
and, dishonest behaviour by selling a small number of low
quality but high value goods does not result into any
significant loss in reputation score. This helps a malicious
seller who behaves honestly for small transactions to gain
reputation and then cheats in large transactions.
If a seller agent has no further utility of good reputation, it
utilises its entire reputation to cheat and exits from e-
market. This attack is called Sudden-Exit (SE).
In Multiple-Identity (MI) or Sybil Attack, a seller is able to
open multiple accounts thereby increasing its probability to
sell a good. It continues selling the goods honestly through
some and dishonestly through others without facing any
significant penalty. It exits from the account with a low
reputation and opens another account.
Sometimes, a number of attackers employ a combination of
strategies to launch a multifaceted and coordinated attack.
This
is known as Orchestrated (ORC) attack [18].
Attackers change their behaviour overtime and divide
themselves into sub-groups where each group plays a
different role at different time.
4.1 Comparative Performance Analysis
to generate an accurate
Reputation systems seek
assessment of participants’ behaviour
in potentially
adversarial environments [18]. In uncertain and un-trusted
agent based environment of e-market, where the actual
buyers and sellers may never meet, absence of such
systems may lead to rampant cheating, fraud, mistrust and
eventual system failure. Hence, the success of a reputation
system
is measured by
the accuracy of computed
reputation that predicts the quality of future interactions in
an environment where a participant may try to exploit the
system to its own advantage. This section highlights the
performance of dynamic reputation framework based on its
relative strength as compared to other models from the
literature in Table 3.
Fig. 6 Seller Selection Strategy (SSS) for computing
expected / actual value of a good
4. Common Attacks and Proposed Defense
Reputation systems are different from general trust based
systems in a way that they include self interested actors or
agents who cheat and effectively launch various attacks to
defeat these systems. The impact of attacks against
reputation systems is much more than the manipulation of
reputation values as these result into money fraudulently
lost and ruined business reputations. This section discusses
different type of attacks classified in literature [2, 3, 18,
22, 24] and presents a comparative performance analysis
of the defense capability of the proposed system against
these attacks.
In Ballot Stuffing (BS), a group of agents collude to rate a
particular agent with abnormally high ratings, whereas in
Badmouthing (BM) an agent is rated abnormally low. In
this attack, colluding agents participate in events that lead
to allocation of reputation or feedback about that agent.
Re-ENtry (REN) is an attack where a low rated agent exits
the market and re-enters with a new identity. This attack is
facilitated by the availability of cheap pseudonyms in the
online environment. The reputation systems with negative
feedback are especially vulnerable to REN.
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, July 2011
ISSN (Online): 1694-0814
www.IJCSI.org
10
No model except
Truntis deals with
this problem.
Type of
Attack /
Problem
Value
Imbalance
(VIM)
Reputation
Lag (RL)
Table 3: Qualitative analysis of Dynamic Reputation System (DRS)
correctly reflect the behaviour of participants and their
based on known attacks/problems and defense mechanisms
capability to withstand different type of attacks launched
Defense
Defense Mechanisms in
by dishonest agents. Therefore, a good reputation system
Mechanisms in
proposed Dynamic Reputation
must incorporate some inbuilt defense mechanisms to
Framework
Other Models
ensure that honest participants are rewarded with economic
VIM is resolved as the amount
gains and cheaters are penalised with economic loss. The
of change in reputation is
proposed strategy incorporates inbuilt defense capability in
monotonically related to the
the
reputation computation methodology
itself by
value of a transaction.
RL is reduced as with increase
increasing its resilience against various attacks especially
in the mutual experience of a
Value Imbalance and Ballot Stuffing. It also discourages
buyer-seller pair, weightage of
fraudulent behaviour by slapping a higher penalty on
shared reputation reduces and
dishonest sellers than the corresponding reward for honest
finally becomes negligible after
behaviour.
large number of transactions.
Its effect is minimised as
reputation earned by a seller in
lieu of repeated transactions
with the same buyer is
discounted with each successive
transaction. Effect of REC/RET
is also limited by the value of
transaction.
REN attack is partially resolved
as to re-enter, an agent must
lose existing reputation and re-
start with minimum reputation.
Probability of SE attack is
reduced. As reputation earned is
proportional to value of
transaction, so to cheat and exit
from e- market, an agent has to
first earn sufficient reputation
by being honest for both large
value and large number of tran-
sactions. Losing hard earned
reputation is not viable unless
transaction value is very high.
the application of proposed reputation
illustrate
To
framework, a case study was conducted by simulating an
electronic marketplace with four users as buyers and six
users as sellers, i.e. B = {bi where i = 1...4} and S = {sj
where j = 1…6}, where B is the set of buyers and S is the
set of sellers in the marketplace for good g. Some
scenarios in the marketplace are shown below.
Models based only
on individual repu-
tation [21, 24, 26]
do not suffer from
RL, other models
have no solution.
Commercial
models like eBay
have a strong
presence of this
attack as 98% of
the eBay ratings
are positive due to
the fear of RET.
e-Bay and Truntis
deal with this
problem with
partial success.
Scenario 1: A situation was investigated where buyer b3
wanted to buy a good g. The sellers s1 to s6 were known to
buyer b3, although only three sellers were in its overall
= {sj where j = 3,4,5}. Further,
reputed list i.e.
=0.15, e = 1.01, α incremental rate of 0.01
=0.45,
and β incremental rate of 0.001 per transaction. Based on
buyer b3’s experience, existing overall reputation
No feasible
solution in any of
the proposed
model so far.
of each seller is depicted in Table 4.
5. Case Study
Reciprocity
(REC) and
Retaliation
(RET)
Re-entry
(REN)
Sudden Exit
(SE)
Multiple-
Identity (MI)
Ballot
Stuffing
(BS)/
Bad-
mouthing
(BM)
Orchestrated
(ORC)
No inbuilt feasible solution.
No feasible
solution provided.
The effect of BS/BM reduces
Evidential model,
with each successive transaction
TRAVOS,
between a buyer-seller pair as
REGRET and
weightage of shared reputation
Broker-Assisting
decreases and becomes
TRS try to deal
negligible when an agent gains
with this attack
sufficient experience of other
with varying
success.
trader agent.
Only partial solution to a subset
No known solution
for this type of
of attacks is possible as dealing
multifaceted
multiple attacks with actors
changing roles is very difficult.
attacks.
Table 4: Individual reputation ratings of different sellers to buyer b3
s6
s5
s4
s3
s2
s1
sj
0.25
0.48
0.50
0.37
0.57
0.20
The buyer b3 specified the pairwise importance of different
attributes of good g i.e. of Price (P), Quality (Q), Delivery
Period (DP) and Service Offered (SO) in linguistic terms.
Their equivalent fuzzy values based on the fuzzy scale of
Fig. 2 are shown as Fuzzy Pairwise Matrix (
) in (26).
Reputation systems foster good behaviour, punish bad
behaviour when it occurs, and reduces the risk of being
harmed by others’ bad behaviour. Strengths and
weaknesses of reputation systems are assessed qualitatively
on the basis of their ability to convert the experience of
buyer and seller agents into a reputation metric that
The average of the weights in the previous transactions
were
=
(0.0405,0.115,0.115,0.2435),
=
= (0.074,0.196,0.196,0.443)
(0.11,0.46,0.46,0.87),
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, July 2011
ISSN (Online): 1694-0814
www.IJCSI.org
11
= (0.0875,0.367,0.367,0.718). Hence, SW , EW,
and,
and W of different attributes of the good g as computed in
MATLAB with δ = 0.27 are illustrated in Fig. 5 below.
price of good g by seller s5 was 1500, so x = 1500. After
purchasing, and receiving the good g, buyer b3 computed
the actual value of the good g by again using step 2, Phase
I of Section 3 as
= 13.346.
Fig. 5 Overall weight computation of attributes of good g by buyer b
Sellers s1, s3, s4, s6, responded to sell good g to buyer b1.
Now, buyer b1 computed the expected value of the product
being offered by the four sellers as explained below.
After taking buyers’ assessment of each seller’s product
offer for the attributes Price (P), Quality (Q), Delivery
Period (DP) and Service Offered (SO) in linguistic terms,
the equivalent fuzzy performance matrix
representing
fuzzy performance of various sellers’ offer for good g is
shown in (27).
Using (11),
and
was computed as,
after defuzzifying the resultant crisp expected value (CVS)
representing the expected value of good g for each seller
, as computed using MATLAB is
illustrated in Fig. 6.
Using (12), ∆ = 13.146-12.2319 = 0.9141 > 0. (28)
As ∆ > 0, buyer b3 incremented the individual reputation
of seller s5 as shown below.
= 1 – (1.01) -0.001*1500 = 0.014815 (29)
and μ =
= 0.01373 (30)
Using (13),
=0.57+0.01373*(1-0.57)=0.576. (31)
The aggregated shared reputation value for seller s5 was
0.56. Therefore, b3 computed overall rating of seller s5 by
using Eq. (18) as:
combining
with
= 0.79*0.576+(1-0.79)*0.56 = 0.572. (32)
Scenario 2: Another situation was investigated where buyer
b2 wanted to buy good g. Sellers s1 to s4 and s6 were known
to buyer b2, whereas sellers s3 and s6 were in its overall
= {sj where j = 3,6}. Moreover,
reputed list, i.e.
=0.25, γ = 3, e = 1.01, α incremental rate of
=0.5,
0.01 per transaction and β incremental rate of 0.001 per
transaction. After previous transaction of buyer b2, overall
reputation ratings
for each seller are given in
Table 5.
Table 5: Reputation ratings of different sellers in buyer b2’s memory
s6
s4
s3
s2
s1
sj
0.312
0.43
0.51
0.39
0.53
Using step 2, Phase I of section 3, the expected value of
the good g equivalent to 11.65 was computed to be the
maximum for seller s3 so the buyer b2 chose seller s3 to buy
good g. Also, buyer b2 had 45 previous transactions with
the seller s3, therefore α = 0.45 and β = 0.045. As seller s3
offered the good g at a price of 6750, so x = 6750. After
purchasing, by again using step 2 of Phase I, buyer b2
computed the actual value of good g, i.e.
as
10.87.
Using (12), ∆ = 10.87 – 11.65 = - 0.78 < 0. (33)
As ∆ < 0, buyer b2 decremented the individual reputation
of seller s5 as shown below.
Fig. 6 Fuzzy (FVS) and Crisp (CVS) values of Sellers’ offers
= 1 – (1.01) -0.001*6750 = 0.064959 (34)
Based on Fig. 6, seller with the highest expected value
of the good g as 12.2319 is selected by buyer b3 for
purchase. Also, as buyer b3 had 79 previous transactions
with the seller s5, therefore α = 0.79 and β = 0.079. The
ξ = γ
= 0.18649 (35)
Using (16),
=0.51-0.18649(1-0.51))=0.4186. (36)
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, July 2011
ISSN (Online): 1694-0814
www.IJCSI.org
12
Further, the aggregated shared reputation value for seller s3
was 0.54. Therefore, b2 finally computed overall rating of
seller s3 by combining its individual rating of s3 with
using Eq. (18) as shown below in Eq. (37).
=0.45* 0.41862 + (1- 0.45)*0.54=0.4854 (37)
Scenario 3: In another case involving Ballot Stuffing
attack, buyer b4 needed a good g. The sellers s1 to s6 were
known to buyer b3 where s1, s2 and s4 are in its reputed list.
Further,
=0.18, e = 1.01, α incremental rate of
=0.4,
0.01 and β incremental rate of 0.001 per transaction. A
number of successive transactions between the buyer b4
and seller s2 were observed where Ballot Stuffing attack
was launched on buyer b4 after 20, 50, 75, 95 and 100
transactions between buyer b4 and seller s2. It was seen that
the increase in reputation due to BS reduced with the
increase in number of transactions as shown in Table 6.
Table 6: Effect of BS reduces with increase in number of
transactions between buyer b4 and seller s2
Value
Number
of Tran-
of Tran-
saction
sactions
Effect of
BS in %
Change of
Reputation
0.47
0.44
0.48
0.51
0.46
20
50
75
95
100
12000 0.528
1500 0.448
5300 0.505
3000 0.523
2700 0.473
0.94
0.93
0.95
0.94
0.95
0.858
0.689
0.616
0.565
0.473
62.29
53.83
22.01
3.98
0
It was also observed that the effect of Badmouthing would
also be reduced due to reduced weightage of shared
reputation with the increase in transactional experience of
a buyer-seller pair.
6. Conclusions
This paper proposed a framework for a dynamic reputation
system that is sensitive to the changing parameters of e-
market environment like experience of agents and the
value of a transaction in e-market environment. The
proposed system has improved inbuilt defense mechanisms
against various attacks especially against Ballot Stuffing
and Value Imbalance. In this framework, increase in
transactional experience leads to increased weightage of
individual reputation and honesty in a large transaction
leads to a greater increase in reputation as compared to a
small transaction. Further, non-satisfactory or fraudulent
large drop of
sellers are penalized with relatively
reputation
resulting
into
reduced
future business
opportunities. The proposed framework makes judicious
use of information sharing by adapting to the changing e-
market environment.
References
[1] A. Josang, R. Ismail, and C. Boyd, “A survey of Trust and
Reputation Systems
for Online service provision”,
Decision Support Systems, vol. 43, no. 2, 618 -644, (2007).
[2] B. Yu, M.P. Singh, “Detecting Deception in Reputation
Management”, In Proceedings of 2nd Int. Joint Conf. on
Autonomous Agents & Multiagent Systems, 73-80, (2003).
[3] B. Yu, M.P. Singh, “An evidential model of Distributed
Reputation management”, AAMAS’02, New York: ACM
Press, 294-301, (2002).
[4] B. Zong, F. Xu, J. Jiao, J. Lv, “A Broker-Assisting Trust
and Reputation System Based on Artificial Neural
Network”, IEEE, (2009).
[5] Chang, D.-Y., “Application of extent analysis method on
fuzzy AHP”, European Journal of Operations research,
Vol. 95, pp. 649-55, 2006.
[6] Chng-Hsing Yeh, Yu-Hern Chang, “Modelling subjective
evaluation for fuzzy group multi-criteria decision making”,
European Journal of Operational Research, pp. 464-473,
2009.
[7] Chou, C.C., “The representation of multiplication operation
on fuzzy numbers and application to solving fuzzy
multiple criteria decision making problems”, In Yang, Q.,
Webb, G. (eds.), LNCS (LNAI), vol. 4099, pp. 161 -169,
Springer –Heidelberg (2006).
[8] Christopher J. Hazard, M.P. Singh, “Reputation Dynamics
and Convergence: A Basis for Evaluating Reputation
Systems”.
[9] E. Shakshuki, S.A. Draz, “Agent-Mediated e-Commerce
System”, Proceedings of the 19th Int. Conference on
Advanced Information Networking and Application , vol. 2,
739–744, (2005).
[10] George Boulougaris, Kostas Kolomvatsos, and Stathes,
“Building the Knowledge Base of a Buyer Agent Using
Reinforcement Learning Techniques”, WCCI 2010 IEEE
World Congress on Computational Intelligence, July, 18 -
23, 2010 - CCIB, Spain.
[11] H. Huang, G. Zhu, S. Jin, “Revisiting Trust and Reputation
in Multi-Agent Systems”, Proceedings of
ISECS
International Colloquium on Computing, Communications,
Control, and Management, 424-429, (2008).
[12] H. Huang, G. Zhu, S.Jin, “Revisiting Trust and Reputation
in Multi-Agent Systems”, In Proceedings of ISECS Int.
Colloquium on Computing, Communications, Control, and
Management, 424-429, (2008).
[13] http://www.amazon.com/.
[14] http://www.ebay.com/.
[15] J. Patel, W.T.L. Teacy, N.R. Jennings, M. Luck, “A
Probabilistic Trust Model
Inaccurate
for Handling
Reputation Sources”, Springer-Verlag 2005, LNCS 377,
193-209, (2005).
[16] J. Sabater, C. Sierra, “REGRET: Reputation in Gregarious
garious Societies”, Proceedings of the Fifth Int. conference
on Autonomous Agents, Canada, 194-195.
[17] J. Sabater, C. Sierra, Reputation and Social Network
Analysis in MAS, AAMAS’02, Bologna, Italy, (2002).
[18] Kevin Hoffman, David Zage, and Cristina Nita-Rotaru, “A
Survey of Attack and Defence Techniques for Reputation
Systems”, ACM Computing Surveys, Vol. 42, Issue 1,
March 2010.
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, July 2011
ISSN (Online): 1694-0814
www.IJCSI.org
13
[19] Li Ziong and ling Liu, “PeerTrust: Supporting Reputaiton -
Based Trust for P2P Electronic Communities”, IEEE
Transactions on Kowledge and Data Enineering, Vol. 16,
No. 7, 2004.
[20] Ohbyung Kwon, “A Pervasive P3P based negotiation
mechanism for privacy-aware pervasive e-commerce”,
Decision Support Systems 50, 213-221 (2011).
[21] Omid Roozmand, Mohammad Ali Bematbakshsh, Ahmad
Barrani, “An Electronic marketplace based on Reputational
and Learning”, Journal of Theorotical and Applied
Electronic Commerce Research,
ISSN
0718-1876
Electronic Version, VOL2/ISSUE 1/APRIL 2007/1-17.
[22] P. Resnick, R. Zeckhakuser R., E. Friedman, K. Kuwabara,
“Reputation Systems: Facilitating Trust
in
Internet
Interactions”, Comm. ACM 43-12, pp. 45-48, 2000.
[23] P. Resnick, R. Zeckhausser, J. Swanson, “Trust among
strangers in Internet Transactions: Empirical Analysis of
ebay’s Reputation System”, The Economics of the Internet
and E-Commerce, Advances in Applied microeconomics,
vol. 11, Elsevier Science, (2002).
[24] R. Kerr, R. Cohen, Modelling trust using transactional,
numerical Units, Proceedings of the conference on Privacy,
Security and Trust, Markham, Canada, (2006).
[25] T. Tran, and R. Cohen, “A Learning Algorithm for Buying
and Selling Agents in Electronic Marketplaces” Advances
in AI, LNCS, Vol. 2338, 31-43, Springer-Verlag (2002).
[26] T. Tran, and R. Cohen, “Improving user satisfaction in
agent-based
electronic marketplaces by
reputation
modelling and adjustable product quality”, AAMAS’04,
pp. 828-835 (2004).
[27] Vibha Gaur, Neeraj Kumar Sharma, Punam Bedi, “Evaluat-
ing Reputation Systems for Agent Mediated e-Commerce”,
ACEEE conference “International Conference on Advances
in Computer Science”, ACS 2010, Kerala, India, December
2010.
[28] Vibha Gaur, Neeraj Kumar Sharma, Punam Bedi, “A
Dynamic Learning Strategy of Reputation Systems for
Agent Mediated e-Commerce”, Int. J. on Recent Trends in
Engineering & Technology, Vol. 05, No. 01, Mar 2011.
[29] Vibha Gaur, Neeraj Kumar Sharma, “A Dynamic Seller
Seller Selection Model for Agent Mediated e-market”,
Springer
conference
“International Conference on
Advances in Computing and Communication”, ACC 2011,
Kochi, India, 2011.
Vibha Gaur: She is PhD from the department of Computer
Science, Delhi University. She is working as Reader in Delhi
University and has a teaching experience of about 12 years . She
has authored more than 18 papers in various international
conferences and journals. Her current research interests include
artificial
intelligence,
information
systems and
software
engineering.
Neeraj Kumar Sharma: PhD student at Delhi University. He is
also working as Assistant Professor in Delhi University and has a
teaching experience of about 8 years. He has published two
booklets pertaining to MCA syllabus of IGNOU in the subjects
Artificial Intelligence and Algorithms. He has presented two papers
in international conferences by ACEEE (ACS 2010) and Springer
(ACC 2011). He has also published a paper in International
Journal on Recent Trends in Engineering & Technology.
|
1806.04254 | 1 | 1806 | 2018-06-11T21:55:45 | Compositional Discovery of Workflow Nets from Event Logs Using Morphisms | [
"cs.MA",
"cs.LO"
] | This paper presents a modular approach to discover process models for multi-agent systems from event logs. System event logs are filtered according to individual agent behavior. We discover workflow nets for each agent using existing process discovery algorithms. We consider asynchronous interactions among agents. Given a specification of an interaction protocol, we propose a general scheme of workflow net composition. By using morphisms, we prove that this composition preserves soundness of components. A quality evaluation shows the increase in the precision of models discovered by the proposed approach. | cs.MA | cs |
Compositional Discovery of Workflow Nets from
Event Logs Using Morphisms(cid:63)
Luca Bernardinello2, Irina Lomazova1, Roman Nesterov1,2, and Lucia Pomello2
1 National Research University Higher School of Economics,
20 Myasnitskaya Ulitsa, 101000 Moscow, Russia
2 Dipartimento di Informatica Sistemistica e Comunicazione,
Universit`a degli Studi di Milano-Bicocca,
Viale Sarca 336 - Edificio U14, I-20126 Milano, Italia
Abstract. This paper presents a modular approach to discover process
models for multi-agent systems from event logs. System event logs are
filtered according to individual agent behavior. We discover workflow
nets for each agent using existing process discovery algorithms. We con-
sider asynchronous interactions among agents. Given a specification of
an interaction protocol, we propose a general scheme of workflow net
composition. By using morphisms, we prove that this composition pre-
serves soundness of components. A quality evaluation shows the increase
in the precision of models discovered by the proposed approach.
Keywords: Petri nets, workflow nets, multi-agent systems, morphisms,
composition, process discovery
1
Introduction
Process discovery focuses on the synthesis of process models from event logs con-
taining the observed record of an information system behavior. Process models
are usually developed at the design stage of the information system life-cycle.
However, the real observed behavior of the information system can eventually
differ from the designed one. In some cases, designers cannot develop precise
models describing all possible scenarios. That is why, process discovery is a topic
of great interest at the moment.
Many process discovery algorithms have been proposed over recent years.
They include Genetic algorithms, HeuristicMiner, Fuzzy miner, Inductive miner,
the algorithms based on integer linear programming (ILP), and on the theory of
regions (see [3] for a comprehensive review). They can be applied to solve typical
problems of event logs, e.g. incompleteness and noise.
Within multi-agent systems (MAS), models obtained by existing process dis-
covery tools can be incomprehensible since concurrent interacting agents pro-
duce rather sophisticated behavior. Process models of MAS, obtained by the
(cid:63) This work is supported by MIUR, Basic Research Program at the National Research
University Higher School of Economics, and Russian Foundation for Basic Research,
project No.16-01-00546.
algorithms mentioned above, are not structured in such a way that it is possible
to identify agent models as components as shown by the following example.
In order to give an intuition behind our approach, consider the system model
shown in Fig. 1(a). Two interacting agents can be clearly identified as well as
the way they interact by looking at the small grey places and arcs. Now take the
event log produced by this system as the input to a process discovery algorithm.
If we try to discover a model from this log directly, we can obtain, for instance,
the results shown in Fig. 1(b) by inductive miner and in Fig. 1(c) by ILP miner.
Although equivalent to the original one in their ability to reproduce the same
event sequences, their structure hides the fact the original system is made of two
agents, communicating through channels. More technically, the two agents cor-
respond to two S-invariants in the original model, while they are not "separable"
by means of S-invariants in the discovered models. It is true that we can improve
the overall structure of models by configuring algorithm parameters. However,
they still will not reflect the underlying MAS organization.
(a) an intitial system model
(b) inductive miner
(c) ILP miner
Fig. 1. Discovering process models of MAS from event logs
We propose a compositional approach to address the problem of discovering
process models of MAS from event logs clearly expressing agents as compo-
nents and their interactions. We assume that agents interact asynchronously
via message passing. System event logs are projected on each agent to discover
component models in terms of workflow nets by using existing process discovery
algorithms. By means of morphisms, we can construct abstract models of the
agents and compose them by adding channels for message passing. This com-
position models the protocol of agent interaction. In this way, it is possible to
check soundness of this simplified model and to compose the discovered agent
models on the basis of this protocol. We prove that this composition preserves
soundness of the protocol and components by construction. In this paper, we
start constructing a formal background to the general compositional approach
to discovering process models of multi-agent systems from event logs.
The problem of discovering structured models from logs is not new and has
been studied in several works based on composition. In [17] the authors have
designed a technique to discover readable models by decomposing transition
systems. A special method to deal with process cancellations has been studied
in [16]. Regular process behavior is composed with cancellations using reset arcs.
A rather large amount of literature has been devoted to Petri net compo-
sition (see, for example, [8,12,24]). In particular, regarding asynchronous com-
munication, several approaches have been proposed. Among the others, in [13]
asynchronous composition of Petri nets through channels has been studied con-
sidering preservation of various channel properties. A general approach to asyn-
chronous composition has also been discussed in [4], where open nets have been
introduced. The core problem of composition lies in preserving component prop-
erties. Open nets have been used by many researches especially focused on mod-
eling composite services (see, for example, [14,15]). They have proposed both
structural and behavioral techniques assuring the correctness of composition.
Using morphisms is another possible way to achieve inheritance of component
properties. Composition of Petri nets via morphisms has been studied in several
works [4,5,7,11,21,22,26]. We will use α-morphisms and the related composition
presented in [6]. In general, α-morphisms allow one to preserve/reflect properties
checking structural and only local behavioral constraints. In the particular case
considered here, α-morphisms preserve/reflect reachable markings and transition
firings as well as preserve soundness as it will be shown in Section 3.
From a more practical point of view, many researchers have considered work-
flow net composition. Workflow nets (WF-nets) form a class of Petri nets used
to model processes and services. Among the others, composition of WF-nets via
shared resources has been studied in [20,25] with a concern about soundness
preservation. In addition, other approaches have been used for modeling and
composing interacting workflow nets [19,23]. Many works have concerned the
web service composition (see the survey [10]), where the authors have stressed
that there is a lack of execution engines based on Petri nets.
The paper is organized as follows. Section 2 gives preliminary definitions
used in this paper as well as composition by channels and α-morphisms. Section
3 discusses properties preserved and reflected by α-morphisms, relevant to WF-
nets. Section 4 introduces a modular approach to construct models of MAS from
event logs, using the same illustrative example shown in Fig. 1. In Section 5, we
summarize the paper by discussing results and possible continuations.
x∈A •x, A• =(cid:83)
x∈A x•, •A• = •A ∪ A•.
elements.
of x ∈ X. Let A ⊆ X, then •A =(cid:83)
2 Preliminaries
N denotes the set of non-negative integers. A+ denotes the set of all finite non-
empty sequences over A, and A∗ = A+∪{}, is the empty sequence. A multiset
m over a set S is a function m : S → N. Let m1, m2 be two multisets over S.
Then m1 ⊆ m2 ⇔ m1(s) ≤ m2(s) for all s ∈ S. Also, m(cid:48) = m1 + m2 ⇔ m(cid:48)(s) =
m1(s) + m2(s), m(cid:48)(cid:48) = m1 − m2 ⇔ m(cid:48)(cid:48)(s) = max(m1(s) − m2(s), 0) for all s ∈ S.
A Petri net is a triple N = (P, T, F ), where P and T are two disjoint sets
of places and transitions, i.e. P ∩ T = ∅, and F ⊆ (P × T ) ∪ (T × P ) is a flow
relation, where dom(F )∪cod(F ) = P ∪T . We consider nets, s.t. ∀t ∈ T : •t ≥ 1
and t• ≥ 1.
Let N = (P, T, F ) be a Petri net, and X = P ∪ T . The set •x = {y ∈
X(y, x) ∈ F} denotes the preset of x ∈ X. The set x• = {y ∈ X(x, y) ∈ F}
denotes the postset of x ∈ X. The set •x• = •x ∪ x• denotes the neighborhood
By N (A) we denote a subnet of N generated by A, i.e. N (A) = (P ∩ A, T ∩
A, F ∩ (A × A)). Let N (A) be a subnet of N generated by A ⊆ X. The set
(cid:13)N (A) = {y ∈ A∃z ∈ X\A : (z, y) ∈ F or •y = ∅} denotes the input elements.
The set N (A)(cid:13) = {y ∈ A∃z ∈ X \ A : (y, z) ∈ F or y• = ∅} denotes the output
A marking (state) of a Petri net N = (P, T, F ) is a function m : P → N. It is a
multiset over a set of places P . A marked Petri net (N, m0) is a Petri net together
with its initial marking m0. A marking m enables a transition t ∈ T , denoted
m[t(cid:105), if •t ⊆ m. The firing of t at m leads to a new marking m(cid:48) = m − •t + t•,
denoted m[t(cid:105)m(cid:48).
A sequence w ∈ T ∗ is a firing sequence of N = (P, T, F, m0) if w = t1t2 . . . tn
and m0[t1(cid:105)m1[t2(cid:105) . . . mn−1[tn(cid:105)mn. Then we can write m0[w(cid:105)mn. The set of all
firing sequences of N is denoted by F S(N ).
A marking m of N = (P, T, F, m0) is reachable if ∃w ∈ F S(N ) : m0[w(cid:105)m.
The set of all markings of N reachable from m is denoted by [m(cid:105). A reachable
marking is dead if it does not enable any transition. N is deadlock-free if no
reachable marking is dead. N is safe if ∀p ∈ P ∀m ∈ [m0(cid:105) : m(p) ≤ 1. Then we
will specify reachable markings as subsets of places.
A state machine is a connected Petri net N = (P, T, F ), s.t. ∀t ∈ T : •t =
t• = 1. A subnet of a marked Petri net N = (P, T, F, m0) identified by a subset
of places A ⊆ P and its neighborhood, i.e. N (A∪•A•), is a sequential component
of N if it is a state machine and has a single token in the initial marking. N
is covered by sequential components if every place of N belongs to at least one
sequential component. Then N is said to be state machine decomposable (SMD).
Semantics of a marked Petri net is given by its unfolding as defined below.
Let N = (P, T, F ) be a Petri net, and F ∗ be the reflexive transitive closure
of F. Then ∀x, y ∈ P ∪ T : (a) x and y are in causal relation, denoted x < y, if
(x, y) ∈ F ∗; (b) x and y are in conflict relation, denoted x#y, if ∃tx, ty ∈ T , s.t.
tx (cid:54)= ty, •tx ∩ •ty (cid:54)= ∅, and tx < x, ty < y.
Definition 1. A Petri net O = (B, E, F ) is an occurrence net if:
1. ∀b ∈ B : •b ≤ 1.
2. F ∗ is a partial order.
3. ∀x ∈ B ∪ E : {y ∈ B ∪ Ey < x} is finite.
4. ∀x, y ∈ B ∪ E : x#y ⇒ x (cid:54)= y.
By definition, O is acyclic. M in(O) denotes the set of minimal nodes of O
w.r.t. F ∗, i.e. the elements having the empty preset. We only consider nets having
transitions with non-empty presets and postsets, then M in(O) ⊆ B.
Definition 2. Let N = (P, T, F, m0) be a marked safe Petri net, O = (B, E, F )
be an occurrence net, and π : B ∪ E → P ∪ T be a map. (O, π) is a branching
process of N if:
1. π(B) ⊆ P and π(E) ⊆ T .
2. π restricted to Min(O) is a bijection between Min(O) and m0.
3. ∀t ∈ T : π restricted to •t is a bijection between •t and •π(t), and similarly
4. ∀t1, t2 ∈ T :
if •t1 = •t2 and π(t1) = π(t2), then t1 = t2.
for t• and π(t)•.
The unfolding of N , denoted U(N ), is the maximal branching process of N ,
s.t. any other branching process of N is isomorphic to a subnet of U(N ) with
the map π restricted to the elements of this subnet. The map associated with
the unfolding is denoted u and called folding.
Workflow nets form a subclass of Petri nets used for process modeling. We
define generalized workflow nets having an initial state m0 and a final state mf .
Definition 3. A marked Petri net N = (P, T, F, m0, mf ) is a generalized work-
flow net (GWF-net) if and only if:
1. m0 = {s ∈ P •s = ∅} and m0 (cid:54)= ∅.
2. mf = {f ∈ P f• = ∅} and mf (cid:54)= ∅.
3. ∀x ∈ P ∪ T ∃s ∈ m0 ∃f ∈ mf : (s, x) ∈ F ∗ and (x, f ) ∈ F ∗.
If m0 = mf = 1, then a generalized workflow net is called just a workflow
net (WF-net, for short). State machine decomposable GWF-nets are safe. The
important correctness property of GWF-nets is soundness [2].
Definition 4. A GWF-net N = (P, T, F, m0, mf ) is sound if and only if:
1. ∀m ∈ [m0(cid:105) : mf ∈ [m(cid:105).
2. ∀m ∈ [m0(cid:105) : mf ⊆ m ⇒ m = mf .
3. ∀t ∈ T ∃m ∈ [m0(cid:105) : m[t(cid:105).
We consider composition of two GWF-nets by adding channels. A set of
channel places (channels, for short) is denoted by Pc. This approach is similar to
the one presented in [13]. They model asynchronous communication via message
passing. Some transitions of two nets can either send a message by an incoming
arc to a channel or receive a message by an outgoing arc from a channel. We
assume to know exactly which transitions send/receive messages to/from which
channel places. In order to simplify the notation, we will not introduce special
transition labels indicating sending/receiving.
Two GWF-nets can be composed via a set of channels Pc iff any channel
receiving a message from one GWF-net send it only to the other GWF-net.
0, mi
f ∪ m2
f .
Definition 5. Let Ni = (Pi, Ti, Fi, mi
f ) be a GWF-net for i = 1, 2, s.t. N1
and N2 are disjoint, where P1 ∩ P2 = ∅ and T1 ∩ T2 = ∅. Let Pc be a set of
channels. A channel-composition of N1 and N2, denoted N1 ⊕Pc N2, is a Petri
net N = (P, T, F, m0, mf ), where:
1. P = P1 ∪ P2 ∪ Pc, where Pc ∩ (P1 ∪ P2) = ∅.
2. T = T1 ∪ T2.
3. F = F1 ∪ F2 ∪ Fc, where Fc ⊆ (Pc × (T1 ∪ T2)) ∪ ((T1 ∪ T2) × Pc).
4. m0 = m1
0 ∪ m2
5. ∀p ∈ Pc :
0 and mf = m1
(a) (•p ⊆ T1 or •p ⊆ T2) and (p• ⊆ T1 or p• ⊆ T2),
(b) •p ⊆ Ti ⇔ p• ⊆ T(i+1) mod 2,
(c) •p (cid:54)= ∅ and p• (cid:54)= ∅.
Remark 1. The operation ⊕Pc is commutative, i.e. N1 ⊕Pc N2 = N2 ⊕Pc N1.
By the following proposition, the class of GWF-nets is closed under the
channel-composition. Figure 2(a) provides an example of channel-composition
of N1 and N2, where channels are indicated by small gray places.
Proposition 1. If N1 and N2 are GWF-nets, then N1 ⊕Pc N2 is a GWF-net.
Proof. We show that each channel lies on a path from a place in mi
0 to a place
in mj
f , where j = (i + 1) mod 2 and i = 1, 2. Take p ∈ Pc. By Def. 5.5, •p ⊆
Ti ⇔ p• ⊆ Tj. Take ti ∈ •p and tj ∈ p•. By Def. 3.3, ∃s ∈ mi
0, s.t. (s, ti) ∈ F ∗i .
Then (s, p) ∈ F ∗. By Def. 3.3, ∃f ∈ mj
f , s.t. (tj, f ) ∈ F ∗j . Then (p, f ) ∈ F ∗. (cid:117)(cid:116)
Further, we recall the definition of α-morphisms (see Definition 6 and Defi-
nition 7 in [6]) supporting abstraction and refinement for Petri nets. An exam-
ple of α-morphism is shown in Fig. 2(b), where the refinement is given by the
shaded ovals and by the transition labeling explicitly. Refinement can also require
splitting transitions of the abstract model. After giving the formal definition of
α-morphisms, we will provide an intuition behind them.
Definition 6. Let Ni = (Pi, Ti, Fi, mi
0) be a marked SMD safe Petri net, Xi =
Pi∪Ti, i = 1, 2. An α-morphism from N1 to N2 is a total surjective map ϕ : X1 →
X2, also denoted ϕ : N1 → N2, such that:
1. ϕ(P1) = P2.
2. ϕ(m1
0) = m2
0.
if ϕ(t) ∈ T2, then ϕ(•t) = •ϕ(t) and ϕ(t•) = ϕ(t)•.
3. ∀t ∈ T1 :
if ϕ(t) ∈ P2, then ϕ(•t•) = {ϕ(t)}.
4. ∀t ∈ T1 :
5. ∀p2 ∈ P2 :
(a) N1(ϕ−1(p2)) is an acyclic net;
(b) ∀p ∈ (cid:13)N1(ϕ−1(p2)) : ϕ(•p) ⊆ •p2, and if •p2 (cid:54)= ∅, then •p (cid:54)= ∅;
(c) ∀p ∈ N1(ϕ−1(p2))(cid:13) : ϕ(p•) = p2•;
(d) ∀p ∈ P1 ∩ ϕ−1(p2) : p /∈ (cid:13)N1(ϕ−1(p2)) ⇒ ϕ(•p) = p2 and
p /∈ N1(ϕ−1(p2))(cid:13) ⇒ ϕ(p•) = p2;
(e) ∀p ∈ P1 ∩ ϕ−1(p2) :
N1, s.t. p ∈ P (cid:48) and ϕ−1(•p2•) ⊆ T (cid:48).
there is a sequential component N(cid:48) = (P (cid:48), T (cid:48), F (cid:48)) of
(a) N1 ⊕Pc N2, Pc = {x, y, z}
(b) α-morphism ϕ : N(cid:48)
2 → N2
Fig. 2. Introductory examples
By definition, α-morphisms allow us to refine places by replacing them with
subnets. Thus, if a transition is mapped on a place, then its neighborhood should
be mapped on the same place (4). If a transition is mapped on a transition, it
should have the corresponding neighborhood (3).
Indeed, α-morphisms are motivated by the attempt to ensure that properties
of an abstract model hold in its refinement. Each output place of a subnet should
have the same choices as its abstraction does (5c). However, input places do not
need this constraint (5b), because the choice between them is done before, since
there are no concurrent events in the neighborhood of the subnet (5e). Moreover,
5d guarantees that presets and postsets of places, internal to the subnet, are
mapped to the same place as the subnet. Conditions 5a-5e together ensure the
intuition behind α-morphisms. If a subnet of N1 refines a place in N2, then it
behaves "in the same way". More precisely, by Lemma 1 of [6], (a) no input
transition of the subnet is enabled whenever a token is inside the subnet; and
(b) firing an output transition of the subnet empties it.
3 Properties Preserved and Reflected by α-Morphisms
In this section, we study properties preserved and reflected by α-morphisms. In
[6] several properties of α-morphisms have already been studied. Here we will
mention some of them and consider properties of α-morphisms for GWF-nets.
In the following propositions, we assume Ni = (Pi, Ti, Fi, mi
0) to be a marked
SMD safe Petri net for i = 1, 2, s.t. there is an α-morphism ϕ : X1 → X2, where
Xi = Pi ∪ Ti.
To begin with, α-morphisms preserve the structure of GWF-nets.
Proposition 2. If N1 is a GWF-net, then N2 is a GWF-net.
Proof. We prove that N2 satisfies three structural conditions of Def. 3.
1. By Def. 6.2, ϕ(m1
0. Suppose ∃p2 ∈ m2
2. By Def. 3.2, m1
f ) by m2
f : p• = ∅.
0 : •p2 (cid:54)= ∅. By Def. 6.5b,
0, s.t. ϕ(p1) = p2.
0 : •p = ∅. Then,
3. Suppose ∃x2 ∈ X2, s.t. ∀p ∈ m2
1, . . . , xk
f and p1• = ∅ (by Def. 3.2). Then p2• = ∅ and ∀p ∈ m2
0) = m2
if •p2 (cid:54)= ∅, then •p (cid:54)= ∅. Take p1 ∈ m1
∀p ∈ (cid:13)N1(ϕ−1(p2)) :
Since p1 ∈ (cid:13)N1(ϕ−1(p2)), then •p1 (cid:54)= ∅. By Def. 3.1, ∀p ∈ m1
•p2 = ∅ and ∀p ∈ m2
0 : •p = ∅.
f : p• = ∅. Denote ϕ(m1
f ⊆ P1, s.t. ∀p ∈ m1
f ⊆ P2.
f : p2• (cid:54)= ∅. Take p1 ∈ m1
Suppose ∃p2 ∈ m2
f , s.t. ϕ(p1) = p2. By Def. 6.5c,
∀p ∈ N (ϕ−1(p2))(cid:13) : ϕ(p•) = p2•. Since p1 ∈ N (ϕ−1(p2))(cid:13), then p1• (cid:54)= ∅. But
p1 ∈ m1
0 : (p, x2) /∈ F ∗2 . By Def. 6, ϕ−1(x2) =
1} ⊆ X1. If x2 ∈ T2, then ϕ−1(x2) ⊆ T1, and take x1 ∈ ϕ−1(x2). If
{x1
0 : (s, x1) ∈ F ∗1 .
x2 ∈ P2, then take x1 ∈ (cid:13)N (ϕ−1(x2)). By Def. 3.3, ∃s ∈ m1
Then, ϕ(•x1) ∈ •x2 or ϕ(•x1) = x2. We come backward through the whole path
from s to x1 mapping it on N2 with ϕ. We obtain that ∃x(cid:48) ∈ X2 : (x(cid:48), x2) ∈ F ∗2 ,
s.t. ϕ(s) = x(cid:48).
f : (x2, p) /∈ F ∗2 . By Def. 6, ϕ−1(x2) =
1} ⊆ X1. If x2 ∈ T2, then ϕ−1(x2) ⊆ T1, and take x1 ∈ ϕ−1(x2).
{x1
If x2 ∈ P2, then take x1 ∈ N (ϕ−1(x2))(cid:13). By Def. 3.3, ∃f ∈ m1
f : (x1, f ) ∈ F ∗1 .
Then, ϕ(x1•) ∈ x2• or ϕ(x1•) = x2. We come forward through the whole path
from x1 to f mapping it on N2 with ϕ. We obtain that ∃x(cid:48) ∈ X2 : (x2, x(cid:48)) ∈ F ∗2 ,
s.t. ϕ(f ) = x(cid:48).
(cid:117)(cid:116)
Remark 2. It follows from Proposition 2 that ϕ(m1
f . In the general case
the converse of Proposition 2 is not true. In fact, α-morphisms do not reflect the
initial state of GWF-nets properly (see Fig. 3(a)).
Suppose ∃x2 ∈ X2, s.t. ∀p ∈ m2
1, . . . , xk
f ) = m2
Recall from [6] that N1 is well marked w.r.t. ϕ if each input place of a subnet
in N1, refining a marked place in N2, is marked. Consider the α-morphism shown
in Fig. 3(a), the token of the shaded subnet must be placed into p to make N1
well marked w.r.t. to ϕ. The structure of GWF-nets is reflected under the well-
markedness of N1 (see the following Proposition). However, if N1 is a GWF-net
related to N2 by an α-morphism, then N1 is well marked w.r.t. ϕ.
(a)
(b)
Fig. 3. An α-morphism: two examples
Proposition 3. If N2 is a GWF-net and N1 is well marked w.r.t. ϕ, then N1
is a GWF-net.
Proof. We prove that N1 satisfies three structural conditions of Def. 3.
1. By Def. 3.1, ∀s2 ∈ m2
0}. Take N1(ϕ−1(s2)) corresponding to s2 ∈ m2
f} and ∀f1 ∈ m1
3. Suppose ∃x1 ∈ X1, s.t. ∀s1 ∈ m1
0 : •s2 = ∅. Since N1 is well marked w.r.t. ϕ, m1
0 =
{(cid:13)N1(ϕ−1(s2)) s2 ∈ m2
0. Assume
∃p ∈ (cid:13)N1(ϕ−1(s2)), s.t. •p (cid:54)= ∅. Note that ϕ(p) = s2. Then ϕ(•p) = s2 (by Def.
6.4), and p /∈ (cid:13)N1(ϕ−1(s2)).
f : f2• = ∅. Take N1(ϕ−1(f2)) corresponding to
2. By Def. 3.2, ∀f2 ∈ m2
f and p ∈ N1(ϕ−1(f2))(cid:13). Note that ϕ(p) = f2. Assume p• (cid:54)= ∅.
f2 ∈ m2
Then ϕ(p•) = p2 (by Def. 6.4) and p /∈ N1(ϕ−1(f2))(cid:13). We obtain that m1
f =
f : f1• = ∅.
{N1(ϕ−1(f2))(cid:13) f2 ∈ m2
0 : (s1, x1) /∈ F ∗1 . If (x1, x1) /∈ F ∗1 , we
go backward through the path from x1 to the first node x(cid:48)1 ∈ X1, s.t. •x(cid:48)1 = ∅.
Since ∀t ∈ T1 : •t ≥ 1, then x(cid:48)1 ∈ P1. If x(cid:48)1 /∈ m1
0, then N1 is not well marked
w.r.t. ϕ. If (x1, x1) ∈ F ∗1 , we know by Def. 6.5a that there is a corresponding
0 : (s2, x2) ∈ F ∗2 .
cycle in N2. Take x2 ∈ X2, s.t. ϕ(x1) = x2. By Def. 3.3, ∃s2 ∈ m2
Take x(cid:48)2 ∈ X2 belonging to this cycle, s.t. at least one element in •x(cid:48)2 is not in
the cycle. Since ϕ is surjective, ∃x(cid:48)1 ∈ X1 : ϕ(x(cid:48)1) = x(cid:48)2, belonging to the cycle
(x1, x1) ∈ F ∗1 . If x(cid:48)2 ∈ T2, then ϕ−1(x(cid:48)2) ⊆ T1. By Def. 6.3, the neighborhood of
transitions is preserved by ϕ. Then, ∀t1 ∈ ϕ−1(x(cid:48)2) : ϕ(•t1) = •x(cid:48)2, i.e. there must
be a place in •ϕ−1(x(cid:48)2) which is not in the cycle (x1, x1) ∈ F ∗1 . If x(cid:48)2 ∈ P2, then
take (cid:13)N1(ϕ−1(x(cid:48)2)). At least one place in (cid:13)N1(ϕ−1(x(cid:48)2)) should have an input
transition which is not in the cycle (x1, x1) ∈ F ∗1 , since there exists an element
in •x(cid:48)2 which is not in the cycle in N2. We have shown that ∃x ∈ •x(cid:48)1, s.t. x is
not in the cycle (x1, x1) ∈ F ∗1 . Now either there is a path from x to x∗ in N1,
s.t. •x∗ = ∅, or there is another cycle (x∗, x∗) ∈ F ∗1 .
f : (x1, f1) ∈
F ∗1 . The only difference is that we need to go forward through the paths.
(cid:117)(cid:116)
We recall in the following proposition that α-morphisms preserve reachable
By using a similar reasoning, we prove that ∀x1 ∈ X1 ∃f1 ∈ m1
markings and firing of transitions.
0(cid:105). If m1[t(cid:105)m(cid:48)1, where
0(cid:105). Then ϕ(m1) ∈ [m2
Proposition 4 ([6]). Let m1 ∈ [m1
t ∈ T1, then:
1. ϕ(t) ∈ T2 ⇒ ϕ(m1)[ϕ(t)(cid:105)ϕ(m(cid:48)1).
2. ϕ(t) ∈ P2 ⇒ ϕ(m1) = ϕ(m(cid:48)1).
Remark 3 ([6]). In the general case α-morphisms do not reflect reachable mark-
0(cid:105) and m2[t2(cid:105) do not imply that there exists m1 = ϕ−1(m2) ∈
ings, i.e. m2 ∈ [m2
[m1
0(cid:105), s.t. ∀t ∈ ϕ−1(t2) : m1[t(cid:105).
To reflect reachable markings, we need to check local conditions as shown
in [6]. For any place p2 ∈ P2, refined by a subnet of N1, we construct a "local"
net, denoted S2(p2), of N2 by taking the neighborhood transitions of p2 plus
an artificial input and output place if needed. At the same time, we construct
the corresponding "local" net, denoted S1(p2), of N1 by taking the subnet of
N1 refining p2, i.e. N1(ϕ−1(p2)), and the transitions ϕ−1(•p2), ϕ−1(p2•) plus
an artificial input and output place if needed. The details are given in [6] (see
Definition 9 there).
There is an α-morphism ϕS from S1(p2) to S2(p2) which is a restriction of
ϕ on the places and transitions of S1(p2). In the following Lemma, taking the
unfolding of S1(p2), we assure that the final marking of the subnet enables the
same set of transitions which are enabled by its image. By Definition 6.5a, since
S1(p2) is acyclic, its unfolding is finite.
Lemma 1. Let U(S1(p2)) be the unfolding of S1(p2) with the folding function u,
and ϕS be an α-morphism from S1(p2) to S2(p2). Let N1 be a sound GWF-net.
Then, the map from U(S1(p2)) to S2(p2) obtained as ϕS ◦ u is an α-morphism.
Proof. Since N1 is a GWF-net, S1(p2) is a GWF-net. By [6] (see Lemma 1 there),
when a transition in ϕ−1(p2•) fires, it empties the subnet N1(ϕ−1(p2)). Then
S1(p2) is sound, and by Def. 4.3 ∀t ∈ T1∃m ∈ [m1
0(cid:105) : m[t(cid:105). So, each transition of
S1(p2) will occur at least once. Then, the folding u is a surjective function from
U(S1(p2)) to S1(p2), and ϕS ◦ u is an α-morphism from U(S1(p2)) to S2(p2). (cid:117)(cid:116)
As for the main results, we obtain that under the assumption of soundness
of the GWF-net N1, α-morphisms not only preserve, but also reflect reachable
markings and transition firings (see Proposition 5). Moreover, α-morphisms pre-
serve soundness as shown in Proposition 6.
Proposition 5. If N1 is a sound GWF-net, then ∀m2 ∈ [m2
ϕ(m1) = m2, and if ∃t2 ∈ T2 : m2[t2(cid:105), then ∀t1 ∈ ϕ−1(t2) : m1[t1(cid:105).
Proof. Follows from Lemma 1 and from [6] (see Proposition 5 there).
0(cid:105)∃m1 ∈ [m1
0(cid:105) :
Proposition 6. If N1 is a sound GWF-net, then N2 is a sound GWF-net.
Proof. We prove that N2 satisfies three behavioral conditions of Def. 4.
f ∈ [m1(cid:105). Then, ∃w ∈ T ∗1 : m1[w(cid:105)m1
[tn(cid:105)m1
f , i.e. w =
f . By Prop. 4, we can simulate w on N2,
1. By Def. 4.1, ∀m1 ∈ [m1
t1t2 . . . tn and m1[t1(cid:105)m1
0(cid:105) : m1
1 . . . mn−1
1
0(cid:105) : m2
f ∈ [m2(cid:105).
f . Then we can write m(cid:48)2 = m2
0(cid:105), s.t. ϕ−1(m1) = m(cid:48)2 and m1
f ) = m2
f . Now assume ∃m2 ∈ [m2
2. Suppose ∃m(cid:48)2 ∈ [m2
0(cid:105) : m(cid:48)2 ⊇ m2
and by Prop. 2, ϕ(m1
∃m(cid:48)1 ∈ [m1
By Prop. 4, we again simulate w(cid:48) on N2. Then m2
0(cid:105) : ϕ−1(m2) = m(cid:48)1. By Def. 4.1, m1
f . By Prop. 5, take m1 ∈ [m1
1 ∈ [m1(cid:105), i.e. ∃w ∈ T ∗1 : m1[w(cid:105)mf
∀p ∈ P (cid:48) : p /∈ m2
By Def. 4.1, mf
N2. By Prop. 2, ϕ(m1
is to consume at least one token from m2
contradiction.
f /∈ [m2(cid:105). By Prop. 5,
f ∈ [m(cid:48)1(cid:105), i.e. ∃w(cid:48) ∈ T ∗ : m(cid:48)1[w(cid:48)(cid:105)m1
f .
f ∪ P (cid:48), where
f (cid:54)⊆ m1.
1 . By Prop. 4, we simulate w on
f . The only way to completely empty places in P (cid:48)
f : p• (cid:54)= ∅ which is a
0(cid:105) : m1[t1(cid:105). The map ϕ is surjective, i.e.
∀t2 ∈ T2 : ∃t1 ∈ T1 : ϕ(t1) = t2. By Prop. 4, m1[t1(cid:105)m(cid:48)1 ⇒ ϕ(m1)[ϕ(t1)(cid:105)ϕ(m(cid:48)1).
Then, ∀t2 ∈ T2 ∃m2 ∈ [m2
(cid:117)(cid:116)
Remark 4. In the general case the converse of Proposition 6 is not true. Consider
the example shown in Fig. 3(b), where N2 is sound and N1 is not sound, since
transitions y1 and y2 are dead. Thus, α-morphisms do not reflect soundness.
Note that reachable markings are also not reflected in this example. However, in
the next section we will provide conditions under which soundness is reflected.
3. By Def. 4.3, ∀t1 ∈ T1 ∃m1 ∈ [m1
f ) = m2
f . Then ∃p ∈ m2
0(cid:105) : m2[t2(cid:105).
4 From Event Logs to Structured and Sound Models of
Multi-Agent Systems
In this section, we present our approach to process discovery by composing
individual agent models through α-morphisms. An event log L is a finite multiset
of finite non-empty sequences (traces) over a set of observable actions A.
We assume to have an event log L of two interacting agents. For instance,
we will further work with the same event log obtained from the MAS shown in
Fig. 1(a) which we have used in Section 1. We assume to know what actions are
executed by which agent, A = A1∪A2, s.t. A1∩A2 = ∅. Also, we assume to know
actions corresponding to their asynchronous "message-passing" interaction.
Instead of discovering the model directly from L, we propose to filter the log
according to the agent actions A1 and A2 producing two new logs L1 and L2.
Traces of L1 and L2 contain actions done only by a corresponding agent. By
using, for example, inductive miner [18], from L1 and L2 we obtain two GWF-
nets N(cid:48)1 and N(cid:48)2 modeling the two agents. By construction, N(cid:48)1 and N(cid:48)2 are well-
structured and sound, which implies that they are state machine decomposable
(see Corollary 4 in [1]). Well-structured models are recursively built from blocks
representing basic control flow constructs, e.g. choice, concurrency or cycle.
It is possible to compose N(cid:48)1 and N(cid:48)2 using the channel-composition as in
Definition 5 obtaining a new GWF-net N(cid:48)1 ⊕Pc N(cid:48)2, where channels are defined
according to the specification of agent interaction we have assumed to know.
However, it is obvious that N(cid:48)1 ⊕Pc N(cid:48)2 might not be sound. In order to avoid the
verification of N(cid:48)1 ⊕Pc N(cid:48)2, we apply the following approach to get its soundness
by construction.
(a) F c
= F ∩ [((Pc ∪ P2) × T2) ∪ (T2 × (Pc ∪ P2))];
N2
1 ⊆ (Pc × T (cid:48)1) ∪ (T (cid:48)1 × Pc).
(b) F c
N(cid:48)
4. m(cid:48)0 = m(cid:48)01 ∪ m2
5. ∀p ∈ Pc, ∀t ∈ T1 :
0 and m(cid:48)f = m(cid:48)f 1 ∪ m2
f .
We can abstract the discovered nets N(cid:48)1 and N(cid:48)2 w.r.t. interacting actions, thus
producing two GWF-nets N1 and N2, s.t. there is an α-morphism ϕi : N(cid:48)i → Ni
for i = 1, 2. According to Proposition 6, Ni is sound. The abstract models
can also be composed via the same channels obtaining N1 ⊕Pc N2. This abstract
model represents the interaction protocol between the agents. Obviously, N1⊕Pc
N2 is less complex than N(cid:48)1⊕Pc N(cid:48)2, and its soundness can be much easier verified.
Given N1 ⊕Pc N2 and the two α-morphisms ϕi : N(cid:48)i → Ni for i = 1, 2, we
can construct two new GWF-nets: N(cid:48)1 ⊕Pc N2 and N1 ⊕Pc N(cid:48)2, which actually
represent different abstractions of the same MAS. This construction is formally
defined in the following definition. We also show in Remark 5 that there is an
α-morphism from N(cid:48)1⊕Pc N2 (by symmetry, from N1⊕Pc N(cid:48)2) towards N1⊕Pc N2.
Definition 7. Let Ni = (Pi, Ti, Fi, mi
f ) be a GWF-net for i = 1, 2, and Pc
be a set of channels. Let N1⊕Pc N2 = (P, T, F, m0, mf ) be a channel-composition
of N1 and N2. Let N(cid:48)1 = (P (cid:48)1, T (cid:48)1, F (cid:48)1, m(cid:48)01, m(cid:48)f 1) be a GWF-net, s.t. there is an
α-morphism ϕ1 : N(cid:48)1 → N1. Construct N(cid:48)1 ⊕Pc N2 = (P (cid:48), T (cid:48), F (cid:48), m(cid:48)0, m(cid:48)f ), where:
1. P (cid:48) = P (cid:48)1 ∪ P2 ∪ Pc.
2. T (cid:48) = T (cid:48)1 ∪ T2.
3. F (cid:48) = F (cid:48)1 ∪ F c
N2 ∪ F c
N(cid:48)
, where:
0, mi
1
((t, p) ∈ F ⇒ ϕ−1(t) × {p} ⊆ F c
N(cid:48)
1
) and ((p, t) ∈ F ⇒ {p} × ϕ−1(t) ⊆ F c
N(cid:48)
1
).
Remark 5. Let N1, N(cid:48)1 and N2 be GWF-nets, and ϕ1 : N(cid:48)1 → N1 be an α-
morphism. Then there is an α-morphism ϕ(cid:48)1 : N(cid:48)1 ⊕Pc N2 → N1 ⊕Pc N2. In fact,
by construction, ϕ(cid:48)1 is given by ϕ1 plus the identity mapping of places and tran-
sitions of N2 together with the identity mapping of channel places.
Example 1. Here we consider as N1 ⊕Pc N2 the GWF-net shown in Fig.2(a). We
can refine it by models N(cid:48)1 or N(cid:48)2, discovered from filtered event logs L1 and L2
as shown in Fig. 4. The α-morphisms between the discovered models and the
abstract ones are indicated by the shaded ovals and the transition labeling. The
α-morphism between N(cid:48)2 and N2 has also been shown in Fig. 2(b).
As for the main result, we will prove in Proposition 7 that an α-morphism
from N(cid:48)1 ⊕Pc N2 (by symmetry, from N1 ⊕Pc N(cid:48)2) to N1 ⊕Pc N2 reflects the
soundness of N1⊕Pc N2. To prove this fact, we will use the property of reachable
markings of a channel-composition stated in the following Lemma.
Lemma 2. Let Ni = (Pi, Ti, Fi, mi
(P, T, F, m0, mf ). Then, ∀m ∈ [m0(cid:105) : m = m1∪ mc∪ m2, where m1 ∈ [m1
[m2
f ) a GWF-net for i = 1, 2, N1 ⊕Pc N2 =
0(cid:105), m2 ∈
0, mi
0(cid:105), and mc ⊆ Pc.
Proof. By Def. 5.4, m0 = m1
f . Take m ∈ [m0(cid:105), then
∃w ∈ F S(N1 ⊕Pc N2) : m0[w(cid:105)m, where w ∈ T ∗. By Def. 5.2, T = T1 ∪ T2.
Restricting w to T1 and T2 produces two firing sequences of N1 and N2 leading
from m1
0 to the reachable markings m1 and m2 which constitute m. (cid:117)(cid:116)
0 and mf = m1
f ∪ m2
0 ∪ m2
0 and m2
(a) N(cid:48)
1 ⊕Pc N2
(b) N1 ⊕Pc N(cid:48)
2
Fig. 4. Refining N1 ⊕Pc N2 with agent nets N(cid:48)
1 and N(cid:48)
2 discovered from filtered logs
Proposition 7. Let N1, N(cid:48)1 and N2 be sound GWF-nets, and ϕ1 : N(cid:48)1 → N1 be
an α-morphism. If N1 ⊕Pc N2 is sound, then N(cid:48)1 ⊕Pc N2 is sound.
Proof. By Rem. 5, there is an α-morphism ϕ(cid:48)1 from N(cid:48)1 ⊕Pc N2 to N1 ⊕Pc N2.
Assume N(cid:48)1 ⊕Pc N2 = (P (cid:48), T (cid:48), F (cid:48), m(cid:48)0, m(cid:48)f ) and N1 ⊕Pc N2 = (P, T, F, m0, mf ).
We prove that N(cid:48)1 ⊕Pc N2 satisfies the three conditions of soundness of Def. 4.
1. Take m(cid:48) ∈ [m(cid:48)0(cid:105). By Lemma 2, m(cid:48) = m(cid:48)1 ∪ m2 ∪ mc. By Prop. 4 for ϕ(cid:48)1,
ϕ(cid:48)1(m(cid:48)) = m ∈ [m0(cid:105). By Lemma 2, m = m1 ∪ m2 ∪ mc, where m2 and mc are
the same as in m(cid:48) and ϕ1(m(cid:48)1) = m1 (by Prop. 4 for ϕ1). Since N1 ⊕Pc N2 is
sound, ∃w ∈ F S(N1 ⊕Pc N2) : m[w(cid:105)mf , where w ∈ T ∗. It is possible to write
2v, where v = or v = t1
w = w1
1 ∈ T1, s.t. i ≥ 1.
2 can be obviously executed on the component N2 of N(cid:48)1 ⊕Pc N2 as well,
Then wi
because ϕ(cid:48)1 reflects the connection to channels (by Def. 7.5 and Rem. 5). Since
N(cid:48)1 is sound, ϕ1 reflects reachable markings and firing of transitions (by Prop. 5)
between N(cid:48)1 and N1. Thus, there is a reachable marking m(cid:48)1i in N(cid:48)1, belonging
to ϕ−1
1) is enabled
at m(cid:48)1i in N(cid:48)1. Moreover, these transitions are enabled in N(cid:48)1 ⊕Pc N2, because ϕ(cid:48)1
reflects connection to channels (by Def. 7.5 and Rem. 5). Hence, the sequence
w ∈ F S(N1 ⊕Pc N2) is reflected in N(cid:48)1 ⊕Pc N2 reaching its final marking m(cid:48)f .
m(cid:48)f = m(cid:48)f 1 ∪ m2
In this way, ϕ(cid:48)1(m(cid:48)) = ϕ(cid:48)1(m(cid:48)f 1) ∪ ϕ(cid:48)1(m2
2. Suppose by contradiction ∃m(cid:48) ∈ [m(cid:48)0(cid:105) : m(cid:48) ⊇ m(cid:48)f and m(cid:48) (cid:54)= m(cid:48)f . By Def. 7,
f ∪ m3. By Prop. 4 for ϕ(cid:48)1, ϕ(cid:48)1(m(cid:48)) ∈ [m0(cid:105).
f ∪ m3 =
1(cid:105) in N1, then any transition in ϕ−1
f ) ∪ ϕ(cid:48)1(m3) = ϕ1(m(cid:48)f 1) ∪ m2
f . Then m(cid:48) = m(cid:48)f 1 ∪ m2
2 ∈ T ∗2 and ti
1) in N1, s.t. if mi
1w2
2t2
1 . . . with wi
1 (ti
1 (mi
1[ti
m1
f ∪ m2
f ∪ m3 = mf ∪ m3 (by Rem. 5 and Def. 7.4). Thus, this marking strictly
covers the final marking mf of N1 ⊕Pc N2 which contradicts its soundness.
3. We prove that ∀t(cid:48) ∈ T (cid:48) ∃m(cid:48) ∈ [m(cid:48)0(cid:105) : m(cid:48)[t(cid:48)(cid:105). By Lemma 2, m(cid:48) = m(cid:48)1 ∪ m2 ∪
mc. By Def. 7.2, ∀t(cid:48) ∈ T (cid:48) : t(cid:48) ∈ T (cid:48)1 or t(cid:48) ∈ T2. If t(cid:48) ∈ T2, then since N1 ⊕Pc N2
is sound, ∃m ∈ [m0(cid:105), s.t. m[t(cid:48)(cid:105). By Rem. 5 and by Def. 7.5, m2 ∪ mc enables
t(cid:48). If t(cid:48) ∈ T (cid:48)1, then there are two cases. If ϕ(cid:48)1(t(cid:48)) ∈ P , then t(cid:48) is not connected
to channels. Since N(cid:48)1 is sound, m(cid:48)1 ⊆ m(cid:48) enables t(cid:48). If ϕ(cid:48)1(t(cid:48)) ∈ T , then take
t ∈ T , s.t. ϕ(cid:48)1(t(cid:48)) = t. Since N1⊕Pc N2 is sound, ∃m ∈ [m0(cid:105) : m[t(cid:105). By Prop. 5, ϕ1
reflects reachable markings and firings of transitions on N(cid:48)1. Moreover, ϕ(cid:48)1 reflects
connection to channels (by Def. 7.5 and Rem. 5). Then m(cid:48)1 ∪ mc enables t(cid:48). (cid:117)(cid:116)
Since there are two α-morphisms from N1 ⊕Pc N(cid:48)2 and N(cid:48)1 ⊕Pc N2 towards
N1 ⊕Pc N2, we can compose them by using the composition defined in [6] (see
Definition 12) obtaining as a result N with other two α-morphisms from N
towards N1⊕Pc N(cid:48)2 and N(cid:48)1⊕Pc N2, s.t. the diagram shown in Fig. 5(b) commutes.
Alternatively, by applying a similar construction as the one given in Defi-
nition 7, we can refine N2 in N(cid:48)1 ⊕Pc N2 by N(cid:48)2 obtaining N(cid:48)1 ⊕Pc N(cid:48)2 which is
isomorphic to the previously obtained composition N . Symmetrically, it is pos-
sible to refine N1 in N1 ⊕Pc N(cid:48)2 by N(cid:48)1 coming to the same result. According to
Remark 5, there are α-morphisms from N(cid:48)1⊕Pc N(cid:48)2 to N(cid:48)1⊕Pc N2 and to N1⊕Pc N(cid:48)2.
According to Proposition 7, N(cid:48)1 ⊕Pc N2 (by symmetry, N1 ⊕Pc N(cid:48)2) is sound, and
then N(cid:48)1 ⊕Pc N(cid:48)2 is also sound.
Thus, we have shown that it is possible to even simultaneously refine N1 and
N2 in the sound abstract model N1⊕Pc N2 by sound models N(cid:48)1 and N(cid:48)2 obtained
from filtered event logs, s.t. the result N(cid:48)1 ⊕Pc N(cid:48)2 is also sound.
Example 2. In Fig. 5(a), we show the result of composing, by means of α-
morphisms, N(cid:48)1 ⊕Pc N2 and N1 ⊕Pc N(cid:48)2 constructed in Example 1. This com-
position can also be obtained directly by the channel-composition of N(cid:48)1 and N(cid:48)2.
The obtained model meets the desired requirement stated in Section 1: we can
identify the agents as subnets and explicitly see their asynchronous interaction.
(a) composition N isomorphic to N(cid:48)
1 ⊕Pc N(cid:48)
2
(b) diagram
Fig. 5. Composition of N(cid:48)
1 ⊕Pc N2 and N1 ⊕Pc N(cid:48)
2 based on α-morphisms
N1⊕PcN2N01⊕PcN2N1⊕PcN02N4.1 Comparing Quality of Presented MAS Process Models
Process models of MAS presented in Fig. 1(b) and in Fig. 1(c) are discovered
directly from the log produced by simulating the model shown in Fig. 1(a). The
composition shown in Fig. 5(a), in fact, is obtained from the same log. That is
why, we have compared their quality using the standard process discovery metrics
[9]. Fitness measures how accurately a model can replay traces of an initial event
log. Intuitively, precision indicates a ratio between the behavior given by the log
and the one allowed by the model. If it is low, then a model allows for too much
additional behavior. Table 1 provides the result of this quality analysis.
Table 1. Fitness and precision of MAS models presented in the paper
Model
Algorithm
Discovery Fitness Precision
Figure 1(b) Inductive miner Direct
Figure 1(c) ILP miner
Direct
Figure 5(a) Inductive miner Composed
1,0000
1,0000
1,0000
0,1732
0,8516
0,8690
The result of the compositional process discovery shows the increase in preci-
sion resulting from the separate analysis of agent behavior. However, we can see
that the precision of the composed model is close to that of the model obtained
by ILP miner. Thus, the model can be appropriate in terms of precision, but not
in terms of the MAS structure.
5 Conclusion and Future Work
In this paper, we have proposed a compositional approach to discover process
models of multi-agent systems from event logs. We have considered asynchronous
agent interactions which are modeled by a channel-composition of two nets. We
assume that events can be partitioned, s.t. system event logs are filtered accord-
ing to agent behavior to discover their detailed models. In order to guarantee
that their composition is sound, we have proposed to abstract agent models,
by using α-morphisms, w.r.t. interacting actions thus constructing an abstract
model of a communication protocol. The general algorithm of constructing α-
morphisms is one of the open problems which is a subject for further research.
We have proven that, when this abstract protocol is sound, the direct composi-
tion of the detailed models is also sound. In proving this fact, we have used two
intermediate models corresponding to a detailed view of one agent composed
with the abstract view of the other.
The obtained system model is structured in such a way that it is possible to
identify agent models as components and their interactions are clearly expressed.
We have compared the quality of directly obtained models with the quality of
models obtained by the proposed approach. The quality of a composed model
is seen to be at the appropriate level in terms of fitness and precision being the
general process discovery quality dimensions. In the future, we suggest intro-
ducing a structural indicator showing the extent to which it is easy to identify
agents as parts of the model as well as their interaction.
We plan to explore more general asynchronous interactions, e.g. when the
same channel can be used by several agents as well as the possibility to have
both asynchronous and synchronous communication. Moreover, we would like to
generalize the proposed approach to other classes of nets. Another line of research
will be focused on dealing with dynamic changes. In particular, intermediate
models, mentioned above, can be used to check if changes in the behavior of an
agent affect the soundness of the whole system.
References
1. van der Aalst, W.M.P.: Workflow verification: Finding control-flow errors using
petri-net-based techniques. In: Business Process Management: Models, Techniques,
and Empirical Studies. LNCS, vol. 1806, pp. 161–183. Springer, Heidelberg (2000)
2. van der Aalst, W.M.P., van Hee, K.M., ter Hofstede, A.H.M., Sidorova, N., Verbeek,
H.M.W., Voorhoeve, M., Wynn, M.T.: Soundness of workflow nets: classification,
decidability, and analysis. Formal Aspects of Computing 23(3), 333–363 (2011)
3. Augusto, A., Conforti, R., Dumas, M., Rosa, M.L., Maggi, F.M., Marrella, A.,
Mecella, M., Soo, A.: Automated discovery of process models from event logs:
Review and benchmark. CoRR abs/1705.02288 (2017)
4. Baldan, P., Corradini, A., Ehrig, H., Heckel, R.: Compositional modeling of reactive
systems using open nets. In: Larsen, K.G., Nielsen, M. (eds.) CONCUR 2001.
LNCS, vol. 2154, pp. 502–518. Springer, Heidelberg (2001)
5. Bednarczyk, M.A., Bernardinello, L., Caillaud, B., Paw(cid:32)lowski, W., Pomello, L.:
Modular system development with pullbacks. In: ICATPN 2003. LNCS, vol. 2679,
pp. 140–160. Springer, Heidelberg (2003)
6. Bernardinello, L., Mangioni, E., Pomello, L.: Local state refinement and composi-
tion of elementary net systems: An approach based on morphisms. In: Transactions
on Petri Nets and Other Models of Concurrency VIII. LNCS, vol. 8100, pp. 48–70.
Springer, Heidelberg (2013)
7. Bernardinello, L., Monticelli, E., Pomello, L.: On preserving structural and be-
havioural properties by composing net systems on interfaces. Fundamenta Infor-
maticae 80(1-3), 31–47 (2007)
8. Best, E., Devillers, R., Hall, J.G.: The box calculus: A new causal algebra with
multi-label communication. In: APN 1992. LNCS, vol. 609, pp. 21–69. Springer,
Heidelberg (1992)
9. Buijs, J.C.A.M., van Dongen, B.F., van der Aalst, W.M.P.: On the role of fitness,
precision, generalization and simplicity in process discovery. In: OTM 2012. LNCS,
vol. 7565, pp. 305–322. Springer, Heidelberg (2012)
10. Cardinale, Y., El Haddad, J., Manouvrier, M., Rukoz, M.: Web service composition
based on petri nets: Review and contribution. In: RED 2012. LNCS, vol. 8194, pp.
83–122. Springer, Heidelberg (2013)
11. Fabre, E.: On the construction of pullbacks for safe petri nets. In: Donatelli, S.,
Thiagarajan, P.S. (eds.) ICATPN 2006. LNCS, vol. 4024, pp. 166–180. Springer,
Heidelberg (2006)
12. Girault, C., Valk, R.: Petri Nets for Systems Engineering: A Guide to Modeling,
Verification, and Applications. Springer, Heidelberg (2003)
13. Haddad, S., Hennicker, R., Møller, M.H.: Channel properties of asynchronously
composed petri nets. In: ICATPN 2013. LNCS, vol. 7927, pp. 369–388. Springer,
Heidelberg (2013)
14. van Hee, K.M., Mooij, A.J., Sidorova, N., van der Werf, J.M.: Soundness-preserving
refinements of service compositions. In: Web Services and Formal Methods. LNCS,
vol. 6551, pp. 131–145. Springer, Heidelberg (2011)
15. van Hee, K.M., Sidorova, N., van der Werf, J.M.: Construction of asynchronous
communicating systems: Weak termination guaranteed! In: Software Composition.
LNCS, vol. 6144, pp. 106–121. Springer, Heidelberg (2010)
16. Kalenkova, A.A., Lomazova, I.A.: Discovery of cancellation regions within process
mining techniques. Fundamenta Informaticae 133(2-3), 192–209 (2014)
17. Kalenkova, A.A., Lomazova, I.A., van der Aalst, W.M.P.: Process model discovery:
A method based on transition system decomposition. In: ICATPN 2014. LNCS,
vol. 8489, pp. 71–90. Springer, Heidelberg (2014)
18. Leemans, S.J.J., Fahland, D., van der Aalst, W.M.P.: Discovering block-structured
process models from event logs - a constructive approach. In: ICATPN 2013. LNCS,
vol. 7927, pp. 311–329. Springer, Heidelberg (2013)
19. Lomazova, I.A.: Interacting workflow nets for workflow process re-engineering. Fun-
damenta Informaticae 101(1-2), 59–70 (2010)
20. Lomazova, I.A., Romanov, I.V.: Analyzing compatibility of services via resource
conformance. Fundamenta Informaticae 128(1-2), 129–141 (2013)
21. Nielsen, M., Rozenberg, G., Thiagarajan, P.: Elementary transition systems. The-
oretical Computer Science 96(1), 3–33 (1992)
22. Padberg, J., Urb´asek, M.: Rule-based refinement of petri nets: A survey. In: Petri
Net Technology for Communication-Based Systems: Advances in Petri Nets. LNCS,
vol. 2472, pp. 161–196. Springer, Heidelberg (2003)
23. Pankratius, V., Stucky, W.: A formal foundation for workflow composition, work-
flow view definition, and workflow normalization based on petri nets. In: APCCM
2005, vol. 43. pp. 79–88. Australian Computer Society, Inc. (2005)
24. Reisig, W.: Understanding Petri Nets: Modeling Techniques, Analysis Methods,
Case Studies. Springer, Heidelberg (2013)
25. Siegeris, J., Zimmermann, A.: Workflow model compositions preserving relaxed
soundness. In: BPM 2006. LNCS, vol. 4102, pp. 177–192. Springer (2006)
26. Winskel, G.: Petri nets, morphisms and compositionality. In: APN 1985. LNCS,
vol. 222, pp. 453–477. Springer, Heidelberg (1986)
|
1311.6870 | 1 | 1311 | 2013-11-27T05:26:03 | Multi-agent based protection system for distribution system with DG | [
"cs.MA"
] | This paper introduces the basic structure of multi-agent based protection system for distribution system with DGs. The entire system consists of intelligent agents and communication system. Intelligent agents can be divided into three layers, the bottom layer, the middle layer and the upper layer. The design of the agent in different layer is analyzed in detail. Communication system is the bridge of multi-agent system (MAS). The transmission mode, selective communication and other principles are discussed to improve the transmission efficiency. Finally, some evaluations are proposed, which provides the design of MAS with reference. | cs.MA | cs | MULTI-AGENT BASED PROTECTION SYSTEM FOR
DISTRIBUTION SYSTEM WITH DG
JIN SHANG, NENGLING TAI and QI LIU
Department of Electrical Power Engineering, Shanghai JiaoTong University,
Shanghai,200240,China
[email protected]
This paper introduces the basic structure of multi-agent based protection system for distribution system with DGs. The
entire system consists of intelligent agents and communication system . Intelligent agents can be divided into three layers,
the bottom layer, the middle layer and the upper layer. The design of the agent in different layer is analyzed in detail.
Communication system is the bridge of multi-agent system (MAS). The transmission mode, selective communication and
other principles are discussed to improve the transmission efficiency. Finally, some evaluations are proposed, which
provides the design of MAS with reference.
Keywords: Multi-agent; protection; distribution system; DG; communication
1. Background and Introduction
The environmental problems have aroused worldwide attention, and the energy crisis is getting more and
more serious. With the development of renewable sources and its controlling technology, a number of
distributed generations (DG) have been connected to the distribution system, which provides a new method
to save the limited energy and reduce carbon dioxide emissions.
However, DGs also bring some problems. Protection coordination is one of the most important problem s.
There’re lots of researches that analyze the problems from different aspects [1-4]. The key point is that,
there is only single power supply in the original system, but DGs add new power supplies to the grid, which
make it into a complex multi power supplies network. The new power supplies will significantly affect the
power flow. When a fault occurs, they will provide additional current to the fault point, which will greatly
affect the reliability of protection.
Since the original protection of distribution system is no longer as reliable as before, there’re many
improved methods proposed to solve this problem. It is very convenient to disconnect the DG unit when a
fault occurs [4]. And most standards for DG also require like this (IEEE-Std.1547-2003). In this case, DG
will not affect the fault current. However, for the system with large DG penetration level, it will not support
the grid voltage and frequency during and immediately after the fault. Restricting the capacity and access
point of DG is another method [5-7]. Then the influence of DGs is greatly reduced. But this will greatly
stunt the development and application of DG. The fault current limiter (FCL) has also been popular for a
while [2,8]. There’re also many other methods that proposed to improve the original protection scheme to
make the protection system more reliable [9-12]. However, all these methods have some limitation. They
may have solved the problems in some degree, but, they’re not systemic and effective enough. The
protection scheme should be modified when the structure of the system changes.
The multi-agent technology was first applied to the power system in the early 1990s. And there’re lots of
researches after that, such as optimal power flow algorithm, power market, voltage controlling and so on.
The protection system based on multi-agent was proposed not long ago. It has been studied a lot recently
[13-16]. However, the application of MAS for the protection of distribution system with DGs has been
rarely analyzed before. This paper presents an effective and extensible scheme. The basic structure of MAS
is introduced, the design of the agents and communication system are analyzed.
2. Structure of MAS
The multi-agent system is composed of different intelligent agents, which cooperate with others as
individual units. Any electrical element that contains necessary information can be represented as an
element agent, such as the line breaker, transformer and so on. There’re also integrated agents, they do not
collect information from certain element directly, but collect information from other agents and draw
conclusions. Fig. 1 shows the schematic diagram of a typical distribution system and the corresponding
protection system.
(a) Schematic diagram of distribution system
(b) Structure of corresponding MAS
Fig.1 Schematic diagram of distribution system and MAS
The distribution system in sub-graph (a) consists of two feeder lines and three energy sources, the
Photovoltaic (PV), Combined Cooling Heating and Power (CCHP), and Composite Energy Storage System
(CESS). In sub-graph (b), the seven orange boxes (B1 to B7) represent the branch agents. which gather
information from the distribution system directly. The three blue boxes represent DG agents, which gather
the real-time information of DGs. The two green ellipses represent the regional agents, which are the
middle segments between terminal agents and central agent. The red ellipse represents the central agent.
The arrows represent the information flow, two -way arrow means two-way flow. The arrows can be
considered to make up the communication system.
According to the structure introduced above, there’re mainly two aspects for the implementation of MAS.
One aspect is the design of various kinds of agents. The other is the construction of communication system.
The two aspects are both very important, and they influence each other at the same time. The model of
agent affects the structure of communication system. Meanwhile, the restriction of communication limits
the information transmission between different agents. It’s of great importance to design both of them
properly.
3. Intelligent Agents
In order to realize the function of different levels and make the structure of MAS clear, the whole MAS can
be divided into three layers [17], the bottom layer, the middle layer and the upper layer, as shown in Fig.2.
PVCCHPCESSB1B2B3B4B5B6B7LoadLoadMVB1B2B3B4B5B6B7StatusSwitch timesCurrentVoltageFrequencyLoadDistribution System StatusPV Electrical quantities Other information StatusCCHP Electrical quantities Other information StatusCESS Electrical quantities Other informationRegional Unit1Regional Unit2Central UnitInstructionsFig.2 Hierarchy chart of agents
All the terminal agents that directly interact with the distribution system (including different DGs), make
up the bottom layer. Regional agents that connect bottom layer and the upper layer make up the middle
layer. The central agent gathers information of the entire system, and it forms the upper layer. Three layers
play different roles. Agents are designed according to the functional requirements.
3.1. Terminal agents
The agents for breakers, lines, DGs and other elements in the bottom layer are classified as terminal agents.
They not only gather information from the power system, but also work as actuators. The tripping,
reclosing, load shedding and other instructions are all implemented through them. Since their functions are
complicated, the model should be well designed.
Fig.3 shows the structure of the branch agent. The branch agent is the integration of line agent and breaker
agent. Since the breaker agent provides the line with protection and the line agent provides the relay with
information, the two agents are closely related with each other. Thus they’re integrated to reduce the
investment and make the communication between them easier.
Fig.3 Structure of branch agent
As shown in Fig.3, the dashed box represents for the branch agent. Data collection module is responsible
for the data acquisition from the sensors, which directly measure the electrical qualities of the power
system. The data preprocess module will fulfill the data conversion and filtering, Then, the data with
prescribed format will be stored in the database. The analysis module reads the data from the database and
conducts the fault analysis [18]. If the breaker should act to clear the fault, the instruction will be sent out.
The action will also be recorded in the database. Once the instruction is successfully executed, the agent
will get the new status. The data interface is a bi-directional port connected to the database. The agent will
communicate with other agents through this port.
Database is the core of the agent, all the electrical data collected from the power system are stored here,
such as the status, the setting values of protection, and other parameters that related to the line and the
Terminal Agent 1Terminal Agent 2Terminal Agent 3Terminal Agent 4Regional Agent 1Regional Agent 2CentralAgent Bottom layerMiddle layerUpper layerData collection moduleInstructions DatabaseData preprocessAnalysis moduleStatusElectrical dataSetting value of protectionOther parametersSensorsBreakerData interface… …Other agentBranch agentequipment (e.g. relay, breaker). The model of the database will directly affect the efficiency of the agent.
Fig.4 shows the structure of the database model.
There are more details in the practical model. Each property has its sub-properties. For example, if the
“Breaker status” shows that the breaker is closed, there is a sub-property to tell whether the current stratus
is normal state, reclosing or manual operation. Besides, the analog properties (current, voltage) should be
stored separately according to phase a, b and c. “Set value” is concerned with the protection principle and
the status of DGs. Several groups of set value are stored for different situations.
Fig.4 Structure of a database model
Besides the branch agent analyzed above, there’re also transformer agent, busbar agent and so on. The
design of this kind of agent is similar with the branch agent. The design of DG agent is also similar,
although the internal control of DG is very complex, only the external information is the key for protection
system. The external information presented by DG is a little different from that of the ordinary element , but
the design idea is the same. In a word, the agent should collect information from the power system, take
analysis, and communicate with other agent.
3.2. Regional agents
Regional agents play the role as a gateway. They do not connect with the distribution system directly , but
collect information from a certain area through several terminal agents. The information is preprocessed
here. The existing of regional agents can avoid the data flood. Although each regional agent covers a
certain area, adjacent areas should overlap with each other to ensure the comprehensiveness and reliability
of the protection system. Since the regional agents exchange information widely with others, its database,
algorithm, interface and the whole structure are all very important. The structure of regional agent is shown
in Fig.5.
Branch ID #1Status propertyBreaker statusAnalog propertyPower (real)Current (real)Voltage (real)Frequency (real)Set value Set value 1Tripping value (real)Delay (real)Set value 2Other parametersSwitching times (integer)Length of line (real)Thermal stable current (real)Fig.5 Structure of regional agent
When the regional agent is to be designed, the function of the agent is defined at first. Then, the
information required and the instructions sent out are confirmed. The database and interfaces are designed
according to this. Database lays a solid foundation for the function modules . For different function modules,
it’s very important to choose a proper algorithm to achieve the function quickly and accurately.
Since the influences of DGs to the protection system are complicated, MAS should be adaptive in different
situations. However, the speed of online adaptive system can hardly meet the requirement of protection.
But the possible running status of DGs in a certain distribution system are fixed, which provides possibility
to build an offline adaptive system. An expert system is built to support the offline adaptive system. When
the running status of the network changes, the expert system will provide appropriate protection knowledge,
including protection configuration, coordination, setting values and so on. The knowledge as well as the
real-time information will be read by the function module. Then, the new protection scheme can be figured
out and instructions will be sent to the terminal agents.
3.3. Central agents
Since MAS has good abilities of information interaction and controlling [19-20], besides working as
protection system, it is also responsible for the optimal operation of the entire system.
Some kinds of DG have a random power output, such as PV wind turbine and CCHP . Fuel cell and CESS
are flexible units, which can be adjusted as source or load. Since the central agent can obtain the
information of the entire system, it’s able to arrange the running of each DG to achieve the optimal and
stable running of distribution system. DG agents will implement the instructions. The concrete
implementations are carried out by the controlling module inside of DG, which is not concerned by MAS.
Once the voltage or frequency of the distribution system is abnormal, the central agent can make
adjustments by controlling the active and reactive power of DGs, transferring load or even shedding load to
keep the system stable.
The goal of central agent involves the entire distribution system. The information it requires mainly comes
from the regional agents. Naturally, only the conclusive and necessary messages after preprocessing are
sent here. Since the controlling target of central agent is complex, the algorithm is much more complicated.
Different algorithms are applied under different situations. Using appropriate algorithms for different
application is of great significance.
DatabaseInformation collection interfaceInstruction interfaceanalysis unit algorithmCriterionFunction module1. . .analysis unit algorithmCriterionFunction module2Information interfaceAdjacent regional Agent Information sendinginterfaceInstruction interfaceTerminal Agent 1Terminal Agent 2Terminal Agent 3Central Agent ExpertSystem4. Communication System
Communication system is the bridge of MAS. The transmission mode, efficiency, synchronization, cost and
information securities are important aspects to evaluate the system. They not only challenge the
communication technology, but also put forward higher demands on the configuration scheme of MAS.
4.1. Transmission mode
Using proper transmission mode will significantly improve the performance of MAS. There’re three
communication modes that commonly used, direct communication, radio communication, and blackboard
system. Direct communication is applied for the situation, in which both sides know each other in advance.
Radio communication enables one agent to broadcast information to all the members in the same group ,
even without knowing the address. Blackboard system is a centralized controlling system, in which all the
group members upload their information to a public area and the others can share the information as they
need. The three modes are applied in different situations according to their characteristics.
Terminal agents directly contact with the power system. They demand little of information analysis. So, it’s
unnecessary for them to communicate widely with others . They only communicate with adjacent agents,
which is fixed and regular. It’s better to use direct communication. Terminal agents also send information
to regional agent. Since each regional agent covers a certain area, it will be determined which few terminal
agents are in this area. In turn, these terminal agents will clearly know their communication object. So, it’s
also suitable to use direct communication. There’re lots of terminal agents in bottom layer, direct
communication reduces the cost and make the communication more safe and effective.
A regional agent is the core of the certain area. Besides receiving information from the terminal agents, it
also sends instructions to them. Since there is more than one terminal agent in the group, the instructions
may be sent to any one of them. It’s better to use radio communication, then, all the agents in this group
can receive the information and the instruction will be executed by the corresponded one after further
confirmation. Regional agents also communicate with the other agents in the same layer. Blackboard
system is applied in this situation. All the regional agents put their information in the public area. Other s
can easily get what they need for the further analysis. Because the public area is accessible for all the
regional agents, it requires strong fault tolerance. When the messages uploaded by different agents are in
conflict, only the right one or the one with higher priority will be recorded. The conclusions made by the
regional agents should be sent to the central agent, which is similar to the information transmission from
terminal agent to regional agent. The direct communication is suitable in this case.
The central agent gets information from all the regional agents for global optimization. The results and
instructions will then be sent to the regional agents by radio communication.
The communication modes between different objects in MAS are listed in Tab.1.
Tab. 1 Communication mode of MAS
Sender
Terminal
Regional
Receiver
agent
agent
Direct
Radio
Terminal
agent
Regional
agent
Central
agent
Central
agent
——
Direct
Blackboard
Radio
——
Direct
——
4.2. Selective communication
In order to save costs and increase speed, the communication system should be effective. When the agent
communicates with others, the objects should be selective. In the bottom layer, terminal agent
communicates with adjacent agents. As shown in Fig.1, line B7 is far from line B4, whether breaker B7
should act or not almost has nothing to do with line B4. So it’s unnecessary to connect agent B7 with agent
B4. On the contrary, line B1 and B2 are adjacent, which make them closely related . It’s very important to
acquire the information of the adjacent line to make fault analysis. So the two agents are connected to share
the information.
The information transferred should also be selective. For the communication between terminal agents, the
breaker status and current information is useful for the others, while the voltage and switch times are
useless. It’s of more importance to make it selective when the terminal agents send information to the
regional agents and the regional agents send informat ion to the central agent. Regional agents and central
agent get a large amount of information from more than one agent, it must be ensured that only the
information necessary for the further analysis are received. What’s more, central agent is more likely to
receive the analysis results from the regional agents to achieve the rapid analysis of optimization operation.
4.3. Principles
There’re some other principles that should be followed to improve the efficiency and reduce the cost of the
communication system.
Firstly, the task of local agent should be arranged reasonably. Since all the agents are intelligent , they
should carry out analysis as much as possible within their capability. This will reduce the information
transmission from the source.
Secondly, it’s better to transport status information instead of analog information [21]. For example,
directional overcurrent protection needs current direction as criterion, while low voltage start overcurrent
protection needs the value of voltage. Direction can be easily represented by a status property, which takes
up only 1 byte. But the value of voltage takes up more memory and it’s more demanding on the
synchronization of information. The transmission of status information is easier and more reliable.
The transmission distance should be as short as possible. A terminal agent should send information to the
nearest regional agent rather than the other one. Meanwhile, terminal agents do not send information
directly to central agent. The information is sent to regional agent and preprocessed to get simplified
conclusions. The conclusions will then be sent to the central agent.
5. Conclusions
The design of MAS can be more flexible on the premise of reliability. An excellent MAS implementation
should at least meet four requirements as following:
First of all, it must satisfy the reliability, sensitivity, rapidity, selectivity requirements of protection and
achieve the optimal controlling of the distribution system.
Second, the modules of MAS should be standardized to ensure the compatibility of differ ent systems and
good scalability to the expansion of grid.
Third, the construction and running of MAS should be economical.
Fourth, the information security should be guaranteed.
The four requirements define the optimal goals and provide the design of MAS with reference. Generally,
the future protection of distribution system should be intelligent based on the multi-agent technology and
the communication network. With the development of DGs and its controlling technology, a
communication network for DGs should be built to achieve the optimal running of power system. This will
also lay foundation for the multi-agent based protection system and makes it an inexorable trend.
References
1. Yuan Chao, Wu Gang, Protection technology for distributed generation systems, Power System Protection and
Control, 37(2009) 99-105.
2. K. Kauhaniemi, L. Kumnpulainen, Impact of distributed generation on the protection of distribution networks, in
Proc. et lEE Int. Conf.on Developments in Power System Protection . Vol. 1(2004), pp. 315 - 318.
3. Vandevelde, L, Melkebeek, J, Protection of Power Distribution Network with High Penetration Level of
Distributed Generation, Fifth FTW PhD Symposium, Faculty of Engineering, Ghent University, 2004, paper No.
024.
4. Morren, J., Haan, S.W.H. Impact of distributed generation units with power electronic converters on distribution
network protection, IET 9th International Conference on Power Energy, & Industry Applications, Glasgow, UK ,
2008
5. Wang Jianghai, Tai Nengling. Penetration level permission of DG in distributed network considering relay
protection, Proceedings of the CSEE, 30(2010) 37-43.
6. Feng Xike, Tai Nengling. Research on the impact of DG capacity on the distribution network curren t protection
and countermeasure, Power System Protection and Control, 38(2010) 156-165.
7. Lei Jinyong,Huang Wei,Xia Xiang.Penetration level calculation with considerations of phase-to-phase short
circuit fault, Automation of Electric Power Systems,32(2008) 82-86
8. YE Lin, LIN Liang-zhen. Superconducting Fault Current Limiter Applications in Electric Power Systems,
Proceedings of the CSEE, 20(2000) 1-5
9. Lin Xia, Lu Yuping, Wang Lianhe. New Current Protection Scheme Considering Distributed Generation Impact,
Automation of Electric Power System, 32(2008) 50-56.
10. Zhang Yanxia, Dai Fengxian. New Schemes of Feeder Protection for Distribution Networks Including Distributed
Generation, Automation of Electric Power System, 33(2009) 71-74.
11. Li Yongli, Jin Qiang, Li Botong. Application of inverse-time overcurrent protection based on low voltage
acceleration in Micro-Grid, Journal of Tianjin University, 44(2011) 955-960.
12. Sun Jingliao, Li Yongli. Study on Adaptive Current Instantaneous Trip Protection Scheme for Distribution
Network with Inverter Interfaced DG, Automation of Electric Power System, 33(2009) 71-76.
13. Renan Giovanini, Kenneth Hopkinson, Denis V. Coury, and James S. Thorp, A Primary and Backup Cooperative
Protection System Based on Wide Area Agents, IEEE Transactions on Power Delivery, 21(2006) 1222-1230
14. Wang Huifang, He Benteng, Shi Hongyu, Applications of multi-Agent technology in protection system, Electric
Power Automation Equipment. 27(2007) 102-106.
15. COURY D V, THORP J S, HOPKINSIN K M. An agent- based current differential relay for use with a utility
Intranet. IEEE Transactions on Power Delivery, 17(2002) 47-53.
16. HOSSACK J A, MENAL J, STEPHEN D J, et al. A multi-agent architecture for protection engineering diagnostic
assistance. IEEE Transactions on Power Systems, 18(2003) 639-647.
17. Xu Tianqi, Yin Xianggen, Analysis on functionality and feasible structure of wide area protection system, Power
System Protection and Control, 37(2009) 93-97.
18. K.K. Li, W.L. Chan, Xiangjun Zeng and Xianzhong Duan, Agent-based self-healing protection system, IEEE
Transactions on Power Delivery, 21(2006) 610-618
19. I. Zabet and M. Montazeri, Implementing Cooperative Agent-based Protection and Outage anagement System for
Power Distribution Network Control, 4th International Power Engineering and Optimization Conf, Shah Alam,
Selangor, MALAYSIA, 2010.
20. H. N. Aung, A. M. Khambadkone, D. Srinivasan, and T. Logenthiran, Agent-based Intelligent Control for
Real-time Operation of a Microgrid, 2010 Joint International Conf. Power Electronics, Drives and Energy
Systems (PEDES) & 2010 Power India, New Delhi, India, 2010
21. Sun Hui, Liu Qianjin, Power Distribution Network Protection and Control Using Mas, Proceedings of the
CSU-EPSA. 23(2011) 135-141.
|
1910.03640 | 1 | 1910 | 2019-10-08T18:51:15 | MAMS-A*: Multi-Agent Multi-Scale A* | [
"cs.MA",
"cs.DS"
] | We present a multi-scale forward search algorithm for distributed agents to solve single-query shortest path planning problems. Each agent first builds a representation of its own search space of the common environment as a multi-resolution graph, it communicates with the other agents the result of its local search, and it uses received information from other agents to refine its own graph and update the local inconsistency conditions. As a result, all agents attain a common subgraph that includes a provably optimal path in the most informative graph available among all agents, if one exists, without necessarily communicating the entire graph. We prove the completeness and optimality of the proposed algorithm, and present numerical results supporting the advantages of the proposed approach. | cs.MA | cs |
MAMS-A*: Multi-Agent Multi-Scale A*
Jaein Lim1 and Panagiotis Tsiotras2 ∗†
Abstract
We present a multi-scale forward search algorithm for distributed agents to solve single-query
shortest path planning problems. Each agent first builds a representation of its own search space of
the common environment as a multi-resolution graph, it communicates with the other agents the
result of its local search, and it uses received information from other agents to refine its own graph
and update the local inconsistency conditions. As a result, all agents attain a common subgraph
that includes a provably optimal path in the most informative graph available among all agents, if
one exists, without necessarily communicating the entire graph. We prove the completeness and
optimality of the proposed algorithm, and present numerical results supporting the advantages of
the proposed approach.
1
Introduction
Humans appear to rely heavily on hierarchical structures for decision-making, especially for complex
tasks (e.g., planning a route from work to home, navigating traffic, etc). Despite the fact that any
plan is physically realizable as a sequence of refined actions (e.g., walking to the office door, opening
the door, walking down the hallway, etc), most humans do not plan at this low level set of actions.
Instead, planning is achieved using a variety of abstraction levels, by aggregating the sequence of
actions into high-level macro-actions (i.e., exiting the office building, changing lanes in traffic, etc),
and by executing this sequence of high-level actions by refining them down [1,2]. This is done because
acquiring perfect knowledge about the environment is often prohibitive, and hence acting on the right
level of granularity of pertinent information is imperative in order to operate in dynamic and uncertain
environments. This observation has led many researchers to investigate multi-scale representations of
the underlying search space for planning [3 -- 8].
Kambhampati and Davis [4] incorporated a top-down refinement scheme of the environment ab-
stracted in a quad-tree for path-planning problems. The obstacle region starting from the coarsest
resolution level is excluded from the refinement in order to reduce the search space. Likewise, Pai and
Reissell [5] utilized top-down refinement for path-planning, specifically using the wavelet transform
of a 2-D environment. As the wavelet difference coefficients inform how smooth the refined path will
be in the next refined level, the magnitude of the coefficients serve as an inconsistent heuristic for
refinement. Marthi et al [1] introduced the angelic semantic for a top-down hierarchical planning,
which specified for each high-level action the set of reachable states by refinement, along with the
associated upper and lower bounds on the cost. They showed that some pruning rules based on the
upper and lower bounds on the value of the high-level action plans preserve global optimality, while
the optimistic evaluation of an abstract plan serves as a heuristic for refinement [1].
More recently, the construction of multi-resolution graphs of the environment has been studied
for path-planning problems to efficiently solve for a locally optimal solution [9 -- 12]. These references
∗1Jaein Lim is a graduate student at the School of Aerospace Engineering, Georgia Institute of Technology, Atlanta.
†2 Panagiotis Tsiotras is a Professor and David and Andrew Lewis Chair at the School of Aerospace Engineering
and Associate Director at the Institute for Robotics and Intelligent Machines, Georgia Institute of Technology, Atlanta.
GA 30332-0150, USA. Email: [email protected]
GA 30332-0150, USA. Email: [email protected]
Figure 1: Top: Three agents' abstract graphs of the same environment with gray scale representing
risk level. Bottom: The individual agents' abstract graphs and optimal paths (green) from bottom left
initial vertex (purple) to the goal vertex in the top right. After the search, the agents share a common
subgraph that consists of the optimal path in the finest resolution abstraction available. Unexpanded
vertices were not communicated and are left blank.
construct fine resolution graph representations near the agent to accurately represent the environment
in the vicinity of the agent, and coarser resolution representations far away from the agent to reduce
the dimensionality of the search space. As a result, a multi-resolution framework allows a natural
formulation of the perception-action loop, while still maintaining practical efficacy by utilizing a
reduced search space.
Different approaches have been studied for planning problems with multiple agents, using dis-
tributed or parallel processing techniques to increase the solution quality via inter-agent communi-
cation. The C-FOREST algorithm [13] employs multiple CPU units in parallel using the same start
and goal states for randomized motion planning. Each computing agent stores its own search tree,
and communicates with the other agents to restrict the sampling space to focus the search so as to
increase solution quality. Botea et al [7] built a hierarchical abstraction of the map, in which local
roadmaps are computed in parallel with fine abstraction. Then, whenever a new set of start and
goal locations is given, a solution is computed holistically using the coarser resolution abstraction. A
somewhat similar approach was used in [14] where a multi-scale algorithm was proposed to accelerate
A*. By pre-processing the environment in a hierarchical dyadic decomposition, the overall problem is
divided to a nested sequence of smaller problems. The solutions of these smaller problems were then
merged together using a "bottom-up" fusion algorithm to get the globally optimal path much faster
than existing methods. Finally, Nissim and Brafman [15] formulated a distributed agent planning
problem where each agent maintains a separate search space and expands the state from its OPEN
list similar to the regular A* algorithm. Each agent then informs the relevant agents (that is, those
who require the current state as a precondition for their actions) of the best cost-to-come and the
heuristic estimate of that state by sending a message. Once the agent receives the message from
another agent, this agent adds the message to its OPEN list only if the cost-to-come of the state is
better than its own. In essence, this is an optimality-preserving pruning technique, where multiple
agents communicate local information in an attempt to build their own optimal solution [15].
In this paper, we extend the distributed forward search algorithm proposed in [15] to incorporate
the multi-resolution framework of [9] for path-planning with multiple agents. Unlike other top-down
pre search agent1pre search agent2pre search agent3post search agent1post search agent2post search agent3refinement schemes mentioned above, which rely on the agent's own abstraction hierarchy, we refine
each agent's abstract path using the information provided by the other agents.
2 Problem Formulation
2.1 Multiresolution World Representation
Without loss of generality, we assume that the environment W ⊂ Rd is given as a hypercube of
side length 2(cid:96) for some positive integer (cid:96). The hypercube W is hierarchically abstracted as a 2d-
tree T = (N ,R) using a recursive dyadic partition, where N is the node set and R is the edge set
describing the relations of the nodes in N , such that each node in the tree encodes the information
contained in a subset of W. Specifically, each node nk,p ∈ N at depth k abstracts information of the
world contained in the hypercube H(nk,p) ⊆ W of side length 2k centered at p ∈ W. The function
V : N → R+ maps each node to some non-negative real value V (nk,p), for example, the probability
of occupancy of H(nk,p) or a cost measure to the same region. We assume that T is a full tree, that
is, each nk,p ∈ N has either 2d children or none. The children of nk,p are denoted by {nk−1,qi}i∈[1,2d]
where qi = p + 2k−2ei and ei is a vector in the set {[±1, ...,±1] ∈ Rd}.
2.2 Abstract Graph Construction
Let Φ = {ϕi}i∈I be a finite set of agents, where I = {1, 2, ..., n} is the agent index set. Each
agent ϕi ∈ Φ builds a non-empty multi-resolution graph Gi = (Vi,Ei) from T , such that Gi spatially
represents W, where Vi is the vertex set and Ei is the edge set. The agent ϕi selects some nodes from
N as its vertices in a top-down fashion, and for each node nk,p ∈ N , it selects either all of its children
or none of them to maintain a dyadic representation of W using the selected vertices in Vi. More
precisely, when the agent selects the children of a node in N , it excludes this node from Vi. This rule
ensures that the union of the regions corresponding to the vertices in Vi sufficiently covers W. Hence,
Vi ⊆ N , and each v ∈ Vi corresponds to a node of N , but the converse is not true. The node nk,p of
T is selected as a vertex of Gi if
√
(cid:107)p − pi(cid:107)2 −
d > α2k,
(1)
define H(W ) be the hypercube covered by W , that is, H(W ) =(cid:83)
where pi is the position of agent ϕi and α > 0 is a user-specified parameter.
Similarly to the nodes, we denote the hypercube covered by vertex v ∈ Vi as H(v), such that if
vertex v ∈ Vi corresponds to node n ∈ N , then H(v) = H(n). Let a set of vertices W ⊆ N . We
v∈W H(v). Two vertices v and v(cid:48)
in Vi are neighbors if the union of the boundaries of the corresponding hypercubes is neither empty
nor a singleton. Each edge e ∈ Ei assigns a non-negative real value E(v, v(cid:48)) to a pair of vertices
(v, v(cid:48)) ∈ Vi × Vi if and only if the corresponding vertices are neighbors. The edge value E(v, v(cid:48)) is the
cost to traverse from v to v(cid:48), and is defined as [9]
(2)
where λ1, λ2 ∈ (0, 1] are weights used to penalize the content and the abstraction level, respectively,
of the corresponding node nk,p of v(cid:48).
E(v, v(cid:48)) = 2dk(λ1V (nk,p) + λ2),
2.3 Merged Graph
Consider an arbitrary vertex set W which includes the vertices u and v. A vertex u is defined to be
a child vertex of v in W , if H(u) ⊂ H(v). We define a vertex w ∈ W to be a fine vertex in W if there
are no children vertices of w in W . Otherwise, w is defined to be a coarse vertex in W . Hence, every
vertex in the individual agent's graph Gi = (Vi,Ei) is finest by construction, as the agent excludes the
parent node from Vi if the agent chooses the children nodes to include in Vi.
only the fine vertices of the union VI =(cid:83)
For the set of agents Φ, we define the merged graph GΦ = (VΦ,EΦ) with vertices consisting of
i∈I Vi of the vertices of all agents' graphs Gi, and edge set
EΦ that assigns the edge cost E(v, v(cid:48)) to every pair of neighboring (v, v(cid:48)) ∈ VΦ × VΦ. The merged
graph excludes a vertex v from VI if there exist children vertices of v that cover the region covered
by v. Note that VΦ ⊆ VI is sufficient to spatially represent W compactly. Figure 2 illustrates the
construction of the graph GΦ.
Figure 2: Example of problem formulation for W ⊂ R2, from left to right: a) T - abstracted world
encoded in a quad-tree; b) G1 - agent ϕ1's graph construction from T ; c) G2 - agent ϕ2's graph
construction from T ; d) VI={1,2} - hashed blue vertex of V1 is coarse and solid green vertices of V2
are fine in V1 ∪ V2; and e) GΦ - merged graph from both Gi and Gj
2.4 Path-Planning Problem
A path P = (v0, v1, . . . , vk) on the graph G = (V,E) is an ordered set of vertices vi ∈ V, i = 0, . . . , k
such that for any two consecutive vertices there exists an edge e ∈ E. Given G, an initial vertex
vinit ∈ V and a goal vertex vgoal ∈ V, we define the path-planning problem Π, as the problem to find a
path P = (vinit, . . . , vgoal) in G. An optimal path PG(Π) or PG for a problem instance Π = Π(vinit, vgoal)
with initial and goal vertices vinit to vgoal is a path having the smallest cost over all paths from vinit
to vgoal. To simplify the notation, we use PΦ instead of PGΦ to denote an optimal path in the merged
graph GΦ.
We denote the cost-to-come with g : V → R+ and the heuristic cost-to-go with h : V → R+, which
both assign each vertex in V a non-negative real value. For each individual agent, these functions
may assign different values to the same vertex. Hence, we use a subscript, namely gi(vk), to denote
the cost accumulated from the initial vertex vinit = v0 to vk in the agent ϕi's graph, and use hi(vk)
as the heuristic estimate from vk to the goal vertex vgoal = vg in the agent ϕi's graph representation.
For each agent, we define the evaluation function fi(vk) = gi(vk) + hi(vk). For the single agent case
with uniform resolution, the problem formulation reduces to the well-known shortest-path-planning
problem on a graph.
3 The Multi-Agent Multi-Scale A* (MAMS-A*) Algorithm
Some agents may have a finer resolution abstraction in a region than others, and we are interested
in finding an optimal path that would be optimal in the finest resolution abstraction of the world if
agreed upon by all agents. One naıve way to achieve this objective would be to build a single merged
graph abstraction GΦ from all agents in Φ first, and then search for an optimal path PΦ within this new
graph. Consequently, all agents will perform a search in the most informative graph available among
them. However, as much this approach refines the abstraction level of the graph, it also enlarges the
search space. In addition, the amount of information communicated among the agents is increased
unnecessarily by broadcasting the entire graph, whether or not the received information can improve
the solution quality. Thus, construction of such a graph dilutes the benefit of using multi-resolution
abstractions during the search.
To alleviate the mentioned issues, we propose an algorithm in which each agent ϕi broadcasts a
message containing the vertex information (i.e., (cid:104)s, gi(s), hi(s)(cid:105)) only when ϕi expands its own vertex
s. Also, each agent processes the received message only if it contains finer resolution information about
the environment or if the messaged vertex has not been expanded or it has a better cost-to-come than
the agent's own cost-to-come value. Hence, we limit communication only to the expanded vertices.
If the heuristic used by the agents is consistent, then the algorithm expands and broadcasts only the
vertices with the lowest possible total cost. In addition, we assume that every broadcasted message
reaches all agents in Φ. We present the pseudo-algorithm below.
Algorithm 1 MAMS-A* for ϕi
1: while ∃ active agent ∈ Φ do
2:
3:
4:
5:
6:
ProcessMessage
if ϕi is active then
s ← pop front OPEN
Expand(s)
Publish(s)
Algorithm 2 ProcessMessage
1: for message = ((cid:104)s, gj(s), hj(s)(cid:105)) ∈ message que do
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
switch message do
case ∃ v ∈ Vi such that H(v) = H(s)
if v not expanded or gi(v) > gj(s) then
Adopt(s)
case ∃ v ∈ Vi such that H(s) ⊂ H(v)
add s to Vi
for v(cid:48) ∈ neighbors(v) do
remove e(v, v(cid:48)) from Ei
add e(s, v(cid:48)) to Ei if exists
remove v from Vi
remove v from OPEN or CLOSED
Adopt(s)
case ∃ v ∈ Vi such that H(v) ⊂ H(s)
else
discard message
add s to Vi
for v(cid:48) ∈ Vi do
add e(s, v(cid:48)) to Ei if exists
Adopt(s)
The proposed multi-agent multi-scale A* algorithm comprises of three major procedures: 1) Pro-
cessMessage, 2) Expand, and 3) Publish, and is summarized in Algorithm 1. Each individual agent
ϕi ∈ Φ repeats these procedures until the finest goal vertex is expanded and processed among the
agents in Φ. Once agent ϕi expands the goal vertex of its graph Gi, this agent is inactivated by Line 2
of Algorithm 3. Inactive agents do not expand any vertices nor publish any messages until a message
from another agent reactivates them by Line 6 of Algorithm 4. The algorithm starts with all agents
being active, and terminates when all agents become inactive (Line 1 of Algorithm 3). Suppose ui
and uj are the goal vertices of agents ϕi and ϕj respectively, such that H(uj) ⊂ H(ui). If agent ϕi
expands its goal vertex ui ∈ Vi (which is coarse in the vertex set VI since H(uj) ⊂ H(ui)) before the
vertex uj ∈ Vj is broadcasted by another agent ϕj, then ϕi will not expand any vertices nor publish
any messages until this agent is reactivated by an incoming message containing the vertex uj (Line 6
of Algorithm 4). On the other hand, if a message containing vertex uj is broadcasted to agent ϕi
Algorithm 3 Expand(s)
1: if s is a goal vertex or OPEN = ∅ then
inactivate ϕi
2:
3: else
4:
5:
6:
7:
8:
9:
10:
11:
move s to CLOSED
for s(cid:48) ∈ neighbors(s) do
if s(cid:48) /∈ CLOSED then
if gi(s(cid:48)) > gi(s) + E(s, s(cid:48)) then
gi(s(cid:48)) ← gi(s) + E(s, s(cid:48))
fi(s(cid:48)) ← gi(s(cid:48)) + hi(s(cid:48))
add s(cid:48) to OPEN
predecessor(s(cid:48)) ← s
2:
3:
Algorithm 4 Adopt(s)
1: if ∃ predecessor(s) in Vi then
gi(s) ← gj(s)
hi(s) ← max(hi(s), hj(s))
fi(s) ← gi(s) + hi(s)
add s to OPEN
reactivate ϕi
4:
5:
6:
before ϕi expands its goal vertex ui, then ui will be simply removed from the agent ϕi's graph. Hence,
every agent will expand the fine goal vertex in VΦ at least once before termination.
In case an agent receives finer resolution information about one of its vertices (Line 6 of Algo-
rithm 2), the agent removes this vertex from its graph and from its OPEN or CLOSED lists. When
agent ϕi receives the expansion result of the vertex from agent ϕj that already exists in its graph Gi,
Line 3 of Algorithm 2 puts the expansion result in the OPEN list only if the vertex has not been
expanded or if it has better cost-to-come value. When a new vertex is received that has no related
vertex in Gi because the coarse vertex has already been removed, then Line 16 of Algorithm 2 simply
updates the local graph and puts the expansion result in the OPEN list.
Figure 3: Illustrative example of Algorithm 2, from left to right: a) Gi - agent ϕi's original graph; b)
Gj - agent ϕj's graph; c) Gk - agent ϕk's graph; d) agent ϕi's modified graph after receiving messages
from ϕj and ϕk
By removing a vertex from its graph upon receiving fine resolution information about this vertex,
we are preemptively preventing each agent to construct a path that includes coarse resolution vertices
from VI. Instead, if necessary, the agent will receive fine vertices passing through the region origi-
nally covered by the removed vertex, as the other agents with fine resolution information available
expand and broadcast (see Figure 3, for instance). Indeed, if an optimal path PΦ passes through the
region covered by the removed vertices, then the corresponding segment of PΦ will be expanded and
broadcasted by other agents. Hence, path connectivity for the agent will be restored despite of the
removal of coarse vertices. We give the formal proof of optimality and completeness of the MAMS-A*
algorithm in the next section.
4 Analysis
We prove the completeness of the MAMS-A* algorithm and the optimality of the solution with respect
to the merged graph by extending a well known result of A* [16]. We will use Lemma 1 and its corollary
to show the completeness of the algorithm regardless of the removal of coarse vertices, assuming that
every broadcasted message arrives to all the agents.
Lemma 1. Let VI be the collection of all agents' vertices, that is, VI = (cid:83)
i∈I Vi. For any coarse
vertex u in VI of an agent ϕi, there exists a set of the fine vertices W ⊆ VI such that H(W ) = H(u).
Proof. Let k be some integer such that vertex vk has corresponding region H(vk) with side length 2k.
Suppose vertex vk of agent ϕi is coarse in VI, that is, there exists at least one vertex vm ∈ VI such
that H(vm) ⊂ H(vk) for m < k. Let M = {m : H(vm) ⊂ H(vk), vm ∈ VI}. Then M is non-empty,
closed and bounded, since vk is coarse and there is only a finite number of vertices in VI. Let n be the
minimum of M . Then vn is a fine vertex corresponding to vk, that is, H(vn) ⊂ H(vk) with n ≤ m < k.
Without loss of generality, let Vj be the vertex set of agent ϕj which includes vn. Since H(Vj) = W,
and Vj is the dyadic partition of W, there exists a subset Vn ⊆ Vj of cardinality 2d containing vn
whose elements have the same corresponding parent node, namely, µn+1, and H(Vn) = H(µn+1). If
n = k − 1, then H(Vk−1) = H(vk) and Vk−1 ⊆ Vj ⊆ VI. Since there cannot exist a finer vertex than
vn, the claim holds.
Consider now n < k − 1. Since the agent ϕj has the fine resolution vertex vn, the agent had once
selected the node µn+1 ∈ N , the parent node of µn ∈ N , where H(µn) = H(vn), from tree T as
its vertex during the construction of its abstract graph Gj. Hence, there exists a set W1 ⊆ Vj which
contains either siblings of vn+1 or their children, such that H(W1) = H(vn+2). In the same way, since
agent ϕj had once selected µn+1 ∈ N , it also had selected the parent node µn+2 ∈ N during the
construction of its abstract graph Gj. Hence, there exists a set W2 ⊆ Vj which contains either siblings
of vn+2 or their children, such that H(W2) = H(vn+3). Repeating the same argument k− n− 1 times,
we have a set Wk−n−1 ⊆ Vj such that H(Wk−n−1) = H(vk), and Wk−n−1 has vertices with side
length not greater than level k − 1. Repeating the entire argument for all coarse vertices of Wk−n−1
completes the proof.
Figure 4: Illustrative example Lemma 1, from left to right: a) agent ϕ1's vertex set V1; b) agent ϕ2's
vertex set V2; c) agent ϕ3's vertex set V3; d) VI={1,2,3} - ϕ1's hashed red vertex is coarse in VI={1,2,3},
and there exists a set of the fine vertices (green solid) covering the same region.
Corollary 1. For any coarse vertex u of an agent ϕi, there exists a set of fine vertices W ⊆ VΦ such
that H(W ) = H(u).
Proof. By Lemma 1, for any coarse vertex u ∈ VI, there exists a set of the fine vertices W ⊆ VI and
H(W ) = H(u). Since VΦ ⊆ VI is the largest finest resolution vertex set in VI, and W consists only
the fine vertices, it follows that W ⊆ VΦ.
The following lemma and the corollary will be used to prove the optimality of the path with respect
to the merged graph GΦ.
Lemma 2. Let v be a vertex that has not been expanded by any agent. For any optimal path PΦ from
s to v, there exists an agent ϕi ∈ Φ that has either an open vertex v(cid:48) or has an incoming message
(cid:104)v(cid:48), gj(v(cid:48)), hj(v(cid:48))(cid:105) from ϕj, i (cid:54)= j such that v(cid:48) is on PΦ and gi(v(cid:48)) = gΦ(v(cid:48)).
Proof. Let PΦ = (s = v0, v1, ..., vk = v). If v(cid:48) = s, then the lemma is trivially true, since gi(s) =
gΦ(s) = 0. Suppose now that s is closed by all agents, and let ∆ be the set of closed vertices by some
agents in PΦ, such that gi(δ) = gΦ(δ) for all δ ∈ ∆. Then ∆ is not empty, since s ∈ ∆. Let v∗ be
the element of ∆ with the highest index closed by agent ϕi, that is v∗ = argminδ∈∆ fi(δ). Clearly,
v∗ (cid:54)= v, as v is not closed. Let v(cid:48) be the successor of v∗ on PΦ (possibly v(cid:48) = v). If v(cid:48) is reachable
by ϕi, then gi(v(cid:48)) = gi(v∗) + E(v∗, v(cid:48)) = gΦ(v(cid:48)), because v(cid:48) is on PΦ. Otherwise, there exists ϕj who
can reach v(cid:48) via processing the message (cid:104)v∗, gi(v∗), hi(v∗)(cid:105), because no vertices in PΦ can be removed.
By Line 8 of Algorithm 3, gj(v(cid:48)) = gj(v∗) + E(v∗, v(cid:48)) = gΦ(v(cid:48)). Then, the message (cid:104)v(cid:48), gj(v(cid:48)), hj(v(cid:48))(cid:105)
is broadcasted, and eventually gj(v(cid:48)) = gi(v(cid:48)) = gΦ(v(cid:48)) by Line 2 of Algorithm 4. Hence the claim
holds.
Corollary 2. Suppose hk is admissible for all k ∈ I, that is, hk ≤ hΦ, where hΦ is the true cost-to-go
in GΦ, and suppose the algorithm has not terminated. Then, for any optimal path PΦ from the initial
vertex s to any goal vertex, there exists an agent ϕi which either has an open vertex v(cid:48) or has an
incoming message containing v(cid:48), such that v(cid:48) is on PΦ and fi(v(cid:48)) ≤ fΦ(s).
Proof. By Lemma 2, there exists an agent ϕi which either has an open vertex v(cid:48) or has an incoming
message containing v(cid:48) on PΦ with gi(v(cid:48)) = gΦ(v(cid:48)). Then
fi(v(cid:48)) = gi(v(cid:48)) + hi(v(cid:48))
= gΦ(v(cid:48)) + hi(v(cid:48))
≤ gΦ(v(cid:48)) + hΦ(v(cid:48)) = fΦ(v(cid:48)).
Since v(cid:48) is on the optimal path PΦ, fΦ(v(cid:48)) = fΦ(s), which completes the proof.
Theorem 1. With admissible heuristisc hi(s), i ∈ I, MAMS-A* terminates in a finite number of
iterations by finding an optimal solution, if one exists, in the merged graph GΦ.
Proof. We prove this theorem by contradiction. Suppose the algorithm does not terminate by finding
an optimal path to a goal vertex in the merged graph GΦ. There are three cases to consider:
1. The algorithm terminates at a non-goal. This contradicts the termination condition (Line 1 of
Algorithm 1) since the agents become inactive only if they expand a goal vertex or the OPEN list
is empty (Line 1 of Algorithm 3). At least one agent has non-empty OPEN if a goal vertex has
not been expanded.
2. The algorithm fails to terminate. Since there is a finite number of non-goal vertices, a finite number
of agents, and a finite number of non-cyclic paths from the start vertex s to any vertex v with
non-negative edge cost, a vertex will be closed forever by all agents or removed permanently from
the search space by Line 6 of Algorithm 2. Hence, the only possibility left for an agent to remain
active without reaching the goal vertex is when the graph is disconnected along the path from the
initial vertex to the goal vertex by Line 9 of Algorithm 2. Suppose a coarse vertex u of Gi was
removed by Line 9 of Algorithm 2. By Corollary 1, there exists a set W of fine vertices such that
H(W ) = H(u). Hence, if H(u) contains the part of the path to the goal, the vertices of W will be
added to graph Gi by Line 17 of Algorithm 2. Moreover, any vertex w in W cannot be removed
because it is a fine vertex. Hence, a path to the goal vertex that may have become disconnected
by the removal of the coarse vertex u will be eventually restored by the set of the fine vertices in
W . This contradicts the assumption that the algorithm failed to terminate.
3. The algorithm terminates at a fine resolution goal without achieving the minimum cost in the merged
abstraction Φ. Suppose the algorithm terminates at some goal vertex v with fj(v) > fΦ(v). By
Corollary 2, just before termination, there existed an agent ϕi which had an open node v(cid:48), or had
an incoming message containing v(cid:48), such that v(cid:48) is on an optimal path and fi(v(cid:48)) ≤ fΦ(s). Thus,
at this stage, v(cid:48) would have been selected for expansion rather than v, or at least one agent would
have been reactivated by the message containing v(cid:48), contradicting the assumption the algorithm
terminated without achieving the minimum cost.
5 Discussion
Note that since the attained solution does not necessarily imply resolution completeness, it may
be prudent to alleviate the computational burden of message broadcasting by sequentially sending
messages from one agent to another at the expense of optimality. Let the sequence of agents be
(ϕ1, ϕ2, . . . , ϕn), such that ϕ1 passes its expansion result to ϕ2, and ϕ2 passes it to ϕ3, and so forth.
The agents will not loose any information that has been deemed optimal by the previous agents, and
therefore the next agent ϕi+1 will always make decisions based on augmented information provided
by the previous agent ϕi, resulting in an optimal path in the partially merged graph. Nonetheless, the
last agent ϕn's path may not be necessarily the same as PΦ, since a segment of PΦ could be ignored
by an agent ϕi without the information of some agent ϕj for j > i, and thus this segment may not
be passed onto the next agent ϕi+1. However, in our experiments the results were shown to be very
close to the optimal one.
We also adopted the backtracking algorithm presented in [9] to incorporate a further refinement
scheme for resolution completeness, i.e., to find a feasible path in the fine resolution space. At each
iteration, the agent traverses along the abstract solution path and stores only the fine resolution
path segment to its memory, then re-solves the shortest path problem at a new vertex with different
abstraction until the goal vertex is reached. If no solution can be found from the current vertex v, the
agent backtracks to the previous vertex u in the accumulated path and removes the edge e = (u, v)
from the graph to avoid a cyclic iteration. The proof of completeness is omitted for brevity, and
instead we refer the reader to [9]. Note that it is desirable to backtrack as early as possible, however
this depends on the environment and the choice of α. A larger value of α makes the algorithm easier
to backtrack earlier, as the agent attains more information far away from the current location than
with a smaller value of α. However, the cardinality of the search space also increases with increasing
α, and therefore the right granularity of the abstract graph for optimal performance is not known a
priori.
6 Numerical Results
The MAMS-A* algorithm was implemented within the Robot Operating System (ROS) framework
for modularized agents. In a single workstation, multiple ROS nodes were generated to solve a single
query planning problem cooperatively. The communication among the nodes was made via ROS
messaging.
Different number of agents were generated at different locations including the start and goal
positions in a 2D labeled map; see Figure 1. In our experiments, we chose λ1 and λ2 to be 0.999
and 0.001, respectively, and we set V (nk,p) ∈ [0, 1] to be the risk level averaged over the region
H(nk,p). Different values of α were chosen with varying size of the search space represented as depth,
e.g., depth 7 corresponds to 27d nodes. Each result was then normalized by the resolution complete
solution computed with a regular A* in the corresponding depths. Figure 5 shows the result after one
iteration.
The computational advantage of the proposed algorithm is most prominent when the original
search space is large and α is small (e.g., α = 1 depth 7), as the abstraction reduces the search space
Figure 5: Computation time and solution cost of abstract path for different number of agents and
parameters normalized by regular A* result. Left: normalized path cost. Right: normalized time.
most significantly. The algorithm finds an abstract path three orders of magnitude faster compared to
the regular A*. As we penalize the abstraction in the cost function defined in equation (2), the cost of
the abstracted path is substantially worse compared to the resolution optimal solution especially for
the single agent case. The increased number of agents improves the solution quality of the abstract
path.
A similar comparison was made and plotted in Figure 6, but using instead the backtracking
algorithm to solve for a fine resolution path. At each iteration, only one agent was allowed to move,
while the other agents remained stationary. This was done to demonstrate the application of the
algorithm for cooperative agents with different goal locations.
Figure 6: Computation time and solution cost of fine path for different number of agents and param-
eters normalized by regular A* result. Left: normalized path cost. Right: normalized time.
In the single agent case, the performance was highly sensitive to the choice of α. At some abstrac-
tion structure, the single agent could still find near optimal solutions, but in the worst case, the path
length was 16 times longer than the optimal. In contrast, as a better heuristic for refinement was
used, the multi-agent cases resulted in more consistent computation times and cost performance that
was less sensitive to the particular choice of α.
0246810121416SingleTwoThreeFourNormalized Path CostNumber of Agents𝛼=1 depth 7𝛼=2 depth 7𝛼=3 depth 7𝛼=1 depth 6𝛼=2 depth 6𝛼=3 depth 6𝛼=1 depth 5𝛼=2 depth 5𝛼=3 depth 50.00010.0010.010.1110SingleTwoThreeFourNormalized TimeNumber of Agents𝛼=1 depth 7𝛼=2 depth 7𝛼=3 depth 7𝛼=1 depth 6𝛼=2 depth 6𝛼=3 depth 6𝛼=1 depth 5𝛼=2 depth 5𝛼=3 depth 5024681012141618SingleTwoThreeFourNormalized Path CostNumber of Agents𝛼=1 depth 7𝛼=2 depth 7𝛼=3 depth 7𝛼=1 depth 6𝛼=2 depth 6𝛼=3 depth 6𝛼=1 depth 5𝛼=2 depth 5𝛼=3 depth 50.0010.010.1110SingleTwoThreeFourNormalized TimeNumber of Agents𝛼=1 depth 7𝛼=2 depth 7𝛼=3 depth 7𝛼=1 depth 6𝛼=2 depth 6𝛼=3 depth 6𝛼=1 depth 5𝛼=2 depth 5𝛼=3 depth 57 Conclusion
In this paper, we propose a new algorithm to solve a single query shortest path planning problem us-
ing multiple multi-resolution graphs representing the same search space. The solution quality and the
speeds up from abstraction is balanced efficiently by using multiple agents distributed in the search
space, as they communicate only the expansion result of A* to avoid unnecessary communication.
The completeness and optimality of the algorithm are shown. The proposed scheme was applied to a
backtracking algorithm and demonstrated the advantages of using selective and distributed informa-
tion provided by other agents for refinement heuristics in terms of computational time and solution
quality.
Acknowledgement
This work has been supported by ARL under DCIST CRA W911NF-17-2-0181.
References
[1] B. Marthi, S. Russell, and J. Wolfe, "Angelic hierarchical planning: optimal and online algorithms
(revised)." University of California, Berkeley" Technical Report, 2009.
[2] S. J. Kiebel, J. Daunizeau, and K. J. Friston, "A hierarchy of time-scales and the brain," PLoS
Computational Biology, vol. 4, no. 11, p. e1000209, 2008.
[3] M. Helmert, P. Haslum, J. Hoffmann, and R. Nissim, "Merge-and-shrink abstraction: A method
for generating lower bounds in factored state spaces," Journal of the ACM, vol. 3, 05 2014.
[4] S. Kambhampati and L. S. Davis., "Multiresolution path planning for mobile robots," IEEE
Journal of Robotics and Automation, pp. 135 -- 145, 1986.
[5] D. K. Pai and L. . Reissell, "Multiresolution rough terrain motion planning," IEEE Transactions
on Robotics and Automation, vol. 14, no. 1, pp. 19 -- 33, Feb 1998.
[6] R. Holte, M. Perez, R. Zimmer, and A. MacDonald, "Hierarchical A*: Searching abstraction
hierarchies efficiently." in AAAI, 1996, p. 530535.
[7] A. Botea, M. Muller, and J. Schaeffer, "Near optimal hierarchical path-finding," Journal of Game
Development, vol. 1, pp. 7 -- 28, 2004.
[8] H. A. Simon, "The architecture of complexity," Proceedings of the American Philosophical Society,
vol. 106, no. 6, pp. 467 -- 482, 1962.
[9] F. Hauer, A. Kundu, J. M. Rehg, and P. Tsiotras, "Multi-scale perception and path planning
on probabilistic obstacle maps," in IEEE International Conference on Robotics and Automation
(ICRA), Seattle, WA, May 2015, pp. 4210 -- 4215.
[10] D. Jung, "Hierarchical path planning and control of a small fixed-wing uav: theory and experi-
mental validation." Ph.D. dissertation, Georgia Institute of Technology, Atlanta, GA, 2007.
[11] R. V. Cowlagi and P. Tsiotras, "Multiresolution motion planning for autonomous agents via
wavelet-based cell decompositions," IEEE Transactions on Systems, Man, and Cybernetics, Part
B (Cybernetics), vol. 42, no. 5, pp. 1455 -- 1469, Oct 2012.
[12] P. Tsiotras and E. Bakolas, "A hierarchical on-line path planning scheme using wavelets," in 2007
European Control Conference (ECC), Kos, Greece, July 2007, pp. 2806 -- 2812.
[13] M. Otte and N. Correll, "C-FOREST: parallel shortest path planning with superlinear speedup,"
IEEE Transactions on Robotics, vol. 29, no. 3, pp. 798 -- 806, June 2013.
[14] Y. Lu, Y. Huo, and P. Tsiotras, "A beamlet-based graph structure for path planning using
multiscale information," IEEE Transactions on Automatic Control, vol. 57, no. 5, pp. 1166 -- 1178,
May 2012.
[15] R. Nissim and R. Brafman, "Distributed heuristic forward search for multi-agent planning,"
Journal of Artificial Intelligence Research, vol. 51, no. 1, pp. 293 -- 332, 2014.
[16] P. E. Hart, N. J. Nilsson, and B. Raphael, "A formal basis for the heuristic determination of
minimum cost paths," IEEE Transactions on Systems Science and Cybernetics, vol. 4, no. 2, pp.
100 -- 107, July 1968.
|
1302.0488 | 1 | 1302 | 2013-02-03T13:34:08 | A multi-lane traffic simulation model via continuous cellular automata | [
"cs.MA",
"nlin.CG"
] | Traffic models based on cellular automata have high computational efficiency because of their simplicity in describing unrealistic vehicular behavior and the versatility of cellular automata to be implemented on parallel processing. On the other hand, the other microscopic traffic models such as car-following models are computationally more expensive, but they have more realistic driver behaviors and detailed vehicle characteristics. We propose a new class between these two categories, defining a traffic model based on continuous cellular automata where we combine the efficiency of cellular automata models with the accuracy of the other microscopic models. More precisely, we introduce a stochastic cellular automata traffic model in which the space is not coarse-grain but continuous. The continuity also allows us to embed a multi-agent fuzzy system proposed to handle uncertainties in decision making on road traffic. Therefore, we simulate different driver behaviors and study the effect of various compositions of vehicles within the traffic stream from the macroscopic point of view. The experimental results show that our model is able to reproduce the typical traffic flow phenomena showing a variety of effects due to the heterogeneity of traffic. | cs.MA | cs |
A multi-lane traffic simulation model via continuous
cellular automata
Emanuele Rodaro
Centro de Matem´atica, Faculdade de Ciencias, Universidade do Porto,
R. Campo Alegre 687, 4169-007 Porto, Portugal
e-mail: [email protected]
Oznur Yeldan
Dipartimento di Matematica, Politecnico di Milano,
Piazza Leonardo da Vinci 32, 20133 Milano, Italy
e-mail: [email protected]
September 27, 2018
Abstract
Traffic models based on cellular automata have high computational
efficiency because of their simplicity in describing unrealistic vehicular
behavior and the versatility of cellular automata to be implemented on
parallel processing. On the other hand, the other microscopic traffic
models such as car-following models are computationally more expen-
sive, but they have more realistic driver behaviors and detailed vehicle
characteristics. We propose a new class between these two categories,
defining a traffic model based on continuous cellular automata where
we combine the efficiency of cellular automata models with the accu-
racy of the other microscopic models. More precisely, we introduce
a stochastic cellular automata traffic model in which the space is not
coarse-grain but continuous. The continuity also allows us to embed a
multi-agent fuzzy system proposed to handle uncertainties in decision
making on road traffic. Therefore, we simulate different driver behav-
iors and study the effect of various compositions of vehicles within the
traffic stream from the macroscopic point of view. The experimental
results show that our model is able to reproduce the typical traffic
flow phenomena showing a variety of effects due to the heterogeneity
of traffic.
1
1
Introduction
Traffic models are fundamental resources in the management of road net-
work. A real progress in the study of traffic has obtained with the introduc-
tion of the models based on cellular automata (CA)1. A cellular automaton is
a collection of cells (sites) on a grid of specified shape (lattice) that evolves
through a number of discrete time steps according to a set of local rules
based on the states of neighboring cells, for more details see [9]. CA models
(CAMs) have the ability of being easily implemented for parallel computing
because of their intrinsic synchronous behavior. A set of simple rules can
be used to simulate a complex behavior, thus these models are conceptu-
ally simple (for the theory and applications of CA as models for complex
systems in several scientific fields, see [2, 3, 5]). The traffic models based
on CA are capable of capturing micro-level dynamics and relating these to
macro-level traffic flow behavior. However, they are not as accurate as the
usual microscopic traffic models2 such as the time-continuous car-following
ones [1]. A basic one-dimensional CAM for highway traffic flow was first
introduced by Wolfram, where he gave an extensive classification of CAMs
as mathematical models for self-organizing dynamic systems [23, 24]. Nagel
and Schreckenberg proposed the first nontrivial traffic model (the NaSch
model) based on CA for single-lane highway in 1992 [17]. This is a time-
and space-discrete model where the traffic road is divided into cells of 7.5
m and it is defined on a one-dimensional array of a fixed number of sites
with closed (periodic) boundary conditions. The velocity is expressed as the
number of cells that a vehicle advances in one time step. The maximum
velocity (vmax) is assumed to be 5 cells/sec (135 km/h) and every vehicle
has the same target velocity vmax. Each update of the movements of the ve-
hicles is determined by four consecutive rules that are performed in parallel
to each vehicle at each second. In literature, the CA traffic models are up-
dated similarly where they only differ on the randomization step introduced
to add some randomness, for a survey see [15]. Note that in all of them the
cells represent the space as it is in the NaSch model, so in the sequel we call
them as "NaSch-type" models [12, 18, 20, 21].
In this paper, we propose a new traffic model via continuous cellular
automata (CCA) which gets closer to the car-following models by introduc-
1Throughout this paper, abbreviation CA refers to both cellular automata (plural) and
cellular automaton (singular).
2We use the term "usual microscopic traffic models" to refer to the microscopic traffic
models other than CA, which are in general defined by means of a system of differential
equations.
2
ing some continuity without losing the computational advantages typical of
CAMs. Continuous cellular automata (or coupled map lattices) are cellular
automata where the states of the cells are real values in [0, 1], and the local
transition rule is a real function. They have have been introduced by Kaneko
as simple models with the features of spatiotemporal chaos, and have appli-
cations in many different areas like fluid dynamics, biology, chemistry, etc.
(for more details on couple map lattices, see [8, 10]). In this work we drop
the restriction that the set of states is [0, 1], and we use the name CCA to
consider CA where the set of state is in general an infinite set of the same
cardinality of the continuum. Therefore, we consider a hybrid between the
usual microscopic traffic models which are very accurate in predicting gen-
eral traffic behavior but computationally expensive, and the CAMs which
are very efficient due to their simplicity and intrinsic parallelism making
them natural to be implemented for parallel computing. This process of
passing from the typical coarse-granularity of CAMs to the continuity in
space is done with a change of vision where we abandon the cell-space cor-
respondence and assume that cells represent vehicles. Thus we consider a
model with open boundary conditions where the number of cells is equal to
the number of vehicles. In this way, we obtain the immediate advantage of
having less cells to compute (just the number of vehicles). The continuity
also gives us the possibility to refine the microscopic rules that govern the
traffic dynamics, using fuzzy reasoning to mimic different real-world driver
behaviors. All parameters of the decision process of the drivers are modeled
individually by means of fuzzy subsets so that various types of drivers can be
taken into consideration. Hence, we are able to study how the heterogene-
ity influences the traffic macroscopically. The CCA model proposed here is
defined first for a single-lane road and then we extend it to the multi-lane
case. The assumption that cells represent vehicles makes this extension not
as natural as it is in the NaSch-type models.
2 The single-lane model
In our CCA model, for the purpose of simulating different driver (vehicle)
behaviors, we apply a multi-agent fuzzy system where the environmental
information is transformed into the decision for the next time step action
for each vehicle. Using this fuzzy logic-based system, we categorize the
vehicles into types (kinds) where they have common characteristics such
as the same perception of time or distance. In this way, we aim to study
the effect of different composition of vehicles, i.e., the heterogeneity in road
3
traffic. Let us now describe our model for a single-lane road. Note that for
the sake of simplicity, we fix the unit of time as one second. Consider the one
dimensional CCA SL = (Z, Σ, N , δ) where the lattice is the set of integers
and the set of cell states Σ = (K ×R+
0 ×R×{L, 0, R}×{L, 0, R})∪{⊥}.
A cell with the state ⊥ represents a cell without a vehicle. The generic i-th
non-empty cell is in the state σi(t) = (ki, xi(t), vi(t), si(t), di(t), d′
i(t)) where
0 ×R+
• ki represents the kind consisting of all the information (parameters)
specified differently for each kind of vehicle, such as: the maximum
velocity vmaxi, the optimal velocity vopti (the velocity which each kind
of vehicle feels comfortable in traffic stream), the length li, the fuzzy
membership functions, the maximum stress smaxi, the minimum stress
smini, the probability functions of lane-changing to the right lane
PRi(x) and to the left lane PLi(x).
• xi(t) is the position, defined as the distance from the origin of the
road to the middle point of this vehicle, vi(t) is the velocity, and si(t)
is the stress, a variable to keep track of how much the driver is above
or below of his optimal velocity. The stress parameter is introduced
to implement a more realistic driver behavior since we make the as-
sumption that drivers usually tend to decelerate when they are moving
with a velocity higher than their optimal velocity. We assume that if
si(t) < 0 then the driver is stressed and wants to go faster, instead
if si(t) ≥ 0 then his stress derives from the desire to go slower. Note
that the main usage of si(t) is related to the lane-changing process
described in Section 3.
• di(t) is the variable describing the desire for lane-changing to the left
"L", to the right "R" and staying on the same lane "0". d′
i(t) is
the variable showing from which lane the i-th vehicle is transferred:
from the left lane "L", from the right lane "R" or not transferred
"0". Although these variables are used in the multi-lane model, the
evaluations are done in the single-lane part.
N is a kind of one-dimensional extended Moore neighborhood defined by
N (i) = (i − 1, i, i + 1, i + 2), and δ : Σ4 → Σ is the local transition function
(local rule) acting upon a cell and its direct neighborhoods. The local rule
is defined componentwise by δ(σi−1(t), σi(t), σi+1(t), σi+2(t)) = (ki, xi(t +
1), vi(t + 1), si(t + 1), di(t + 1), 0). The variables si(t + 1) and di(t + 1) are de-
scribed in Section 3. The space is updated as usual by xi(t+1) = xi(t)+vi(t+
1) and the velocity by vi(t + 1) = min(vmaxi, ∆x+
i (t), max(0, vi(t) + Ai(t)))
4
where Ai(t) is the acceleration calculated using the fuzzy decision modules
and ∆x+
i (t) is the distance with the front vehicle from front bumper to rear
bumper defined in (1). This front distance constraint in the choice of the
updated velocity is introduced to make the model collision-free as in the
NaSch model. However, since it is unrealistic, it is applied in our model
only in the borderline situations where extreme decelerations are involved.
Indeed, we have tried to avoid this constraint as much as possible by intro-
ducing enough fuzzy rules to make the system more reactive to reduce these
extreme situations. It is worth noting that in the case Ai(t) = 7.5 m/s2, we
essentially obtain the open boundary, space-continuous and deterministic
version of the NaSch model [17].
Ai(t) is depending on the kind ki, the velocity vi(t) and the variables
defined as following.
1. Back Distance (BD): ∆x−
i (t) = xi(t) − xi−1(t) − li
2 − li−1
2 ,
2. Front Distance (F D):
∆x+
i (t) = xi+1(t) − xi(t) −
li+1
2
−
li
2
,
(1)
3. Next Front Distance (N F D): ∆x+
2 − li
2 .
This is introduced to have a better perception of the driver behavior
of the next front vehicle since in reality drivers observe not only the
vehicle just in front of them but also the vehicles ahead.
i,N (t) = xi+2(t) − xi(t) − li+2
4. Perceived Front Collision Time (P F CT ):
i,P (t) = (cid:26) ζi(t),
τ +
min(ζi(t), τ +
i (t)),
i (t) < 0,
if τ +
otherwise.
smaxi
−si(t)
vi(t)
and τ +
where ζi(t) is the parameter introduced for slowing down depending on
the stress calculated by ζi(t) =
i (t) is Front Collision
Time (F CT ), the time that passes for the i-th vehicle to reach to
(to collide with) the front vehicle, defined as τ +
vi(t)−vi+1(t) .
P F CT is a parameter which is a combination between FCT and an
auxiliary time defined to keep the velocity close to the optimal velocity
using a parameter depending on the stress variable.
If the FCT is
strictly negative, then the driver perceives an artificial vehicle with the
FCT ζi(t) to keep the vehicle close to its optimal velocity. Otherwise,
P F CT takes the smallest FCT value between ζi(t) and τ +
i (t) to avoid
collisions.
i (t) =
∆x+
i (t)
5
5. Worst Front Collision Time (W F CT ): τ +
. The colli-
sion time with the front vehicle in the case it suddenly stops. This
parameter is introduced for safety reasons.
vi(t)
i,W (t) = ∆x+
i (t)
∆x+
i,N (t)
i,N (t) =
6. Next Front Collision Time (N F CT ): τ +
vi(t)−vi+2(t) . The colli-
sion time with the next front vehicle. It is clear that a vehicle never
reaches to its next front vehicle, but N F CT is introduced to anticipate
the braking maneuver of next front vehicle.
i (t) = ∆x−
vi−1(t)−vi(t) . The collision time
of the back vehicle. This is introduced to take into account the phe-
nomenon where the back driver comes closer the front driver and forces
him to accelerate. We call this situation as pushing effect.
7. Back Collision Time (BCT ): τ −
i (t)
The approach of embedding fuzzy logic while dealing with a system de-
scribed by continuous variables has been already introduced, indeed, there
are several works based on fuzzy logic systems in car-following models [1].
In our model, we use a fuzzy rule-based system by means of fuzzy IF-THEN
rules [16] that determines the behavior of the vehicles in traffic stream. In
this fuzzy system we introduce two fuzzy modules, formed by two sets of
fuzzy rules, according to their significance. The first module has more im-
portance since it is based on the information related to the front and the
back vehicles while the second one has less importance since the rules in that
module are related to the next front vehicle. As a consequence of having
two different fuzzy modules, we have two outputs: Ai,1 is the output coming
out from the first fuzzy module and Ai,2 is the output coming out from the
second fuzzy module. The first and the seconds sets of fuzzy rules used in
the simulator are summarized in Table 1 and Table 2, respectively. After re-
ceiving the inputs τ +
i (t),
vi(t) determined by the environment, the final decision of the acceleration
Ai(t) is returned by the function (to avoid cumbersome notation, we omit
the dependency of t):
i,N (t), ∆x−
i (t), ∆x+
i (t), ∆x+
i,W (t), τ +
i,N (t), τ −
i,P (t), τ +
F (Ai,1, Ai,2) =
min(Ai,1, Ai,2)
Ai,1+Ai,2
2
Ai,1
if Ai,1 ≤ 0,
if Ai,1 > 0 ∧ Ai,2 ≤ −0.25,
otherwise.
(2)
where we give more weight to the decision taken by the first module. Indeed,
in the simulation, we have noticed that without these kind of constraints
the vehicles were tending to slow down too much. This is also the reason of
splitting the fuzzy module into two parts. Moreover, the second module and
6
consequently the second acceleration gains significance only in the case of
emergencies such as a sudden breakdown or deceleration of the next front ve-
hicle. The linguistic terms (properties) used for the acceleration outputs Ai
are: PB=Positive Big, PM=Positive Medium, PS=Positive Small, Z=Zero,
NS=Negative Small, NM=Negative Medium, and NB=Negative Big.
Table 1: First fuzzy set of rules
PFCT
BIG
MEDIUM
SMALL
VERY SMALL
WCT
SMALL
Front Distance (FD)
Velocity (vi)
BIG
MEDIUM
SMALL VERY SMALL
SMALL
(vi NOT SMALL)
(vi NOT SMALL)
ZERO
ZERO
PB
PM
ZERO
NM
NB
PS
ZERO
NM
NB
NS
NS
NM
NB
NM
NS
NM
NB
NM
(Jam Situation)
In the first fuzzy set of rules we have also the ones related to the back
vehicle, thus we consider the pushing effect where BCT is "Very Small"
and BD is "Very Small". In this case, we apply the following rule formed
by taking into consideration the safety with the front vehicle: (IF P F CT is
BIG AND F D is BIG) OR (IF P F CT is BIG AND F D is M EDIU M ) OR
(IF P F CT is M EDIU M AND F D is BIG) OR (IF P F CT is M EDIU M
AND F D is M EDIU M ) then the acceleration choice is P S.
Table 2: Second fuzzy set of rules
Next Front Distance (NFD)
VERY SMALL SMALL MEDIUM BIG
NFCT
VERY SMALL
SMALL
MEDIUM
BIG
NB
NM
NS
NS
NB
NM
NM
NS
NM
NS
These rules are based on some common sense of driver behaviors in-
cluding some experiences. Although the rules are the same for each kind
of vehicle, they have different "weights" depending on the definition of the
membership functions of different kinds. In this way, it is possible to give a
description of a variety of behaviors, such as the behavior of a long vehicle
driver or a driver with low reflexes. For instance, a person with low reflexes
7
perceives a time of collision of 5 seconds as a very short time, however a
person with higher reflexes probably would feel comfortable with that time
of collision.
After the fuzzy system receives all the inputs, we first determine the
degree of membership of each input. Then by taking the minimum value of
the images of the inputs (corresponding to the fuzzy logic AND operation)
in each rule, we obtain the weights of the fuzzy rules. This evaluation is
described in general terms as following.
and C j be fuzzy subsets with the membership functions
and µC j , respectively, and let Rj be the fuzzy rules defined
1, ..., Bj
kj
Let Bj
, . . . , µBj
kj
µBj
as:
1
Rj : IF xj
1 is Bj
1 AN D . . . AN D xj
kj
is Bj
kj
T HEN y is C j
with
µBj
1
(xj
1) ∧ . . . ∧ µBj
kj
(xj
kj
) = min(cid:26)µBj
1
(xj
1), . . . , µBj
kj
(xj
kj
)(cid:27)
for 1 ≤ j ≤ m, where m is the number of fuzzy rules.
In our fuzzy system, there are also rules including the form: xj
r is not Bj
r
r) for some r ∈ [1, kj ]. These rules
with the degree of membership µ∼Bj
which are the first two rules of the first fuzzy decision module, are formed
with the purpose of emphasizing the vehicle is not in a jam situation (see
Table 1 where vi is not small). For an input xj
r, the degree of membership
of not having a property Bj
r ") can be written as:
r ("not being Bj
(xj
r
µ∼Bj
r
(xj
r) = 1 − µBj
r
(xj
r).
The output of the previous process so far is a fuzzy set, so we should con-
vert our fuzzy output set into one single number as the output of the fuzzy
system, which is the "acceleration" in our case. Recall that since we have
two fuzzy modules, there are two outputs of the system: Ai,1 and Ai,2 which
are used to evaluate Ai(t) at time t by the function F , see Equation 2. The
conversion process is called as defuzzification and there are many defuzzifica-
tion techniques to obtain a crisp value, such as the center-of-gravity (COG)
and the weighted average formula (WAF) method. In our model, since we
would like to use a simple method that does not require too much compu-
tational power, we define a new method and call it as generalized weighted
average formula (GWAF), i.e., we generalize the WAF to the case where the
membership functions are not necessarily symmetric. We describe it now in
8
general terms. Suppose that each j-th rule receives the values xj
inputs. Let
1, ..., xj
kj
as
wj = min(cid:26)µBj
1
(xj
1), ... , µBj
kj
(xj
kj
)(cid:27)
be the weights for each rule j and let P j = µ−1
C j (wj ) be the preimage of the
weight of j-th rule. We assume that µC j does not have any plateau, since
we do not want P j to contain intervals (this is done to have a discrete set).
The defuzzified output is thus calculated by:
y = Pm
j=1 wj Pz∈P j z
Pm
j=1 P j wj
.
3 The multi-lane model
In this section, we extend the single-lane model to the multi-lane case. This
extension is not trivial as it is in the NaSch-type models where adding a
lane simply means adding an array of cells and where the local transition
function can naturally be extended. This is a consequence of having a clear
physical interpretation of the model given by the fact that space is rep-
resented by cells. However, as a consequence of not having the cell-space
correspondence, first of all we do not have the natural order which makes the
extension of the local transition function so easy to achieve, and secondly
not all the configurations c : Z → Σ of our model represent a physical situa-
tion. For this reason, we consider just the configurations that have physical
meaning, i.e., two adjacent cells n, n + 1 are in the states where the positions
fulfill the constraint xn(t) < xn+1(t). We denote the set consisting of such
configurations by Confp(SL). The support of a configuration c ∈ Confp(SL)
is a maximal interval [i, j] of integers with i ≤ j such that for all k < i and
k > j, c(k) =⊥.
The union of two arrays of cells representing a road with two lanes is
a natural candidate for a multi-lane model. Therefore, we first present
our multi-lane model as a union of interacting single-lane CCA where the
interaction is given by a transfer operation, and then we prove in Prop. 3.1
that this model can actually be simulated by a CCA.
The process of lane-changing behavior consists of several steps. First the
driver feels the desire of lane-changing, then if the conditions of the place
in the lane where the driver wants to move respect some safety constraints,
the driver can finally perform the maneuver. Regarding the decision of
performing a lane-changing, we first check if the i-th vehicle with the state
9
σi(t) = (ki, xi(t), vi(t), si(t), di(t), d′
i(t)) desires to change lanes, i.e., di(t) 6=
0. The desire of lane-changing is depending on the stress variable si(t).
Having positive stress means that the driver is above of his optimal velocity,
thus he tends to change lane to the right (slower lane). Otherwise, the driver
is nervous and he desires to go faster, thus he tends to change lane to the
left (faster lane). The stress cannot be increased (or decreased) arbitrarily,
so we define the two parameters smini and smaxi which are the maximum
amounts of negative and positive stress that a driver can tolerate. Thus
if the updated stress si(t + 1) exceeds the boundaries smini and smaxi we
simply assign it to these limit values. The stress is updated by
si(t + 1) =
sacc(t)/2
sacc(t) · (1 + Φ)
sacc(t)
i (t) < 0 and
i (t) ≥ 0 and
if τ +
if τ +
otherwise.
smini
2 < sacc(t) < 0,(3)
2 < sacc(t) < 0,(4)
smini
where the accumulated stress is defined by sacc(t) = si(t)+(vi(t+1)−vopti )·
X(t) and X(t) is a random variable distributed uniformly, X(t) ∼ U (0, 1).
Condition (3) is used to avoid frequent lane-changing in the case of a jam
situation, if the queue is moving. We also embed the strategy of trying to
change lanes instead of braking in the case the front vehicle is close and
tends to brake. We model this effect with the condition (4) considering a
factor Φ representing how much the i-th vehicle is in the situation where
the front vehicle is close and going much more slower than the i-th vehicle.
Φ is calculated by the membership value of (τ +
i (t) is V ERY SM ALL ∧
∆x+
i (t) is SM ALL) ∨
(τ +
i (t) is
SM ALL). It is used to increase the amount of stress and consequently to
have more probability of changing lanes.
i (t) is M EDIU M ) ∨ (τ +
i (t) is SM ALL∧∆x+
i (t) is V ERY SM ALL ∧ ∆x+
i (t) is M EDIU M )∨(τ +
i (t) is SM ALL∧∆x+
We now describe the stochastic process that evaluates the desire of lane-
changing for the next time step di(t+1) = Eval(L,R)(ki, vi(t), si(t)) described
in Algorithm 1. The decision of this action is made by means of a Bernoulli
process B(2, p). The probabilities of changing lane to the left and to the
right, which are in general different, are calculated by two functions PLi(x) :
[0, 1] → [0, 1] and PRi(x) : [0, 1] → [0, 1] contained in the kind ki. The reason
is that some kinds of vehicles tend to move more to the left lane while some
others tend to move more to the right. For instance, long vehicles prefer to
go to the right lane more than left, i.e., they tend to stay more on the right
lane. The variable used to calculate such probabilities is the normalized
stress nsi(t) = max(si(t)/smini , si(t)/smaxi ). Thus if si(t) ≥ 0 then the
choice to stay or go to the right is done by B(2, PRi (nsi(t))), otherwise
10
else
di(t + 1) = R
di(t + 1) = 0
if si(t) ≥ 0 then
end if
else
Execute the Bernoulli Trial Z ∼ B(2, µvels(vi(t)))
if Z = 1 then
nsi(t) = si(t)/smini
Execute the Bernoulli Trial Y ∼ B(2, PLi (nsi(t))
if Y = 1 then
nsi(t) = si(t)/smaxi
Execute the Bernoulli Trial X ∼ B(2, PRi (nsi(t))
if X = 1 then
Algorithm 1 The pseudo-code for evaluating Eval(L,R).
1: procedure Eval(L,R)(ki, vi(t), si(t))
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
28:
29:
30:
31:
32:
33:
34:
35: end procedure
end if
Execute the Bernoulli Trial W ∼ B(2, 0.7)
if W = 1 then
if R = 0 then
di(t + 1) = L
end if
if L = 0 then
di(t + 1) = R
end if
end if
else
end if
else
end if
di(t + 1) = L
di(t + 1) = R
di(t + 1) = L
else
di(t + 1) = 0
by B(2, PLi(nsi(t))) to go to the left.
If the latter process is resulted as
going to the left, we take into consideration also the jam situation where the
drivers randomly move to the left or right to find an emptier lane. For this
purpose we use the velocity parameter and we need the fuzzy set of "Velocity
SMALL" with the membership function denoted by µvels to perform this
evaluation which is done by the Bernoulli process B(2, µvels(vi(t))). If the
result of the outcome is positive, meaning that the traffic is indeed jammed,
the decision for lane-changing depends on the relative position of the lane,
i.e., if the vehicle is in the most left (right) lane then it can only move to
the right (left). For this reason, the single-lane model SL(L,R) depends on
two parameters L, R which are Boolean variables used to describe whether
or not there exists a lane on the left or on the right, respectively. Thus if
there is no lane on the left (right) of the driver, i.e., L = 0 (R = 0), he can
only move to the right (left) lane. If there are lanes both on the left and
11
right, the choice is obtained using the Bernoulli process B(2, 0.7) where the
decision is "moving to the left lane" with the probability of 0.7 and "moving
to the right lane" otherwise. These probabilities are decided to be different
since we make the assumption that the drivers desiring to go faster usually
tend to move to the left lane more than the right even in a situation of traffic
congestion.
After the desire of lane-changing, we perform the transfer of a vehicle.
The transfer clearly changes the configuration of the single-lane CCA, thus
we need to introduce some operations to describe this process. Given a vehi-
cle represented by a state σ = (k, x, v, s, d, d′) ∈ Σ \ {⊥} and a configuration
c ∈ Confp(SL), the inserting operator at position n ∈ Z is the function
Insn : Σ \ {⊥} × Confp(SL) → Confp(SL) that changes the configuration
from c into Insn(σ, c) by shifting the states of all cells one step starting
from the n-th position and setting the state of the n-th cell to the value σ.
The right-inverse of Insn is the deleting operator at position n denoted by
Deln : Confp(SL) → Confp(SL). The index n gives the position where we
insert or delete the content of a cell. The function Insn(σ, c) is well defined
only if the insertion of the vehicle still generates a physical configuration.
However, before the insertion, we check what is the relative position of the
vehicle that wants to perform a lane-changing with respect to the lane that
it is going to enter. For this reason, we need to define an index operator
Indx : Σ \ {⊥} × Confp(SL) → Z such that Indx(σ, c) represents the index
where the vehicle with state σ would go if we would try to insert it into the
configuration c.
In our model, the process of lane-changing is based on some safety crite-
rions which check the possibility of executing a lane-changing by considering
the situation in the target lane. These criterions, obtained from some simu-
lation experiments, guarantee that after the lane-changing there will be no
danger (avoidance of collision) with the back and the following vehicle on
the target lane. Consider the vehicle represented by σ that wants to enter
in a lane with configuration c, thus the corresponding position in the target
lane is between the j − 1-th and j-th vehicle with velocities vj−1 and vj
where j = Indx(σ, c). Suppose that the back and front distances of this
entering vehicle with respect to the j − 1-th and j-th vehicle are denoted by
∆− and ∆+, respectively, then the safety constraints are:
∆− > max(0, v1.2
j−1 − v + vj−1 − v + 3), ∆+ > max(0, v1.25 − vj + 3)
(5)
The condition for performing a lane-changing to the left (right) lane can
be summarized by the Boolean variable transL(σ, c) (transR(σ, c)) which
12
consists of the safety criterion (5), the desire to change lane to the left
(right), i.e., d = L (d = R) and not being already transferred, i.e., d′ = 0 (to
avoid multiple transfers in one step of simulation). In the process of lane-
changing, we also need to keep trace where the vehicle comes from because
the transfer of a vehicle is seen as a process consisting of copying and erasing
steps. For this purpose we define the copy of σ as:
σcp = (cid:26) (k, x, v, s/5, L, R)
(k, x, v, s/5, R, L)
if σ = (k, x, v, s, L, 0),
if σ = (k, x, v, s, R, 0).
where we decrease the stress from s to s/5, firstly because we make the
assumption that when a vehicle changes lanes there is a sense of satisfaction
reducing the stress, and secondly this change helps to reduce the ping-pong
phenomenon [12, 20] of vehicles continuing to move from one lane to another
in case of traffic congestion. If a vehicle with state σ desires to go to the left
(right) lane, then we copy σ into c, i.e., we update c into a new configuration
denoted by σ L c (σ R c)∈ Confp(SL) defined by the following equation
(X ∈ {L, R}):
σ X c = (cid:26) Insj(σcp, c)
c
if transX(σ, c), where j = Indx(σ, c)
otherwise.
Besides, we need an operator to update a configuration c′ in which we have
to erase the state that has already been copied into c. The erasing procedure
is accomplished by changing c′ into the new configuration c′ \ω ∈ Confp(SL)
defined as:
Deli(c′)
if (c′(i) = (h, y, w, 5r, R, 0) ∧ ω = (h, y, w, r, R, L))
∨(c′(i) = (h, y, w, 5r, L, 0) ∧ ω = (h, y, w, r, L, R)),
where i = Indx(ω, c′)
c′
otherwise.
c′ \ ω =
We extend these functions to the binary operations L, R and \ on
Confp(SL) to describe the transfer process of all the vehicles from one
lane to another. We call L and R as the left and right copying op-
eration, respectively, and \ as the erasing operation. The extension is made
in the following way. Let c, c′ ∈ Confp(SL) be two configurations with
c(i) = ωi 6=⊥ for i = m, . . . , M and c′(i) = σi 6=⊥ for i = n, . . . , N , where
[m, M ], [n, N ] are the supports of c, c′, respectively. We define the config-
urations c′
let e0 = c and ek := σk L ek−1
for k = 1, . . . , N − n + 1 then we define c′
L c := eN −n+1 (analogously
for R). On the other hand, for c′ \ c, let g0 = c′ and gk := gk−1 \ ωjk for
L c inductively as follows:
13
for i = 0 → M − 1 do
if i = 0 then
c1 := (c0 R c1)
c0 := c0 \ (c0 R c1)
end if
if 0 < i < M − 1 then
ci−1 := (ci L ci−1)
ci := ci \ (ci L ci−1)
ci+1 := (ci R ci+1)
ci := ci \ (ci R ci+1)
if i = 1 then
Algorithm 2 The pseudo-code for one time step evolution of the multi-lane
model
1: procedure Update(c0, . . . , cM −1)
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
25: end procedure
cM −2 := (cM −1 L cM −2)
cM −1 := cM −1 \ (cM −1 L cM −2)
cM −2 := δ∗
cM −1 := δ∗
end if
if i = M − 1 then
(1,1)(cM −2)
(1,0)(cM −1)
ci−1 := δ∗
(1,1)(ci−1)
c0 := δ∗
(0,1)(c0)
else
end if
end if
end for
k = 1, . . . , M − m + 1 then c′ \ c := gM −m+1. Using these operators it is easy
to see that the process of the transfer of vehicles from c′ to c, where c is the
configuration of a lane on the left of the lane with configuration c′, can be
easily described by transforming c into c′
L c and c′ into c′ \ (c′
L c).
We now present our multi-lane model using these copying and erasing
operations. Suppose that there are M ≥ 2 lanes on a highway. We model
each lane using the single-lane CCA model SL. Recall that SL depends on
the parameters L, R, thus we rewrite it as SL(L,R) = (Z, Σ, N , δ(L,R)). In
this way, we can associate to the road the ordered M -tuple:
(SL(0,1), SL1
(1,1), . . . , SLM −2
(1,1) , SL(1,0))
where if M ≥ 3 we have M − 2 copies of SL(1,1), and where SL(0,1) and
SL(1,0) represent the left- and the right-most lane, respectively. In the case
M = 2, we consider just the pair (SL(0,1), SL(1,0)). Suppose that these M
number of CCA are in the configurations (c0, . . . , cM −1) ∈ Confp(SL)M . In
our multi-lane model, we scan each lane and we transfer the vehicles to the
adjacent lanes. After this process, for each lane we apply the single-lane
CCA model to update the configuration and this update is done by means
14
of the global transition function of SL(a,b) denoted by δ∗
(a,b), a, b ∈ {0, 1}.
In this way, we have a new array of configurations (c′
M −1), and this
process represents 1 sec. of simulation. Moreover, the order with which the
transfer is performed is from the left-most lane to the right-most one, and
this is done to satisfy the precedence requirement in European roads. In
Algorithm 2, it is described the updating process U pdate : (c0, . . . , cM −1) 7→
(c′
M −1). We now show that Algorithm 2 can be simulated by a CCA
which implies that our multi-lane model is framed as a CCA model.
0, . . . , c′
0, . . . , c′
Proposition 3.1. There is a stochastic CCA multi-lane model which sim-
ulates Algorithm 2.
Proof. We define the stochastic CCA:
ML = (Z, Ω, M, ∆)
where
• Ω = (Confp(SL) × {copy, erase} × N3) ∪ {⊥}, where ⊥ is the state
associated to the empty cells representing cells with no lane.
• M(i) = (i − 1, i, i + 1) is the von Neumann neighborhood.
• ∆ : Ω3 → Ω is the local transition function such that
∆(ω−1, ω0, ω1) = ω′
0
defined in Algorithm 3 with inputs
ωj = (cj, Xj, Mj, Pj , Kj), j = −1, 0, 1.
If we consider M lanes with the configurations c0, . . . , cM −1, we associate to
ML = (Z, Ω, M, ∆) the configuration
C = (ω0, . . . , ωM −1)
where ωi = (ci, copy, M, i, 0) for i = 0, . . . , M − 1.
It is easy to see that
applying 2M times the global transition function ∆∗ to C, we obtain a new
configuration
∆∗2M
(C) = (ω′
0, . . . , ω′
M −1)
with ω′
i = (c′
i, copy, M, i, 0) for i = 0, . . . , M − 1 where
(c′
0, . . . , c′
M −1) = U pdate(c0, . . . , cM −1),
and U pdate(c0, . . . , cM −1) is the function defined in Algorithm 2.
15
end if
if X0 = copy then
end if
X0 := erase
else
end if
X0 := erase
else
if K0 = 0 then
if X0 = copy then
if ω0 =⊥ then
ω′
else
0 =⊥
if P0 = K0 then
c0 := (c0 \ c1)
if P0 = K0 + 1 then
c0 := (c−1 R c0)
if P0 = K0 − 1 then
c0 := (c1 L c0)
end if
if P0 = K0 + 1 then
c0 := (c−1 R c0)
end if
if 0 < K0 < M0 − 1 then
end if
K0 := K0 + 1 mod M0
X0 := copy
exit
Algorithm 3 The pseudo-code to compute the local transition function ∆.
1: procedure ∆ (ω−1, ω0, ω1)
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
28:
29:
30:
31:
32:
33:
34:
35:
36:
37:
38:
39:
40:
41:
42:
43:
44:
45:
46:
47:
48:
49:
50:
51:
52:
53:
54:
55:
56:
57:
58:
59:
60:
61:
62:
63: end procedure
end if
K0 := K0 + 1 mod M0
X0 := copy
exit
end if
if K0 = M0 − 1 then
if X0 = copy then
end if
K0 := K0 + 1 mod M0
X0 := copy
end if
if 0 < P0 < M0 − 1 then
end if
if P0 = M0 − 1 then
c0 := δ∗
(1,0)(c0)
if P0 = K0 − 1 then
c0 := (c1 L c0)
if P0 = K0 then
c0 := (c0 \ c−1)
end if
if P0 = 0 then
c0 := δ∗
(0,1)(c0)
if P0 = K0 then
c0 := (c0 \ c−1)
c0 := (c0 \ c1)
end if
end if
end if
end if
X0 := erase
else
end if
c0 := δ∗
(1,1)(c0)
16
4 The experiments and the simulation results
The model presented here is a CAM which is intrinsically parallel. We first
implement the model using the programming language Python since it is
a high level language making the implementation of the model faster and
easier. Indeed, during the phase of the development of writing the code, we
use an object-oriented philosophy, especially while passing from the single-
lane to multi-lane case. Thus, it is easier to modify and to rewrite some
parts of the code to tune it better. Using this code we run a series of
experiments for a first evaluation of the model. Part of the data obtained
by these experiments have been presented in the EWGT 2012 conference
[26], and the complete version is contained in the PhD thesis [25]. We also
implement the model using CUDA to take advantage of the power of the
modern graphic cards to perform parallel computation. Indeed, the single-
lane model can be naturally parallelize simply by giving a cell (a vehicle in
our case) to each thread of the GPU. In Section 5 we give a brief description
of this process.
4.1 Setting the kinds of vehicles and the experiment scenar-
ios
In this section, we describe the setting up conditions for the kinds of vehicles
used in a series of simulations. In our experiments, we use just two kinds of
vehicles which we call as passenger vehicles and long vehicles. The vehicles
have the following parameters:
• passenger vehicles: vmax = 36 m/s, vopt = 28 m/s, the length 4 m,
the natural acceleration noise: 0.2 m/s2 (see [7]), smax = 500 m,
smin = −450 m, the function of the probability of lane-changing to the
right lane PR(x) = x, the function of the probability of lane-changing
to the left lane PL(x) = x.
• long vehicles: vmax = 25 m/s, vopt = 20 m/s, the length 9 m, the
natural acceleration noise: 0.1 m/s2 (see [7]), smax = 300 m, smin =
−700 m, the function of the probability of lane-changing to the right
lane PR(x) = x, the function of the probability of lane-changing to the
left lane PL(x) = x1.25.
17
Figure 1: The membership functions of the passenger vehicles for the front
distance
Regarding the fuzzy membership functions, we tune them according to a
questionary posed to a group of drivers. The results represent how much the
claims are related to each interviewee's perception while driving. We then
consider the corresponding membership functions by interpolating linearly
these data. However, in the simulations, we do not use these functions
based on the data. Instead, we approximate them with the triangular and
trapezoidal membership functions which are more common and easier from
the computational point of view. We notice from the experiments that this
kind of approximation do not alter the results of the simulation significantly.
Firstly, because the sample is too small so the data obtained is subject to
errors, and secondly, the obtained membership functions are not so different
from their approximated versions and the simulation can gain a boost of
a factor 1.5.
In Figure 1, we see one of the membership functions of the
passenger vehicles for the perception of front distance adjusted according to
the collected data and the approximated version, respectively.
For the first evaluation of our model, we simulate a piece of highway
near an off-toll plaza. The parameters used in the simulations are:
• Length of the road L
• Number of lane M
• Number of iterations (the simulation time)
• Number of repetitions of the same experiment
• Emission rate λ: the number of vehicles entering this piece of highway
• Influence radius ρ of the off-toll plaza, note that ρ = −1 means that
there is an open road tolling
18
• Obstacle: An obstacle can be placed on the left-most lane or on the
right-most lane
We model the entrance of the each lane using a Poisson stochastic process.
The probability of emitting at least one vehicle in a lane in the time interval
[0,t] is calculated by a Poisson distribution. If the random test succeeds,
i.e., if the result is "emit a vehicle" then we randomly choose a kind of
vehicle where the choice is a "passenger vehicle" with the probability of
1 − p and a "long vehicle" with the probability of p, and in the experiments
we consider p = 0%, 10%, 20%, 30%. The emission rate is set to λ/M for
each lane where we consider λ = 0.25, 0.5, 1, 1.5, 2 veh/s. For instance, if
λ = 1.5 and M = 3, the average number of vehicles entering the piece
of highway is 90 veh/min which means that each lane at the beginning of
this road is charged of around 30 veh/min corresponding to a situation of
heavy traffic since the maximum capacity of a lane is considered around
40 veh/min [14]. Regarding the off-toll plaza, we introduce a parameter
called influence radius which is the interval of the road segment in which
the vehicles are captured when they are exiting. This parameter is used to
control the processing time of each vehicle which influences the throughput
(the number of vehicles processed in every 10 seconds). The influence radii
considered are ρ = 10, 25, 50 m and "-1" which means that the off-toll plaza
is not visible to the vehicles, thus they simply act as if there is no any off-
toll plaza. This situation corresponds to the case of an open road tolling
payment system where the vehicles do not need to slow down and stop to
make payment. Every 10 seconds the simulator checks the number of vehicles
processed (exited) and it calculates the average latency, i.e., the average of
the time spent to travel from the entrance to the exit. We also place an
obstacle in some experiments either on the left- or on the right-most lane
with a dimension of 2L/5 in the middle of the piece of highway to analyze
a bottleneck phenomenon.
In the simulations, each experiment has 1000
iterations and it is repeated 100 times. The execution time takes around
6.6 hours using one core of a computer equipped with a 16 core Xeon at 2.7
GHz (X5550) with 16 GB of RAM running Debian Linux (kernel 2.6.32).
4.2 Analysis of the experimental results
The macroscopic parameters considered for the purpose of analyzing the
general behavior of traffic are evaluated as following. The density describing
the number of vehicles per unit length of the piece of highway (measured
in vehicles per meter) at time t is calculated by D(t) = N (t)
L where N (t)
19
is the total number of vehicles at time t and L is the length of the road
representing a piece of highway (5 km long) near the off-toll plaza. The
number of vehicles is not constant since the entering rate of the vehicles
(depending on a Poisson stochastic process) is different from the exiting
one, so we obtain different densities. In our experiments, the density can
reach at 0.25 veh/m/lane as maximum since the length of a passenger vehicle
is assumed to be 4 m long. The average velocity, i.e., the averaged sum of
i=1 vi/N (t), and finally,
the velocities at time t is calculated by vav(t) = PN (t)
the flow is evaluated by q(t) = D(t) · vav(t).
The analysis of traffic flow is typically performed by constructing the
fundamental diagram (the flow-density diagram) that determines the traffic
state of a roadway by showing the relation between flow and density. There-
fore, the computations described above are used to plot the fundamental di-
agrams where we analyze different traffic phenomena, see for instance Figure
2.
In the simulation results, we notice that the different composition of
vehicles obtained by changing the percentages of the long vehicles is an im-
portant factor in influencing the flow. It is seen in Figure 2 that adding even
a small percentage of long vehicles to the traffic stream changes the funda-
mental diagram significantly. The heterogeneity effects also the throughput
as it is predictable since long vehicles are slower and so in the queue near
the off-toll plaza it takes more time to move and to get processed.
The experiments show that the model is able to reproduce the typical
traffic flow physical phenomena such as the three phases of traffic flow [11]:
Free flow, synchronized flow and wide-moving jam, see Figure 3. Free flow
corresponds to the region of low to medium density and weak interaction
between vehicles. In general, the slope of the fundamental diagram in the
free flow phase is related to the speed limit, meaning that in this phase
vehicles can move almost at the speed limit. Instead, in the free flow phase of
the fundamental diagram in our experimental results, the slope is related to
the optimal velocity, meaning that in this phase the vehicles can move almost
at the optimal velocity. The reason is that in our model the vehicles do not
aim to reach to the maximum velocity as it is in the NaSch-type models,
but they tend to go with their optimal velocity. Free flow is characterized
with a strong correlation and quasi-linear relation between the local flow
and the local density [19]. The synchronized flow presents medium and
high density while the flow can behave free or jammed. In other words, it
is defined by the interaction between the vehicles and is characterized by
an uncorrelated flow-density diagram. However, this phase is not clearly
20
Figure 2: Comparison of fundamental diagrams with 3 and 4 lanes, respec-
tively
21
Figure 3: Traffic phases in the fundamental diagram: Free flow, synchronized
flow and wide-moving jam, and the cross-covariance between the flow and
density
understood in the context of CA and not observed in most of the NaSch-
type models. It probably requires the presence of sources (on-ramps, on-toll
plaza) and sinks (off-ramps, off-toll plaza), see [22]. The wide-moving jam
phase represents the situation where the traffic is jammed (congested). In
this phase, an increase in the density results with a decrease in the flow. Let
us now consider the cross-covariance between the flow q(t) and the density
D(t), see Figure 3:
cc(q, D) =
hq(t)D(t)i − hq(t)ihD(t)i
phq(t)2i − hq(t)i2phD(t)2i − hD(t)i2
where the brackets h·i indicate averaging the values obtained in all the ex-
periments at time t. In the free flow phase, the flow is strongly related to
the density indicating that the average velocity is nearly constant. For large
densities, in the wide-moving jam phase, the flow is mainly controlled by
density fluctuations. There is a transition between these two phases where
the fundamental diagram shows a plateau when the cross-variance is close
to zero. This situation with cc(q, D) ≈ 0 is identified as the synchronized
flow [13, 19].
22
It is seen in Figure 3 that we reproduce these relations where the free
flow phase initiates with the situation of cross-covariance close to 1 and
continues with a positive cross-covariance, the synchronized flow phase is in
the region where the cross-covariance is close to zero and the wide-moving
jam phase corresponds to the situation where the cross-covariance is negative
(anticorrelation).
The plateau formation has the dependency also on the throughput. In
Figure 4, it is seen this situation where we have compared the fundamen-
tal diagrams for different influence radii which are related to the average
throughputs. Observing any of these three plots, we see that when the aver-
age throughput is increased, there occurs a more immediate transition from
the synchronized flow phase to the wide-moving jam phase. In other words,
the phase-change between these two flows occurs with a higher density with
the decrease of the average throughput. Furthermore, when we compare the
three plots in Figure 4, we see that with more long vehicle percentage we
have the phase-change with a higher density. The same phenomenon is also
shown with arrows in Figure 2.
This phenomenon is inverted in the presence of an obstacle (on the right-
most lane3). More precisely, when an obstacle is set we observe that the
phase-change occurs with a lower density, see Figure 5. This phenomenon is
more clear with the presence of long vehicles, probably because when long
vehicles get stuck in traffic this phase emerges faster. Besides, without an
obstacle there is an increase at the slope (absolute value) of the fundamental
diagram where there is the wide-moving jam phase, when the percentage of
long vehicles is increased (see Figure 2). In other words, the flow decreases
faster in the presence of long vehicles with the same increment of density,
which is not observed in the case of placing an obstacle (the lines are almost
parallel, see Figure 5). However, this parallelism occurs only when the road
is enough saturated. For instance in Figure 6 we see that the parallelism
occurs in the first and second plots, but not in the third plot since the lane
number is increased and so the emission rate per lane is decreased, i.e., there
is not enough saturation.
Another effect of setting an obstacle is a reduction on the traffic capacity
as it is expected. For instance, in the experiments plotted in Figure 5,
the maximum flow that can be reached is around 1.33 veh/sec without an
obstacle and around 1.2 veh/sec with an obstacle placed on the right-most
3When we place an obstacle on the left-most lane, we observe that the result is almost
the same with placing it on the right-most lane, so when we make comparisons of having
or not having obstacle we use the result of placing it on the right-most lane.
23
Figure 4: The fundamental diagrams depending on the different average
throughputs
24
Figure 5: The fundamental and the cross-covariance diagrams without and
with obstacle, respectively
25
26
Figure 6: The slope in the wide-moving jam phase with the obstacles
Figure 7: The effect of open road tolling on the flow phases with 3 lanes and
4 lanes
27
lane. In this figure, we also see that this reduction is more evident with the
presence of long vehicles.
In the case that there is an open road tolling, the wide-moving jam
phase does not take place, so there is no anticorrelation situation. As it is
seen in Figure 7, there is just a transition between the free flow and the
synchronized flow. The absence of wide-moving jam phase occurs in general
with the situations where the emission rate is low with respect to the rate
that the vehicles are processed (the influence radius or throughput) at the
off-toll plaza as it is expected.
The experiments also show that the model is able to reproduce the hys-
teresis phenomena in transition between free flow and synchronized flow
phases (see [11]) and in transition between synchronized flow and wide-
moving jam phases. The regions where there are saddles followed by a
capacity drop, as in the Fig.9(e) of [6], are the regions of metastability in
the phase-changes (from free flow to synchronized flow and from synchro-
nized flow to wide-moving jam). This metastability phenomenon is not so
evident when there are long vehicles. More precisely, the heterogeneity of
traffic effects the formation of the plateaus. In Figure 2 and 4, we see that in
the case of the presence of long vehicles, the bumpy plateaus in the synchro-
nized flow phase are replaced by more flattened plateaus, so the saddles in
the phase-changes are not observed as they are in the absence of long vehi-
cles. This is probably due to the fact that passenger vehicles are faster and
so the flow of a traffic without long vehicles changes its phase more sharply.
However, we observe that the presence of obstacles increases the number
of the saddles even when there are long vehicles, making the fundamental
diagrams more bumpy especially in the synchronized flow phase (see Figure
5 and 6).
5 Conclusion
It is introduced a new model for multi-lane traffic. This model is an attempt
to define a new class of traffic models which is a hybrid between the usual
microscopic traffic models, like car-following models, and the usual CAMs
which we have identified as the NaSch-type models. In the process of the
extension of the single-lane model to the multi-lane case, we have first pre-
sented the model as an array of communicating one-dimensional CCA, and
then we have proved that this model can be simulated by a suitable CCA.
In this way, we have framed our multi-lane model inside the class of CCA.
28
For a first test, we have implemented the model using Python4 with an
object-oriented philosophy of programming. Using a questionnaire we have
set up two kinds of vehicles which we have used to run a series of experiments.
Analyzing the experimental results, we have studied the influence of different
composition of vehicles on the macroscopic behavior of the traffic in order to
observe the typical traffic flow phenomena. We have found that the results
are promising, indeed we reproduce and enrich the fundamental diagrams
of traffic flow.
Table 3: Computation Time Comparison between CPU and GPU
Number of Vehicles CPU GPU
(sec)
45,8
104
194
556
1288
(per lane)
0; 0; 1500
0; 0; 3000
0; 0; 5000
0; 0; 10000
(sec)
484
958
1608
4270
9679
5000; 5000; 5000
The code written in Python does not take advantage of CA and its
typical synchronous behavior. For this reason, we have adapted the code
using PyCuda5 to partially parallelize Algorithm 2 on GPU's and we have
seen that it is possible to boost the speed of execution by a factor of ∼ 10.
Indeed, in Table 3 we see the computation time comparison between the
two codes made by running 1000 steps of simulation for a road with 3 lanes
and where it is given the initial numbers of the vehicles distributed per lane
(on a laptop equipped with a processor i7 intel and with a graphic card
NVIDIA GeForce GT 555M). The increased speed of execution by higher
factors of simulation is important also to adapt the model for a forecasting
usage. By partial parallelization, we mean that the lane-changing process
performed using the operations L, R, \ is done sequentially, and the
only parts that can be run in parallel are the global transition functions
δ∗
(a,b), a, b ∈ {0, 1}. Therefore Algorithm 2 can be completely parallelized
only if we decide not to apply the precedence rules and assume a concurrent
strategy of lane-changing.
The analysis we perform here is not conclusive, but gives an insight of
the potentiality of our model. For this reason, we suggest the following tasks
4The
code
can
in
https://dl.dropbox.com/u/50248089/Ozsim.py.
in
5The
found
found
be
be
code
can
https://dl.dropbox.com/u/50248089/Cozsim.py.
29
the
public
Dropbox
link
the
public
Dropbox
link
as future works and research directions to improve and validate the model
and the simulator:
• We did not use all the potentiality of the code since our aim was to
give a first evaluation to our model. However, it would be interesting
to consider also the experiments involving on- and off-ramps and loop-
detectors to analyze different and more realistic situations.
• The heterogeneity considered is reduced to two kinds of vehicles. A
natural question is how the system reacts introducing other kinds. For
instance, in highway environments, motorcycles or sport vehicles can
be added to the mixed traffic of passenger vehicles and long vehicles.
This also brings with it the interesting issue of how to tune the mem-
bership functions for such new kinds.
• The process of lane-changing is purely stochastic. However, in litera-
ture there are some attempts in microscopic models where the process
of lane-changing is described by using a fuzzy logic-based system [1, 4],
thus it would be interesting to extend our model to a model in which it
is implemented a fuzzy logic-based system to refine the lane-changing
rules.
• The model has to be compared with real data. In other words, a careful
case study on specific scenarios with the data available is necessary
for the validation by the community of people working on traffic flow
theory, granular flow theory and traffic (transportation) engineering.
Acknowledgments
The author acknowledges the support from the European Regional Devel-
opment Fund through the programme COMPETE and by the Portuguese
Government through the FCT -- Funda¸cao para a Ciencia e a Tecnologia
under the project PEst-C/MAT/UI0144/2011. The second author also ac-
knowledges the support of the FCT project SFRH/BPD/65428/2009.
References
[1] M. Brackstone and M. McDonald. Car-following: A historical review.
Transportation Research Part F, 2:181 -- 196, 1999.
30
[2] P. Chaudhuri, D. Chowdhury, S. Nandi, and S. Chattopadhyay. Ad-
IEEE Computer
ditive cellular automata: Theory and applications.
Society Press, New York, 1, 1997.
[3] B. Chopard. Modelling physical systems by cellular automata. In: G.
Rozenberg et al (eds) Handbook of Natural Computing: Theory, Exper-
iments, and Applications. Springer, Heidelberg, 2010.
[4] M. Errampalli, M. Okushima, and T. Akiyama. Fuzzy logic based
lane change model for microscopic traffic flow simulation. Journal
of Advanced Computational Intelligence and Intelligent Informatics
(JACIII), 12(2):172 -- 181, 2008.
[5] F. Farina and A. Dennunzio. A predator-prey cellular automaton with
parasitic interactions and environmental effects. Fundamenta Informat-
icae, 83:337 -- 353, 2008.
[6] Nikolas Geroliminis and Jie Sun. Hysteresis phenomena of a macro-
scopic fundamental diagram in freeway networks. Transportation Re-
search Part A, 45:966 -- 979, 2011.
[7] I.D. Greenwood. A new approach to estimate congestion impacts for
highway evaluation-effects on fuel consumption and vehicle emissions.
PhD thesis, University of Auckland, New Zealand, 2003.
[8] K. Kaneko. Theory and application of coupled map lattices. John Wiley
and Sons Ltd, 1993.
[9] J. Kari. Theory of cellular automata: A survey. Theoretical Computer
Science, 334:3 -- 33, 2005.
[10] G. Keller, M. Kunzle, and T. Nowiki. Some phase transitions in coupled
map lattices. Physica D, 59:39 -- 51, 1992.
[11] B.S. Kerner and H. Rehborn. Experimental properties of phase transi-
tions in traffic flow. Phys. Rev. Lett., 79:4030 -- 4033, 1997.
[12] W. Knospe, L. Santen, A. Schadschneider, and M. Schreckenberg. Dis-
order effects in cellular automata for two-lane traffic. Physica A: Sta-
tistical and Theoretical Physics, 265(3 -- 4):614 -- 633, 1999.
[13] W. Knospe, L. Santen, A. Schadschneider, and M. Schreckenberg. To-
wards a realistic microscopic description of highway traffic. Journal of
Physics A, 33:477 -- 485, 2000.
31
[14] Myer Kutz. Handbook of transportation engineering. Myer Kutz Assoc.
Inc., pages 8.1 -- 8.17, 2004.
[15] S. Maerivoet and B. De Moor. Cellular automata models of road traffic.
Physics Reports, 419(1):1 -- 64, November 2005.
[16] E.H. Mamdani. Applications of fuzzy algorithm for control a simple
dynamic plant. Proceedings of the IEEE, 121(12):1585 -- 1588, 1974.
[17] K. Nagel and M. Schreckenberg. A cellular automaton model for freeway
traffic. Journal de Physique I, 2(12):2221 -- 2229, 1992.
[18] K. Nagel, D. E. Wolf, P. Wagner, and P. Simon. Two-lane traffic
rules for cellular automata: A systematic approach. Phys. Rev. E,
58(2):1425 -- 1437, 1998.
[19] L. Neubert, L. Santen, A. Schadschneider, and M. Schreckenberg.
Single-vehicle data of highway trac: A statistical analysis. Phys. Rev.
E, 60:6480 -- 6490, 1999.
[20] M. Rickert, K. Nagel, M. Schreckenberg, and A. Latour. Two lane
traffic simulations using cellular automata. Physica A: Statistical and
Theoretical Physics, 231(4):534 -- 550, 1996.
[21] P. Wagner, K. Nagel, and D.E. Wolf. Realistic multi-lane traffic rules
for cellular automata. Physica A: Statistical and Theoretical Physics,
234(3 -- 4):687 -- 698, 1997.
[22] Dietrich E. Wolf. Cellular automata for traffic simulations. Physica A,
263:438 -- 451, 1999.
[23] S. Wolfram. Theory and applications of cellular automata. World
Scientific Press, Singapore, 1986.
[24] S. Wolfram. A new kind of science. Wolfram Media, Inc., 2002.
[25] O. Yeldan. A stochastic continuous cellular automata traffic model with
fuzzy decision rules. PhD thesis, Politecnico di Milano, Milan, March
2012.
[26] O. Yeldan, A. Colorni, A. Lu`e, and E. Rodaro. A stochastic continuous
cellular automata traffic flow model with a multi-agent fuzzy system.
Procedia -- Social and Behavioral Sciences, 54:1350 -- 1359, 2012.
32
|
0910.3580 | 3 | 0910 | 2010-02-24T14:52:26 | Set-Rationalizable Choice and Self-Stability | [
"cs.MA"
] | A common assumption in modern microeconomic theory is that choice should be rationalizable via a binary preference relation, which \citeauthor{Sen71a} showed to be equivalent to two consistency conditions, namely $\alpha$ (contraction) and $\gamma$ (expansion). Within the context of \emph{social} choice, however, rationalizability and similar notions of consistency have proved to be highly problematic, as witnessed by a range of impossibility results, among which Arrow's is the most prominent. Since choice functions select \emph{sets} of alternatives rather than single alternatives, we propose to rationalize choice functions by preference relations over sets (set-rationalizability). We also introduce two consistency conditions, $\hat\alpha$ and $\hat\gamma$, which are defined in analogy to $\alpha$ and $\gamma$, and find that a choice function is set-rationalizable if and only if it satisfies $\hat\alpha$. Moreover, a choice function satisfies $\hat\alpha$ and $\hat\gamma$ if and only if it is \emph{self-stable}, a new concept based on earlier work by \citeauthor{Dutt88a}. The class of self-stable social choice functions contains a number of appealing Condorcet extensions such as the minimal covering set and the essential set. | cs.MA | cs |
Set-Rationalizable Choice and Self-Stability
Felix Brandt
and Paul Harrenstein
Ludwig-Maximilians-Universitat Munchen
80538 Munich, Germany
{brandtf,harrenst}@tcs.ifi.lmu.de
A common assumption in modern microeconomic theory is that choice
should be rationalizable via a binary preference relation, which Sen showed
to be equivalent to two consistency conditions, namely α (contraction) and γ
(expansion). Within the context of social choice, however, rationalizability
and similar notions of consistency have proved to be highly problematic,
as witnessed by a range of impossibility results, among which Arrow's is the
most prominent. Since choice functions select sets of alternatives rather than
single alternatives, we propose to rationalize choice functions by preference
relations over sets (set-rationalizability). We also introduce two consistency
conditions, bα and bγ, which are defined in analogy to α and γ, and find that
a choice function is set-rationalizable if and only if it satisfies bα. Moreover, a
choice function satisfies bα and bγ if and only if it is self-stable, a new concept
based on earlier work by Dutta. The class of self-stable social choice functions
contains a number of appealing Condorcet extensions such as the minimal
covering set and the essential set.
1 Introduction
Arguably the most basic model of individual and collective choice is a choice function,
which associates with each set A of feasible alternatives a non-empty subset S(A) ⊆ A.
Apparently, not every choice function complies with our intuitive understanding of
rationality. Consider, for example, the choice function S with S({a, b}) = {a} and
S({a, b, c}) = {b}. Doubts as to an agent's rationality could be raised, if, when offered
the choice between apple pie and brownies, he were to choose the former, but the lat-
ter, when told that chocolate mousse is also an option.1 In microeconomic theory, the
1Sen (1993, 1997) gives examples where rational choosers actually make choices as described and gener-
ally argues against imposing internal consistency conditions on rational choice. His examples usually
involve a kind of context-dependence. For instance, a modest person may be unwilling to take the
largest piece of cake and thus his choice depends on the other pieces that are available. Our view is
1
existence of a binary relation R on all alternatives such that S returns precisely the
maximal elements according to R from any feasible set is commonly taken as a minimal
rationality condition on choice functions. Choice functions for which this is the case are
called rationalizable (see, e.g., Richter, 1966; Herzberger, 1973; Blair et al., 1976; Moulin,
1985a).2 Rationalizable choice functions have been characterized using two consistency
conditions that relate choices within feasible sets of variable size, namely conditions α
and γ (Sen, 1971). Clearly, acyclicity of the strict part P of R is necessary and sufficient
for S to be rationalizable if every finite set of alternatives is feasible. Stronger ratio-
nality conditions can be obtained by requiring the rationalizing relation R to satisfy
certain structural restrictions, such as completeness, transitivity, or quasi-transitivity
(i.e., transitivity of P ).
The above considerations have had a profound impact on the theory of social choice, in
particular on the interpretation of Arrow's general impossibility theorem (Arrow, 1951),
which states the impossibility of social choice functions that satisfy four intuitive criteria,
including rationalizability via a transitive preference relation. An obvious way around
Arrow's disturbing result is to try to relax this condition, e.g., by requiring social choice
functions to be merely rationalizable. Although this approach does allow for some social
choice functions that also meet the remaining three criteria, these functions turned out
to be highly objectionable, usually on grounds of involving a weak kind of dictatorship
or violating other conditions deemed to be indispensable for rational social choice (for an
overview of the extensive literature, see Blair et al., 1976; Kelly, 1978; Schwartz, 1986;
Sen, 1977, 1986; Campbell and Kelly, 2002). Sen (1995, page 5) concludes that
[. . . ] the arbitrariness of power of which Arrow's case of dictatorship is
an extreme example, lingers in one form or another even when transitivity
is dropped, so long as some regularity is demanded (such as the absence of
cycles).
One possibility to escape the haunting impossibility of rationalizable social choice
It turns out that α (and
is to require only α or γ but not both at the same time.
even substantially weakened versions of α) give rise to impossibility results that retain
Arrow's spirit (Sen, 1977). By contrast, there are a number of social choice functions
that satisfy γ. An attractive one among these based on majority rule is the uncovered
set (Fishburn, 1977; Miller, 1980; Moulin, 1986).
In this paper, we approach the matter from a slightly different angle. Choice functions
are defined so as to select subsets of alternatives from each feasible set, rather than a
single alternative. Still, the consistency and rationality conditions on choice functions
that violation of internal consistency conditions need not necessarily point at irrational behavior as
such but can just as well indicate the presence of situational features that affect choice but are not
(appropriately) represented in the mathematical model. In some cases the set of alternatives can be
redefined so as to capture all aspects that affect their choice. For instance, the choice of the modest
person above is arguably not between mere pieces of cake, but rather between tuples that consist of
a piece of cake and the pieces left for others to choose from.
2Rationalizable choice functions have also been referred to as binary (Schwartz, 1976), normal (Sen,
1977), and reasonable (Allingham, 1999).
2
have been defined in terms of alternatives. Taking cue from this observation, we propose
an alternative notion of rationality called set-rationalizability. A choice function S is
set-rationalizable if a binary relation R on all non-empty subsets of alternatives can be
found such that for each feasible subset A, S(A) is maximal with respect to R among
all non-empty subsets of A.
ural variant of α defined in terms of sets rather than alternatives. Despite its intu-
We find that set-rationalizable choice functions can be characterized by bα, a nat-
itive appeal, bα has played a remarkably small role in (social) choice theory (Chernoff,
1954; Aizerman and Aleskerov, 1995). Yet, it differentiates quite a number of well-
known choice functions. In particular, we will show that various prominent social choice
functions -- such as all scoring rules, all scoring runoff rules, and all weak Condorcet
sure maximality, the minimal covering set, and the essential set -- do.
extensions -- do not satisfy bα, whereas several Condorcet extensions -- such as weak clo-
For our second result, we introduce a new property bγ, which varies on γ in an analogous
way as bα varies on α. It turns out that bα and bγ characterize the class of self-stable choice
Despite the logical independence of bα and bγ, the class of self-stable social choice functions
functions, whose definition is inspired by earlier work of Dutta (1988) and Brandt (2009).
also contains the Condorcet extensions mentioned above. These Condorcet extensions
also satisfy all conditions typically appearing in Arrovian impossibility results except
rationalizability, i.e., α and γ. Accordingly, by replacing α and γ with bα and bγ, the
impossibility of rationalizable social choice can be avoided and turned into a possibility
result.
2 Preliminaries
We assume there to be a universe U of at least three alternatives. Any subset of U
from which alternatives are to be chosen is a feasible set (sometimes also called an issue
or agenda). Throughout this paper we assume the set of feasible subsets of U to be
given by F(U ), the set of finite and non-empty subsets of U , and generally refer to finite
non-empty subsets of U as feasible sets. Our central object of study are choice functions,
i.e., functions S : F(U ) → F(U ) such that S(A) ⊆ A for all feasible sets A.
A choice function S is called rationalizable if there exists a binary relation R on U
such that for each feasible set A,
S(A) = {a ∈ A : x P a for no x ∈ A}
where P is the strict part of R. Observe that acyclicity of P is required to guarantee
that S invariably returns a non-empty set.
Two typical candidates
the rationalizing relation are the base relation
RS (Herzberger, 1973) and the revealed preference relation RS (Samuelson, 1938), which,
for all alternatives x and y, are given by
for
a RS b if and only if a ∈ S({a, b}), and
a RS b if and only if a ∈ S(X) for some X with b ∈ X.
3
Thus, the revealed preference relation relates a to b if a is chosen in the presence of b and
possibly other alternatives, whereas the base relation only relates a to b if a is chosen in
the exclusive presence of b.
Rationalizable choice functions are characterized by a consistency axiom, which
Schwartz (1976) defined such that for all feasible sets A and B and all alterna-
tives x ∈ A ∩ B,
x ∈ S(A ∪ B) if and only if x ∈ S(A) and x ∈ S(B).
The above equivalence can be factorized into two implications, viz. the conditions α and
γ (Sen, 1971) for feasible sets A and B and alternatives x ∈ A ∩ B,3
if x ∈ S(A ∪ B) then x ∈ S(A) and x ∈ S(B),
if x ∈ S(A) and x ∈ S(B) then x ∈ S(A ∪ B).
(α)
(γ)
Axiom α is a contraction consistency property, which states that alternatives that are
chosen in a feasible set are still chosen in feasible subsets. By contrast, γ is an expansion
consistency property, which states that alternatives chosen in two feasible sets are also
chosen in their union. Sen (1971) proved that a choice function S is rationalizable if and
only if it satisfies both α and γ, with the witnessing relations RS and RS, which are
identical in the presence of α.
Theorem 1 (Sen, 1971). A choice function is rationalizable if and only if it satisfies
both α and γ.
Similar results can also be obtained if stronger requirements are imposed on the ra-
tionalizing relation (see, e.g., Sen, 1977; Moulin, 1985a; Schwartz, 1976). For instance,
Arrow (1959) showed that a choice function can be rationalized by a complete and tran-
sitive relation if and only if it satisfies the weak axiom of revealed preference (WARP) -- a
consistency condition, first proposed by Samuelson (1938), which is stronger than the
conjunction of α and γ and central to large parts of microeconomic theory. Formally,
WARP is defined such that for all feasible sets A and B with B ⊆ A,
if S(A) ∩ B 6= ∅ then S(A) ∩ B = S(B).
(WARP)
3 Set-Rationalizable Choice
In analogy to the definitions of Section 2, we now define the concept of set-
rationalizability, the base and revealed preference relations over sets of alternatives,
and properties bα and bγ. The main result of this section is that set-rationalizable choice
is completely characterized by bα.
We say a choice function is set-rationalizable if it can be rationalized via a preference
relation on sets of alternatives.
3The definitions of α and γ given here are equivalent, but not syntactically identical, to Sen's original
ones. They are chosen so as they reveal their similarity to bα and bγ below.
4
Definition 1. A choice function S is set-rationalizable if there exists a binary re-
lation R ⊆ F(U ) × F(U ) such that for each feasible set A there is no X ∈ F(A)
with X P S(A) where P is the strict part of R.
We define the base relation RS and the revealed preference relation bRS of a choice
function S on sets as follows:4
A RS B if and only if A = S(A ∪ B),
A bRS B if and only if A = S(X) for some X with B ⊆ X.
3.1 Set-contraction consistency
X ⊆ A ∩ B,
if X = S(A ∪ B) then X = S(A) and X = S(B).
chosen alternatives rather than its individual elements.
Condition bα is defined as a natural variant of α that makes reference to the entire set of
Definition 2. A choice function S satisfies bα, if for all feasible sets A, B, and X with
(bα)
bα is not implied by the standard contraction consistency condition α (see Example 2).
Moreover, bα is a not a contraction consistency property according to Sen's original ter-
minology (see, e.g., Sen, 1977). It does not only require that chosen alternatives remain
in the choice set when the feasible set is reduced, but also that unchosen alternatives
remain outside the choice set. Thus, it has the flavor of both contraction and expansion
consistency. bα can be split into two conditions that fall in Sen's categories: an expansion
condition known as ǫ+ (Bordes, 1983) and Aizerman (Moulin, 1986), which requires that
S(B) ⊆ S(A) for all S(A) ⊆ B ⊆ A, and a corresponding expansion condition. Similarly,
bγ can be factorized into two conditions.
In this paper, however, we are concerned with the choice set as a whole and bα merely
says that the set S(A) chosen from a feasible set A is also chosen from any subset B
of A, provided the former contains S(A). This reading is reflected by the useful char-
acterization of bα given in the following lemma, which reveals that bα is equivalent to
such established notions as Chernoff's postulate 5∗ (Chernoff, 1954), the strong superset
property (Bordes, 1979), and outcast (Aizerman and Aleskerov, 1995).
Lemma 1. A choice function S satisfies bα if and only if for all feasible sets A and B,
if S(A) ⊆ B ⊆ A then S(A) = S(B).
Proof. For the direction from left to right, let S(A) ⊆ B ⊆ A. Then, both A∪B = A and
B = A ∩ B. Hence, S(A ∪ B) = S(A) ⊆ B = A ∩ B. Since S satisfies bα, S(A) = S(B).
For the opposite direction, assume for an arbitrary non-empty set X, both X ⊆ A ∩ B
and X = S(A ∪ B). Then, obviously, both S(A ∪ B) ⊆ A ⊆ A ∪ B and S(A ∪ B) ⊆ B ⊆
A ∪ B. It follows that S(A ∪ B) = S(A) and S(A ∪ B) = S(B).
4Given a choice function S, the base relation on sets is a natural extension of the base relation on
alternatives and, hence, both are denoted by RS.
5
As a corollary of Lemma 1, we have that choice functions S satisfying bα, like those
satisfying α, are idempotent, i.e., S(S(A)) = S(A) for all feasible sets A.
An influential and natural consistency condition that also has the flavor of both con-
traction and expansion is path independence (Plott, 1973). Choice function S satis-
fies path independence if S(A ∪ B) = S(S(A) ∪ S(B)) for all feasible sets A and B.
Aizerman and Malishevski (1981) have shown that path independence is equivalent to
the conjunction of α and ǫ+. Since α is the strongest contraction consistency property
and implies the contraction part of bα, we obtain the following alternative characterization
of path independence.
Proposition 1. A choice function satisfies path independence if and only if it satisfies
α and bα.
It can easily be verified that the revealed preference relation on sets bRS of any choice
function S that satisfies bα is closed under intersection, i.e., for all feasible sets X, Y ,
and Z such that Y ∩ Z 6= ∅,
X bRS Y and X bRS Z imply X bRS Y ∩ Z.
3.2 Set-expansion Consistency
We define bγ in analogy to γ as follows.
Definition 3. A choice function S satisfies bγ if for all feasible sets A, B, and X,
it also chooses X from their union.
if X = S(A) and X = S(B) then X = S(A ∪ B).
(bγ)
Thus, a choice function satisfies bγ, if whenever it chooses X from two different sets,
Example 2 shows that bα is not a weakening of α (and not even of the conjunction of
α and γ). To see that bγ is not implied by γ, consider the following choice function over
the universe {a, b, c}, which satisfies γ but not bγ:
X
S(X)
{a, b}
{a, c}
{b, c}
{a, b, c} {a, b, c}
{a}
{a}
{b}
However, bγ is implied by the conjunction of α and γ.
Proposition 2. Every rationalizable choice function satisfies bγ.
Proof. Assume both α and γ to hold for an arbitrary choice function S and consider
an arbitrary feasible sets X, A, and B with X = S(A) and X = S(B). The inclusion
of X in S(A ∪ B) follows immediately from γ. To appreciate that also S(A ∪ B) ⊆ X,
consider an arbitrary x /∈ X and assume for contradiction that x ∈ S(A ∪ B). Then,
either x ∈ A or x ∈ B. Without loss of generality we may assume the former. Clearly,
x ∈ (A ∪ B) ∩ A and α now implies that x ∈ S(A), a contradiction.
6
Schwartz (1976) has shown that quasi-transitive rationalizability is equivalent to the
conjunction of α, γ, and ǫ+. Since α implies the contraction part of bα and α and γ imply
bγ, we obtain the following alternative characterization of quasi-transitive rationalizabil-
ity. As a consequence, WARP implies both bα and bγ.
Proposition 3. A choice function is quasi-transitively rationalizable if and only if it
satisfies α, bα, and bγ.
bγ is reminiscent of the generalized Condorcet condition (see, e.g., Blair et al., 1976),
which requires that for all feasible sets A and all a ∈ A,
if S({a, b}) = {a} for all b ∈ A then S(A) = {a}.
Choice functions that satisfy this condition we will refer to as generalized Condorcet
extensions. It is easily appreciated that bγ implies the generalized Condorcet condition.
In the setting of social choice, Condorcet extensions are commonly understood to be
social choice functions for which additionally choice over pairs is determined by majority
rule (see Section 5.3.1).
In analogy to the relationship between closure under intersection of bRS and bα, bRS of
a choice function S that satisfies bγ is closed under union,5 i.e., for all feasible sets X, Y ,
and Z,
X bRS Y and X bRS Z imply X bRS Y ∪ Z.
3.3 Set-Rationalizability
As in the case of α and γ, a single intuitive consistency condition summarizes the con-
junction of bα and bγ: for all feasible sets A, B, and X with X ⊆ A ∩ B,
X = S(A) and X = S(B) if and only if X = S(A ∪ B).
For illustrative purposes consider the following examples.
Example 1. Let the choice function S over the universe {a, b, c} be given by the table
sets RS coincide and are depicted in the graph on the right. A routine check reveals that
in Figure 1. For S the revealed preference relation on sets bRS and the base relation on
this choice function satisfies both bα and bγ (while it fails to satisfy α). Also observe that
each feasible set X contains a subset that is maximal (with respect to bRS) among the
non-empty subsets of X, e.g., {a, b, c} in {a, b, c} and {a} in {a, b}. Theorem 2, below,
shows that this is no coincidence.
Example 1 also shows that the revealed preference relation over sets need not be
complete. Some reflection reveals that the relation is always incomplete.
Example 2. The table in Figure 2 summarizes a choice function that is rationalizable
by any acyclic relation P with a P c P b. Nevertheless, the revealed preference relation
5This condition is also known as robustness (Arlegi, 2003, see also Barber`a et al. (2004)).
7
X
S(X)
{a, b}
{a, c}
{b, c}
{a, b, c} {a, b, c}
{a}
{c}
{b}
{a,b,c}
{a,b}
{b,c}
{a,c}
{a}
{b}
{c}
Figure 1: The revealed preference relation bRS of the choice function S as in Example 1.
X
S(X)
{a, b}
{a, b}
{a}
{a, c}
{c}
{b, c}
{a, b, c} {a}
{a,b,c}
{a,b}
{b,c}
{a,c}
{a}
{b}
{c}
Figure 2: The revealed preference relation bRS of the choice function S as in Example 2.
8
over sets does not set-rationalize this choice function. Observe that both {a} and {a, b}
are maximal in {a, b} with respect to the strict part of bRS. As S({a, b, c}) = {a} and
S({a, b}) = {a, b}, S clearly does not satisfy bα. Again Theorem 2, below, shows that
this is no coincidence.
By definition, the base relation RS of any choice function S is anti-symmetric, i.e.,
thus both anti-symmetric.
X RS Y and Y RS X imply X = Y . In the presence of bα, bRS and RS coincide and are
Set-rationalizable choice functions are characterized by bα.6
Theorem 2. A choice function is set-rationalizable if and only if it satisfies bα.
Proof. For the direction from left to right, assume S is set-rationalizable and let R be
the witnessing binary relation on sets. Now consider arbitrary feasible sets A, B and X
with X ⊆ A ∩ B and assume that X = S(A ∪ B). Then, S(A ∪ B) ⊆ A ∩ B. Hence,
Y P S(A ∪ B), for no non-empty subset Y ⊆ A ∪ B. It follows that there is no non-empty
subset Y of A such that Y P S(A ∪ B) either. Hence, S(A ∪ B) is maximal with respect
to R within A. As S is set-rationalizable, S(A ∪ B) has also to be the unique such
subset in A. The argument that S(A ∪ B) is also the unique maximal element of R in B
runs along analogous lines. It follows that both S(A) = S(A ∪ B) and S(B) = S(A ∪ B).
For the opposite direction assume S to satisfy bα and consider arbitrary feasible sets A
and B such that B ⊆ A and S(A) 6= B. Then,
Hence, by virtue of Lemma 1,
S(A) ⊆ B ∪ S(A) ⊆ A.
S(A) = S(B ∪ S(A)),
which implies that S(A) RS B. Since RS is anti-symmetric, it is thus impossible that
B RS S(A). A similar argument holds for bRS, which coincides with RS in the presence
of bα.
In the proof of Theorem 2, it is precisely the revealed preference relation on sets that
is witness to the fact that choice functions satisfying bα are set-rationalizable. In contrast
to Sen's Theorem 1, however, the revealed preference relation on sets is not the unique
relation that can achieve this. It is also worth observing that the proof shows that for
each feasible set X and choice function S satisfying bα, the selected set S(X) is not merely
a maximal set but also the unique maximum set within X given bRS, i.e., S(X) bRS Y for
all non-empty subsets Y of X.
4 Self-Stability
It turns out that the notions of set consistency introduced in the previous section bear
a strong relationship to the stability of choice sets as introduced by Dutta (1988) and
6Moulin shows a similar statement for single-valued choice functions (Moulin, 1985a).
9
generalized by Brandt (2009). Stability of choice sets is based on the notions of internal
and external stability by von Neumann and Morgenstern (1944), which can be merged
in the following fixed-point characterization.
Definition 4. Let A, X be feasible sets and S a choice function. X is S-stable in A if
X = {a ∈ A : a ∈ S(X ∪ {a})}.
Alternatively, X is S-stable in A if it satisfies both internal and external S-stability
in A:
S(X) = X,
(internal S-stability)
a 6∈ S(X ∪ {a}) for all a ∈ A \ X.
(external S-stability)
The intuition underlying stable sets is that there should be no reason to restrict the se-
lection by excluding some alternative from it and, secondly, there should be an argument
against each proposal to include an outside alternative into the selection.
For some choice functions S, a unique inclusion-minimal S-stable set generally exists.
If that is the case, we use bS to denote the choice function that returns the unique minimal
S-stable set in each feasible set and say that bS is well-defined. Within the setting of
social choice, a prominent example is Dutta's minimal covering set MC (Dutta, 1988;
Dutta and Laslier, 1999), which is defined as the unique minimal stable set with respect
frequently turns out to be highly non-trivial (Brandt, 2009).
to the uncovered set UC , i.e., MC = dUC . Proving that a choice function bS is well-defined
We find that there is a close connection between bγ and minimal S-stable sets.
Lemma 2. Let S be a choice function such that bS is well-defined. Then bS satisfies bγ.
Proof. Consider arbitrary feasible sets A, B, X and assume that bS(A) = bS(B) = X.
Trivially, as X is internally S-stable in A, so is X in A ∪ B. To appreciate that X is also
externally S-stable in A ∪ B, consider an arbitrary x ∈ (A ∪ B) \ X. Then, x ∈ A \ X
or x ∈ B \ X. In either case, S(X ∪ {x}) = X, by external S-stability of X in A if
the former, and by external S-stability of X in b if the latter. Also observe that any
subset of X that is S-stable in A ∪ B, would also have been S-stable in both A and B.
Hence, X is minimal S-stable in A ∪ B. Having assumed that bS is well-defined, we may
conclude that bS(A ∪ B) = X.
We now introduce the notion of self-stability. A choice function S is said to be self-
stable if for each feasible set A, S(A) is the unique (minimal) S-stable set in A.
Definition 5. A choice function S is self-stable if bS is well-defined and S = bS.
In the next section we argue that self-stability defines an interesting class of choice
functions, containing a number of well-known and important social choice functions.
First, and on a more abstract level, however, we establish that the class of self-stable
choice functions is characterized by the conjunction of bα and bγ.
10
Theorem 3. A choice function is self-stable if and only if it satisfies both bα and bγ.
Proof. For the direction from left to right, assume S to be self-stable. Lemma 2 implies
that S satisfies bγ. For bα, consider arbitrary feasible sets A, B such that S(A) ⊆ B ⊆ A.
By virtue of Lemma 1, it suffices to show that S(B) = S(A). As, moreover, bS(B) = S(B)
and bS is well-defined, S(B) is the unique S-stable set in B. Hence, it suffices to show
that S(A) is both internally and externally S-stable in B. Internal S-stability of S(A)
in B is trivial since S(S(A)) = S(A) by S(A)'s being internally S-stable in A. To
appreciate that S(A) is also externally S-stable in B, consider an arbitrary x ∈ B \S(A).
Then also x ∈ A \ S(A) and by S(A)'s being externally S-stable in A, we obtain S(A) =
S(S(A) ∪ {x}). It follows that S(A) is also externally S-stable in B.
For the other direction, assume S satisfies both bα and bγ and consider an arbitrary
feasible set A. To show that S satisfies internal S-stability, observe that trivially S(A) ⊆
S(A) ⊆ A. Hence, by Lemma 1, S(A) = S(S(A)). To appreciate that S also satisfies
external S-stability, let x ∈ A \ S(A). Then, S(A) ⊆ S(A) ∪ {x} ⊆ A and, again by
Lemma 1, S(A) = S(S(A) ∪ {x}). To see that bS is well-defined, consider an arbitrary
S-stable set Y in A and let A \ Y = {x1, . . . , xk}, i.e., A = Y ∪ {x1, . . . , xk}. By external
S-stability of Y , then S(Y ∪ {xi}) = S(Y ) for each i with 1 ≤ i ≤ k. Thus by k − 1
applications of bγ, we obtain S(Y ) = S(Y ∪ {x1, . . . , xk}) = S(A).
As an immediate consequence of Theorem 3 and the observation that bγ implies the
generalized Condorcet condition, we have the following corollary.
Corollary 1. Every self-stable choice function is a generalized Condorcet extension.
Examples of self-stable Condorcet extensions will be given in Section 5.3.1.
5 Social Choice
In this section, we assess the consequences of the reflections in the previous two sections
on the theory of social choice. Before we do so, however, we introduce some additional
terminology and notation.
5.1 Social Choice Functions
We consider a finite set N = {1, . . . , n} of at least two agents. Each agent i entertains
preferences over the alternatives in U , which are represented by a transitive and complete
preference relation Ri. In some cases, we will assume preferences to be linear, i.e., also
satisfying anti-symmetry, but otherwise we impose no further restrictions on preference
relations. We have a Ri b denote that agent i values alternative a at least as much as
alternative b. We write Pi for the strict part of Ri, i.e., a Pi b if a Ri b but not b Ri a.
Similarly, Ii denotes i's indifference relation, i.e., a Ii b if both a Ri b and b Ri a. The
set of all preference relations over the universal set of alternatives U will be denoted
by R(U ). The set of preference profiles, with typical element R = (R1, . . . , Rn), is then
given by R(U )N .
11
The central object of study in this section are social choice functions, i.e., functions
that map the individual preferences of the agents and a feasible set to a set of socially
preferred alternatives.
Definition 6. A social choice function (SCF) is a function f : R(U )N × F(U ) → F(U )
such that f (R, A) ⊆ A for all preference profiles R and feasible sets A.
Clearly, every SCF f together with a preference profile R in R(U ) defines a choice
function Sf,R on U in a natural way by letting for each feasible set A, Sf,R(A) = f (R, A).
We say that f satisfies WARP, rationalizability, or any other condition defined for choice
functions, if Sf,R does for every preference profile R. Pareto-optimality, independence
of irrelevant alternatives, and non-dictatorship are conditions that are more specifically
defined for SCFs.
Pareto-optimality requires that an alternative should not be chosen if there exists
another alternative that all agents unanimously prefer to the former.
Definition 7. An SCF f satisfies (pairwise) Pareto-optimality if for all preference pro-
files R and all alternatives a, b, if b Pi a for all i ∈ N then a 6∈ f (R, {a, b}).
Independence of irrelevant alternatives reflects the idea that choices from a set of
feasible alternatives should not depend on preferences over alternatives that are not
contained in this set.
Definition 8. An SCF f satisfies independence of irrelevant alternatives (IIA) if
f (R, A) = f (R′, A) for all feasible sets A and preference profiles R, R′ such that
RA = R′A.
In the context of SCFs, IIA constitutes no more than a framework requirement for
social choice.
Another minimal requirement for any SCF is that it should be sensitive to the pref-
erences of more than one agent. In particular, there should not be a single agent who
can enforce the inclusion of alternatives in the choice set no matter which preferences
the other agents have. Such an agent is usually called a (weak) dictator.7
Definition 9. An SCF f is (pairwise) non-dictatorial if there is no agent i such that
for all preference profiles R and alternatives a, b, if a Pi b then a ∈ f (R, {a, b}).
Definition 7 through Definition 9 are also referred to as the Arrovian conditions.
Other useful and frequently imposed requirements on SCFs are neutrality, anonymity,
and positive responsiveness.
Neutrality can be seen as a strengthening of IIA and requires SCFs to be invariant
under renaming alternatives, i.e., all alternatives are to be treated equally.
Definition 10. An SCF f is neutral if π(f (R, A)) = f (R′, A) for all feasible sets A,
preference profiles R, R′, and permutations π : A → A such that a R′
i b if and only if
π(a) Ri π(b) for all alternatives a, b and agents i.
7For presentational purposes we employ the notion of a weak dictator or vetoer in all impossibility
theorems, although Theorem 4 holds for an even weaker notion of non-dictatorship.
12
By contrast, anonymity says that SCFs be invariant under renaming agents and as
such is a strong variant of non-dictatorship.
Definition 11. An SCF f is anonymous if f (R, A) = f (R′, A) for all feasible sets A,
preference profiles R and R′, and permutations π : N → N such that R′
i = Rπ(i) for all
agents i.
It also appears reasonable to demand that SCFs are monotonic in the sense that
increased support may not hurt an alternative.
Definition 12. An SCF f is (pairwise) positive responsive if for all alternatives a, b and
all preference profiles R, R′, there is some agent i such that Rj = R′
j for all agents j 6= i
and either both a Ii b and a P ′
i b or both b Pi a and a R′
i b,
if a ∈ f (R, {a, b}) then f (R′, {a, b}) = {a}.
5.2 Impossibility Results
Famously, Arrow's general impossibility theorem, as formulated for SCFs, states that no
SCF that satisfies all of the Arrovian conditions exists.
Theorem 4 (Arrow, 1951; 1959). No SCF satisfies Pareto-optimality, IIA, WARP, and
non-dictatorship.
As the Arrovian conditions cannot be satisfied by any SCF, at least one of them needs
to be excluded or relaxed to obtain positive results. Clearly, dropping non-dictatorship is
unacceptable and, as already mentioned, IIA merely states that the SCF represents a rea-
sonable model of preference aggregation (see, e.g., Schwartz, 1986; Bordes and Tideman,
1991). Wilson (1972) has shown that without Pareto-optimality only SCFs that are con-
stant (i.e., completely unresponsive) or fully determined by the preferences of a single
agent are possible. Moreover, it could be argued that not requiring Pareto-optimality
runs counter to the very idea of social choice. Accordingly, the only remaining possibility
is to exclude WARP.
Imposing weaker rationality conditions than WARP, however, offers little relief as it
turns out that the vicious essence of Arrow's impossibility remains. There is a range of
results stating the impossibility of SCFs satisfying weaker versions of WARP in a satisfac-
tory way (see, e.g., Kelly, 1978; Schwartz, 1986; Campbell and Kelly, 2002; Banks, 1995).
Among these, the results by Mas-Colell and Sonnenschein (1972) and Blau and Deb
(1977) deserve special mention as they concern rationalizability instead of WARP. We
will employ a variant of Blau and Deb's theorem due to Austen-Smith and Banks (2000).
Theorem 5 (Mas-Colell and Sonnenschein, 1972). No SCF satisfies Pareto-optimality,
positive responsiveness, IIA, rationalizability, and non-dictatorship, provided that n > 3.
By strengthening IIA to neutrality and assuming that the number of alternatives
exceeds the number of agents, positive responsiveness is no longer required.
13
1 1 1
a c
b
b a c
b a
c
{x, y} f (R, {x, y})
{a, b}
{b, c}
{a, c}
{a}
{b}
{c}
Table 1: On the left a preference profile (figures indicate numbers of agents) leading to
the Condorcet paradox. On the right the corresponding choice function on pairs
if determined by majority rule.
Theorem 6 (Austen-Smith and Banks, 2000). No SCF satisfies Pareto-optimality, neu-
trality, rationalizability, and non-dictatorship, provided that U > n.
For further characterizations of rationalizable social choice the reader be referred to
Moulin (1985b), Banks (1995), and Austen-Smith and Banks (2000).
5.3 Condorcet Extensions and Scoring Rules
In light of the severe problems that α and γ entail in social choice, we now investigate
which of the well-known SCFs satisfy bα and bγ. We focus on two types of SCFs, namely
Condorcet extensions and scoring rules.
5.3.1 Condorcet Extensions
Despite the Arrovian impossibility results, social choice over two alternatives is unprob-
lematic. May (1952) has shown that the simple majority rule -- choosing the alternative
that a majority prefers to the other alternative, and in case of a tie, choose both -- can
be characterized by neutrality, anonymity, and positive responsiveness. Thus, it seems
reasonable to require of SCFs f that they reflect majority rule on pairs. Extending any
such SCF f to feasible sets with more than two alternatives, one immediately runs into
arguably one of the earliest Arrovian impossibility results, viz. the Condorcet paradox
(de Condorcet, 1785). Consider the preference profile depicted in Table 1. Then, if f
on pairs is determined by majority rule, the base relation RSf,R fails to be acyclic, and
therefore Sf,R does not satisfy α. Observe, moreover, that f (R, {a, b, c}) = {a, b, c},
if f satisfies bα. For suppose otherwise, then, without loss of generality, we may assume
fies bα, however, the former is at variance with f (R, {a, c}) = {c}, and the latter with
f (R, {a, b}) = {a}. Thus, Sf,R coincides with the choice function S of Example 1 and
Figure 1 depicts its weak revealed preference relation bRSf,R.
By Theorem 3, the class of SCFs that satisfy both bα and bγ consists precisely of all
that either f (R, {a, b, c}) = {a} or f (R, {a, b, c}) = {a, b}. Assuming that f satis-
self-stable SCFs. By virtue of Theorem 2 and Corollary 1 the SCFs in this class are all
set-rationalizable generalized Condorcet extensions. May's characterization furthermore
implies that all self-stable SCFs that satisfy anonymity, neutrality, and positive respon-
siveness are Condorcet extensions. Among them are well-known rules like weak closure
14
3 2 1
a b
c
c a b
c a
b
Table 2: A preference profile (figures indicate numbers of agents) showing that no weak
Condorcet extension and scoring rule satisfies bα. For every weak Condorcet
extension and every scoring rule the choice function for this profile is as in
Example 2 (also compare Figure 2).
maximality (also known as the top cycle, GETCHA, or the Smith set), the minimal cov-
ering set, the essential set, and their generalizations (Bordes, 1976; Dutta and Laslier,
1999; Laslier, 2000).8
Interestingly, well-known Condorcet extensions that satisfy only one of bα and bγ appear
he refers to as GOCHA, is an example of an SCF that satisfies bγ but not bα. By contrast,
the iterated uncovered set (e.g., Dutta, 1988) satisfies bα but not bγ.
to be less common. Still, Schwartz's strong closure maximality (Schwartz, 1972), which
When pairwise choice is determined via majority rule, the set of weak Condorcet
winners for a given preference profile R and feasible set A is defined as {a ∈ A : a ∈
f (R, {a, b}) for all b ∈ A}. An SCF is called a weak Condorcet extension if it returns
the set of weak Condorcet winners whenever this set is non-empty. Clearly, every weak
Condorcet extension is a Condorcet extension. The converse is not generally the case,
but many Condorcet extensions (such as Kemeny's rule, Dodgson's rule, Nanson's rule,
and the minimax rule) are also weak Condorcet extensions (see Fishburn, 1977). It turns
out that no weak Condorcet extension is set-rationalizable.
Theorem 7. No weak Condorcet extension satisfies bα.
Proof. Let f be a weak Condorcet extension and consider the linear preference profile R
with preferences over A = {a, b, c} as given in Table 2. Since alternative a is the unique
weak Condorcet winner -- three out of six agents prefer it to b and all agents but one
prefer it over c -- f (R, {a, b, c}) = {a}. Now observe that the preferences of the same
agents over the subset {a, b} are such that three agents prefer a to b and three b to a.
Accordingly, f (R, {a, b}) = {a, b}. As c /∈ f (R, {a, b, c}) but f (R, {a, b, c}) 6= f (R, {a, b}),
we may conclude that f does not satisfy bα.
5.3.2 Scoring Rules
Scoring rules are based on the idea that the voters each rank the alternatives in a feasible
set according to their preferences, which, for technical convenience we will here assume
8Brandt (2009) defines an infinite hierarchy of self-stable SCFs. If we assume an odd number of agents
with linear preferences, the class of self-stable SCFs is also conjectured to contain the tournament
equilibrium set (Schwartz, 1990) and the minimal extending set. Whether this is indeed the case
depends on a certain graph-theoretic conjecture (Laffond et al., 1993; Brandt, 2009).
15
to be linear. Each time an alternative is ranked mth by some voter it gets a particular
score sm. The scores of each alternative are then added and the alternatives with the
highest cumulative score are selected. The class of scoring rules includes several well-
known SCFs, like the Borda rule -- alternative a gets k points from agent i if i prefers a
to k other alternatives -- and the plurality rule -- the cumulative score of an alternative
equals the number of agents by which it is ranked first.
Formally, we define a score vector of length k as a vector s = (s1, . . . , sk) in Rk such
that s1 ≥ · · · ≥ sk and s1 > sk. For example, (1, 0, 0), (2, 1, 0), and (1, 1, 0) are the
score vectors of length 3 for the plurality rule, the Borda rule, and the anti-plurality
rule, respectively. Given a feasible set X of k alternatives, an x ∈ X, and a linear
preference profile R, we have s(x, i) denote the score alternative x obtains from voter i,
i.e., s(x, i) = sm if and only if x is ranked mth by i within X. Then, the (cumulative)
score s(x) of an alternative x within X given R is then defined such that
s(x) = X
i∈N
s(x, i).
A scoring rule is an SCF that selects from each feasible set X for each preferences
profile the set of alternatives x in X with the highest score s(x) according to some score
vector s of length X. Observe that no restrictions are imposed on how the score vectors
for different lengths are to be related.
As every scoring rule fails to select the Condorcet winner for some preference profile
(Fishburn, 1973) and coincides with majority rule on two alternatives, they generally do
rule is set-rationalizable.
not satisfy bγ. We find that no scoring rule can satisfy bα either. It follows that no scoring
Theorem 8. No scoring rule satisfies bα.
Proof. Let f be a scoring rule. Let further s = (s1, s2, s3) and s′ = (s′
2) be its
associated score vectors of lengths 3 and 2, respectively. Without loss of generality we
may assume that s1 = 1 and s3 = 0. Consider the preference profile R with preferences
over A = {a, b, c} as depicted in Table 2. Then, s(a) = 3 + 2s2, s(b) = 2 + s2 and
s(c) = 1 + 3s2. Since 1 ≤ s2 ≤ 0, it can easily be appreciated that s(a) > s(b)
as well as s(a) > s(c). Hence, f (R, {a, b, c}) = {a}. As in the proof of Theorem 7,
1, s′
f (R, {a, b}) = {a, b} and we may conclude that f does not satisfy bα.
Using the same example as in the proof of Theorem 8, the reader can easily verify that
all scoring run-off rules -- such as single transferable vote (STV) -- also fail to satisfy bα
and as such are not set-rationalizable.
An interesting question in this context is whether the impossibility shown in Theorem 8
can be generalized to rank-based SCFs, i.e., SCFs that merely take into account the
positions of alternatives in the individual rankings (Laslier, 1996).
It turns out this
is not the case because, for instance, the (rather unattractive) SCF that chooses all
alternatives that are ranked first by at least one voter is rank-based and satisfies bα.9 It
9This SCF has also been mentioned by Gardenfors (1976) and Kelly (1977). Taylor (2005) calls it the
omninomination rule.
16
might also be worth observing that this SCF happens to satisfy bγ and Pareto-optimality
as well.
6 Summary and Conclusion
Problems relating to the possibility of reasonable social choice functions have proved to
be rather tenacious. In particular, attempts to circumvent Arrow's impossibility result
by replacing the weak axiom of revealed preference (WARP), which requires a transitive
and complete preference relation on alternatives underlying choice, by weaker conditions
on the underlying preference relation have generally failed to deliver.
By weakening WARP to set-rationalizability, we have shown that social choice func-
tions that also satisfy the other Arrovian postulates do exist. These social choice func-
tions are generally characterized by their satisfying bα. This condition, which also goes
by the names of strong superset property, 5∗, and outcast, is no stranger in choice
theory, but nevertheless has played a surprisingly small role therein. In an early pub-
lication, Chernoff writes that "postulate 5 ∗ is not imposed in our definition of a ra-
tional solution" (Chernoff, 1954, page 430) and Aizerman and Aleskerov chime in by
(Aizerman and Aleskerov, 1995, page 21). The characterization of set-rationalizable
stating that "this property [bα] did not find wide use in the choice theory literature"
choice functions via bα can be interpreted as a strong argument for this postulate.
By also imposing bγ, the set-expansion property that forms the counterpart of bα, we
obtain the class of self-stable generalized Condorcet extensions. In the context of social
choice, this class comprises appealing social choice functions like the minimal covering
set and the essential set, yet excludes other well-known rules like all scoring rules, all
scoring runoff rules, and all weak Condorcet extensions. As such, self-stability defines
a fascinating class of social choice functions, which offers an interesting way around the
impossibility results that have haunted social choice theory for such a long time.
Acknowledgements
We thank Nicholas Baigent and Cristopher Tyson for helpful suggestions.
This material is based upon work supported by the Deutsche Forschungsgemeinschaft
under grant BR 2312/3-3.
References
M. Aizerman and F. Aleskerov. Theory of Choice, volume 38 of Studies in Mathematical
and Managerial Economics. North-Holland, 1995.
M. Aizerman and A. Malishevski. General theory of best variants choice: Some aspects.
IEEE Transactions on Automatic Control, 26(5):1030 -- 1040, 1981.
M Allingham. Rational Choice. Macmillan, 1999.
17
R. Arlegi. A note on Bossert, Pattanaik and Xu's "Choice under complete uncertainty:
Axiomatic characterization of some decision rules". Economic Theory, 22:219 -- 225,
2003.
K. J. Arrow. Social Choice and Individual Values. New Haven: Cowles Foundation, 1st
edition, 1951. 2nd edition 1963.
K. J. Arrow. Rational choice functions and orderings. Economica, 26:121 -- 127, 1959.
D. Austen-Smith and J. S. Banks. Positive Political Theory I: Collective Preference.
University of Michigan Press, 2000.
J. S. Banks. Acyclic social choice from finite sets. Social Choice and Welfare, 12:293 -- 310,
1995.
S. Barber`a, W. Bossert, and P. K. Pattanaik. Ranking sets of objects. In S. Barber`a, P. J.
Hammond, and C. Seidl, editors, Handbook of Utility Theory, volume II, chapter 17,
pages 893 -- 977. Kluwer Academic Publishers, 2004.
D. H. Blair, G. A. Bordes, J. S. Kelly, and K. Suzumura. Impossibility theorems without
collective rationality. Journal of Economic Theory, 13:361 -- 379, 1976.
J. H. Blau and R. Deb. Social decision functions and the veto. Econometrica, 45(4):
871 -- 879, 1977.
G. Bordes. Consistency, rationality and collective choice. Review of Economic Studies,
43(3):451 -- 457, 1976.
G. Bordes. Some more results on consistency, rationality and collective choice. In J. J.
Laffont, editor, Aggregation and Revelation of Preferences, chapter 10, pages 175 -- 197.
1979.
G. Bordes. On the possibility of reasonable consistent majoritarian choice: Some positive
results. Journal of Economic Theory, 31:122 -- 132, 1983.
G. Bordes and N. Tideman.
Independence of irrelevant alternatives in the theory of
voting. Theory and Decision, 30(2):163 -- 186, 1991.
F. Brandt.
report,
http://arxiv.org/abs/0803.2138, 2009. Presented at the 9th International Meeting of
the Society of Social Choice and Welfare.
tournaments.
Technical
Minimal
stable
sets
in
D. E. Campbell and J. S. Kelly. Impossibility theorems in the Arrovian framework. In
K. J. Arrow, A. K. Sen, and K. Suzumura, editors, Handbook of Social Choice and
Welfare, volume 1, chapter 1. Elsevier, 2002.
H. Chernoff. Rational selection of decision functions. Econometrica, 22:422 -- 443, 1954.
18
Marquis de Condorcet. Essai sur l'application de l'analyse `a la probabilit´e des d´ecisions
rendues `a la pluralit´e des voix. Imprimerie Royale, 1785. Facsimile published in 1972
by Chelsea Publishing Company, New York.
B. Dutta. Covering sets and a new Condorcet choice correspondence. Journal of Eco-
nomic Theory, 44:63 -- 80, 1988.
B. Dutta and J.-F. Laslier. Comparison functions and choice correspondences. Social
Choice and Welfare, 16(4):513 -- 532, 1999.
P. C. Fishburn. The Theory of Social Choice. Princeton University Press, 1973.
P. C. Fishburn. Condorcet social choice functions. SIAM Journal on Applied Mathe-
matics, 33(3):469 -- 489, 1977.
P. Gardenfors. Manipulation of social choice functions. Journal of Economic Theory, 13
(2):217 -- 228, 1976.
H. G. Herzberger. Ordinal preference and rational choice. Econometrica, 41:187 -- 237,
1973.
J. Kelly. Strategy-proofness and social choice functions without single-valuedness. Econo-
metrica, 45(2):439 -- 446, 1977.
J. S. Kelly. Arrow Impossibility Theorems. Economic Theory and Mathematical Eco-
nomics. Academic Press, 1978.
G. Laffond, J.-F. Laslier, and M. Le Breton. More on the tournament equilibrium set.
Math´ematiques et sciences humaines, 31(123):37 -- 44, 1993.
J.-F. Laslier. Rank-based choice correspondences. Economics Letters, 52:279 -- 286, 1996.
J.-F. Laslier. Aggregation of preferences with a variable set of alternatives. Social Choice
and Welfare, 17:269 -- 282, 2000.
A. Mas-Colell and H. Sonnenschein. General possibility theorems for group decisions.
Review of Economic Studies, 39(2):185 -- 192, 1972.
K. May. A set of independent, necessary and sufficient conditions for simple majority
decisions. Econometrica, 20:680 -- 684, 1952.
N. R. Miller. A new solution set for tournaments and majority voting: Further graph-
theoretical approaches to the theory of voting. American Journal of Political Science,
24(1):68 -- 96, 1980.
H. Moulin. Choice functions over a finite set: A summary. Social Choice and Welfare,
2:147 -- 160, 1985a.
H. Moulin. From social welfare ordering to acyclic aggregation of preferences. Mathe-
matical Social Sciences, 9(1):1 -- 17, 1985b.
19
H. Moulin. Choosing from a tournament. Social Choice and Welfare, 3:271 -- 291, 1986.
C. R. Plott. Path independence, rationality, and social choice. Econometrica, 41(6):
1075 -- 1091, 1973.
M. K. Richter. Revealed preference theory. Econometrica, 34(3):635 -- 645, 1966.
P. A. Samuelson. A note on the pure theory of consumers' behaviour. Econometrica, 5:
61 -- 71, 1938.
T. Schwartz. Rationality and the myth of the maximum. Nous, 6(2):97 -- 117, 1972.
T. Schwartz. Choice functions, "rationality" conditions, and variations of the weak
axiom of revealed preference. Journal of Economic Theory, 14:414 -- 427, 1976.
T. Schwartz. The Logic of Collective Choice. Columbia University Press, 1986.
T. Schwartz. Cyclic tournaments and cooperative majority voting: A solution. Social
Choice and Welfare, 7:19 -- 29, 1990.
A. K. Sen. Choice functions and revealed preference. Review of Economic Studies, 38
(3):307 -- 317, 1971.
A. K. Sen. Social choice theory: A re-examination. Econometrica, 45(1):53 -- 89, 1977.
A. K. Sen. Social choice theory. In K. J. Arrow and M. D. Intriligator, editors, Handbook
of Mathematical Economics, volume 3, chapter 22, pages 1073 -- 1181. Elsevier, 1986.
A. K. Sen. Internal consistency of choice. Econometrica, 61:495 -- 521, 1993.
A. K. Sen. Rationality and social choice. The American Economic Review, 85(1):1 -- 24,
1995.
A. K. Sen. Maximization and the act of choice. Econometrica, 65(4):745 -- 779, 1997.
A. D. Taylor. Social Choice and the Mathematics of Manipulation. Cambridge University
Press, 2005.
J. von Neumann and O. Morgenstern. Theory of Games and Economic Behavior. Prince-
ton University Press, 1944.
R. B. Wilson. Social choice theory without the Pareto principle. Journal of Economic
Theory, 5:478 -- 486, 1972.
20
|
1102.1261 | 2 | 1102 | 2011-08-18T09:56:19 | Symmetry in behavior of complex social systems - discussion of models of crowd evacuation organized in agreement with symmetry conditions | [
"cs.MA"
] | The evacuation of football stadium scenarios are discussed as model realizing ordered states, described as movements of individuals according to fields of displacements, calculated correspondingly to given scenario. The symmetry of the evacuation space is taken into account in calculation of displacements field - the displacements related to every point of this space are presented in the coordinate frame in the best way adapted to given symmetry space group, which the set of basic vectors of irreducible representation of given group is. The speeds of individuals at every point in the presented model have the same quantity. As the results the times of evacuation and average forces acting on individuals during the evacuation are given. Both parameters are compared with the same parameters got without symmetry considerations. They are calculated in the simulation procedure. The new program (using modified Helbing model) has been elaborated and presented in this work for realization the simulation tasks the. | cs.MA | cs | Discussion of crowd evacuation models organized according to symmetry
analysis approach
W. Sikora, J. Malinowski
Faculty of Physics and Applied Computer Science, University of Science and Technology,
al.Mickiewicza 30, 30-059 Krakow, Poland
Abstract The evacuation of football stadium scenarios are discussed as model realizing ordered states, described as
movements of individuals according to fields of displacements, calculated correspondingly to given scenario. The symmetry
of the evacuation space is taken into account in calculation of displacements field - the displacements related to every point
of this space are presented in the coordinate frame in the best way adapted to given symmetry space group, which the set of
basic vectors of irreducible representation of given group is. The speeds of individuals at every point in the presented model
have the same quantity. As the results the times of evacuation and average forces acting on individuals during the evacuation
are given. Both parameters are compared with the same ones got without symmetry considerations. They are calculated in the
simulation procedure. For realization the simulation tasks the new program (using modified Helbing model) was elaborated.
Introduction
The behavior of social systems under the action of some external conditions may be
considered in analogy to the behavior of solid states under the action of temperature or
external electric or magnetic fields. Both systems are complex, containing many interacting
elements, and are realized in strictly defined spaces. Very often these spaces are strongly
restricted, and because of these restrictions not any types of evolutions of these systems are
allowed. When these spaces are symmetrical (crystals are good examples of such situation)
the symmetry considerations conducting in the frame of theory of groups and representations
are able to predict the types of behavior of the systems, which are permitted by the symmetry
of these spaces. The symmetry analysis method (SAM) [1] from many years successfully was
used for significant simplification of descriptions of different type of phase transitions in
crystals. The first trial of application the SAM to modeling the evacuation of one floor of
skyscraper, in which the symmetry of allowed space had been broken because of some
accident, is presented in our work at KES AMSTA [2] It had been done, that evacuation along
the paths related to the field of displacements calculated by SAM in agreement with
symmetry of allowed space leads to a little longer time of evacuation (because they are not the
shortest ways to the exits) but significantly lower average force acting on evacuated
individuals. . It is known, that to big press acting on evacuated agents during evacuation occurs
very often the cause of tragic accidents, so the possibility to lower this press seems to be important.
.Taken into account the crowd psychology is rather not realistic assumption, that in empty space of
the floor evacuated individuals choose the paths to the allowed exits non along shortest way, but
along the line indicated by SAM, even they would be drown in some maner by some AMI devices.
There are such constructions, where many people are keeping together, where exists the possibility
to build the paths of evacuation in agreement with SAM field of displacements. Such construction is
for example football stadium. In this work the model of evacuation of one floor of skyscraper
regarded in [2] is applied to one sector of football stadium. The football stadium build from
many similar sectors is a very good approximation of the structure fulfilling the periodic
boundary conditions. The results of symmetry calculations done for one floor of skyscraper
may be applied also to planning the evacuation paths on stadium sector. We discuss the
evacuation of stadium which architecture takes into account the symmetry calculations and
compare it with evacuation of traditional stadium.
Elements of the symmetry analysis method
The symmetry group of some object is defined as some special set of transformations
which leave this object unchanged. As the elements of space groups appear translations,
mirror planes, inversion and some special rotations around the axis, as good as all
combinations of them. Translational symmetry gives the possibility to choose the small block
named elementary cell. The repetition of it reconstructs all system. In this way description of
all system is reduced to description of elementary cell. Such procedure reduces the number of
parameters needed to description of the system, but steel this number may be decreased by
using full symmetry restrictions, not only translational one. The properties of given system in
mathematical language are presented as functions defined on allowed space. In crystals it may
be the displacements of atoms from initial equilibrium positions, magnetic moments localized
on given positions or probability of sites occupations for example. The transformation
properties of such functions are given by matrix representations of allowed space symmetry
group. One may find the books where the representations of different groups (also
crystallographic 32 point groups and 230 space groups) are calculated and listed.
Theory of group representations had been applied for simplification of description of
many-body, complex physical systems many years ago. E. Wigner, G.J.Lubarski and A.P.
Cracknell introduced as "symmetric coordinates" set of basis vectors of irreducible
representations of molecules symmetry groups in calculations of molecules vibrations.
Lubarski discussed also the role of irreducible representations (IR) of crystal symmetry group
in crystallographic second order phase transitions. This method to the description of magnetic
ordering in crystals was at first introduced by E.F. Bertaut. Later that line of analysis has been
developed by many other theoreticians, like Izyumov and others [1]. The presentation of the
functions describing interesting system properties, localized on given set of symmetry
equivalent positions, in the usually used frame of coordinates related to the edges of
elementary cell (crystallographic system), as was mentioned previously, takes advantage of
translation symmetry only. The other symmetry relations are lost in this description and as a
consequence the description of many system properties is not as simple as possible. From
rules of the theory of group representations follows that any function defined on the space
with given symmetry group may be presented as linear combination of basis vectors of
irreducible representations (BV-s) Ψ of this group:
S= ∑
l , ν , λ
(l - number of k vectors describing the translational symmetry of ~S, ν- number of IR's, λ -
number of dimensions of ν's IR).
From equation (1) follows, that the function S may be treated as some vector in the functional
space, the BV-s Ψ play the same role in the presentation of function S, as axis of coordinate
system, and coefficients ckl, ν λ
, as components of it. When irreducible representation is taken
into account the dimension of this functional space invariant under all group transformations
is the smallest one. It leads to smallest number of ckl, ν λ
parameters, which in the frame of BV-s
Ψ presents the function S. Each choice of these free parameters ckl, ν λ
uniquely determines one
of the possible models of new structure that may be realized after the phase transition. The
c λ
k l , ν Ψ λ
k l , ν
(1)
presentation of model structures in the frame of basis vectors of irreducible representations of
the initial symmetry group instead of that in the frame of crystallographic system (x; y; z), is
the best matching to the symmetry of the problem and it provides the simplest (requiring the
lowest number of independent parameters) form of the structure description.
The form of the basis vectors and the information which of the representations take part in the
phase transition under consideration are directly given by the theory of groups and
representations. It is important to note that the basis vectors have the same translational
properties as Bloch functions. Therefore, the basis vectors may be defined on positions in
given elementary cell of the crystal as well as in the elementary cell translated by a lattice
vector t, which just corresponds to a multiplication by eikt . Not all from the possible ckl, ν λ
are
allowed, because the parameters should be selected in such way that the resulting properties
related to all atoms have real values. This condition influences on the set of equations which
ckl, ν λ
have to satisfy and as a result the number of independent free parameters is reduced and
strictly determined. After such operation the final model contains clearly defined minimum
number of free parameters and presents strictly defined relations between localized on
different crystal sites quantities describing considered property. The choice of representation
τν and the coefficients ckl, ν λ
uniquely determines the symmetry of the new, ordered structure,
independently on the kind of the property taken into account. The type of phase transition and
the property under consideration is included in the form of basis vectors. In the frame of SAM
also discussion of connections between different types of transformations is possible.
For realization of the mentioned problems the computer program MODY based on the
representations of symmetry space groups [2], and another associated programs - SPLIT,
Tensor-vis, Tensor_OpenGL, had been elaborated. They offer to find all possibilities of new
scalar, vector and tensor type structure properties allowed by the initial symmetry of the
structure.
The discussion of coexistence of different types of system behavior, leading to different
properties of the system are based on the assumption, that different functions describing these
properties of the system should have the same symmetry. From theory of representation it is
known, that these different functions should belong to the same irreducible representation of
system symmetry group.
Application the SAM to stadium evacuation scenario
The scenario of evacuation of football stadium organized according to SAM approach is
discussed in this chapter and compared with traditional model of stadium. By using the
simulations with and without implementation of SAM results the time of evacuations and
average forces acting on the pedestrians during the evacuation are calculated.
The football stadium, similar as existing in Munich for example, are the space where the big
number of individuals are localized, which with quite good approximation presents the
translational symmetry with periodic boundary conditions (usually taken into account in
crystals). This is the reason that as the first step of stadium evacuation scenario the evacuation
of one stadium sector may be discussed. It significantly reduces the number of evacuated
individuals and, as consequence, the number of parameters used for scenario description. The
real symmetry of the sector is described by P1m1 space group. For designation the ordering of
chairs and evacuation paths guaranteeing quick and safe evacuation, the field of
displacements which agree with full symmetry of available space should be calculated by
using the vector type SAM. On the base of P1m1 symmetry group the number of positions in
the sector, which should be regarded is reduced to ½, but the directions of displacements
which should be defined on these positions remain free. The best choice of displacement
directions from evacuation point of view can be made by regarding the P1m1 group as the
broken symmetry of Pmm2 group generated by τ4 representation of k=(0,0,0), which lead to
field of displacements on the xy plane (which are the polar vector quantities), and
corresponding field of speeds (which are the scalar quantities) as given in the Table1 quoted
below. Because the steps going up to exits, the displacemenst at each positions should have
the z components, directed to the up. As it is shown in the Tab1, such relation between z
components belongs to the τ1 representation. From SAM follows that τ1 may be associated
with any representation, because it doesn’t change the initial symmetry. Taking into account
the vector field of displacements got by mentioned above treatment the paths for evacuation
are design in one stadium sector.
Table1
Representation
and
destination
group
Tau1
destination
group Pmm2
Tau2
destination
group P112
Tau3
destination
group Pm11
Tau4
destination
group P1m1
Version
vectorI
vectorII
vectorIII
scalar
vectorI
vectorII
vectorIII
scalar
vectorI
vectorII
vectorIII
scalar
vectorI
vectorII
vectorIII
scalar
A1
B1
C1
P1
A2
B2
C2
P2
A3
B3
C3
P3
A4
B4
C4
P4
The polar vector type and scalar type basic vector functions of representations of Pmm2 space
group with k=(0,0,0), defined at positions 4i in the elementary cell
Pos. 4i
3: (1-x, y, 0)
2: (1-x, 1-y,0)
4: (x, 1-y,0)
Free parameter
1: (x, y, 0)
(1,0,0)
(0,1,0)
(0,0,1)
1
(1,0,0)
(0,1,0)
(0,0,1)
1
(1,0,0)
(0,1,0)
(0,0,1)
1
(1,0,0)
(0,1,0)
(0,0,1)
1
(-1,0,0)
(0,-1,0)
(0,0,1)
1
(-1,0,0)
(0,-1,0)
(0,0,1)
1
(1,0,0)
(0,1,0)
(0,0,-1)
-1
(1,0,0)
(0,1,0)
(0,0,-1)
-1
(-1,0,0)
(0,1,0)
(0,0,1)
1
(1,0,0)
(0,-1,0)
(0,0,-1)
-1
(-1,0,0)
(0,1,0)
(0,0,1)
1
(1,0,0)
(0,-1,0)
(0,0,-1)
-1
(1,0,0)
(0,-1,0)
(0,0,1)
1
(-1,0,0)
(0,1,0)
(0,0,-1)
-1
(-1,0,0)
(0,1,0)
(0,0,-1)
-1
(1,0,0)
(0,-1,0)
(0,0,1)
1
Simulation of stadium evacuation
The evacuation of the stadium sector is simulated by using the Helbing ”social forces” model
[4], which was taken as a starting point to model presented in this paper.
m i
d ⃗v i
dt
=m i
0 ⃗e i
v i
0 ( t )− ⃗v i ( t )
τ
+ ∑
j (≠i )
⃗f ij +∑
W
⃗f iW
(2)
Equation (2) on right side has a sum of three forces acting on human during evacuation simulation.
Second and third one describe sum of repel forces from all other mans and sum of repel forces from
all walls and all obstacles inside the evacuated space. First force is the most interesting at this stage.
In general it describes in which direction each person should go. In simple case like empty room with
some doors, this force can be easily calculated as a sum of attract forces from all doors. Here is also
the place for the implementation of vector field calculated by symmetry considerations. This
assumption is inadequate with more complicated geometry of the building. Figure (1) shows the
example when such approach leads to situation when pedestrian will stick for eternity in dead end.
Fig 1. The „dead-end”.
In approach presented in this paper floor space was divided into cells (this got nothing in common
with “cellular automata” approach to such kind of simulations!). Every cell can contain obstacle, free
space or exit. Every cell that contain free space have vector of desirable velocity connected with it,
calculated according to schema described below. Any person that stands inside particular cell takes
this vector as his desirable velocity. Unlike in cellular automata approach in this approach ”cell” can
contain one or more persons and any direction of velocity. Single cell size depends on building
geometry only. To make a simulation of an evacuation of single room, small number (like 7x6 for
example) of cells is more than enough. Figure (2) show example of such table presenting the final
field of velocities. These vectors can be calculated using “ray casting” method as shown in paper [5].
Fig 2. Final field of velocities
The vector field calculated for stadium sector by SAM is presented on the figure 3 and the
sector architecture which takes into account these SAM calculations for building the
evacuation paths is presented on the figure 4. It gives the map of free spaces, obstacles and
exits needed for calculation of forces acting on individuals as mentioned in the equation 2 and
velocities field used in the simulation (figure 5). The traditional stadium sector architecture is
given on the figure 6.
Figure 3 The vector field calculated by SAM related to one stadium sector for Pmm2 space
group and τ4 representation of k=(0,0,0)
Figure 4 Construction of evacuation paths in stadium sector with agreement to SAM vector
field calculations
Figure 5 Table of final field of velocities calculated for simulation of stadium sector
evacuation for SAM model
Figure 6 Table of final field of velocities calculated for simulation of stadium sector
evacuation for traditional model
The time of evacuation and average forces acting on the individuals are calculated during the
simulation by using SAM related and traditional architectures of stadium. The number of
evacuated individuals – 408 - taken for simulation agrees with number of sites in the sector of
Munchen football stadium and is the same for both analysed architectures. This two models
differ only in distribution of chairs and evacuation paths inside the sector. The results for both
models – SAM related and traditional - are given as the plots presenting the average force
acting on one individual as the function of time from the beginning to the end of evacuation.
The comparison of these functions is seen on the figure 7.
Figure 7. Average forces acting on pedestrian at each step of evacuation process calculated for
traditional and SAM stadium models.
Conclusions
The new model of architecture of sectors of football stadium is proposed, which leads
to the best sector evacuation. As the criterion of goodness of evacuation two parameters - the
time of evacuation te (expressed by the steps of simulation), and average force acting on the
individuals during the evacuation Fa – are taken into account. The model, in which the
evacuation paths are related to stadium symmetry considerations, as may be seen on the figure
(7) significantly minimalize the Fa while the te remain almost the same as for the traditional
construction.
Acknowledgement
This work is partially supported by EU program SOCIONICAL (FP7 No 231288).
References
[1]. W. Sikora, L. Pytlik, “Application of Symmetry Analysis to Description of Ordered
Structures in Crystals”, Copyright @ 2010 by Nova Science Publishers , NY, Chapter 1 (pp 1-
40) in “Group Theory: Classes, Representations and Connections, and Applications.”
[2]. W. Sikora, J. Malinowski “Symmetry Approach to Evacuation Scenarios”, 4th KES
International Symposium, KES-AMSTA 2010, Gdynia, Poland, June 23-25, 2010,
Proceedings Part II, Lecture Notes in Artificial Intelligence ( Subseries of Lecture Notes in
Computer Science, Edited by R Goebel, J. Siekmann, and W. Wahlster, ) Springer-Verlag
Berlin Heidelberg 2010, p 229-241
[3]. D.Helbing, et al., Simulating dynamical features of escape panic, Nature, vol 407,
2000, p. 487
[4] D.Helbing, P.Molnár “Social force model for pedestrian dynamics”,
Physical Review E 51, (1995) 4282-4286
[5] T.Kretz, C.Bonish, P.Vortish, „Comparision of Various Methods for the Calculation of the
Distance Potential Field”, arXiv:0804.3868v1 [physics.comp-ph]
|
1609.01808 | 1 | 1609 | 2016-09-07T02:34:45 | Review on Microscopic Pedestrian Simulation Model | [
"cs.MA"
] | Microscopic Pedestrian Simulation Model is computer simulation model of pedestrian movement where every pedestrian in the model is treated as individual. Most of pedestrian researches have been done on macroscopic level, which does not consider the interaction between pedestrians and does not well suited for prediction of pedestrian flow performance in pedestrian areas or building with some objects that reduce the effective width of it. In the other hand, microscopic level has more general usage and considers detail of the design. Tough the analytical model for microscopic pedestrian model is existed exist, the numerical solution of the model is very difficult and simulation is favorable. The model has practical application of Evacuation from building, Design of pedestrian area, and Experimental & Optimization Design Tool. In general, Microscopic Pedestrian Simulation Model consist of two terms, that make the pedestrian moving toward the destination and make repulsive effect toward other pedestrian or obstacles. | cs.MA | cs | Teknomo, Kardi; Takeyama, Yasushi; Inamura, Hajime, Review on Microscopic Pedestrian Simulation
Model, Proceedings Japan Society of Civil Engineering Conference March 2000, Morioka, Japan, March
2000
Review on Microscopic Pedestrian Simulation Model
Kardi Teknomo1, Yasushi Takeyama2, Hajime Inamura3
collisions. Two forces are work on each pedestrian.
First, magnetic force as formulated by Coulomb's
law, which is depend on the intensity of magnetic
load of a pedestrian and distance between
pedestrians. Another force acts on a pedestrian to
avoid the collision with another pedestrian or
obstacle exerts acceleration a is calculated as:
a = V. cos (alpha).tan (beta)
(2)
A
alpha
V
a
RV
beta
C
B
Figure 1. Additional Repulsive Force on Magnetic
Force Model
Total of forces from goals, walls and other
pedestrians act on each pedestrian, and its decides
the velocity of each pedestrian each time.
c. Social Force Model
Helbing (1991-99) was developed Social Force
Model with Molnar, and Vicsek which has similar
principles of both Benefit Cost cellular Model and
Magnetic Force Model. A pedestrian is subjected to
social forces that motivate the pedestrian. The
summation of these forces act upon a pedestrian
create acceleration dv/dt as:
(cid:71)
)t(v
)t(vdm
i
i
=
dt
∑
+
(cid:71)
evm
io
(cid:71)
(cid:71)
))t(x),t(x(f
ij
(cid:71)
))t(x(f
b
(cid:71)
ξ+
(3)
)t(
+
−
(cid:71)
(cid:71)
(cid:71)
τ
i
j
i
i
The first term in the right hand of eq.(3) represent
the motivation to reach the goal. The model based
on assumption that every pedestrian has intention to
reach certain destination at a certain target time.
The direction is a unit vector from a particular
location to the destination point.
is existed exist [Henderson
Microscopic Pedestrian Simulation Model is
computer
simulation model of pedestrian
movement where every pedestrian in the model is
treated as
individual. Most of pedestrian
researches have been done on macroscopic level
[for best classical examples: Fruin (1971), HCM
(1985)], which does not consider the interaction
between pedestrians and does not well suited for
prediction of pedestrian flow performance in
pedestrian areas or building with some objects
that reduce the effective width of it. In the other
hand, microscopic level has more general usage
and considers detail of the design. Tough the
analytical model for microscopic pedestrian
model
(1974),
Helbing (1992)], the numerical solution of the
model
is
favorable. The model has practical application of
Evacuation from building, Design of pedestrian
area, and Experimental & Optimization Design
Tool. There are several microscopic pedestrian
simulation models:
a. Benefit Cost Cellular Model
Gipps and Marksjo (1985) propose this model. It
simulates the pedestrian as particle in a cell. Each
cell can be occupied by at most one pedestrian
and a score assigned to each cell on the basis of
proximity to pedestrians. The score represent the
gain made by the pedestrian when moving toward
his destination. The repulsive effect of the nearby
pedestrians, and formulated as:
X-
is very difficult and simulation
(1)
(S ).X-
)X-
(S .K
X-
i
Score
=
).(D
i
X-S
i
i
i
i
2
i
i
X-D .
i
i
).(D
2
i
i
-
1
)
αΔ
-
(
2
β+
≠
(j
)i
the
in
(including
the nine-cell neighbor of
location of
Where the field of two pedestrian overlap, the
score in each cell is the sum of the score
generated by pedestrian individually. The score is
the
calculated
pedestrian
the
pedestrian). Pedestrian will move to the next cell
that has maximum net benefit.
b. Magnetic Force Model
Prof. Okazaki (1979-93) developed this model
with Matsushita. The application of magnetic
models and equation of motion in the magnetic
field cause pedestrian movement. Each pedestrian
and obstacle have positive pole. Negative pole is
assumed to be located at the goal of pedestrians.
Pedestrian moves to their goals and avoids
1 Doctoral Student, Graduate School of Information Science, Tohoku University Japan
2 Associate Professor, Graduate School of Information Science, Tohoku University Japan
3 Professor, Graduate School of Information Science, Tohoku University Japan
1
Table 1. Comparison Microscopic Pedestrian Simulation Models
Movement to goal
Benefit Cost Cellular
Gain Score
and positive
Magnetic Force
Positive and negative
magnetic force
Positive
magnetic forces
continuous
physical meaning
queuing, way finding in
maze, evacuation
heuristic
possible
by inspection
Social Force
Intended velocity
Interaction forces
continuous
physical meaning
queuing,
-
self
organization, oscillatory
change
mathematics
not possible
by inspection
Flows. Mathematics and Computers in
Simulation 27, pp. 95-105.
3. Helbing, D. (1991) A mathematical model
for the behavior of pedestrians. Behavioral
Science 36, pp. 298-310.
4. Helbing, D. (1992) A fluid-dynamic model
for the movement of pedestrians. Complex
Systems 6, pp. 391-415.
5. Helbing, D. and Vicsek, T. (1999) Optimal
Self-Organization. New Journal of Physics
1, 13.1-13.17.
6. Henderson, L. F. (1974) On the Fluid
Mechanic of Human Crowd Motions,
Transportation Research 8, pp. 509-515.
7. Matsushita and Okazaki (1991) A study of
Simulation Model for Way Finding Behavior
in Mazes. Journal of
by Experiments
Architecture, Planning. Environment
Engineering. AIJ, No.429, pp. 51-59.
8. Okazaki, S (1979) A Study of Pedestrian
Movement in Architectural Space, Part 1:
Pedestrian Movement by the Application on
of Magnetic Models. Trans. of A.I.J.,
No.283, pp. 111-119.
9. Transportation Research Board
(1985)
Highway Capacity Manual, Special Report
204 TRB, Washington D.C.
m,K,
Notation
Si = vector location of target cell
Xi = vector location of the subject
Di = vector location of destination
Δ = Distance between cell and the pedestrian.
,βα
V = velocity of pedestrian A
RV = relative velocity
xi (t) =Location of pedestrian i at time t.
vi(t) = velocity of pedestrian i at time t = dxi(t)/dt
vo = intended velocity.
ei = direction of pedestrian i ∈{(1,0),(=1,0)}
iξ = Fluctuation of individual velocities
= Constants
Repulsive Effect
Cost Score
Pedestrian movement
Value of variables
Phenomena explained
discreet
arbitrary
queuing
cellular based
by inspection
Higher programming
orientation in
Evacuation Application possible
Parameter Calibration
The ideal speed is equal to remaining distance per
remaining time. The remaining distance is the
different between the destination point and the
location at that time, while the remaining time is
different between target time and the simulation
time. Intended Velocity is the ideal speed times
the unit vector of direction. Speed limitation
(maximum and minimum) can be put to make the
speed more realistic. The second and last term of
the right hand side of eq (3) designate for
interaction between pedestrians and pedestrian to
obstacles (i.e. column) and interaction pedestrian
with the boundaries
Comparison of the Models
In general, Microscopic Pedestrian Simulation
Model consist of two terms, that make the
pedestrian moving toward the destination and
make repulsive effect toward other pedestrian or
obstacles. Benefit Cost cellular also uses arbitrary
scores while Magnetic and Social Force model
has more variables with physical meaning. Social
Force model is highly mathematics evolved to
explain
the behavior of pedestrian, while
Magnetic Force Model is more developed in
heuristic approach.
None of the microscopic pedestrian simulation
models have calibrated and validated
their
constant parameters based on real pedestrian
movement data. It has no statistical guarantee that
the parameters will work for general cases or
even for specific region. Therefore, in order to
use
research
direction is proposed to be done to automate data
collection of individual movement data, and to
set up statistical procedures for calibration and
calibration of the parameters.
REFERENCES
1. Fruin, J.J. (1971). Designing for Pedestrians:
A Level of Service Concept. Highway
research Record 355, 1-15.
the model practically,
2. Gipps, P.G. and Marksjo, B. (1985) A
for Pedestrian
Micro-Simulation Model
future
2
|
1706.05839 | 1 | 1706 | 2017-06-19T09:09:50 | On Optimal Group Claims at Voting in a Stochastic Environment | [
"cs.MA",
"cs.SI",
"eess.SY",
"math.OC",
"physics.soc-ph"
] | There is a paradox in the model of social dynamics determined by voting in a stochastic environment (the ViSE model) called "pit of losses." It consists in the fact that a series of democratic decisions may systematically lead the society to the states unacceptable for all the voters. The paper examines how this paradox can be neutralized by the presence in society of a group that votes for its benefit and can regulate the threshold of its claims. We obtain and analyze analytical results characterizing the welfare of the whole society, the group, and the other participants as functions of the said claims threshold. | cs.MA | cs |
ISSN 0005-1179, Automation and Remote Control, 2017, Vol. 78, No. 6, p. 1087. c(cid:13) Pleiades Publishing, Ltd., 2017.
Original Russian Text c(cid:13) V.A. Malyshev, P.Yu. Chebotarev, 2017, published in Avtomatika i Telemekhanika, 2017, No. 6, 157 -- 172.
INTELLECTUAL CONTROL SYSTEMS, DATA ANALYSIS
On Optimal Group Claims at Voting
in a Stochastic Environment
V.A. Malyshev∗,∗∗,a and P.Yu. Chebotarev∗,∗∗,b
∗Trapeznikov Institute of Control Sciences, Russian Academy of Sciences, Moscow, Russia
∗∗Moscow Institute of Physics and Technology, Moscow, Russia
e-mail: [email protected], [email protected]
Received October 28, 2016
Abstract -- There is a paradox in the model of social dynamics determined by voting in a stochastic
environment (the ViSE model) called "pit of losses." It consists in the fact that a series of democratic
decisions may systematically lead the society to the states unacceptable for all the voters. The paper
examines how this paradox can be neutralized by the presence in society of a group that votes for
its benefit and can regulate the threshold of its claims. We obtain and analyze analytical results
characterizing the welfare of the whole society, the group, and the other participants as functions of
the said claims threshold.
Keywords: ViSE model, social dynamics, voting, stochastic environment, pit of losses.
DOI: 10.1134/S0005117917060091
1. INTRODUCTION
It is known that decisions made by the majority of voters on the proposals generated by a stochastic
environment may systematically lead to situations unacceptable for all the voters. This voting paradox
(the "pit of losses" paradox) has been described in [1]. A natural approach to neutralizing this paradox
is increasing the majority threshold (i.e., the number of votes necessary to accept a proposal).
However, there is another approach that deserves consideration. Suppose that there is a "group" in
the society whose participants pursue group rather than individual interests. Moreover, the group has
a "claims threshold," i.e., the minimum profitability of proposals the group considers acceptable for it.
Which group claims threshold is profitable (optimal) for the whole society, for the group and for the
other participants? In this paper, we give the answers to these and several other questions.
Consider the main features of the ViSE (Voting in Stochastic Environment) model [2]. Let society
consist of n members. ℓ members are egoists and g = n − ℓ are group members; therefore, δ = ℓ/n is
the proportion of egoists. The ViSE model extends the voting model introduced by A.V. Malishevsky
(see [3]), another extension of which is the well-known dynamic multidimensional voting model [4].
Each participant is characterized by the current value of his/her capital (an alternative interpretation
of it is utility). A proposal (of the environment) is a vector of proposed participants' capital increments. In
the present paper, these increments are realizations of independent identically distributed normal random
variables. The parameters of the corresponding normal distribution N (µ, σ2) can be easily interpreted:
the cases of µ > 0, µ = 0, and µ < 0 correspond to a favorable, neutral, and unfavorable environment,
respectively; σ characterizes the scatter of the proposals.
In the basic version of the ViSE model, the only stochastic agent is the environment. The behavior
of the voters is deterministic in contrast to the random voting models [5]. An egoist votes for those and
only those proposals that increase his/her capital. All members of a group vote for the proposals that
are beneficial to this group and vote against the other proposals. The group can consider a proposal as
1087
1088
MALYSHEV, CHEBOTAREV
a favorable one in the following cases: (a) the average increase (which can be zero, positive, or negative)
of a group member's capital exceeds the chosen claims threshold t [6], or (b) the percentage of the group
members receiving positive capital increments exceeds some threshold. In this paper, we consider the
first case. The group supports those and only those proposals in which the average capital increment of
its members is greater2 than a selected threshold t. Let α ∈ [0, 1] be the strict relative majority threshold
for all votes of the society.
If the proportion of the society supporting a proposal is greater than α,
then the proposal is accepted and then implemented. The implemented proposals constitute the voting
trajectory. The subject of our study is the statistical dependence of such trajectories (which express the
dynamics of social welfare) on the parameters of the model.
It should be noted that the behavior of the voters in the ViSE model corresponds to the Downsian
concept [8], more precisely, to its operationalization that is based on the comparison of the proposed state
with status quo [9]. Dynamic voting models have been studied in the theory of legislative bargaining [10],
where in some cases [11 -- 13] stochastic generation of proposals has been assumed. In this type of models,
voters have "ideal states" that maximize their individual utility and the central problem is searching
for equilibrium. Such kind of problems are trivial or even pointless in the ViSE model because the
participants do not have finite ideal states. However, in this model, individual utilities (capitals) can be
naturally aggregated into group utilities3. This makes it possible to study collectivistic and altruistic
voting strategies. Because of this, the ViSE model gives the researcher a tool for studying cooperation
and egoism, which provides an alternative to the simple games (such as Prisoner's Dilemma, Ultimatum,
Avatamsaka, Public Goods, etc.) traditionally used for these purposes.
The ViSE model allows one to identify a number of social phenomena, mechanisms, and relationships
associated with collective decisions. Their presence in practice (and degree) is a subject of special study.
The model also allows to test various approaches to bringing society to the desired or optimal state. Of
course, this model can not reflect all aspects of social reality, however, all its predictions are characterized
by mathematical transparency, therefore, the conditions for the manifestation of these phenomena are
amenable to verification.
As indicated above, the paper examines the social dynamics in the presence of a group with a claims
threshold. A moderate group of this kind can be interpreted as an elite.
We obtain the expressions for the mathematical expectations of egoists' and group members' capital
increments in the described society. These expressions are presented in Section 2.
In Section 3, it is
shown that the group can choose such a claims threshold (it can be called optimal) that the expected
capital increment of the society is maximal. We provide a closed form expression for this threshold.
The dependence of the participants' expected capital increments on the majority threshold is studied in
Section 4. The influence of choosing the optimal claims threshold on the size of the "pit of losses" is
examined in Section 5.
2. THE CAPITAL INCREMENTS OF EGOISTS AND GROUP MEMBERS
If the group does not support a proposal, then for its acceptance, the number of egoists' votes cast
for it must exceed αn. Otherwise, if the group supports the proposal, then it is necessary and sufficient
that the egoists give more then
αn − g = αn − n + ℓ = (α + δ − 1)n
votes, i.e., the share (in the society) of the egoists supporting the proposal should exceed the value
2 This voting rule can be formulated in terms of the deterministic version of the model used in [7].
3 Such aggregation is natural because of the assumption of the transferability of utilities.
γ = α + δ − 1.
(1)
AUTOMATION AND REMOTE CONTROL Vol. 78 No. 6
2017
ON OPTIMAL GROUP CLAIMS AT VOTING
1089
Fig. 1. The expected one-step capital increments of a group member (1), an egoist (2), and a randomly selected
participant (3), where n = 100, ℓ = 50, µ = −1, σ = 10, and α = 0.5.
Proposition 1. The mathematical expectation of egoist's capital increment edE in one voting step is
equal to
M(edE ) =hµ+(µ, σ, ℓ, γn) µ+(µ, σ, ℓ, αn)i"P
Q#,
(2)
(3)
where a row vector is multiplied by a column vector , µ+(µ, σ, ℓ, ℓ0) is the expectation of the normal voting
sample of size ℓ with parameters (µ, σ) and voting threshold ℓ0 [14], P = F(cid:16) (µ−t)√g
F (·) is the standard normal distribution function.
σ
(cid:17) , Q = 1 − P, and
The proofs of all results are given in the Appendix.
σf
normal density.
−1#!,
Proposition 2. The mathematical expectation of a group member's capital increment edG in one voting
step is equal to
x=[ξ]+1b(x ℓ) ≈ F(cid:18)− [ξ]+0.5−pℓ
σ(cid:1), q = 1 − p, P and Q are defined in Proposition 1, f = f(cid:16) (µ−t)√g
M(edG ) =hFγn Fαni µ"P
Q# +
√g" 1
√pqℓ (cid:19), b(x ℓ) =(cid:0)ℓ
x(cid:1)pxqℓ−x is the binomial probability function,
where Fξ =Pℓ
(cid:17), and f (·) is the standard
p = F(cid:0) µ
Dependence of expected capital increments M(edE ) and M(edG ) of the participants on the claims thresh-
Fig. 1 demonstrates that in a moderately unfavorable environment (µ/σ = −0.1), the group (half of
the society in the present case) has a maximum income at zero claims threshold t. However, the egoists
jointly lose more than the group wins, therefore, the expected capital increment of the whole society is
negative, and so the society is gradually losing welfare. If the group's claims increase, then its income
decreases more slowly than the loss of egoists. When the claims threshold t is slightly higher than 0.2,
the expected capital increment of the whole society becomes positive. When t = 1, the expected capital
increment of the society reaches a maximum. A group with higher claims is blocking more and more
profitable proposals, and the expected capital increment of the society is decreasing to zero.
old t are shown in Fig. 1.
σ
AUTOMATION AND REMOTE CONTROL Vol. 78 No. 6
2017
1090
MALYSHEV, CHEBOTAREV
Fig. 2. The expected one-step capital increments of an egoist (a), a group member (b), a randomly selected partici-
pant (c), and the difference between the expected capital increments of a group member and an egoist (d ) as functions
of the adjusted claims threshold of the group t/σ and the proportion of the egoists δ, when n = 100, µ = −0.1, σ = 1,
and α = 0.5.
Fig. 3. The expected one-step capital increments of an egoist (a), a group member (b), a randomly selected participant
(c), and the difference between the expected capital increments of a group member and an egoist (d ) as functions of
the adjusted claims threshold of the group t/σ and the proportion of the egoists δ, when n = 100, µ = 0.1, σ = 1,
and α = 0.5.
AUTOMATION AND REMOTE CONTROL Vol. 78 No. 6
2017
ON OPTIMAL GROUP CLAIMS AT VOTING
1091
Fig. 4. The expected one-step capital increments of an egoist (1), a group member (2), and a randomly selected
participant (3): sections of the surfaces in Fig. 2; n = 100, µ = −0.1, σ = 1, and α = 0.5.
Dependencies of the expected one-step capital increments of the participants on the adjusted claims
threshold of the group t/σ and the proportion of the egoists δ are presented in Figures 2 and 3 for the
cases of moderately unfavorable (µ/σ = −0.1) and favorable (µ/σ = 0.1) environments. Fig. 4 shows
the sections of the surfaces presented in Fig. 2. It allows to compare the capital increments of an egoist,
a group member, and a randomly selected participant. These dependencies are characterized by the
following regularities:
1. For µ < 0 and any proportion of the egoists, the average capital increment of an egoist monotonically
increases with the claims threshold of the group, because the number of accepted proposals that are
unprofitable for egoists decreases. The fastest growth of the capital increment is observed at t close
to µ;
2. When the proportion of egoists is small and the claims threshold of the group is low, the group accepts
many unfavorable proposals. This causes a fast loss of egoists' welfare;
3. There is a maximum (with respect to the proportion δ of egoists) of the expected capital increment of
an egoist in the domain of sufficiently high group's claims thresholds t and a high proportion of egoists
(δ > 0.9). For large t, this maximum exceeds the average capital increment in the society consisting of
egoists only. This is caused by the fact that a small group with a high t votes against most proposals.
Therefore, the proposals must have a high support from the egoists to be accepted. Such an actual
increase of the majority threshold for egoists (for the approvement of a proposal, 51 votes are needed,
but of 90 -- 98 votes instead of 100) radically reduces the "pit of losses" [1], and the average capital
increment of egoists reaches the largest values;
4. According to Theorem 1 in [1], for the society consisting of egoists and the environment with the
parameters under consideration, the optimal majority threshold is α0 ≈ 0.52;
5. The group and the egoists lose welfare when the claims threshold and the proportion of egoists are
low. When t is close to µ, the expected capital increment of a group member increases rapidly with the
growth of the claims threshold. However, in contrast to the average capital increments of the egoists,
AUTOMATION AND REMOTE CONTROL Vol. 78 No. 6
2017
1092
MALYSHEV, CHEBOTAREV
for any proportion of the group, the expected capital increment of a group member has a maximum
at t = 0 (since this threshold optimizes the group benefit). This maximum takes the greatest value
when the group is small (cf.
[15]);
6. In the domain of high thresholds t and the proportion of egoists δ > 0.9, the expected capital increment
of a group member has a minimum with respect to δ, which is lower than the corresponding value for
egoists. Thus, excessive claims of a small group worsen its position in comparison with the position
of egoists;
7. The expected capital increment of a group member is higher than that of an egoist everywhere, except
for the domains of very high and very low claims thresholds and small group sizes.
The expected capital increment of a randomly selected participant (surfaces (c) in Figures 2 and 3)
is expressed by the weighted average of the functions (a) and (b) with weights equal to the proportions
of egoists and the group, respectively. The surface (c) has a combination of properties of the averaged
surfaces. A randomly chosen participant loses capital when the group's claims threshold is low and the
proportion of egoists is small. If the share of egoists is moderate, then the expected capital increment of
an average participant (and of the whole society) has a maximum with respect to t/σ; the corresponding
optimal group's claims threshold is found in Section 3. The value of the maximum is higher for a larger
group. In comparison to the maximum for the group, this maximum is shifted to the domain of larger
t/σ, because if t/σ grows from the group's optimum, then the expected capital increment of a group
member decreases slower than the expected capital increment of an egoist increases. This leads to the
growth of the expected capital increment of the whole society.
The established relationships allow us to draw the following conclusions.
The zero claims threshold is optimal for the group in any environment. It is advantageous for the
group to be relatively small (about 15 members out of 100 participants) in this case. In a moderately
unfavorable environment, such a group becomes richer, whereas egoists lose welfare.
In an unfavorable environment, the optimal group's claims threshold is positive. The decrease of this
threshold from the optimum causes a faster loss for the society then the increase from the optimum.
In a favorable environment, on the contrary, the optimal group's claims threshold is negative, and
the expected capital increment of the society decreases faster when the threshold is deviated from the
optimal value to the positive direction. This conclusion is analogous to the one of [1] saying that the
more favorable environment is encountered, the lower majority threshold is optimal.
3. OPTIMAL GROUP'S CLAIMS THRESHOLD
In this section, we obtain an analytical expression for the optimal threshold, i.e., for the group's claims
threshold that maximizes the capital increment of the society. Let β be the ratio of the number of egoists
to the number of group members:
β =
δ
.
1 − δ
ℓ
n − ℓ
=
Theorem 1. The expected one-step capital increment of the society reaches its maximum at the group's
claims threshold
t0 =
β
Fγn − Fαn(cid:0)µ+(µ, σ, ℓ, αn) − µ+(µ, σ, ℓ, γn)(cid:1),
(4)
where the notations is introduced in Section 1 and Propositions 1 and 2.
Let us find out how the optimal threshold t0 depends on the model parameters. Since γ < α (see (1)),
it follows from the definition of Fξ that Fγn − Fαn > 0 (and the smaller the share of the group 1 − δ,
AUTOMATION AND REMOTE CONTROL Vol. 78 No. 6
2017
ON OPTIMAL GROUP CLAIMS AT VOTING
1093
the smaller this difference); β is nonnegative. Consequently, the sign of t0 coincides with the sign of the
difference µ+(µ, σ, ℓ, αn) − µ+(µ, σ, ℓ, γn).
Fig. 5,a demonstrates the dependence of t0 on the proportion of egoists δ and the majority threshold α
for n = 100 and µ/σ = 0.1.
We note that for a large group, the absolute value of threshold t0 is small because the factors β and
(Fγn − Fαn)−1 are close to zero. The decrease of t0 with the increase of the majority threshold α becomes
faster with the growth of the number of egoists. The shape of this surface does not substantially depend
on the sign of µ.
Fig. 5,b shows the dependence of t0 on the proportion of egoists δ and the mean of the environment
proposals µ for n = 100, α = 0.5, and σ = 1.
The two surfaces in Fig. 5 have the same shape. When µ increases, t0 decreases and the smaller the
group is, the faster the change is.
Fig. 6 shows various sections of the surface presented in Fig. 5,a by the planes of fixed majority
thresholds. For α = 0.46, we have t0 ≈ 0; for the smaller α's, the optimal claims threshold t0 is positive
and increases with δ; for the lager α's, it is negative and decreases.
Corollary. If the votes of a group are sufficient to accept a proposal (α < 1 − δ), then
t0 =
β
1 − Fαn
(µ+(µ, σ, ℓ, αn) − µ).
If the votes of the egoists are insufficient to accept a proposal (δ 6 α), then
t0 = −
β
Fγn
µ+(µ, σ, ℓ, γn).
If both of the above conditions are met (δ 6 α < 1 − δ), then
t0 = −β µ.
In the latter case, the optimal group's claims threshold t0 has an extremely simple expression. If the
number of votes necessary for a proposal to be accepted exceeds the number of egoists and does not
exceed the size of the group, then t0 is in the same ratio to (−µ) as the number of egoists to the number
of group members is, and the larger the group is, the closer to zero t0 is.
Fig. 5. Dependence of the optimal claims threshold t0 of the group on: (a) the proportion of egoists δ and the majority
threshold α for µ = 0.1, n = 100, and σ = 1; (b) the proportion of egoists δ and the mathematical expectation of the
proposals µ for α = 0.5, n = 100, and σ = 1.
AUTOMATION AND REMOTE CONTROL Vol. 78 No. 6
2017
1094
MALYSHEV, CHEBOTAREV
Fig. 6. Dependence of group's optimal claims threshold t0 on the proportion of egoists δ for various majority thresholds
(α = 0.15 (1), α = 0.46 (2), α = 0.5 (3), α = 0.6 (4), and α = 0.9 (5)); n = 100, µ = 0.1, σ = 1.
4. DEPENDENCE OF CAPITAL INCREMENTS ON THE MAJORITY THRESHOLD
The expression of the optimal majority threshold for a society consisting of egoists has been obtained
in [1]. Now we consider the problem of optimizing the majority threshold α for the society that consists
of egoists and a group. Recall that the optimal threshold is the threshold that maximizes the increment
of the total capital of the society.
Using Propositions 1 and 2 consider the analytical dependencies of the expected capital increments
of an egoist, a group member, and a randomly selected participant on the majority threshold α and the
proportion of egoists δ in the moderately unfavorable environment (µ/σ = −0.1) for the zero group's
claims threshold t.
The sections of the corresponding surfaces by the planes of equal egoists shares are shown in Fig. 7. If ℓ
is not very high, then sections (a) have two maxima with respect to α; the curves of maxima arguments
intersect at the point (δ = 1, α = α0), where α0 is the optimal majority threshold in the society consisting
of egoists. Consider the reasons for the appearance of these "ridges."
We start with the relationship for egoists (Fig. 7,a). At a very low proportion of egoists and a low
majority threshold, an egoist has a high expected capital increment, because the probability of the event
that all the egoists are satisfied with a proposal is markedly different from zero, while their votes are
sufficient to accept such a proposal. Therefore, their expected one-step capital increment is comparable
in the absolute value to µ. When the majority threshold is higher than the proportion of egoists, then
they are unable to accept a proposal by their votes only, and their expected capital increment is much
lower. The second maximum is realized at the majority threshold close to 1. Its appearance is caused by
the following fact. When the adoption of a proposal requires both the votes of the group and the egoists
(i.e., overall, the egoists have a veto), then egoists' influence on decision-making is quite noticeable, and
their interests are substantially taken into account. However, the support of the proposal by the group
is mandatory for the realization of this scenario, while with µ < 0, it does not happen very often, so this
maximum is much lower than the first one.
If the number of egoists increases, then both maxima still exist, but they shift to α0 (with a linear
dependence of their arguments on δ) and become lower. It can be simply explained. Here, one egoist
capable of accepting a proposal is replaced by a "clique" which less often provides the required number
of votes. The expected capital increment of a "clique" member (when the clique is satisfied with the
proposal) is lower than that of the above egoist due to the law of large numbers. The part of the curve
behind the second maximum lies somewhat lower, since an excessive majority threshold does not even
allow to accept proposals that are beneficial to both the group and most egoists.
AUTOMATION AND REMOTE CONTROL Vol. 78 No. 6
2017
ON OPTIMAL GROUP CLAIMS AT VOTING
1095
The dependence for the group (Fig. 7,b) has two "slopes" on the δ-sections. Between them, there is
a "plateau." It shows that the majority threshold located between the maxima of the expected capital
increment of the egoists is quite beneficial for the group. Lower thresholds allow the egoists to ignore the
interest of the group, which reduces the group welfare. Excessive thresholds do not even allow to accept
highly profitable proposals. As can be expected, the "plateau" is higher when the proportion of egoists
is larger, because a smaller group has a greater benefit per participant.
Fig. 7,c depicts the expected capital increment of a randomly selected participant. As in the case of
the egoists, the corresponding surface in the coordinates α, δ has two "ridges." When the proportion of
egoists δ is high, the surface of the expected capital increment of a randomly selected participant is close
to that of an egoist. The height of the maxima decrease as the number of egoists increases. At a low δ,
the surface of a randomly selected participant is close to the group surface and does not have high peaks.
Fig. 7,d shows the difference between the expected capital increments of a group member and an egoist.
This difference is positive except for the domain near the first "ridge" of the egoists' surface, where they
win, because the egoists can "dictate their terms" in this case.
5. CLAIMS THRESHOLD ADJUSTMENT TO REDUCE THE "PIT OF LOSSES"
The group can reduce the size of the "pit of losses" (the area with negative expected capital increments
of the society) by choosing an optimal claims threshold. If the group has a sufficient size, then it can
Fig. 7. The expected one-step capital increments of an egoist (a), a group member (b), a randomly selected participant
(c), and the difference between the expected capital increments of a group member and an egoist (d ) as functions
of the majority threshold α for n = 100, µ = −0.1, σ = 1, t = 0, and various proportions of egoists in the society
(δ = 0.02 (1), δ = 0.1 (2), δ = 0.15 (3), δ = 0.3 (4), δ = 0.5 (5), δ = 0.7 (6), and δ = 0.95 (7)).
AUTOMATION AND REMOTE CONTROL Vol. 78 No. 6
2017
1096
MALYSHEV, CHEBOTAREV
Fig. 8. The influence of adopting the optimal claims threshold on the presence of the "pit of losses" for n = 100.
(a) α = 0.4; (b) α = 0.5; (c) α = 0.6. The medium gray area is the area of the presence of "pit of losses" for t = 0,
the dark gray area corresponds to the optimal claims threshold t = t0.
Fig. 9. Dependence of the maximum proportion of egoists for which the choice of group's optimal claims threshold
neutralizes the "pit of losses" on the majority threshold α. Gray points correspond to n = 100 (1), black points to
n = 10 (2).
completely remove the pit. Fig. 8 illustrates this possibility. In other words, a sufficiently large group can
help the society to overcome the paradoxical capital reduction caused by democratic decision-making. It
is important to note that a higher majority threshold allows a smaller group to do so. For example, if
µ/σ > −1, then for α = 0.4 the "pit of losses" does not appear for the societies with the proportion of
egoists up to 44 %; for α = 0.5, up to 56 %, and for α = 0.6, up to 83 %.
Fig. 9 shows the dependence on α of the maximum share of egoists for which the choice of the optimal
group's claims threshold t = t0 removes the "pit of losses." This relationship is basically expressed by
the function y = x (after the correction taking into account the equivalence of majority thresholds that
determine the same winning coalitions).
Thus, it is established that the choice of the optimal group's claims threshold can be considered as a
tool to neutralize the "pit of losses" paradox.
6. CONCLUSION
In this paper, we considered the dependence of the group's claims threshold that maximizes the capital
increment of the society on the parameters of the ViSE model for a society consisting of a group and
egoists. The absolute value of this threshold (called optimal) increases as the proportion of egoists
in the society grows.
If the percentage of egoists is fixed, then the optimal group's claims threshold
decreases with the grow of the majority threshold and becomes negative. Moreover, the optimal group's
claims threshold decreases as the mean µ of the proposals grows. The latter relationship is essentially
AUTOMATION AND REMOTE CONTROL Vol. 78 No. 6
2017
ON OPTIMAL GROUP CLAIMS AT VOTING
1097
a counterpart of one of the conclusions of [1], which recommends increasing the majority threshold in
deteriorating environments and reducing it in improving environments.
We have shown that the choice of the optimum group's claims threshold helps to neutralize the "pit of
losses" paradox in the societies consisting of a group and egoists. For a complete success, the proportion
of egoists should not exceed a certain value depending on the majority threshold. Thereby, an increase
of the majority threshold expands the zone of neutralization (by means of choosing the optimal group's
claims threshold) of the "pit of losses" paradox.
This work was supported by the Russian Science Foundation, project 16-11-00063 granted to IRE RAS.
ACKNOWLEDGMENTS
Proof of Proposition 1. Let G be the event that the group supports a proposal, G is the opposite
APPENDIX
event, P = P (G), and Q = P (G) = 1 − P.
When G occurs, it is necessary and sufficient for the proposal acceptance that egoists add more than
γn votes (case (a)).
If the group votes against the proposal, then more than αn votes of egoists are
required to accept the proposal (case (b)). Since the average of the independent capital increments of
the group members is distributed as N(cid:0)µ, σ2
P = F (µ − t)√g
g (cid:1), the probabilities of events G and G are given by
! and Q = 1 − P = F (t − µ)√g
! .
σ
σ
(A.1)
Formulas for the expected capital increments of an egoist in cases (a) and (b) can be obtained using
Lemma on "normal voting samples" [14] and (A.1), which leads to the expression (2):
M(edE ) = M(cid:0)edE G(cid:1)P (G) + M(cid:0)edE G(cid:1)P (G)
= µ+(µ, σ, ℓ, γn) F (µ − t)√g
σ
! + µ+(µ, σ, ℓ, αn) F (t − µ)√g
σ
! .
Proposition 1 is proved.
Proof of Proposition 2. Let Eξ be the event that the number of egoists' votes cast for a proposal is
higher than ξ. Let
Fξ = P (Eξ).
(A.2)
[ξ] + 0.5 − pℓ
√pqℓ
(cid:19),
Then (see [6])
Fξ =
ℓXx=[ξ]+1
σ(cid:1) , q = F(cid:0)− µ
σ(cid:1) , and b(x ℓ) =(cid:0)ℓ
b(x ℓ) ≈ F(cid:18)−
where p = F(cid:0) µ
x(cid:1)pxqℓ−x.
Using the notation MP(A) = M(cid:0)edG A(cid:1)P (A) we obtain
= MP(cid:0)G ∧ Eγn(cid:1) + MP(cid:0)G ∧ Eαn(cid:1),
(µ − t)√g
t =
AUTOMATION AND REMOTE CONTROL Vol. 78 No. 6
2017
σ
M(cid:0)edG(cid:1) = MP(cid:0)G∧ Eγn(cid:1)+ MP(cid:0)G∧ Eγn(cid:1) + MP(cid:0)G∧ Eαn(cid:1) + MP(cid:0)G∧ Eαn(cid:1)
since the second and fourth terms of the original expression are zero (as sunder the corresponding condi-
tions, the proposal is rejected and the participants' capital does not change). Introducing the notation
(A.3)
(A.4)
1098
MALYSHEV, CHEBOTAREV
and using (A.1), (A.2), independence of the proposal components, the fact that edG is distributed as
N(cid:0)µ, σ2
g (cid:1), and formula (A.9) in [14] expressing M(ζ ζ > t) for a normal ζ, we obtain:
MP(cid:0)G∧ Eγn(cid:1) = M(cid:0)edG G∧ Eγn(cid:1) P (G∧ Eγn) = M(cid:0)edG G(cid:1)P (G) P (Eγn)
√gF(cid:0)t(cid:1)! F(cid:0)t(cid:1) Fγn
σf(cid:0)t(cid:1)
(A.5)
= M(cid:0)edG edG > t(cid:1)F(cid:0)t(cid:1) Fγn = µ +
= µP +
√g!Fγn.
σf
Similarly,
MP(cid:0)G ∧ Eαn(cid:1) = µQ −
σf
√g!Fαn.
(A.6)
Substituting (A.5) and (A.6) into (A.3), we obtain (3). Proposition 2 is proved.
Proof of Theorem. The expected capital increment of a randomly selected participant is equal to
Using Propositions 1 and 2 and the notation (A.4) we now equate the derivative of the expression
M( d) = δM(edE ) + (1 − δ)M(edG ).
(A.7)
(A.7) with respect to t to zero:
δ(cid:2)µ+(µ, σ, ℓ, αn) − µ+(µ, σ, ℓ, γn)(cid:3) f (t)
√g
σ
+ (1 − δ)(Fγn − Fαn)f (t)
σ "−µ +
√g
t# = 0,
σ
√g
which implies
δ [µ+(µ, σ, ℓ, αn) − µ+(µ, σ, ℓ, γn)] − (1 − δ)(Fγn − Fαn) t = 0,
(A.8)
and consequently (4) takes place. Using (A.8), calculate the second derivative of (A.7) at t0 denoting by
t0 the result of substituting t0 into (A.4):
f′(t0)
√g
σ (cid:0)δ(cid:2)µ+(µ, σ, ℓ, αn) − µ+(µ, σ, ℓ, γn)] − (1 − δ)(Fγn − Fαn) t0(cid:3)(cid:1) + f (t0)
= f (t0)
√g
σ
(1 − δ)(Fαn − Fγn).
√g
σ
(1 − δ)(Fαn − Fγn)
This expression is negative. Consequently, t0 is a point of maximum. Theorem is proved.
Proof of Corollary. If the first condition is satisfied, then γ < 0, consequently, Fγn = 1 and
µ+(µ, σ, ℓ, γn) = µ. If the second condition is true, then Fαn = µ+(µ, σ, ℓ, αn) = 0. Substituting these
expressions into (4) we complete the proof of Corollary 3.
REFERENCES
1. Chebotarev, P.Yu., Malyshev, V.A., Tsodikova, Ya.Yu., Loginov, A.K., Lezina, Z.M., and Afonkin, V.A., The
Optimal Majority Threshold as a Function of the Coefficient of Variation of the Environment, Large-scale
Systems Control , 2016, vol. 62, pp. 169 -- 187.
2. Borzenko, V.I., Lezina, Z.M., Loginov, A.K., Tsodikova, Ya.Yu., and Chebotarev, P.Yu., Strategies of Voting in
Stochastic Environment: Egoism and Collectivism, Autom. Remote Control , 2006, vol. 67, no. 2, pp. 311 -- 328.
3. Mirkin, B.G., Group Choice, P.C. Fishburn, Ed., New York: Wiley, 1979.
AUTOMATION AND REMOTE CONTROL Vol. 78 No. 6
2017
ON OPTIMAL GROUP CLAIMS AT VOTING
1099
4. McKelvey, R.D., Intransitivities in Multidimensional Voting Models and Some Implications for Agenda Control,
J. Econom. Theory, 1976, vol. 12, no. 3, pp. 472 -- 482.
5. Coughlin, P. and Nitzan, S., Directional and Local Electoral Equilibria with Probabilistic Voting, J. Econom.
Theory, 1981, vol. 24, no. 2, pp. 226 -- 239.
6. Chebotarev, P.Yu., Loginov, A.K., Tsodikova, Ya.Yu., Lezina, Z.M., and Borzenko, V.I., Voting in a Stochastic
Environment: The Case of Two Groups, Autom. Remote Control , 2011, vol. 72, no. 7, pp. 1537 -- 1547.
7. Palfrey, T.R. and Rosenthal, H., Voter Participation and Strategic Uncertainty, Amer. Political Sci. Rev., 1985,
vol. 79, no. 1, pp. 62 -- 78.
8. Downs, A., An Economic Theory of Democracy, N.Y.: Harper and Brothers, 1957.
9. Grofman, B., The Neglected Role of the Status Quo in Models of Issue Voting, J. Politics, 1985, vol. 47, no. 1,
pp. 229 -- 237.
10. Duggan, J. and Kalandrakis, T., Dynamic Legislative Policy Making, J. Econom. Theory, 2012, vol. 147, no. 5,
pp. 1653 -- 1688.
11. Penn, E.M., A Model of Farsighted Voting, Amer. J. Political Sci., 2009, vol. 53, no. 1, pp. 36 -- 54.
12. Dziuda, W. and Loeper, A., Voting Rules in a Changing Environment , SSRN paper 2500777, 2014. DOI:
10.2139/ssrn.2500777.
13. Dziuda, W. and Loeper, A., Dynamic Collective Choice with Endogenous Status Quo, J. Polit. Economy, 2016,
vol. 124, no. 4, pp. 1148 -- 1186.
14. Chebotarev, P.Yu., Analytical Expression of the Expected Values of Capital at Voting in the Stochastic Envi-
ronment, Autom. Remote Control , 2006, vol. 67, no. 3, pp. 480 -- 492.
15. Chebotarev, P.Yu., Loginov, A.K., Tsodikova, Ya.Yu., Lezina, Z.M., and Borzenko, V.I., Snowball of Cooper-
ation and Snowball Communism, Proceedings of the Fourth Int. Conf. on Control Sciences, ISC RAS, 2009,
pp. 687 -- 699.
This paper was recommended for publication by A.L. Fradkov, a member of the Editorial Board
AUTOMATION AND REMOTE CONTROL Vol. 78 No. 6
2017
|
1602.08150 | 4 | 1602 | 2017-01-31T17:45:24 | Reachability-Based Safety and Goal Satisfaction of Unmanned Aerial Platoons on Air Highways | [
"cs.MA",
"eess.SY"
] | Recently, there has been immense interest in using unmanned aerial vehicles (UAVs) for civilian operations. As a result, unmanned aerial systems traffic management is needed to ensure the safety and goal satisfaction of potentially thousands of UAVs flying simultaneously. Currently, the analysis of large multi-agent systems cannot tractably provide these guarantees if the agents' set of maneuvers is unrestricted. In this paper, platoons of UAVs flying on air highways is proposed to impose an airspace structure that allows for tractable analysis. For the air highway placement problem, the fast marching method is used to produce a sequence of air highways that minimizes the cost of flying from an origin to any destination. The placement of air highways can be updated in real-time to accommodate sudden airspace changes. Within platoons traveling on air highways, each vehicle is modeled as a hybrid system. Using Hamilton-Jacobi reachability, safety and goal satisfaction are guaranteed for all mode transitions. For a single altitude range, the proposed approach guarantees safety for one safety breach per vehicle, in the unlikely event of multiple safety breaches, safety can be guaranteed over multiple altitude ranges. We demonstrate the platooning concept through simulations of three representative scenarios. | cs.MA | cs |
Reachability-Based Safety and Goal Satisfaction of Unmanned Aerial
Platoons on Air Highways
Mo Chen∗, Qie Hu∗, Jaime F. Fisac∗, Kene Akametalu∗, Casey Mackin†, Claire J. Tomlin‡
University of California, Berkeley
Recently, there has been immense interest in using unmanned aerial vehicles (UAVs) for civilian operations. As
a result, unmanned aerial systems traffic management is needed to ensure the safety and goal satisfaction of
potentially thousands of UAVs flying simultaneously. Currently, the analysis of large multi-agent systems cannot
tractably provide these guarantees if the agents' set of maneuvers is unrestricted. In this paper, platoons of UAVs
flying on air highways is proposed to impose an airspace structure that allows for tractable analysis. For the
air highway placement problem, the fast marching method is used to produce a sequence of air highways that
minimizes the cost of flying from an origin to any destination. The placement of air highways can be updated in
real-time to accommodate sudden airspace changes. Within platoons traveling on air highways, each vehicle is
modeled as a hybrid system. Using Hamilton-Jacobi reachability, safety and goal satisfaction are guaranteed for
all mode transitions. For a single altitude range, the proposed approach guarantees safety for one safety breach
per vehicle; in the unlikely event of multiple safety breaches, safety can be guaranteed over multiple altitude
ranges. We demonstrate the platooning concept through simulations of three representative scenarios.
Nomenclature
c
P
C
V
H
d
S
W
x
p = (px, py)
v = (vx, vy)
¯p
¯v
dsep
tfaulty
Qi
Qi
= Cost map
= A path between two points
= Cumulative cost of a path
= Value function of partial differential equations
= Air highway
= Direction of travel of air highway
= A sequence of air highways
= Waypoint
=
= Horizontal position
= Horizontal velocity
=
=
=
=
=
=
Target position
Target velocity
Separation distance of vehicles within a platoon
Time limit for descent during potential conflict
ith vehicle
Set of vehicles for vehicle Qi to consider for safety
System state (of a vehicle)
I.
Introduction
Unmanned aerial vehicles (UAVs) have in the past been mainly
used for military operations [1, 2]; however, recently there has been
an immense surge of interest in using UAVs for civil applications.
Through projects such as Amazon Prime Air [3] and Google Project
Wing [4], companies are looking to send UAVs into the airspace to not
only deliver commercial packages, but also for important tasks such
as aerial surveillance, emergency supply delivery, videography, and
search and rescue [5]. In the future, the use of UAVs is likely to become
more and more prevalent.
As a rough estimate, suppose in a city of 2 million people, each
person requests a drone delivery every 2 months on average and each
delivery requires a 30-minute trip for a UAV. This would equate to thou-
sands of UAVs simultaneously in the air just from package delivery ser-
vices. Applications of UAVs extend beyond package delivery; they can
also be used, for example, to provide supplies or to respond to disasters
in areas that are difficult to reach but require prompt response [6, 7].
As a result, government agencies such as the Federal Aviation Admin-
istration (FAA) and National Aeronautics and Space Administration
(NASA) are also investigating unmanned aerial systems (UAS) traffic
∗PhD Candidate, Department of Electrical Engineering and Computer Sci-
†PhD Student, Department of Electrical Engineering and Computer Sciences
‡Professor, Department of Electrical Engineering and Computer Sciences,
ences
Member AIAA
management (UTM) in order to prevent collisions among potentially
numerous UAVs [5, 8, 9].
Optimal control and game theory present powerful tools for pro-
viding safety and goal satisfaction guarantees to controlled dynamical
systems under bounded disturbances, and various formulations [10–12]
have been successfully used to analyze problems involving small num-
bers of vehicles [13–16]. These formulations are based on Hamilton-
Jacobi (HJ) reachability, which can compute the backward reachable
set (BRS), defined as the set of states from which a system is guaran-
teed to have a control strategy to reach a target set of states. HJ reach-
ability is a powerful tool because BRS can be used for synthesizing
both controllers that steer the system away from a set of unsafe states
("safety controllers") to guarantee safety, and controllers that steer the
system into a set of goal states ("goal satisfaction controllers") to guar-
antee goal satisfaction. Unlike many formulations of reachability, the
HJ formulations are flexible in terms of system dynamics, enabling
the analysis of controlled nonlinear systems under disturbances. Fur-
thermore, HJ reachability analysis is complemented by many numeri-
cal tools readily available to solve the associated HJ partial differential
equation (PDE) [17–19]. However, the computation is done on a grid,
making the problem complexity scale exponentially with the number
of states, and therefore with the number of vehicles. Consequently, HJ
reachability computations are intractable for large numbers of vehicles.
In order to accommodate potentially thousands of vehicles simul-
taneously flying in the air, additional structure is needed to allow for
tractable analysis and intuitive monitoring by human beings. An air
highway system on which platoons of vehicles travel accomplishes
both goals. However, many details of such a concept need to be ad-
dressed. Due to the flexibility of placing air highways compared to
building ground highways in terms of highway location, even the prob-
lem of air highway placement can be a daunting task. To address this,
in the first part of this paper, we propose a flexible and computationally
efficient method based on [19] to perform optimal air highway place-
ment given an arbitrary cost map that captures the desirability of having
UAVs fly over any geographical location. We demonstrate our method
using the San Francisco Bay Area as an example. Once air highways
are in place, platoons of UAVs can then fly in fixed formations along
the highway to get from origin to destination. The air highway struc-
ture greatly simplifies safety analysis, while at the same time allows
intuitive human participation in unmanned airspace management.
A considerable body of work has been done on the platooning of
ground vehicles [20]. For example, [21] investigated the feasibility of
vehicle platooning in terms of tracking errors in the presence of dis-
turbances, taking into account complex nonlinear dynamics of each
vehicle. [22] explored several control techniques for performing var-
ious platoon maneuvers such as lane changes, merge procedures, and
1
split procedures. In [23], the authors modeled vehicles in platoons as
hybrid systems, synthesized safety controllers, and analyzed through-
put. Reachability analysis was used in [24] to analyze a platoon of two
trucks in order to minimize drag by minimizing the following distance
while maintaining collision avoidance safety guarantees. Finally, [25]
provided a method for guaranteeing string stability and eliminating
accordion effects for a heterogeneous platoon of vehicles with linear
time-invariant dynamics.
Previous analyses of a large number of vehicles typically do not
provide safety and goal satisfaction guarantees to the extent that HJ
reachability does; however, HJ reachability typically cannot be used
to tractably analyze a large number of vehicles. In the second part of
this paper, we propose organizing UAVs into platoons, which provides
a structure that allows pairwise safety guarantees from HJ reachability
to better translate to safety guarantees for the whole platoon. With re-
spect to platooning, we first propose a hybrid systems model of UAVs
in platoons to establish the modes of operation needed for our platoon-
ing concept. Then, we show how reachability-based controllers can be
synthesized to enable UAVs to successfully perform mode switching,
as well as prevent dangerous configurations such as collisions. Finally,
we show several simulations to illustrate the behavior of UAVs in vari-
ous scenarios.
Overall, this paper is not meant to provide an exhaustive solution
to the unmanned airspace management problem. Instead, this paper
illustrates that the computation intractability of HJ reachability can be
overcome using an air highway structure with UAVs flying in platoons.
In addition, the results are intuitive, which can facilitate human partic-
ipation in managing the airspace. Although many challenges not ad-
dressed in this paper still need to be overcome, this paper can provide
a starting point for future research in large-scale UASs with safety and
goal satisfaction guarantees.
II. Air Highways
We consider air highways to be virtual highways in the airspace
on which a number of UAV platoons may be present. UAVs seek to
arrive at some desired destination starting from their origin by traveling
along a sequence of air highways. Air highways are intended to be the
common pathways for many UAV platoons, whose members may have
different origins and destinations. By routing platoons of UAVs onto a
few common pathways, the airspace becomes more tractable to analyze
and intuitive to monitor. The concept of platoons will be proposed in
Section III; in this section, we focus on air highways.
Let an air highway be denoted by the continuous function H :
[0, 1] → R2. Such a highway lies in a horizontal plane of fixed al-
titude, with start and end points given by H(0) ∈ R2 and H(1) ∈ R2
respectively. For simplicity, we assume that the highway segment is
a straight line segment, and the parameter s indicates the position in
some fixed altitude as follows: H(s) = H(0) + s(H(1) − H(0)). To
each highway, we assign a speed of travel vH and specify the direction
of travel to be the direction from H(0) to H(1), denoted using a unit
vector d =
. As we will show in Section III, UAVs use
simple controllers to track the highway.
H(1)−H(0)
(cid:107)H(1)−H(0)(cid:107)2
Air highways must not only provide structure to make the analy-
sis of a large number of vehicles tractable, but also allow vehicles to
reach their destinations while minimizing any relevant costs to the ve-
hicles and to the surrounding regions. Such costs can for example take
into account people, assets on the ground, and manned aviation, enti-
ties to which UAVs pose the biggest risks [5]. Thus, given an origin-
destination pair (eg.
two cities), air highways must connect the two
points while potentially satisfying other criteria. In addition, optimal
air highway locations should ideally be able to be recomputed in real-
time when necessary in order to update airspace constraints on-the-fly,
in case, for example, airport configurations change or certain airspaces
have to be closed [5]. With this in mind, we now define the air highway
placement problem, and propose a simple and fast way to approximate
its solution that allows for real-time recomputation. Our solution based
on solving the Eikonal equation can be thought of as converting a cost
map over a geographic area in continuous space into a discrete graph
whose nodes are waypoints joined by edges which are the air highways.
Note that the primary purpose of this section is to provide a method
2
for the real-time placement of air highways. The specifics of deter-
mining the cost map based on population density, geography, weather
forecast information, etc., as well as the criteria for when air highway
locations need to be updated, is beyond the scope of this paper.
In addition, if vehicles in the airspace are far away from each other,
it may be reasonable for all vehicles to fly in an unstructured man-
ner. As long as multiple-way conflicts do not occur, pairwise collision
avoidance maneuvers would be sufficient to ensure safety. Unstruc-
tured flight is likely to result in more efficient trajectories for each indi-
vidual vehicle. However, whether multiple-way conflicts occur cannot
be predicted ahead of time, and are not guaranteed to be resolvable
when they occur. By organizing vehicles into platoons, the likelihood
of multiple-way conflicts is vastly reduced. Structured flight is in gen-
eral less efficient for the individual vehicle, and this loss of efficiency
can be thought of as a cost incurred by the vehicles in order ensure
higher levels of safety.
In general, there may be many different levels of abstractions in
the airspace. For larger regions such as cities, air highways may prove
beneficial, and for a small region such as a neighborhood, perhaps un-
structured flight is sufficiently safe. Further research is needed to better
understand parameters such as the density of vehicles above which un-
structured flight is no longer manageable, and other details like platoon
size.
A. The Air Highway Placement Problem
Consider a map c : R2 → R which defines the cost c(p) incurred when
a UAV flies over the position p = (px, py) ∈ R2. Given any posi-
tion p, a large value of c(p) indicates that the position p is costly or
undesirable for a UAV to fly over. Locations with high cost could, for
example, include densely populated areas and areas around airports. In
general, the cost map c(·) may be used to model cost of interference
with commercial airspaces, cost of accidents, cost of noise pollution,
risks incurred, etc., and can be flexibly specified by government regu-
lation bodies.
Let po denote an origin point and pd denote a destination point.
Consider a sequence of highways SN = {H1, H2, . . . , HN} that satis-
fies the following:
H1(0) = po
Hi(1) = Hi+1(0), i = 0, 1, . . . , N − 1
HN (1) = pd
(1)
The interpretation of the above conditions is that the start point
of first highway is the origin, the end point of a highway is the start
point of the next highway, and the end point of last highway is the
destination. The highways H1, . . . , HN form a sequence of waypoints
for a UAV starting at the origin po to reach its destination pd.
Given only the origin point po and destination point pd, there are
an infinite number of choices for a sequence of highways that satisfy
(1). However, if one takes into account the cost of flying over any po-
sition p using the cost map c(·), we arrive at the air highway placement
problem:
(cid:33)
(cid:41)
(cid:40)(cid:32) N(cid:88)
(cid:90) 1
minSN ,N
i=1
subject to (1)
0
c(Hi(s))ds
+ R(N )
(2)
where R(·) is a regularizer, such as R(N ) = N 2.
The interpretation of (2) is that we consider air highways to be line
segments of constant altitude over a region, and UAV platoons travel on
these air highways to get from some origin to some destination. Any
UAV flying on a highway over some position p incurs a cost of c(p), so
that the total cost of flying from the origin to the destination is given by
the summation in (2). The air highway placement problem minimizes
the cumulative cost of flying from some origin po to some destination
pd along the sequence of highways SN = {H1, H2, . . . , HN}. The
regularization term R(N ) is used to prevent N from being arbitrarily
large.
3
from an origin po to any destination pd. Once V is found, the optimal
path P between po and pd can be obtained via gradient descent.
c(p)∇V (p) = 1
V (po) = 0
(5)
The Eikonal equation (5) can be efficiently computed numerically
using the fast marching method [19]; each computation takes on the
order of merely a second.
Note that (4) can be viewed as a relaxation of the air highway
placement problem defined in (2). Unlike (2), the relaxation (4) can be
quickly solved using currently available numerical tools. Thus, we first
solve the approximate air highway placement problem (4) by solving
(5), and then post-process the solution to (4) to obtain an approximation
to (2).
Given a single origin point po, the optimal cumulative cost func-
tion V (pd) can be computed. Suppose M different destination points
i , i = 1, . . . , M are chosen. Then, M different optimal paths
pd
Pi, i = 1, . . . , M are obtained from V .
C. From Paths to Waypoints
Each of the cost-minimizing paths Pi computed from the solution to
the Eikonal equation consists of a closely-spaced set of points. Each
path Pi is an approximation to the sequence of highways Si
Ni =
j}i=M,j=Ni
{Hi
defined in (2), but now indexed by the corresponding
i=1,j=1
path index i.
For each path Pi, we would like to sparsify the points on the path
to obtain a collection of waypoints, Wi,j, j = 1, . . . , Ni + 1, which
are the end points of the highways:
j(0) = Wi,j,
Hi
j(1) = Wi,j+1,
Hi
j = 1, . . . , Ni
(6)
There are many different ways to do this, and this process will not
be our focus. However, for illustrative purposes, we show how this
process may be started. We begin by noting the path's heading at the
destination point. We add to the collection of waypoints the first point
on the path at which the heading changes by some threshold θC, and
repeat this process along the entire path.
If there is a large change in heading within a small section of the
cost-minimizing path, then the collection of points may contain many
points which are close together.
In addition, there may be multiple
paths that are very close to each other (in fact, this behavior is desir-
able), which may contribute to cluttering the airspace with too many
waypoints. To reduce clutter, one could cluster the points. Afterwards,
each cluster of points can be replaced by a single point located at the
centroid of the cluster.
To the collection of points resulting from the above process, we
add the origin and destination points. Repeating the entire process for
every path, we obtain waypoints for all the cost-minimizing paths under
consideration. Figure 1 summarizes the entire air highway placement
process, including our example of how the closely-spaced set of points
on a path can be sparsified.
D. Results
To illustrate our air highway placement proposal, we used the San Fran-
cisco Bay Area as an example, and classified each point on the map
into four different regions: "regions around airports", "highly popu-
lated cities", "water", and "other". Each region has an associated cost,
reflecting the desirability of flying a vehicle over an area in the region.
In general, these costs can be arbitrary and determined by government
regulation agencies. For illustration purposes, we assumed the follow-
ing categories and costs:
• Region around airports: cairports = b,
Figure 1. Illustration of the air highway placement procedure.
B. The Eikonal Equation – Cost-Minimizing Path
Let s0, s1 ∈ R, and let P : [s0, s1] → R2 be a path starting from an
origin point po = P(s0) and ending at a destination point pd = P(s1).
Note that the sequence SN in (2) is a piecewise affine example of a path
P(s), s ∈ [s0, s1]; however, a path P that is not piecewise affine cannot
be written as a sequence of highways SN .
More concretely, suppose a UAV flies from an origin point po to
a destination point pd along some path P(s) parametrized by s. Then,
P(s0) = po would denote the origin, and P(s1) = pd would denote the
destination. All intermediate s values denote the intermediate positions
of the path, i.e. P(s) = p(s) = (px(s), py(s)).
Consider the cost map c(px, py) which captures the cost incurred
for UAVs flying over the position p = (px, py). Along the entire path
P(s), the cumulative cost C(P) is incurred. Define C as follows:
C(P) =
c(P(s))ds
(3)
(cid:90) s1
s0
For an origin-destination pair, we would like to find the path such
that the above cost is minimized. More generally, given an origin point
po, we would like to compute the function V representing the optimal
cumulative cost for any destination point pd:
C(P)
V (pd) =
min
P(·),P(s1)=pd
=
min
P(·),P(s1)=pd
(cid:90) s1
s0
c(P(s))ds
(4)
It is well known that the viscosity solution [26] to the Eikonal
equation (5) precisely computes the function V (pd) given the cost map
c [19, 27]. Note that a single function characterizes the minimum cost
• Cities: ccities = 1,
• Water: cwater = b−2,
Origin𝑝𝑜Destination𝑝𝑑Low cost regionHigh cost regionCost-minimizing path ℙOrigin𝑝𝑜Destination𝑝𝑑Low cost regionHigh cost regionLocations with large change in path headingOrigin𝑝𝑜Destination𝑝𝑑Low cost regionHigh cost regionSequence of highways ℍ1,ℍ2,…,ℍ5• Other: cother = b−1.
This assumption assigns costs in descending order to the categories
"regions around airports", "cities", "other", and "water". Flying a UAV
in each category is more costly by a factor of b compared to the next
most important category. The factor b > 1 is a tuning parameter that
we adjusted to vary the relative importance of the different categories,
and we used b = 4 in the figures below.
Figure 2 shows the San Francisco Bay Area geographic map, cost
map, cost-minimizing paths, and contours of the value function V . The
region enclosed by the black boundary represents "region around air-
ports", which have the highest cost. The dark blue, yellow, and light
blue regions represent the "cities", the "water", and the "other"' cate-
gories, respectively. We assumed that the origin corresponds to the city
"Concord", and chose a number of other major cities as destinations.
A couple of important observations can be made here. First, the
cost-minimizing paths to the various destinations in general overlap,
and only split up when they are very close to entering their destina-
tion cities. This is intuitively desirable because having overlapping
cost-minimizing paths keeps the number of distinct air highways low.
Secondly, the contours, which correspond to level curves of the value
function, have a spacings corresponding to the cost map: the spacings
are large in areas of low cost, and vice versa. This provides insight into
the placement of air highways to destinations that were not shown in
this example.
Figure 3 shows the result of converting the cost-minimizing paths
to a small number of waypoints. The left plot shows the waypoints,
interpreted as the start and end points of air highways, over a white
background for clarity. The right plot shows these air highways over
the map of the Bay Area. Note that we could have gone further to
merge some of the overlapping highways. However, the purpose of
this section is to illustrate the natural occurrence of air highways from
cost-minimizing paths; post-processing of the cost-minimizing paths,
which serve as a guide for defining air highways, is not our focus.
E. Real-Time Highway Location Updates
Since (5) can be solved in approximately 1 second, the air highway
placement process can be redone in real-time if the cost map changes
at a particular time. This flexibility can be useful in any situation in
which unforeseen circumstances could cause a change in the cost of
a particular region of the airspace. For example, accidents or disaster
response vehicles may result in an area temporarily having a high cost.
On the other hand, depending on for instance the time of day, it may
be most desirable to fly in different regions of the airspace, resulting in
those regions temporarily having a low cost.
III. Unmanned Aerial Vehicle Platooning
Air highways exhibiting trunk routes that separate near destina-
tions motivate the use of platoons which fly on these highways. The
air highway structure along with the UAV platooning concept together
enable the use of reachability to analyze safety and goal satisfaction
properties. The structure reduces the likelihood of multiple-way con-
flicts, and makes pairwise analysis more indicative of the joint safety
of all UAVs. In addition to reducing complexity, the proposed struc-
ture is intuitive, and allows human participation in the monitoring and
management of the unmanned airspace.
Organizing UAVs into platoons implies that the UAVs cannot fly
in an unstructured way, and must have a restricted set of controllers
or maneuvers depending on the UAV's role in the airspace. To model
UAVs flying in platoons on air highways, we propose a hybrid sys-
tem whose modes of operations describe a UAV's role in the highway
structure. For the hybrid system model, reachability analysis is used to
enable successful and safe operation and mode transitions.
A. UAVs in Platoons
1. Vehicle Dynamics
Consider a UAV whose dynamics are given by
x = f (x, u)
(7)
4
where x represents the state, and u represents the control action. The
techniques we present in this paper do not depend on the dynamics of
the vehicles, as long as their dynamics are known. However, for con-
creteness, we assume that the UAVs are quadrotors that fly at a constant
altitude under non-faulty circumstances. For the quadrotor, we use a
simple model in which the x and y dynamics are double integrators:
px = vx
py = vy
vx = ux
vy = uy
ux,uy ≤ umax
(8)
where the state x = (px, vx, py, vy) ∈ R4 represents the quadrotor's
position in the x-direction, its velocity in the x-direction, and its po-
sition and velocity in the y-direction, respectively. The control input
u = (ux, uy) ∈ R2 consists of the acceleration in the x- and y- di-
rections. For convenience, we will denote the position and velocity
p = (px, py), v = (vx, vy), respectively.
In general, the problem of collision avoidance among N vehi-
cles cannot be tractably solved using traditional dynamic programming
approaches because the computation complexity of these approaches
scales exponentially with the number of vehicles. Thus, in our present
work, we will consider the situation where UAVs travel on air highways
in platoons, defined in the following sections. The structure imposed
by air highways and platooning enables us to analyze the safety and
goal satisfaction properties of the vehicles in a tractable manner.
2. Vehicles as Hybrid Systems
We model each vehicle as a hybrid system [23, 28] consisting of the
modes "Free", "Leader", "Follower", and "Faulty". Within each mode,
a vehicle has a set of restricted maneuvers, including one that allows
the vehicle to change modes if desired. The modes and maneuvers are
as follows:
• Free:
A Free vehicle is not in a platoon or on a highway, and its pos-
sible maneuvers or mode transitions are
– remain a Free vehicle by staying away from highways
– become a Leader by entering a highway to create a new
platoon
– become a Follower by joining a platoon that is currently
on a highway
• Leader:
A Leader vehicle is the vehicle at the front of a platoon (which
could consist of only the vehicle itself). The available maneu-
vers and mode transitions are
– remain a Leader by traveling along the highway at a pre-
specified speed vH
– become a Follower by merging the current platoon with a
platoon in front
– become a Free vehicle by leaving the highway
• Follower:
A Follower vehicle is a vehicle that is following a platoon leader.
The available maneuvers and mode transitions are
– remain a Follower by staying a distance of dsep behind the
vehicle in front in the current platoon
– remain a Follower by joining a different platoon on an-
other highway
– become a Leader by splitting from the current platoon
while remaining on the highway
– become a Free vehicle by leaving the highway
5
• Faulty:
If a vehicle from any of the other modes becomes unable to op-
erate within the allowed set of maneuvers, it transitions into the
Faulty mode. Reasons for transitioning to the Faulty mode in-
clude vehicle malfunctions, performing collision avoidance with
respect to another Faulty vehicle, etc. A Faulty vehicle is as-
sumed to descend via a fail-safe mechanism after some pre-
specified duration tfaulty to a different altitude level where it no
longer poses a threat to vehicles on the air highway system.
Such a fail-safe mechanism could be an emergency landing pro-
cedure such as those analyzed in [29–31]. Typically, emergency
landing involves identifying the type of fault and finding feasi-
ble landing locations given the dynamics during the fault. We
will omit these details and summarize them into tfaulty, the time
required to exit the current altitude level.
The available maneuvers and associated mode transitions are sum-
marized in Figure 4.
Figure 5. Notation for vehicles in platoons.
• join a new platoon
• leave a platoon to create a new one
• react to malfunctioning or intruder vehicles
We also propose more basic controllers to perform other simpler
actions such as
• follow the highway at constant altitude at a specified speed
• maintain a constant relative position and velocity with respect
to the leader of a platoon
In general, the control strategy of each vehicle has a safety com-
ponent, which specifies a set of states that it must avoid, and a goal
satisfaction component, which specifies a set of states that the vehi-
cle aims to reach. Together, the safety and goal satisfaction controllers
guarantee the safety and success of a vehicle in the airspace making any
desired mode transition. In this paper, these guarantees are provided us-
ing reachability analysis, and allow the multi-UAV system to perform
joint maneuvers essential to maintaining structure in the airspace.
B. Hamilton-Jacobi Reachability
1. General Framework
Consider a differential game between two players described by the sys-
tem
x = f (x, u1, u2), for almost every t ∈ [−T, 0]
(9)
where x ∈ Rn is the system state, u1 ∈ U1 is the control of Player 1,
and u2 ∈ U2 is the control of Player 2. We assume f : Rn×U1×U2 →
Rn is uniformly continuous, bounded, and Lipschitz continuous in x
for fixed u1, u2, and the control functions u1(·) ∈ U1, u2(·) ∈ U2 are
drawn from the set of measurable functionsa. Player 2 is allowed to use
nonanticipative strategies [32, 33] γ, defined by
γ ∈ Γ := {N : U1 → U2 u1(r) = u1(r)
for almost every r ∈ [t, s] ⇒ N [u1](r)
= N [u1](r) for almost every r ∈ [t, s]}
(10)
In our differential game, the goal of Player 2 is to drive the system
into some target set L, and the goal of Player 1 is to drive the system
away from it. The set L is represented as the zero sublevel set of a
bounded, Lipschitz continuous function l : Rn → R. We call l(·) the
implicit surface function representing the set L : L = {x ∈ Rn
l(x) ≤ 0}.
Given the dynamics (8) and the target set L, we would like to com-
pute the BRS, V(t):
a A function f : X → Y between two measurable spaces (X, ΣX ) and
(Y, ΣY ) is said to be measurable if the preimage of a measurable set in Y is
a measurable set in X, that is: ∀V ∈ ΣY , f−1(V ) ∈ ΣX, with ΣX , ΣY
σ-algebras on X,Y .
Figure 4. Hybrid modes for vehicles in platoons. Vehicles begin in the
"Free" mode before they enter the highway.
j=1 ⊆ {i}N
Suppose that there are N vehicles in total in the airspace contain-
ing the highway system. We will denote the N vehicles as Qi, i =
1 . . . , N. We consider a platoon of vehicles to be a group of M ve-
hicles (M ≤ N), denoted QP1 , . . . , QPM ,{Pj}M
i=1, in a
single-file formation. When necessary, we will use superscripts to de-
represents the ith vehicle in
note vehicles of different platoons: QP j
the jth platoon.
For convenience, let Qi denote the set of indices of vehicles with
If vehicle Qi is a free vehi-
respect to which Qi checks safety.
cle, then it must check for safety with respect to all other vehicles,
Qi = {j : j (cid:54)= i}.
If the vehicle is part of a platoon, then it
checks safety with respect to the platoon member in front and behind,
Qi = {Pj+1, Pj−1}. Figure 5 summarizes the indexing system of the
vehicles.
i
We will organize the vehicles into platoons travel along air high-
ways. The vehicles maintain a separation distance of dsep with their
neighbors inside the platoon.
In order to allow for close proximity
of the vehicles and the ability to resolve multiple simultaneous safety
breaches, we assume that when a vehicle exhibits unpredictable behav-
ior, it will be able to exit the altitude range of the highway within a
duration of tfaulty. Such a requirement may be implemented practically
as an fail-safe mechanism to which the vehicles revert when needed.
3. Objectives
Given the above modeling assumptions, our goal is to provide control
strategies to guarantee the success and safety of all the mode transi-
tions. The theoretical tool used to provide the safety and goal satisfac-
tion guarantees is reachability. The BRSs we compute will allow each
vehicle to perform complex actions such as
• merge onto a highway to form a platoon
Free:•Vehicle not in a platoon or on a highwayLeader•Leader of platoonFollower•Member of platoonFaulty•Descends after a duration of 𝑡faultyLeave highwayMerge onto highwayCreate new platoonMerge with platoon in frontJoin platoonFollow highwayFollow platoonLeave highway𝑄"𝑄#𝑄$𝑄%𝑄&𝑄'𝑄(Platoon 1𝑄""𝑄)𝑄*𝑄"+Platoon 2𝑄"#𝑃""=4𝑃#"=5𝑃$"=6𝑃%"=7𝑃"#=8𝑃##=9𝑃$#=10𝒬)=9𝒬$=1,2,4,5,…,12𝒬"#=1,2,3,…,11𝒬&=4,6Free vehiclesLeader vehiclesFollower vehiclesV(t) := {x ∈ Rn ∃γ ∈ Γ such that ∀u1(·) ∈ U1,
∃s ∈ [t, 0], ξf (s; t, x, u1(·), γ[u1](·)) ∈ L}
(11)
where ξf is the trajectory of the system satisfying initial conditions
ξf (t; x, t, u1(·), u2(·)) = x and the following differential equation al-
most everywhere on [−t, 0]
d
ds
ξf (s; x, t, u1(·), u2(·))
= f (ξf (s; x, t, u1(·), u2(·)), u1(s), u2(s))
(12)
Many methods involving solving HJ PDEs [11] and HJ variational
inequalities (VI) [10, 12, 13] have been developed for computing the
BRS. These HJ PDEs and HJ VIs can be solved using well-established
numerical methods. For this paper, we use the formulation in [11],
which shows that the BRS V(t) can be obtained as the zero sublevel
set of the viscosity solution [26] V (t, x) of the following terminal value
HJ PDE:
∗
u
(t, x) = arg min
u∈U DxV (t, x) · f (x, u)
6
(17)
For our application, we will use several decoupled system models
and utilize decomposition techniques [34–36], which enables real-time
4D BRS computations and tractable 6D BRS computations.
2. Relative Dynamics and Augmented Relative Dynamics
Besides Equation (8), we will also consider the relative dynamics be-
tween two quadrotors Qi, Qj. These dynamics can be obtained by
defining the relative variables
px,r = px,i − px,j
py,r = py,i − py,j
vx,r = vx,i − vx,j
vy,r = vy,i − vy,j
(18)
DtV (t, x)+
min{0, max
u1∈U1
V (0, x) = l(x)
min
u2∈U2
DxV (t, x) · f (x, u1, u2)} = 0,
(13)
We treat Qi as Player 1, the evader who wishes to avoid collision,
and we treat Qj as Player 2, the pursuer, or disturbance, that wishes to
cause a collision. In terms of the relative variables given in (18), we
have
px,r = vx,r
py,r = vy,r
vx,r = ux,i − ux,j
vy,r = uy,i − uy,j
(19)
We also augment (18) with the velocity of Qi, given in (20), to
impose a velocity limit on the quadrotor.
px,r = vx,r
py,r = vy,r
vx,r = ux,i − ux,j
vy,r = uy,i − uy,j
vx,i = ux,i
vy,i = uy,i
(20)
C. Reachability-Based Controllers
Reachability analysis is useful for constructing controllers in a large
variety of situations. In order to construct different controllers, an ap-
propriate target set needs to be defined depending on the goal of the
controller. If one defines the target set to be a set of desired states, the
BRS would represent the states that a system needs to first arrive at in
order to reach the desired states. On the other hand, if the target set
represents a set of undesirable states, then the BRS would indicate the
region of the state space that the system needs to avoid. In addition, the
system dynamics with which the BRS is computed provide additional
flexibility when using reachability to construct controllers.
Using a number of different target sets and dynamics, we now
propose different reachability-based controllers used for vehicle mode
transitions in our platooning concept.
Figure 6. Illustration of a target set, a BRS, and their implicit surface func-
tions.
from which we obtain V(t) = {x ∈ Rn V (t, x) ≤ 0}. The target
set, reachable set, and implicit surface functions l(x) and V (t, x) rep-
resenting them are shown in Fig. 6. From the solution V (t, x), we can
also obtain the optimal controls for both players via the following:
u
u
∗
1(t, x) = arg max
u1∈U1
∗
2(t, x) = arg min
u2∈U2
DxV (t, x) · f (x, u1, u2)
min
u2∈U2
DxV (t, x) · f (x, u
∗
1, u2)
In the special case where there is only one player, we obtain an
(14)
1. Getting to a Target State
optimal control problem for a system with dynamics
x = f (x, u), t ∈ [−T, 0], u ∈ U.
The BRS in this case would be given by the HJ PDE
DtV (t, x) + min{0, min
u∈U DxV (t, x) · f (x, u)} = 0
V (0, x) = l(x)
where the optimal control is given by
(15)
(16)
The controller used by a vehicle to reach a target state is important in
two situations in the platooning context. First, a vehicle in the "Free"
mode can use the controller to merge onto a highway, forming a platoon
and changing modes to a "Leader" vehicle. Second, a vehicle in either
the "Leader" mode or the "Follower" mode can use this controller to
change to a different highway, becoming a "Leader" vehicle.
In both of the above cases, we use the dynamics of a single ve-
hicle specified in (8). The target state would be a position (¯px, ¯py)
representing the desired merging point on the highway, along with a
velocity (¯vx, ¯vy) = vH that corresponds to the speed and direction of
travel specified by the highway. For the reachability computation, we
define the target set to be a small range of states around the target state
¯xH = (¯px, ¯py, ¯vx, ¯vy):
7
LH = {x : px − ¯px ≤ rpx ,vx − ¯vx ≤ rvx ,
py − ¯py ≤ rpy ,vy − ¯vy ≤ rvy}.
(21)
Here, we represent the target set LH as the zero sublevel set of
the function lH (x), which specifies the terminal condition of the HJ
PDE that we need to solve. Once the HJ PDE is solved, we obtain the
BRS VH (t) from the subzero level set of the solution VH (t, x). More
concretely, VH (T ) = {x : VH (−T, x) ≤ 0} is the set of states from
which the system can be driven to the target LH within a duration of
T .
Depending on the time horizon T , the size of the BRS VH (T )
varies. In general, a vehicle may not initially be inside the BRS VH (T ),
yet it needs to be in order to get to its desired target state. Determining
a control strategy to reach VH (T ) is itself a reachability problem (with
VH (T ) as the target set), and it would seem like this reachability prob-
lem needs to be solved in order for us to use the results from our first
reachability problem. However, practically, one could choose T to be
large enough to cover a sufficiently large area to include any practically
conceivable initial state. From our simulations, a suitable algorithm for
getting to a desired target state is as follows:
1. Move towards ¯xH in pure pursuit with some velocity, until
VH (−T, x) ≤ 0. In practice, this step consistently drives the
system into the BRS.
2. Apply the optimal control extracted from VH (−T, x) according
to (17) until LH is reached.
2. Getting to a State Relative to Another Vehicle
In the platooning context, being able to go to a state relative to another
moving vehicle is important for the purpose of forming and joining
platoons. For example, a "Free" vehicle may join an existing platoon
that is on a highway and change modes to become a "Follower". Also,
a "Leader" or "Follower" may join another platoon and afterwards go
into the "Follower" mode.
To construct a controller for getting to a state relative to another
vehicle, we use the relative dynamics of two vehicles, given in (19).
In general, the target state is specified to be some position (¯px,r, ¯py,r)
and velocity (¯vx,r, ¯vy,r) relative to a reference vehicle. In the case of
a vehicle joining a platoon that maintains a single file, the reference
vehicle would be the platoon leader, the desired relative position would
be a certain distance behind the leader, depending on how many other
vehicles are already in the platoon; the desired relative velocity would
be (0, 0) so that the formation can be kept.
For the reachability problem, we define the target set to be a small
range of states around the target state ¯xP = (¯px,r, ¯py,r, ¯vx,r, ¯vy,r):
LP = {x : px,r − ¯px,r ≤ rpx ,vx,r − ¯vx,r ≤ rvx ,
py,r − ¯py,r ≤ rpy ,vy,r − ¯vy,r ≤ rvy}
(22)
The target set LP is represented by the zero sublevel set of the
implicit surface function lP (x), which specifies the terminal condi-
tion of the HJ PDE (13). The zero sublevel set of the solution to (13),
VP (−T, x), gives us the set of relative states from which a quadrotor
can reach the target in the relative coordinates within a duration of T .
In the BRS computation, we assume that the reference vehicle moves
along the highway at constant speed, so that uj(t) = 0. The follow-
ing is a suitable algorithm for a vehicle joining a platoon to follow the
platoon leader:
1. Move towards ¯xP in a straight line, with some velocity, until
VP (−T, x) ≤ 0.
2. Apply the optimal control extracted from VP (−T, x) according
to (14) until LP is reached.
3. Avoiding Collisions
A vehicle can use a goal satisfaction controller described in the previ-
ous sections when it is not in any danger of collision with other vehi-
cles. If the vehicle could potentially be involved in a collision within
the next short period of time, it must switch to a safety controller. The
safety controller is available in every mode, and executing the safety
controller to perform an avoidance maneuver does not change a vehi-
cle's mode.
In the context of our platooning concept, we define an unsafe con-
figuration as follows: a vehicle is either within a minimum separation
distance d to a reference vehicle in both the x and y directions, or is
traveling with a speed above the speed limit vmax in either of the x and
y directions. To take this specification into account, we use the aug-
mented relative dynamics given by (20) for the reachability problem,
and define the target set as follows:
LS = {x :px,r,py,r ≤ d ∨ vx,i ≥ vmax ∨ vy,i ≥ vmax}
(23)
We can now define the implicit surface function lS(x) correspond-
ing to LS, and solve the HJ PDE (13) using lS(x) as the terminal condi-
tion. As before, the zero sublevel set of the solution VS(t, x) specifies
the BRS VS(t), which characterizes the states in the augmented rela-
tive coordinates, as defined in (20), from which Qi cannot avoid LS
for a time period of t, if Qj uses the worst-case control. To avoid col-
lisions, Qi must apply the safety controller according to (14) on the
boundary of the BRS in order to avoid going into the BRS. The fol-
lowing algorithm wraps our safety controller around goal satisfaction
controllers:
1. For a specified time horizon t, evaluate VS(−t, xi − xj) for all
j ∈ Q(i).
Q(i) is the set of quadrotors with which vehicle Qi checks
safety.
2. Use the safety or goal satisfaction controller depending on the
values VS(−t, xi − xj), j ∈ Q(i):
If ∃j ∈ Q(i), VS(−t, xi−xj) ≤ 0, then Qi, Qj are in potential
conflict, and Qi must use a safety controller; otherwise Qi may
use a goal satisfaction controller.
D. Other Controllers
Reachability was used in Section C for the relatively complex maneu-
vers that require safety and goal satisfaction guarantees. For the sim-
pler maneuvers of traveling along a highway and following a platoon,
many well-known classical controllers suffice. For illustration, we use
the simple controllers described below.
1. Traveling along a highway
We use a model-predictive controller (MPC) for traveling along a high-
way; this controller allows the leader to travel along a highway at a
pre-specified speed. Here, the goal is for a leader vehicle to track an
air highway H(s), s ∈ [0, 1] while maintaining some constant velocity
vH specified by the highway. The highway and the specified velocity
can be written as a desired position and velocity over time, ¯p(t), ¯v(t).
Assuming that the initial position on the highway, s0 = s(t0) is speci-
fied, such a controller can be obtained from the following optimization
problem over the time horizon [t0, t1]:
minimize
(cid:90) t1
t0
(cid:8)(cid:107)p(t) − ¯p(t)(cid:107)2+
(cid:107)v(t) − ¯v(t)(cid:107)2 + 1 − s(cid:9)dt
subject to vehicle dynamics (7)
ux,uy ≤ umax,vx,vy ≤ vmax
s(t0) = s0, s ≥ 0
(24)
If we discretize time, the above optimization is becomes convex
optimization over a small number of decision variables, and can be
quickly solved.
2. Following a Platoon
Follower vehicles use a feedback control law tracking a nominal po-
sition and velocity in the platoon, with an additional feedforward term
given by the leader's acceleration input; here, for simplicity, we assume
perfect communication between the leader and the follower vehicles.
This following law enables smooth vehicle trajectories in the relative
platoon frame, while allowing the platoon as a whole to perform agile
maneuvers by transmitting the leader's acceleration command uP1 (t)
to all vehicles.
The i-th member of the platoon, QPi, is expected to track a rela-
tive position in the platoon ri = (ri
y) with respect to the leader's
position pP1, and the leader's velocity vP1 at all times. The resulting
control law has the form:
ui(t) = kp
(cid:2)vP1 (t)−vi(t)(cid:3)+uP1 (t) (25)
(cid:2)pP1 (t)+ri(t)−pi(t)(cid:3)+kv
x, ri
for some kp, kv > 0. In particular, a simple rule for determining ri(t)
in a single-file platoon is given for QPi as:
ri(t) = −(i − 1)dsep d
(26)
where dsep is the spacing between vehicles along the platoon and d is
the highway's direction of travel.
E. Summary of Controllers
We have introduced several reachability-based controllers, as well as
some simple controllers. Pairwise collision avoidance is guaranteed
using the safety controller, described in Section III-C-3. As long as a
vehicle is not in potential danger according to the safety BRSs, it is
free to use any other controller. All of these other controllers are goal
satisfaction controllers, and their corresponding mode transitions are
shown in Figure 7.
The controller for getting to an absolute target state, described in
Section III-C-1, is used whenever a vehicle needs to move onto a high-
way to become a platoon leader. This controller guarantees the success
of the mode transitions shown in blue in Figure 7.
The controller for getting to a relative target state, described in
Section III-C-2, is used whenever a vehicle needs to join a platoon to
become a follower. This controller guarantees the success of the mode
transitions shown in green in Figure 7.
For the simple maneuvers of traveling along a highway or follow-
ing a platoon, many simple controllers such as the ones suggested in
Section III-D can be used. These controllers keep the vehicles in either
the Leader or the Follower mode. Alternatively, additional controllers
can be designed for exiting the highway, although these are not consid-
ered in this paper. All of these non-reachability-based controllers are
shown in gray in Figure 7.
8
QP2, and the platoon trailer QPN checks safety against QPN−1. So
QP1 = {P2},QPN = {PN−1}. When all vehicles are using goal sat-
isfaction controllers to perform their allowed maneuvers, in most situa-
tions no pair of vehicles should be in an unsafe configuration. However,
occasionally a vehicle Qk may behave unexpectedly due to faults or
malfunctions, in which case it may come into an unsafe configuration
with another vehicle.
With our choice of Qi and the assumption that the platoon is in a
single-file formation, some vehicle Qi would get near the safety BRS
with respect to Qk, where Qk is likely to be the vehicle in front or
behind of Qi. In this case, a "safety breach" occurs. Our synthesis of
the safety controller guarantees the following: between every pair of
vehicles Qi, Qk, if VS(−t, xi − xk) > 0, then ∃ui to keep Qi from
colliding with Qk for a desired time horizon t, despite the worst case
(an adversarial) control from Qk. Therefore, as long as the number of
"safety breaches" is at most one for Qi, Qi can simply use the optimal
control to avoid Qk and avoid collision for the time horizon of t. Under
the assumption that vehicles are able to exit the current altitude range
within a duration of tfaulty, if we choose t = tfaulty, the safety breach
would always end before any collision can occur.
Within a duration of tfaulty, there is a small chance that additional
safety breaches may occur. However, as long as the total number of
safety breaches does not exceed the number of affected vehicles, col-
lision avoidance of all the vehicles can be guaranteed for the duration
tfaulty. However, as our simulation results show, placing vehicles in
single-file platoons makes the likelihood of multiple safety breaches
low during the presence of one intruder vehicle.
In the event that multiple safety breaches occur for some of the
vehicles due to a malfunctioning vehicle within the platoon or intrud-
ing vehicles outside of the platoon, vehicles that are causing safety
breaches must exit the highway altitude range in order to avoid col-
lisions. Every extra altitude range reduces the number of simultaneous
safety breaches by 1, so K simultaneous safety breaches can be re-
solved using K − 1 different altitude ranges. The general process and
details of the complete picture of multi-altitude collision avoidance is
part of our future work.
The concept of platooning can be coupled with any collision avoid-
ance algorithm that provides safety guarantees.
In this paper, we
have only proposed the simplest reachability-based collision avoidance
scheme. Existing collision avoidance algorithms such as [37] and [38]
have the potential to provide safety guarantees for many vehicles in
order to resolve multiple safety breaches at once. Coupling the pla-
tooning concept with the more advanced collision avoidance methods
that provide guarantees for a larger number of vehicles would reduce
the risk of multiple safety breaches.
Given that vehicles within a platoon are safe with respect to each
other, each platoon can be treated as a single vehicle, and perform colli-
sion avoidance with other platoons when needed. The option of treating
each platoon as a single unit can reduce the number of individual vehi-
cles that need to check for safety against each other, reducing overall
computation burden.
Figure 7. Summary of mode switching controllers. Reachability-based con-
trollers are shown as the blue and green arrows.
F. Safety Analysis
Under normal operations in a single platoon, each follower vehicle
Qi, i = P2, . . . , PM−1 in a platoon checks whether it is in the safety
BRS with respect to QPi−1 and QPi+1. So Qi = {Pi+1, Pi−1}
for i = P2, . . . , PN−1. Assuming there are no nearby vehicles out-
side of the platoon, the platoon leader QP1 checks safety against
G. Numerical Simulations
In this section, we consider several situations that vehicles in a platoon
on an air highway may commonly encounter, and show via simulations
the behaviors that emerge from the controllers we defined in Sections
III-C and III-D.
1. Forming a Platoon
We first consider the scenario in which Free vehicles merge onto an ini-
tially unoccupied highway. In order to do this, each vehicle first checks
safety with respect to all other vehicles, and uses the safety controller
if necessary, according to Section III-C-3. Otherwise, the vehicle uses
the goal satisfaction controller for getting to an absolute target set de-
scribed in Section III-C-1 in order to merge onto the highway, create a
platoon, and become a Leader vehicle if there are no platoons on the
highway. If there is already a platoon on the highway, then the vehi-
cle would use the goal satisfaction controller for getting to a target set
relative to the platoon leader as described in Section III-C-2 to join the
platoon and become a Follower.
Free:•Vehicle not in platoon or on highwayLeader•Leader of platoonFollower•Member of platoonLeave highwayMerge onto highway(get to absolute state)Create new platoon(get to absolute state)Merge with platoon in front(get to relative state)Join platoon(get to relative state)Follow highway(model predictive controller)Follow platoon(PD controller)Leave highway9
For the simulation example, shown in Figure 8, the highway is
specified by a line segment beginning at the origin. The five vehicles,
Q1, Q2, . . . , Q5 are colored orange, purple, light blue, dark blue, and
yellow, respectively.
The first two plots in Figure 8 illustrate the use of safety and goal
satisfaction BRS for the first two vehicles. Since the goal satisfaction
BRSs are in 4D and the safety BRSs are in 6D, we compute and plot
their 2D slices based on the vehicles' velocities and relative velocities.
All vehicles begin as Free vehicles, so they each need to take into ac-
count five different BRSs: four safety BRSs and one goal satisfaction
BRS. For clarity, we only show the goal satisfaction BRS and the four
safety BRSs for one of the vehicles.
For Q1 (orange), an arbitrary point of entry on the highway is cho-
sen as the target absolute position, and the velocity corresponding to a
speed of 10 m/s in the direction of the highway is chosen as the target
absolute velocity. This forms the target state ¯xH = (¯px, ¯vx, ¯py, ¯vy),
from which we define the target set LH as in Section III-C-1.
At t = 4.2, Q1 (orange) is inside the goal satisfaction BRS for get-
ting to an absolute state, shown as the dotted orange boundary. There-
fore, it is "locked-in" to the target state ¯xH, and follows the optimal
control in (17) to ¯xH. During the entire time, Q1 checks whether it
may collide with any of the other vehicles within a time horizon of
tfaulty. To do this, it simply checks whether its state relative to each of
the other vehicles is within the corresponding safety BRS. As an exam-
ple, the safety BRS boundary with respect to Q2 (purple) is shown as
the orange dashed boundary around Q2 (purple); Q1 (orange) is safe
with respect to Q2 (purple) since Q1 (orange) is outside of the bound-
ary. In fact, Q1 is safe with respect to all vehicles.
After completing merging onto the empty highway, Q1 (orange)
creates a platoon and becomes its leader, while subsequent vehicles
begin to form a platoon behind the leader in the order of ascending
distance to Q1 (orange) according to the process described in Section
III-C-2. Here, we choose the target relative position (¯px,r, ¯py,r) to be a
distance dsep behind the last reserved slot in the platoon, and the target
relative velocity (¯vx,r, ¯vy,r) = (0, 0) with respect to the leader in order
to maintain the platoon formation. This gives us the target set LP that
we need.
At t = 8.0, Q2 (purple) is in the process of joining the platoon
behind Q1 (orange) by moving towards the target ¯xP relative to the
position of Q1 (orange). Note that ¯xP moves with Q1 (orange) as ¯xP
is defined in terms of the relative states of the two vehicles. Since Q2
is inside the goal satisfaction BRS boundary for joining the platoon
(purple dotted boundary), it is "locked-in" to the target relative state
¯xP , and begins following the optimal control in (14) towards the target
as long as it stays out of all safety BRSs. For example, at t = 5.9,
Q2 (purple) is outside of the safety BRS with respect to Q1 (orange),
shown as the purple dashed boundary around Q1 (orange). Again, from
the other safety BRS boundaries, we can see that Q2 is in fact safe with
respect to all vehicles.
In the bottom plots of Figure 8, Q1 (orange) and Q2 (purple) have
already become the platoon leader and follower, respectively. The rest
of the vehicles follow the same process to join the platoon. All 5 ve-
hicles eventually form a single platoon and travel along the highway
together. As with the first two vehicles, the goal satisfaction controllers
allow the remaining vehicles to optimally and smoothly join the pla-
toon, while the safety controllers prevent collisions from occurring.
2.
Intruder Vehicle
We now consider the scenario in which a platoon of vehicles encounters
an intruder vehicle. To avoid collision, each vehicle checks for safety
with respect to the intruder and any vehicles in front and behind of it in
the platoon. If necessary, the vehicle uses the reachability-based safety
controller to avoid collision, otherwise it uses the appropriate controller
to travel on the highway if it is a leader, or follow the leader if it is a
follower. After danger has passed, the vehicles in the platoon resume
normal operation.
Figure 9 shows the simulation result. At t = 9.9, a platoon of four
vehicles, Qi, i = 1, . . . , 4 (with Pi = i), travels along the highway
shown. An intruder vehicle Q5 (yellow) heads left, disregarding the
presence of the platoon. At t = 11.9, the platoon leader Q1 (red)
detects that it has gone near the boundary of the safety BRS (not shown)
with respect to the intruder Q5 (yellow). In response, Q1 (red) starts
using the safety controller to optimally avoid the intruder according to
(14); in doing so, it steers slightly off the highway.
Note that although in this particular simulation, the intruder travels
in a straight line, a straight line motion of the intruder was not assumed.
Rather, the safety BRSs are computed assuming the worst case control
of the intruder, according to (14).
As the intruder Q5 (yellow) continues to disregard other vehicles,
the followers of the platoon also get near the respective boundaries of
their safety BRSs with respect to the intruder. This occurs at t = 13.9,
where the platoon "makes room" for the intruder to pass by to avoid
collisions; all vehicles deviate from their intended path, which is to
follow the platoon leader or the highway. Note that in this case, we
have assumed that the platoon does not move as a unit in response to
an intruder to show more interesting behavior.
After the intruder has passed, eventually all vehicles become far
away from any safety BRSs. When this occurs, the leader resumes
following the highway, and the followers resume following the leader.
At t = 19.9, the platoon successfully gets back onto the highway.
3. Changing highways
In order to travel from origin to destination, a vehicle may need to
change highways several times before exiting an air highway system.
In this simulation, shown in Figure 10, two platoons are traveling on
two different highways that intersect. When the platoons are near the
highway intersection, two of the vehicles in the four-vehicle platoon
change highways and join the other platoon.
The t = 8.2 plot shows the two platoons of vehicles traveling on
the two air highways. One platoon has three vehicles, and the other
has four vehicles. At t = 12.3, the yellow vehicle begins steering off
its original highway in order to join the other platoon. In terms of the
hybrid systems modes, the yellow vehicle transitions from the Leader
mode to the Follower mode. At the same time, the green vehicle tran-
sitions from the Follower mode to the Leader mode, since the previous
platoon leader, the yellow vehicle, has left the platoon. By t = 16.9,
the yellow vehicle successfully changes highways and is now a fol-
lower in its new platoon.
At t = 16.9, the dark red vehicle is in the process of changing
highways. In this case, it remains in the Follower mode, since it is a
follower in both its old and new platoons. While the dark red vehicle
changes highways, the orange vehicle moves forward to catch up to
its new platoon leader, the green vehicle. By t = 23, all the vehicles
have finished performing their desired maneuvers, resulting in a two-
vehicle platoon and a five-vehicle platoon traveling on their respective
highways.
IV. Conclusions
To address the important and urgent problem of the traffic man-
agement of unmanned aerial vehicles (UAVs), we proposed to have
platoons of UAVs traveling on air highways. We showed how such
an airspace structure leads to much easier safety and goal satisfaction
analysis. We provided simulations which show that by organizing ve-
hicles into platoons, many complex maneuvers can be performed using
just a few different backward reachable sets.
For the placement of air highways over a region, we utilize the very
intuitive and efficient fast marching algorithm for solving the Eikonal
equation. Our algorithm allows us to take as input any arbitrary cost
map representing the desirability of flying over any position in space,
and produce a set of paths from any destination to a particular origin.
Simple heuristic clustering methods can then be used to convert the sets
of paths into a set of air highways.
On the air highways, we considered platoons of UAVs modeled
by hybrid systems. We show how various required platoon functions
(merging onto an air highway, changing platoons, etc.) can be imple-
mented using only the Free, Leader, and Follower modes of operation.
Using HJ reachability, we proposed goal satisfaction controllers that
guarantee the success of all mode transitions, and wrapped a safety
controller around goal satisfaction controllers to ensure no collision be-
tween the UAVs can occur. Under the assumption that faulty vehicles
can descend after a pre-specified duration, our safety controller guar-
antees that no collisions will occur in a single altitude level as long as
at most one safety breach occurs for each vehicle in the platoon. Addi-
tional safety breaches can be handled by multiple altitude ranges in the
airspace.
Acknowledgments
This work is supported in part by NSF under CPS:ActionWebs
(CNS-0931843) and CPS:FORCES (CNS1239166), by NASA under
grants NNX12AR18A and UCSCMCA-14-022 (UARC), by ONR un-
der grants N00014-12-1-0609, N000141310341 (Embedded Humans
MURI), and MIT 5710002646 (SMARTS MURI), and by AFOSR un-
der grants UPenn-FA9550-10-1-0567 (CHASE MURI) and the SURE
project.
References
[1] Tice, B. P., "Unmanned Aerial Vehicles – The Force Multiplier of the
1990s," Airpower Journal, 1991, pp. 41–55.
[2] Haulman, D. L., "U.S. Unmanned Aerial Vehicles in Combat, 1991-2003,"
Tech. rep., Air Force Historical Research Agency, Maxwell Air Force
Base, Alabama, 2003.
Inc.,
[3] Amazon.com,
Prime Air
"Amazon
http://www.amazon.com/b?node=8037720011
2016].
[online],"
[retrieved Oct.
2014,
17,
[4] Stewart, J., "Google tests drone deliveries in Project Wing trials," 2014.
[5] Prevot, T., Rios, J., Kopardekar, P., Robinson III, J. E., Johnson, M., and
Jung, J., "UAS Traffic Management (UTM) Concept of Operations to
Safely Enable Low Altitude Flight Operations," Proceedings of the AIAA
Aviation Technology, Integration, and Operations Conference, Jun. 2016,
AIAA paper number: 2016-3292, doi: 10.2514/6.2016-3292.
[6] DeBusk, W., "Unmanned Aerial Vehicle Systems for Disaster Relief: Tor-
nado Alley," AIAA Infotech@Aerospace 2010, Apr. 2010, AIAA paper
number: 2010-3506, 10.2514/6.2010-3506.
[7] AUVSI News, "UAS Aid in South Carolina Tornado Investigation
[online]," http://www.auvsi.org/blogs/auvsi-news/2016/01/29/tornado [re-
trieved Feb. 16, 2016].
[8] Jointed Planning and Development Office (JPDO), "Unmanned Aircraft
Systems (UAS) Comprehensive Plan – A Report on the Nation's UAS
Path Forward," Tech. rep., Federal Aviation Administration, 2013.
[9] National Aeronautics and Space Administration, "Challenge is On to De-
sign Sky for All," 2016, http://www.nasa.gov/feature/challenge-is-on-to-
design-sky-for-all, [retrieved Feb. 12, 2016].
[10] Bokanowski, O., Forcadel, N., and Zidani, H., "Reachability and Minimal
Times for State Constrained Nonlinear Problems without Any Controlla-
bility Assumption," SIAM Journal on Control and Optimization, Vol. 48,
No. 7, Jan. 2010, pp. 4292–4316, doi: 10.1137/090762075.
[11] Mitchell, I. M., Bayen, A. M., and Tomlin, C. J., "A time-dependent
Hamilton-Jacobi formulation of reachable sets for continuous dynamic
games," IEEE Transactions on Automatic Control, Vol. 50, No. 7, Jul.
2005, pp. 947–957.
[12] Barron, E. and Ishii, H., "The Bellman equation for minimizing the maxi-
mum cost," Nonlinear Analysis: Theory, Methods & Applications, Vol. 13,
No. 9, Sept. 1989, pp. 1067–1090, doi: 10.1016/0362-546X(89)90096-5.
[13] Fisac, J. F., Chen, M., Tomlin, C. J., and Sastry, S. S., "Reach-avoid prob-
lems with time-varying dynamics, targets and constraints," Proceedings of
the International Conference on Hybrid Systems: Computation and Con-
trol, 2015, pp. 11–20, doi: 10.1145/2728606.2728612.
[14] Chen, M., Zhou, Z., and Tomlin, C. J., "Multiplayer reach-avoid
games via low dimensional solutions and maximum matching," Proceed-
ings of the American Control Conference, 2014, pp. 1444–1449, doi:
10.1109/ACC.2014.6859219.
[15] Chen, M., Zhou, Z., and Tomlin, C. J., "Multiplayer Reach-Avoid Games
via Pairwise Outcomes," IEEE Transactions on Automatic Control, 2016,
pp. 1–1, doi: 10.1109/TAC.2016.2577619.
[16] Ding, J., Sprinkle, J., Sastry, S. S., and Tomlin, C. J., "Reacha-
bility calculations for automated aerial refueling," Proceedings of the
IEEE Conference on Decision and Control, 2008, pp. 3706–3712, doi:
10.1109/CDC.2008.4738998.
10
[17] Mitchell, I. M., "The Flexible, Extensible and Efficient Toolbox of Level
Set Methods," Journal of Scientific Computing, Vol. 35, No. 2-3, Jun.
2008, pp. 300–329, doi: 10.1007/s10915-007-9174-4.
[18] Osher, S. and Fedkiw, R., Level Set Methods and Dynamic Implicit Sur-
faces, Springer-Verlag, 2002.
[19] Sethian, J. A., "A fast marching level set method for monotonically
advancing fronts." Proceedings of the National Academy of Sciences,
Vol. 93, No. 4, Feb. 1996, pp. 1591–1595, doi: 10.1073/pnas.93.4.1591.
[20] Kavathekar, P. and Chen, Y., "Vehicle Platooning: A Brief Survey and Cat-
egorization," Proceedings of the ASME/IEEE International Conference on
Mechatronic and Embedded Systems and Applications, Parts A and B,
Vol. 3, 2011, pp. 829–845, doi: 10.1115/DETC2011-47861.
[21] McMahon, H. D., Hedrick, K. J., and Shladover, E. S., "Vehicle Mod-
elling and Control for Automated Highway Systems," American Control
Conference, 1990, May 1990, pp. 297–303.
[22] Hedrick, K. J., Zhang, G., Narendran, K. V., s. Chang, K., for Ad-
vanced Transit, P., (Calif.), H., and University of California, B. I. o. T. S.,
Transitional Platoon Maneuvers in an Automated Highway System, Cal-
ifornia PATH Program, Institute of Transportation Studies, University of
California at Berkeley, 1992.
[23] Lygeros, J., Godbole, D. N., and Sastry, S. S., "Verified hybrid con-
trollers for automated vehicles," IEEE Transactions on Automatic Control,
Vol. 43, No. 4, Apr. 1998, pp. 522–539.
[24] Gattami, A., Al Alam, A., Johansson, K. H., and Tomlin, C. J., "Estab-
lishing Safety for Heavy Duty Vehicle Platooning: A Game Theoretical
Approach," Vol. 44, Jan. 2011, pp. 3818–3823, doi: 10.3182/20110828-6-
IT-1002.02071.
[25] Sabau, S., Oara, C., Warnick, S., and Jadbabaie, A., "Optimal
Distributed Control
for Platooning via Sparse Coprime Factoriza-
tions," IEEE Transactions on Automatic Control, 2016, pp. 1–1, doi:
10.1109/TAC.2016.2572002.
[26] Crandall, M. G., Evans, L. C., and Lions, P.-L., "Some properties of vis-
cosity solutions of Hamilton-Jacobi equations," Transactions of the Amer-
ican Mathematical Society, Vol. 282, No. 2, Apr. 1984, pp. 487–502, doi:
S0002-9947-1984-0732102-X.
[27] Alton, K. and Mitchell, I., "Optimal path planning under defferent
the IEEE Inter-
norms in continuous state spaces," Proceedings of
national Conference on Robotics and Automation, pp. 866–872, doi:
10.1109/ROBOT.2006.1641818.
[28] Lygeros, J., Sastry, S., and Tomlin, C., Hybrid Systems: Foundations, ad-
vanced topics and applications, Springer Verlag, 2012.
[29] Adler, A., Bar-Gill, A., and Shimkin, N., "Optimal flight paths
for engine-out emergency landing," Proceedings of
the IEEE Chi-
nese Control and Decision Conference, 2012, pp. 2908–2915, doi:
10.1109/CCDC.2012.6244461.
[30] Coombes, M., Chen, W.-H., and Render, P., "Reachability Analysis of
Landing Sites for Forced Landing of a UAS," Journal of Intelligent
& Robotic Systems, Vol. 73, No. 1-4, Jan. 2014, pp. 635–653, doi:
10.1007/s10846-013-9920-9.
[31] Idicula, J., Akametalu, K., Chen, M., Tomlin, C., Ding, J., and Hook, L.,
"Where to Land: A Reachability Based Forced Landing Algorithm for
Aircraft Engine Out Scenarios," Nov. 2015, Seedling Technical Seminar,
NASA Dryden Flight Research Center, Report number DFRC-E-DAA-
TN28194.
[32] Evans, L. C. and Souganidis, P. E., "Differential games and representa-
tion formulas for solutions of Hamilton-Jacobi-Isaacs equations," Indiana
Univ. Math. J., Vol. 33, No. 5, 1984, pp. 773–797.
[33] Varaiya, P. P., "On the Existence of Solutions to a Differential Game,"
SIAM Journal on Control, Vol. 5, No. 1, Feb. 1967, pp. 153–162, doi:
10.1137/0305009.
[34] Chen, M. and Tomlin, C.
"Exact and efficient Hamilton-
Jacobi reachability for decoupled systems," Proceedings of the IEEE
Conference on Decision and Control, 2015, pp. 1297–1303, doi:
10.1109/CDC.2015.7402390.
J.,
[35] Chen, M., Herbert, S., and Tomlin, C. J., "Exact and Efficient Hamilton-
Jacobi-based Guaranteed Safety Analysis via System Decomposition,"
IEEE International Conference on Robotics and Automation 2017 (to ap-
pear), 2017.
11
[36] Chen, M., Herbert, S., Vashishtha, M., Bansal, S., and Tomlin, C. J., "A
General System Decomposition Method for Computing Reachable Sets
and Tubes," IEEE Transactions on Automatic Control (submitted), 2016.
[37] Bansal*, S., Chen*, M., and Tomlin, C. J., "Safe Sequential Path Planning
of Multi-Vehicle Systems Under Presence of Disturbances and Measure-
ment Noise," American Control Conference (to appear), 2017.
[38] Chen*, M., Shih*, J., and Tomlin, C. J., "Multi-Vehicle Collision Avoid-
ance via Reachability and Mixed Integer Programming," Proceedings of
the IEEE Conference on Decision and Control, 2016.
12
Figure 2. Cost-minimizing paths computed by the Fast Marching Method based on the assumed cost map of the San Francisco Bay Area.
Figure 3. Results of conversion from cost-minimizing paths to highway way points.
Bay Area Map, Cost-Minimizing Paths-1-0.500.51-1-0.8-0.6-0.4-0.200.20.40.60.81Cost Map, Cost-Minimizing Paths, Value Function-1-0.500.51-1-0.8-0.6-0.4-0.200.20.40.60.81-1-0.500.51-1-0.8-0.6-0.4-0.200.20.40.60.81-1-0.500.51-1-0.8-0.6-0.4-0.200.20.40.60.8113
(a) The red vehicle is merging onto the highway while avoiding colli-
sions.
(b) The purple vehicle is joining the platoon while avoiding collisions.
(c) The last three vehicles follow the same process to join the platoon. (d) All five vehicles have successfully joined the platoon and now travel
on the highway together.
Figure 8. A simulation showing how five vehicles initially in the Free mode can form a platoon.
-150-100-50050100150200-300-250-200-150-100-50050t=4.2-150-100-50050100150-300-250-200-150-100-50050t=8-50050100-300-250-200-150-100-500t=10.9-50050100-300-250-200-150-100-500t=20.914
(a) A four-vehicle platoon travels along the highway. The yellow vehi-
cle disregards the others.
(b) Vehicles begin avoidance maneuvers as they get near safety BRS
boundaries.
(c) Safety controllers cause vehicles to spread out to "make room" for
the intruder to pass.
(d) After danger has passed, the platoon resumes normal operation.
Figure 9. A simulation showing how a platoon of four vehicles reacts to an intruder.
050100150200-180-160-140-120-100-80-60-40-20020t=9.9050100150200-180-160-140-120-100-80-60-40-20020t=11.9050100150200-180-160-140-120-100-80-60-40-20020t=13.9050100150200-180-160-140-120-100-80-60-40-20020t=19.915
(a) A three-vehicle platoon and a four-vehicle platoon travel on their
respective air highways.
(b) The yellow vehicle begins to join the new platoon; The green vehicle
becomes a leader.
(c) The dark red vehicle joins a new platoon; the orange vehicle catches
up to new platoon leader.
(d) New platoons now travel on their respective air highways.
Figure 10. A simulation showing two vehicles changing highways and joining a new platoon.
-200-1000100200-200-150-100-50050100150200t=8.2-200-1000100200-200-150-100-50050100150200t=12.3-200-1000100200-200-150-100-50050100150200t=16.9-200-1000100200-200-150-100-50050100150200t=23 |
1905.01358 | 1 | 1905 | 2019-04-29T11:16:34 | Agent based decision making for Integrated Air Defense system | [
"cs.MA"
] | This paper presents algorithms of decision making agents for an integrated air defense (IAD) system. The advantage of using agent based over conventional decision making system is its ability to automatically detect and track targets and if required allocate weapons to neutralize threat in an integrated mode. Such approach is particularly useful for futuristic network centric warfare. Two agents are presented here that perform the basic decisions making tasks of command and control (C2) like detection and action against jamming, threat assessment and weapons allocation, etc. The belief-desire-intension (BDI) architectures stay behind the building blocks of these agents. These agents decide their actions by meta level plan reasoning process. The proposed agent based IAD system runs without any manual inputs, and represents a state of art model for C2 autonomy. | cs.MA | cs | JOURNAL OF BATTLEFIELD TECHNOLOGY VOL 14, NO 1, MARCH 2011
1
AGENT-BASED DECISION MAKING FOR INTEGRATED AIR DEFENSE SYSTEM
Sumanta K. Das and Sumant Mukherjee1
Abstract. This paper presents algorithms of decision making agents for an integrated air defense (IAD) system. The
advantage of using agent based over conventional decision making system is its ability to automatically detect and track
targets and if required allocate weapons to neutralize threat in an integrated mode. Such approach is particularly
useful for futuristic network centric warfare. Two agents are presented here that perform the basic decisions making
tasks of command and control (C2) like detection and action against jamming, threat assessment and weapons
allocation, etc. The belief-desire-intension (BDI) architectures stay behind the building blocks of these agents. These
agents decide their actions by meta level plan reasoning process. The proposed agent based IAD system runs without
any manual inputs, and represents a state of art model for C2 autonomy.
INTRODUCTION
Conventional ways of decision making for command and
control (C2) for an Integrated Air Defense (IAD) system are
performed by human decision makers. The term IAD means
that different tactical air defense services like searching,
detecting, tracking, identifying and engaging targets using air
defense sensors (radars) & weapons (aircrafts & missiles) are
performed in an integrated fashion. Network Centric Warfare
(NCW) is a concept that makes IAD operations successful.
The C2 of NCW is viewed as a collaborative decision making
process. With the advent of synchronous or asynchronous
NCW in terms of both time and space [1], the conventional
methods and modes of implementing the decision making
processes of C2 has become obsolete [2]. The modern
networked-laid IAD systems demand advanced method of
decision making that should be enriched with artificial
intelligence (AI) techniques. At each level of service
execution decisions need to be taken autonomously by
intelligent computational entities or agents. These agents
should be capable
localized decision and
communicate with each other to achieve a collective goal.
take
to
the economics
The Belief-Desire-Intension (BDI) architectures [3] are based
on the philosophical tradition of understanding practical
reasoning. Recently these architectures are extended to
develop autonomous agents on the basis of a number of
disciplines ranging from
to cognitive
psychology to mathematics. The BDI architectures are
applied for developing agents that behave deliberatively and
reactively in a complex environment. In these architectures,
the mental attitudes of the agent are represented by the
attributes like beliefs, desires and intentions. The belief is the
knowledge of the agent about its world or environment.
Agent‟s desire or goal is the condition that agent wants to
satisfy. After satisfying the conditions, the agent has to
perform certain action to achieve the goal that is known as
intentions. Agents have different course of actions to achieve
different desires or goals i.e. known as plan repository or plan
library. JACK is the most widely used programming
language for developing the BDI agents [4].
In the recent times several studies have been performed to
understand and improve the agent based modeling in
different application domains. The agent technologies have
been successfully deployed for wireless battery powered
sensor network in [5] for graph colouring problem. Agent
based modeling and simulation tools are used for making
automated car driver [6]. Software agents can be embedded
on the web as a replacement of the human user. These agents
can do the work which human user is supposed to do. In such
situation dynamic service composition is essential. In [7] a
work
is presented where agents are evolving service
semantics cooperatively in a consumer driven approach. An
application of distributed computation by multi agent system
for traffic control is presented in [8]. Introducing learning
capability in BDI architectures is studied by [9]. A new
architecture is presented in that study as an extension of the
BDI architectures in which learning process is described as
plans. The manipulative abduction
reasons by
experiences and exhibitions of behaviour to find some pattern
in the environment is used for the learning process.
that
Search is an essential part of the agent‟s model. It is a
sequence of actions that takes any agent from the initial state
to the goal state. Search could be uninformed or informed
(heuristic). Heuristic search is an essential action for agents
that work in the real time. Two classes of heuristic search
methods are common, namely real time heuristic search and
incremental heuristic search. A detail comparison of these
two methods along with their advantages and disadvantages
is presented in [10].
The agent models are difficult to verify because there is
always a gap of understanding between agent logic and agent
programming. To overcome this problem an operational
semantics of agent programming language is presented in
[11]. In that study agent logic is first grounded by state based
semantics then denotational semantics is used to connect the
agent logic with agent programming.
An agent may pursue multiple goals at same time. In such
situation it may happens that pursuing multiple goals at the
same time simultaneously is not possible. This is known as
conflicting goals situation. The semantic representation of
conflicting goals is presented in [12]. Monitoring many
agents in a multi-agent architecture is a viable problem of
agent development work. Usual disagreements between
different agents arise in such situation.
are
identified, designed
In the present study C2 agents that are capable of taking
autonomous decisions
and
implemented for an IAD system. The OODA approach [13]
(i.e. Observe-orient-decide-act) is assumed for modeling the
tactical behavior of these agents. This control loop has since
long been used for understanding the human participation in
the complex C2 problem. Major roles of C2 of air defense
systems are threat assessment (TA) and weapon allocation
1 Institute for Systems Studies and Analyses, Defence Research and Development Organization, Metcalfe House, Delhi-110054, India.
2
DAS & MUKHERJEE: AGENT BASED DECISION MAKING FOR AIR DEFENSE SYSTEM
GCCC
LCCC1
LCCC2
…
LCCCn
SRdr11
…
SRdr13
AB11
AB13
TRdr111
SAM111
AP111
…
TRdr131
SAM131
AP131
Figure 1.
Hierarchical structure of a standard IAD system.
(WA). The objective of this study is to apply the practical
reasoning process of human decision makers to develop
autonomous agents responsible for TA and WA. The BDI
architectures are most suitable for
the
philosophical tradition of understanding practical reasoning.
These architectures are also suitable for developing team of
agents as similar to the hierarchical structure of air defense
system.
implementing
This paper is intended to contribute the application of BDI
architectures, as an extension of the goal based agent
architecture, for developing the decision making agents for an
IAD system. Main concern is to formulate the mental
attributes of a human decision maker in terms of belief, desire
and intension. This is a novel methodological application of
agent based modelling for IAD system and a technology
integration between agent oriented programming and Java
based combat simulation model. Two decision making agents
are proposed. The first one is related with identification of
jamming by surveillance radar in battlefield and the second
one is related with TA and WA. A brief discussion is
presented about the deployment status of these agents in a
simulated air combat scenario along with the lessons learned
from this study.
IAD SYSTEM
Air defense system has progressed steadily over recent years
to include highly sophisticated mission planning tools and
artificially intelligent capabilities [14, 15]. The Air force
mission support system (AFMSS, [14]), Power Scene and
Top Scene [14] all represent major advances in this field. Up
to now, most IAD operations consist of large teams of human
operators that control the IAD‟s actions.
The idea of using multi agent system (MAS) for weapons and
targets management in IAD is appropriate for distributed
architectures. In cooperative MAS, agents work together to
achieve one or more desired common goals. The overall
system goal is achieved through interactions and coordination
of the individual agents [3]. A distributed agent team has
advantages over a single, complex agent in many applications
[16]. For example, for search and rescue operations, multiple
robots can forage far more effectively than a single, complex
robot [17].
COMMAND AND CONTROL OF IAD SYSTEM
This section is intended to identify the possible information
processing agents for performing the task of C2 in an IAD
system. C2 of air defense system of most of the countries
follow certain hierarchical structure. Information is being
exchanged between different levels of this structure. The
Global Command and Control Centre (GCCC), Local
Command and Control Centre (LCCC), Surveillance Radar
(SRdr), Airbase Cadre (AB), tracking radar (TRdr), surface to
air missile (SAM), aircraft pilot (AP) are the different
components of an IAD system. The main roles of these
components are target detection and classification, threat
assessment (TA) and weapons allocation (WA).
Figure 1 shows the hierarchical structure of a standard IAD
system. The directions of flow of information between
different levels are shown by arrows. The arrow with dashed
line is purposely used to represent that command is passing
from higher to lower level. At the top of the tree is the higher
command unit which is known as the Global Command And
Control Centre (GCCC). Therefore in a MAS set-up these are
identified as one agent; namely the GCCC agent.
The GCCC agent first analyses the decisions given by the
different LCCCs located at diverse locations and takes its
own decision then passes it to the next level of the command
units i.e. to AB. The LCCC unit is identified as the second
agent. This agent analyses the information given by the
different SRdr(s) at diverse locations and takes their own
decision based on its perception and passes it to the GCCC
agent. The SRdr is the third type of agent. The LCCC agents
decide which target to engage and which weapon to allocate
to that target. The AB is identified as the fourth type of
agents. Based on the decisions given by the LCCC agent, the
AB agent decides which TRdr to track which target and
which SAM to engage which target. The TRdr and the SAM
systems are considered to be the fifth type of agents. Based
on the decisions given by the AB agent these agents engage
targets. In this study only two agents (namely, SRdr and
LCCC agent) are designed and implemented to show the
paradigm shift of agent based decision making for an IAD
system.
JOURNAL OF BATTLEFIELD TECHNOLOGY VOL 14, NO 1, MARCH 2011
3
Figure 2. Working principal of surveillance radar agent, nt stands for number of targets detected at time t. X
denotes target detected and X denotes the hidden target.
Figure 3. LCCC agent (4), prioritizing the clusters (1) and performing autonomously the target-interceptor
pairing (action) (3). Different targets (2) are grouped in different clusters (1) by MSDF module. For
prioritizing the clusters the LCCC agent uses the VAVP values (5).
BDI ARCHITECTURES OF C2 AGENTS
Two main questions are answered while constructing the BDI
architectures of the C2 agents. First one is what goals
(options or desires) the agent decides to achieve with its
current beliefs about the environment and second is how it is
going to achieve these chosen goals (intensions) by means of
some actions. These issues are resolved from the practical
reasoning applied by the human experts to the air defense
domain.
A. BDI architectures of the surveillance radar agent
Surveillance radars are required to detect aircrafts or missiles
flying towards them and often misdirected or confused by the
enemy targets that uses noise jamming. The experienced
radar operators can detect jamming and they generally decide
to keep the radar switch off in such situation. The goal of the
SRdr agent is to protect the radar from the noise jamming.
From the intensity of jamming this agent can decide which
action will be suitable for the radar.
The SRdr agent measures the intensity of jamming from the
difference between the numbers of targets detected at time
t+1 and t. If the difference is significant, the radar is jammed.
The working principal of SRdr agent is shown in the Figure
2. The SRdr agent is assumed to be deployed in the simulated
environment. It receives the information like "numbers of
targets (nt)" detected at time t from its environment. On the
basis of nt+1 and nt it identifies the occurrence of noise
jamming. An index is defined for this purpose namely
Normalized Target Difference (NTD = ((nt-nt+1)/nt )). On
the basis of the NTD values it decides what action it should
perform based on its belief. The main action of the SRdr
agent is to perform target detection in a jamming free
environment. Depending on the NTD values, the SRdr agent
can stay either in any two of the four states namely "Sense
Mode", "Sleep Mode", "Switch Off" and "Frequency
Hopping". If the "Jamming" is found then it can go either in
"Switch Off" or in "Frequency Hopping" mode.
B. BDI architectures of the LCCC agent
X X X X X X X X X X X X X X X X X X time = t time = t + t time = t1 time = t2 time = t3 time = t4 nt= 5 n t + t = 2 NTD = 0.6 Jammed Frequency Switch Off (if NTD>0.5) Hopping (if NTD > 0.75) (if 0.5< NTD <0.75) Z Z X X X V11 Y Y Y V-2,-2 V-1,-2 V0,-2 V1,-2 V2,-2 V-2,-1 V-1,-1 V0,-1 V1,-1 V2,-1 V-2,0 V-1,0 V0,0 V1,0 V2,0 V-2,1 V-1,1 V0,1 V11 V2,1 V-2,2 V-1,2 V0,2 V12 V2,2 1 2 3 4 5 Cluster 1 Cluster 2 Cluster 3 4
DAS & MUKHERJEE: AGENT BASED DECISION MAKING FOR AIR DEFENSE SYSTEM
Initialize clock = 0, simulation_time = 60, LCCC agent A;
Input: cluster id, package size, mission type, cluster locations, number or attacking aircraft. VAVP locations, interceptor locations.
Output: target priority list, target-interceptor pairing.
1.
2. While ( clock < simulation_time)
3.
4.
5. Endwhile
A.distance () ;
Clock ++ ;
3. A.distance ()
Start:
3.1. Compute distances (d1, d2) between clusters and VAVP and clusters and interceptors;
3.2. Add the distances in a beliefset-1 and beliefset-2 respectively.
3.3. Add attacking aircraft ranking in a beliefset-3.
3.4. Add attacking aircraft and interceptor availability separately in beliefsets-4 and 5 respectively;
3.5. Post an event (ev1) confirming that all belief updating is complete;
3.6. Meta-level plan reasoning using beliefset-1 to find closest clusters;
3.7. Post the closet cluster information by an event ev2.
3.8. Meta level plan reasoning using beliefsets-2 and 5 to find closet interceptor.
3.9. Post the cluster-interceptor pairing with an event ev3.
3.10. Meta level plan reasoning using beliefsets-3 and 4 to find closet attacking aircraft in the cluster.
3.11. Update the beliefsets-4 and 5.
End
Figure 4. Algorithm for implementing the LCCC agent.
Initialize clock = 0, simulation_time = 60, Surveillance Radar Agent S;
Input: number of targets (n) at t and t+1.
Output: identifying jamming, and action against jamming.
1.
2. While ( clock < simulation_time)
3.
4.
5. Endwhile
S.update (clock) ;
Clock ++ ;
3. S.update (clock)
Start :
3.1. Calculate NTD as ratio of nt / nt-1.
3.2. Add the NTD and clock time in beliefset-1.
3.3. Automatically post an event (ev1) containing NTD value and clock time.
3.4. Meta level plan reasoning (plan-1) for no action if NTD value is less than 0.5.
3.5. Meta level plan reasoning for action against jamming (plan-2) if NTD value is greater than 0.5.
3.6. Posting an event ev2 from plan-2 containing NTD value and clock time.
3.7. Meta level plan reasoning for frequency hopping action (plan-3) if NTD value lies between 0.5 to 0.75.
3.8. Meta level plan reasoning to switch off the radar (plan-4) if NTD value is greater than 0.75.
End
Figure 5. Algorithm for implementing the surveillance radar agent.
The LCCC agent is responsible for TA and WA. This agent
gets inputs from the multisensory data fusion (MSDF)
module. The MSDF groups the detected targets into different
clusters and sends the cluster information (cluster identity,
cluster location) along with the situational assessed inputs
about the enemy‟s intent (like mission type i.e. strike or
escort, package size i.e. small or large). Based on this
information and the LCCC agent‟s own beliefs (like VAVP
(vulnerable area and vulnerable points) value), LCCC agent
prioritizes the clusters and allocate interceptor to the
attacking aircraft. Figure 3 shows the LCCC agent residing in
a grid environment, evaluating the threat and prioritizing
targets along with target-interceptor pairing. For finding the
closest cluster this agent uses the meta-level plan reasoning
(MLPR) process based on the distance measure. The goal of
the LCCC agent is to optimally engage the detected targets
with its available interceptors subject to the restriction that no
target gets engaged by more than one interceptor.
META LEVEL PLAN REASONING
In this study, the concept of MLPR [3, 4, 9] is used
extensively by the C2 agents for taking optimal decisions.
MLPR is a method of selecting the appropriate plan from the
plan library to satisfy the agent‟s goal. This method is
generally used for BDI agent implementation. The actions in
MLPR are supposed to be optimal in some respect.
Sometimes, MLPR can also be used to enable the agent to
learn from the changing environment.
MLPR is implemented by using the getInstanceInfo() library
function provided by the JACK [17]. The getInstanceInfo()
method calculates the ranking of a plan by a PlanInstanceInfo
object. The ranking is done by calculating one index which is
a function of distance, mission type and package size.
Mission types and package sizes are assumed to be fuzzy set.
The membership values of these variables are obtained by
JOURNAL OF BATTLEFIELD TECHNOLOGY VOL 14, NO 1, MARCH 2011
5
(a)
(b)
Figure. 6. Architecture of (a) surveillance radar agent and (b) LCCC agents developed through JACK agent
programming language. Abbreviations: b: beleifset, ev: event, p: plan, H: handles, P: posts, M:modifies,
A: add, NTD: Normalized target difference.
example,
using a trapezoidal membership function. Each distance,
package size and mission type generates a distinct plan
(Figure 7). The plan with maximum ranking get selected by
the getInstanceInfo() function. In this way MLPR capability
is incorporated in the LCCC agent‟s architectures. The events
are posted either by the LCCC agent itself or by other plans.
(namely
For
the
NewClusterPriorityEvents)
the plan
"NewClusterPlan" when this plan is selected by the agent. In
the similar way the interceptor aircraft of the defender force
is allocated to the nearest aircraft. While allocating an
interceptor to the aircraft the agent also checks its availability
status so that multiple allocations do not take place. The
agent‟s algorithms are shown in the Figures 4 and 5 and
implemented through the JACK agent programming language
as shown in the Figure 6 (a and b).
ev2
from
event
is posted
The agent can decide which of the plans are applicable for a
particular event using either the three functions separately or
together. First one is the relevant() function. The agent uses
this function to select the plans that can handle such
particular event. Second is the context() function. This
function is used to select plan instances which are consistent
with the agent's current beliefs. If there are still multiple
plans left in the applicable plan set, the JACK provides the
getInstanceInfo() function to return a PlanInstanceInfo
object. This class has the def() method which can return the
rank of the plan. The MLPRs of the "NewClusterPlan" of the
LCCC agent and "Radar is Jammed" plan of the SRdr agent
are shown in the Figure 7. The rank of the "NewClusterPlan"
plan instance is the function of normalized distance between
the cluster mean and the VAVP value, package size and
mission type. The SRdr agent uses the relevant() function for
MLPR where as the LCCC agent uses both the context() and
the getInstanceInfo() functions together.
EVALUATION
Two approaches are used for evaluating the C2 agents. First
approach is the logical evaluation and second approach is the
statistical evaluation. Although logical evaluation is the most
widely used method for agent research, it can not quantify the
performance of the agents. A solution could be to use logical
evaluation for
the deadlock situations and
quantifying the performance by statistical measures. The
logical verification rectifies the conflicting/multiple goal
situations in the system. The statistical hypothesis testing
measures the performance of the agents.
identifying
A. Logical Evaluation
First approach is based on the logical verification of the
agent‟s model. In logical verification, the concept of goal
inference rule (gir) is used for detecting the conflicting goals
in the system ([12]). The girs‟ for SRdr agents is defined as
in the Figure 8. For example the gir,
{Jammed} ,{Frequency Hopping}k- Switch Off
represents that if the SRdr agent is Jammed (belief state
denoted by ), it may derive the goal to go for the "Switch
Off" plan (denoted by 1), but the goal to go for the
"Frequency Hopping" (denoted by 2) is in conflict (denoted
by k- ,where as k+ denotes non-conflicting goals)with the
goal to go for the "Switch off" plan (see Figure 8).
The girs are extended to default logic ([12]). The gir helps to
find out any sort of conflicting goals present in the model.
Consider that one wants to express that if a SRdr agent is
found "Jammed", it may go either for the "Switch Off" or
"Frequency Hopping" mode, but should not simultaneously
pursue these goals simultaneously, i.e., the goals "Switch Off"
6
DAS & MUKHERJEE: AGENT BASED DECISION MAKING FOR AIR DEFENSE SYSTEM
context()
{
ClusterPriority.get ($cls_id, $pck_size, $msn_type, $vavp_id, $distance);
}
static boolean relevant(Antijam ev)
{
return (ev.NTD >0.75);
}
public PlanInstanceInfo getInstanceInfo()
{
try {
if ($pck_size.equals("Big")) value1 = 2; else value1 = 1;
if ($msn_type. Equals("Strike")) value2 = 2; else value2 = 1;
rank = (int) ($distance.as_double() / 100.0 + value1 / 2 + value2 / 2);
return PlanInstanceInfo.def [9-rank]; }
catch (LogicException ex) { return PlanInstanceInfo.def [0]; }
}
Figure 7 Meta level plan reasoning by context(), relevant(), and getInstanceInfo() functions. The relevant() method in
this diagram is part of the "Radar is Jammed" plan of the surveillance radar agent. The context() and
getInstanceInfo() functions are part of the "NewClusterPlan" plan of the LCCC agent.
and "Frequency Hopping" are conflicting. Moreover, if a
SRdr agent has "Switch Off" mode, it wants to go "Sleep
Mode" with it, if it is in the "Frequency Hopping" mode, it
wants to remain in the "Sense Mode". This could be modeled
using the girs, as shown in the Figure 8.
as given in the Figure 9. Probability of false alarm plays a
vital role in the correct detection of jamming. Although a
single value of false alarm (i.e. 5%) is taken in this study, the
performance measure of the agent can be simulated for other
values of Pf.
Another form of logical evaluation adopted in the study is
representing the entire mechanism in the form of operational
semantics [11]. In this approach first agent model is grounded
with state-based semantic, then denotational semantics are
used to define the mathematical relation connecting agent
logic and agent programming. The operational semantic, state
based semantic, model semantic of LCCC agent use a
propositional language (L0) to represent their environment
with the operators like (conjunction), (disjunction) and
(negation). The L0 is infinite set of atomic proposition that
uses entailment ( = ) relation. The operational semantic
defines the input-output relation as a compositional function
mapping from initial states to the final state reached upon
termination. The state based semantics provides
the
ingredients for defining the operational semantics. The
denotational semantics provides the semantics for a modal
logic of agent programs [11].
B. Statistical Evaluation
This evaluation is based on the classical statistical approach
of hypothesis testing. The assumed hypothesis (also called
Null hypothesis, H0) is that the output data of the agent model
follows certain perfect statistical distribution.
The SRdr agent acts accordingly to the distribution pattern of
the number of targets detected (nt). The cut off value of the
NTD has a role in the performance measure of the SRdr
agent. If the number of targets detected (nt) follows the
Gaussian random distribution then the NTD follows the
Student's- t distribution. Some other form of transformations
is given in the Table 1.
The decision of correct detection of jamming is a classical
statistical problem of finding signal in the background of
random noise. The Kolmogorov-Smirnov (KS) statistic is
used to determine the underlying distribution pattern of NTD
To test the SRdr agent performance, 500 random numbers
were generated using the Gaussian random distribution with
mean and standard deviation equal to 20 and 10 respectively.
On the generated data, the NTD index is calculated. It is
found that after NTD transformation, the Gaussian random
number
statistical
distribution which is very similar to the Student's- t
distribution with parameter v = 2. If it is assumed that the nt
follows some other statistical distribution then the resulting
distributions of NTD would be of the form given in the Table
1.
into another
transforms
form of
The SRdr agent‟s algorithm is applied to the generated data.
The result of the simulation after applying the SRdr agent‟s
logic is shown in the Table 2. This table shows that out of
total 500 samples, 231 times (i.e. 41 %) the radar is found to
be jammed. This statistic is close to the Jamming Factor
(which was introduced in the simulation as random noise). It
was found that 91 times the radar is found "Switch Off". So it
has saved around 19% of the energy. Although the simulation
was started with Gaussian random data, after applying the
agent‟s logic the data transformed into statistical distribution
which is very similar to the Binomial distribution (because
the transformed data, the decisions, were either "Switch On"
or "Switch Off"). The closeness of this distribution is
measured by the KS statistic as shown in the Figure 9. This
statistic is used for performance measure of this agent. This
performance measure could be used to add the learning
capability in the agents.
For the LCCC agent, experiments have been performed with
three clusters, three types of cluster size (i.e. large, medium
and small) and two types of mission objectives (i.e. strike and
escort). So, total eighteen (3 3 2) possibilities of plans
instances are generated. Therefore, search space consists of
eighteen combinations. Hence, it is obvious with the increase
JOURNAL OF BATTLEFIELD TECHNOLOGY VOL 14, NO 1, MARCH 2011
7
Goal : K : if to achieve goal k for given belief then perform the plan .
Goal Inference Rule (gir):
{Jammed} ,{Frequency Hopping}k- Switch Off
{Jammed} ,{Switch Off}k- Frequency Hopping
{Frequency Hopping}k+ Sense Mode
{Switch Off}k+ Sleep Mode
Tautology : Frequency Hopping, Switch Off / Switch Off,
Tautology : Switch Off, Frequency Hopping / Frequency Hopping,
Frequency Hopping: Sense Mode / Sense Mode,
Switch Off: Sleep Mode / Sleep Mode.
Extension : {Switch Off, Sleep Mode}, {Frequency Hopping, Sense Mode}
Goal : G{Switch Off Sleep Mode}, G{Frequency Hopping Sense Mode}
Conflicting Goal :
G{Switch Off Frequency Hopping},
G{Sense Mode Sleep Mode},
G{Switch Off Sense Mode},
G{Frequency Hopping Sleep Mode}
Figure 8. Goal inference rule (gir) [12] for logical verification of surveillance radar agent.
G stands for goal.
of search space computation time taken by the agent
decreases. Similarly, the number of VAVP points also
influences the agent‟s performance. Although in this study
only the VAVP points are considered in the agent‟s beliefs,
the number of interceptor also influences the agent‟s
performance, therefore, can be included in the beliefset. In
general, the number of domains of the input parameters
determines the performance of the agents. Search space will
increase multiplicatively with the increase of the domain size.
Computation time to take an optimal decision using MLPR is
effected by these factors.
from
input
influences
the MSDF module
The
the
computation time required by the LCCC agent. It is found
that the number of cluster has direct influences on the
performance of the LCCC agents. In this study, only three
clusters are considered. How the agent will perform with
many clusters have not been studied. Similarly when the
number of mission type and cluster size changes it directly
influences the ranking of the plan instance.
DISCUSSION AND CONCLUSIONS
like
entities
aircrafts,
attacking
The SRdr and LCCC agents are deployed in a simulated
environment of air combat. The simulation is designed with
several
defending
interceptors, surveillance radars, air to air and surface to air
missiles, tracking radars. The simulated environment is
created by Java Netbeans IDE [18]. The agents are
programmed by the JACK agent programming language [17].
JACK supports BDI architectures and MLPR. The data
generated by this simulation are stored in the Oracle [19]
database. The output actually contains the information about
the states conditions of the environment and agents. The
agents analyse the environment and write their decisions
again in this database. The initial belief of the SRdr agent is
that no jamming has occurred. Over the time this agent keeps
on reading data from the database and adds it to its belief set
which automatically posts an event if it is greater than 0.5 (a
threshold value decided by the experts) as an indication of
noise jamming. The MSDF module collaboratively assess the
data obtain by different sensors and writes in the database.
The LCCC agent receives inputs from the MSDF output
through this database and decides accordingly. Based on
these decisions, resources are allocated to the attacking
aircrafts.
On each run of the simulation state situation of both the
environment and the agents are observed. The agents are
programmed such a way that these can automatically detect
any conflicting goal situation. For example, the SRdr agent
checks its present states and if it finds any conflicting states
situation as shown in the Figure 8 it throws an exception. In
this way the agent model is validated logically. For statistical
performance evaluation, the KS statistic is used. The KS
statistic with a lower value is always preferable.
is
in
this work
The main point emphasized
the
implementation details. Also, the MLPR is introduced so
agents can choose the right plan for the plan-repository using
a prioritizing mechanism. Such reasoning and the way it is
implemented can be used for many different application
domains. Main contribution of the paper is combining agent-
oriented programming with a Java based simulation
environment and implementing this for an IAD domain. Main
focus of the work is on how it is done and a significant effort
has been put in implementing these ideas. Given the level of
details it is certain that an advanced system may be
developed for further research is this field.
The present approaches of design, implementation and testing
of agent based system are found to be more suitable for
hierarchical structure of C2 that works on the principle of
practical reasoning. The way BDI architectures are used for
developing the C2 agents can be extended to build higher
order team agents. This could be a general frame work for
implementing decision making processes in an integrated
mode. The traditional optimization technique used for TA for
air defense system can be brought into this framework very
easily. This is an integrated approach of decision making for
selecting the optimal plan satisfying the agent‟s beliefs to
8
DAS & MUKHERJEE: AGENT BASED DECISION MAKING FOR AIR DEFENSE SYSTEM
No. of Targets Detected
Normalized Target
with parameters
Difference
Normal (20,10)
Student‟s t (2)
Triangular (20,10,30)
Gamma (=12.06, =0.08)
Uniform (10,30)
Gamma (=4.90,=0.22)
Exponential (10,20)
Laplace (=185.71,=1.0)
Table 1. Distribution pattern of Normalized Target
the
of
Difference
as
transformation
numbers of targets detected (nt).
from
distribution
obtained
of
Events
Number/ Percentage
Total Samples
500
Jamming
Frequency Hopping
Switch Off
231(46.2%)
134(26.8%)
97(19.4%)
Table 2. Simulation result of the surveillance radar
agent.
achieve desired goals. Usual methods of decision making do
not integrate the decision maker‟s beliefs and desires in direct
way although these components are essential attributes. This
approach is more suitable for futuristic network centric
warfare. The approach
terms of both
implementation (MLPR) and validation (logical as well as
statistical).
is novel
in
REFERENCES
[1] http://www.mindef.gov.sg/content/dam/imindef_media_l
ibrary/photos/scme/0015.res.
[2] http://www.dodccrp.org/events/12th_ICCRTS/Papers/01
0.pdf.
[3] G. Weiss, "Multiagent systems, a modern approach to
distributed modern approach to artificial intelligence,"
The MIT press, Cambridge, Massachusetts, 1999, pages-
585.
[4] R. H. Bordini, M. Dastani, J. Dix, A. E.F. Seghrouchni,
Multi-agent programming, languages, platforms and
applications, Springer, pages 313, 2005.
[5] A. Rogers et al., "Agent technologies for sensor
networks," IEEE Intelligent Systems, pp. 13-16, April,
2009.
[6] A. Pellecchia, C. Igel, J. Edelbrunner and G. Schoner,
"Making driver modeling attractive," IEEE Intelligent
Systems, pp. 8-12, 2005.
[7] M. Sensoy and P. Yolum, "Evolving service semantics
cooperatively: a consumer -driven approach", Auton.
Agent Multi-Agent Syst. 18, pp. 417-470, 2009.
[8] L. C. Bazzan, "Opportunities for multiagent systems and
multiagent reinforcement learning in traffic control",
Auton. Agent Multi-Agent Syst. 18, pp. 342-375, 2009.
[9] B. Subagdja, l. Sonenberg and I. Rahwan, "Intentional
learning agent architecture," Auton. Agent Multi-Agent
Syst. 18, pp. 417-470, 2009.
[10] S. Koenig, X. Sun, "Comparing
real-time and
incremental heuristic search for real time situated
agents," Auton. Agent Multi-Agent Syst., 18, pp. 313-341,
2009.
Figure 9. Kolmogorov Smirnov
statistics
agent's performance measurement.
for
[11] K. V. Hindriks, J.J. C. Meyer, "Toward a programming
theory for rational agents," Auton. Agent Multi-Agent
Syst. 19, pp. 4-29, 2009.
[12] M. Birna van Riemsdijk and M. Dastani, "Goals in
conflict: semantic foundations of goals
in agent
programming," Auton. Agent Multi-Agent Syst., 18, pp.
471-500, 2009.
[13] S. Karim, C. Heinze and S. Dunn, "Agent-based mission
management for a UAV", IEEE-ISSNIP 2004, pp. 481-
486, 2004.
[14] D. S. Alberts, J.J. Garstka and F. P. Stein, "Network
centric warfare, developing and leveraging information
superiority," 2nd Edn. (Revised), CCRP publication
series, 287 pages, (1999).
[15] L. Adelman, M. Christian, J. Gualtieri & T.A. Bresnick,
„Examining the effects of communication training and
team composition on the decision making of patriot air
defense teams‟, IEEE Trans Sys. Man Cyb. A28, 729 -- 41,
(1998).
[16] T. Balch. The impact of diversity on performance in
multi-robot foraging. In Proceedings of the third annual
conference on Autonomous Agents, pages 92 -- 99. ACM
Press, 1999.
[17] JACK®, Development Environment. Agent Oriented
Software Pty. Ltd., P.O. Box 639, Carlton South,
Victoria 3053, Australia..
[18] http://netbeans.org/
[19] http://www.oracle.com/in/index.html
[20] Q. Changwen and H. You, "A method of threat
assessment using multiple attribute decision making,",
IEEE, 2002 6th International Conference on Signal
Processing, vol.2, pp. 1091- 1095, Aug. 2002.
Dr Sumanta Kumar Das and Mr. Sumant Mukherjee are scientists in
the Institute for Systems Studies and Analyses, Defence Research
and Development Organization, Ministry of Defence, Delhi, India.
Both of them are working together for developing the agent based
models for integrated air defense system especially for network
centric warfare. E-mail: [email protected].
|
1412.1468 | 2 | 1412 | 2015-06-18T07:20:45 | Information-Sharing over Adaptive Networks with Self-interested Agents | [
"cs.MA"
] | We examine the behavior of multi-agent networks where information-sharing is subject to a positive communications cost over the edges linking the agents. We consider a general mean-square-error formulation where all agents are interested in estimating the same target vector. We first show that, in the absence of any incentives to cooperate, the optimal strategy for the agents is to behave in a selfish manner with each agent seeking the optimal solution independently of the other agents. Pareto inefficiency arises as a result of the fact that agents are not using historical data to predict the behavior of their neighbors and to know whether they will reciprocate and participate in sharing information. Motivated by this observation, we develop a reputation protocol to summarize the opponent's past actions into a reputation score, which can then be used to form a belief about the opponent's subsequent actions. The reputation protocol entices agents to cooperate and turns their optimal strategy into an action-choosing strategy that enhances the overall social benefit of the network. In particular, we show that when the communications cost becomes large, the expected social benefit of the proposed protocol outperforms the social benefit that is obtained by cooperative agents that always share data. We perform a detailed mean-square-error analysis of the evolution of the network over three domains: far field, near-field, and middle-field, and show that the network behavior is stable for sufficiently small step-sizes. The various theoretical results are illustrated by numerical simulations. | cs.MA | cs | Information-Sharing over Adaptive Networks with
Self-interested Agents
Chung-Kai Yu, Student Member, IEEE, Mihaela van der Schaar, Fellow, IEEE, and Ali H. Sayed, Fellow, IEEE
1
5
1
0
2
n
u
J
8
1
]
A
M
.
s
c
[
2
v
8
6
4
1
.
2
1
4
1
:
v
i
X
r
a
Abstract -- We examine the behavior of multi-agent networks
where information-sharing is subject to a positive communi-
cations cost over the edges linking the agents. We consider
a general mean-square-error formulation where all agents are
interested in estimating the same target vector. We first show
that, in the absence of any incentives to cooperate, the optimal
strategy for the agents is to behave in a selfish manner with
each agent seeking the optimal solution independently of the
other agents. Pareto inefficiency arises as a result of the fact
that agents are not using historical data to predict the behavior
of their neighbors and to know whether they will reciprocate and
participate in sharing information. Motivated by this observation,
we develop a reputation protocol to summarize the opponent's
past actions into a reputation score, which can then be used
to form a belief about the opponent's subsequent actions. The
reputation protocol entices agents to cooperate and turns their
optimal strategy into an action-choosing strategy that enhances
the overall social benefit of the network. In particular, we show
that when the communications cost becomes large, the expected
social benefit of the proposed protocol outperforms the social
benefit that is obtained by cooperative agents that always share
data. We perform a detailed mean-square-error analysis of the
evolution of the network over three domains: far field, near-field,
and middle-field, and show that the network behavior is stable
for sufficiently small step-sizes. The various theoretical results
are illustrated by numerical simulations.
Index Terms -- Adaptive networks, self-interested agents, repu-
tation design, diffusion strategy, Pareto efficiency, mean-square-
error analysis.
I.
INTRODUCTION
A DAPTIVE networks enable agents to share information
and to solve distributed optimization and inference tasks
in an efficient and decentralized manner. In most prior works,
agents are assumed to be cooperative and designed to fol-
low certain distributed rules such as the consensus strategy
(e.g., [2] -- [10]) or the diffusion strategy (e.g., [11] -- [19]). These
rules generally include a self-learning step to update the
agents' estimates using their local data, and a social-learning
step to fuse and combine the estimates shared by neighboring
agents. However, when agents are selfish, they would not obey
the preset rules unless these strategies conform to their own
interests, such as minimizing their own costs. In this work,
Copyright (c) 2015 IEEE. Personal use of this material
is permitted.
However, permission to use this material for any other purposes must be
obtained from the IEEE by sending a request to [email protected].
This work was supported in part by NSF grants CCF-1011918, CSR-
1016081, and ECCS-1407712. An early short version of this work appeared
in the conference publication [1]. The authors are with the Department of
Electrical Engineering, University of California, Los Angeles, CA 90095-1594
USA (e-mail: [email protected], {mihaela,sayed}@ee.ucla.edu).
we assume that the agents can behave selfishly and that they,
therefore, have the freedom to decide whether or not they want
to participate in sharing information with their neighbors at
every point in time. Under these conditions, the global social
benefit for the network can be degraded unless a policy is
introduced to entice agents to participate in the collaborative
process despite their individual interests. In this article, we
will address this difficulty in the context of adaptive networks
where agents are continually subjected to streaming data, and
where they can predict in real-time, from their successive
interactions, how reliable their neighbors are and whether they
can be trusted to share information based on their past history.
This formulation is different from the useful work in [20],
which considered one particular form of selfish behavior in
the context of a game-theoretic formulation. In that work, the
focus is on activating the self-learning and social learning steps
simultaneously, and agents simply decide whether to enter into
a sleep mode (to save energy) or to continue acquiring and
processing data. In the framework considered in our work,
agents always remain active and are continually acquiring data;
the main question instead is to entice agents to participate
in the collaborative information-sharing process regardless of
their self-centered evaluations.
More specifically, we study the behavior of multi-agent
networks where information-sharing is subject to a positive
communication cost over the edges linking the agents. This
situation is common in applications, such as information
sharing over cognitive networks [21], online learning under
communication bandwidth and/or latency constraints
[22],
[23, Ch. 14], and over social learning networks when the
delivery of opinions involves some costs such as messaging
fees [24] -- [26]. In our network model, each agent is self-
interested and seeks to minimize its own sharing cost and
estimation error. Motivated by the practical scenario studied
in [21], we formulate a general mean-square error estimation
problem where all agents are interested in estimating the same
target parameter vector. Agents are assumed to be foresighted
and to have bounded rationality [27] in the manner defined
further ahead in the article. Then, we show that if left unat-
tended, the dominant strategy for all agents is for them not
to participate in the sharing of information, which leads to
networks operating under an inefficient Pareto condition. This
situation arises because agents do not have enough information
to tell beforehand if their paired neighbors will reciprocate
their actions (i.e., if an agent shares data with a second agent,
will the second agent reciprocate and share data back?) This
prediction-deficiency problem follows from the fact that agents
are not using historical data to predict other agents' actions.
One method to deal with this inefficient scenario is to
assume that agents adapt to their opponents' strategies and
improve returns by forming some regret measures. In [28], a
decision maker determines its action using a regret measure to
evaluate the utility loss from the chosen action to the optimal
action in the previous stage game. For multi-agent networks,
a regret-based algorithm was proposed in [20] and [29] for
agents to update their actions based on a weighted loss of the
utility functions from the previous stage games. However, these
works assume myopic agents and formulate repeated games
with fixed utility functions over each stage game, which is
different from the scenario considered in this article where
the benefit of sharing information over adaptive networks con-
tinually evolves over time. This is because, as the estimation
accuracy improves and/or the communication cost becomes
expensive, the return to continue cooperating for estimation
purposes falls and thus the act of cooperating with other agents
becomes unattractive and inefficient. In this case, the regret
measures computed from the previous stage games may not
provide an accurate reference to the current stage game.
In the performance evaluation, we are interested in ensuring
A second useful method to deal with Pareto inefficient and
non-cooperative scenarios is to employ reputation schemes
(e.g., [30] -- [33]). In this method, foresighted agents use rep-
utation scores to assess the willingness of other agents to
cooperate; the scores are also used to punish non-cooperative
behavior. For example, the works [31], [32] rely on discrete-
value reputation scores, say, on a scale 1-10, and these scores
are regularly updated according to the agents' actions. Similar
to the regret
in our
problem the utilities or cost functions of stage games change
over time and evolve based on agents' estimates. Conventional
reputation designs do not address this time variation within
the payoff of agents, which will be examined more closely in
our work. Motivated by these considerations, in Sec. IV, we
propose a dynamic/adaptive reputation protocol that is based
on the belief measure of future actions with real-time benefit
predictions.
learning references mentioned before,
In our formulation, we assume a general random-pairing
model similar to [10], where agents are randomly paired at the
beginning of each time interval. This situation could occur, for
example, due to an exogenous matcher or the mobility of the
agents. The paired agents are assumed to follow a diffusion
strategy [12] -- [15], which includes an adaptation step and a
consultation step, to iteratively update their estimates. Different
from conventional diffusion strategies, the consultation step
here is influenced by the random-pairing environment and by
cooperation uncertainty. The interactions among self-interested
agents are formulated as successive stage games of two players
using pure strategies. To motivate agents to cooperate with
each other, we formulate an adaptive reputation protocol to
help agents jointly assess the instantaneous benefit of de-
preciating information and the transmission cost of sharing
information. The reputation score helps agents to form a belief
of their opponent's subsequent actions. Based on this belief,
we entice agents to cooperate and turn their best response
strategy into an action choosing strategy that conforms to
Pareto efficiency and enhances the overall social benefit of
the network.
2
the mean-square-error stability of the network instead of exam-
ining equilibria as is common in the game theoretical literature
since our emphasis is on adaptation under successive time-
variant stage games. The performance analysis is challenging
due to the adaptive behavior by the agents. For this reason,
we pursue the mean-square-error analysis of the evolution
of the network over three domains: far-field, near-field, and
middle-field, and show that the network behavior is stable
for sufficiently small step-sizes. We also show that when
information sharing becomes costly, the expected social benefit
of the proposed reputation protocol outperforms the social
benefit that is obtained by cooperative agents that always share
data.
Notation: We use lowercase letters to denote vectors and
scalars, uppercase letters for matrices, plain letters for deter-
ministic variables, and boldface letters for random variables.
All vectors in our treatment are column vectors, with the
exception of the regression vectors, uk,i.
II. SYSTEM MODEL
A. Distributed Optimization and Communication Cost
Consider a connected network consisting of N agents.
When agents act independently of each other, each agent k
would seek to estimate the M × 1 vector wo that minimizes
an individual estimation cost function denoted by J est
k (w) :
CM → R. We assume each of the costs {J est
k (w)} is strongly
convex for k = 1, 2, . . . , N, and that all agents have the
same objective so that all costs are minimized at the common
location wo ∈ CM×1.
In this work, we are interested in scenarios where agents can
be motivated to cooperate among themselves as permitted by
the network topology. We associate an extended cost function
with each agent k, and denote it by Jk(w, ak). In this new
cost, the scalar ak is a binary variable that is used to model
whether agent k is willing to cooperate and share information
with its neighbors. The value ak = 1 means that agent k is
willing to share information (e.g., its estimate of wo) with
its neighbors, while the value ak = 0 means that agent k is
not willing to share information. The reason why agents may
or may not share information is because this decision will
generally entail some cost. We consider the scenario where a
positive transmission cost, ck > 0, is required for each act by
agent k involving sharing an estimate with any of its neighbors.
By taking ck into consideration, the extended cost Jk(w, a)
that is now associated with agent k will consist of the sum of
two components: the estimation cost and the communication
cost1:
Jk(w, ak) (cid:44) J est
k (w) + J com
where the latter component is modeled as
k
J com
k
(ak) (cid:44) akck
(ak)
(1)
(2)
1We focus on the sum of the estimation cost and the communication cost
due to its simplicity and meaningfulness in applications. Note that a possible
generalization is to consider a penalty-based objective function J est
k (w) +
p(J com
k (ak)) for some penalty function p(·).
We express the communication expense in the form (2) be-
cause, as described further ahead, when an agent k decides
to share information, it will be sharing the information with
one neighbor at a time; the cost for this communication will be
akck. With regards to the estimation cost, J est
k (w), this measure
can be selected in many ways. One common choice is the
mean-square-error (MSE) cost, which we adopt in this work.
At each time instant i ≥ 0, each agent k is assumed to
have access to a scalar measurement dk(i) ∈ C and a 1 ×
M regression vector uk,i ∈ C1×M with covariance matrix
Ru,k (cid:44) Eu∗
k,iuk,i > 0. The regressors {uk,i} are assumed
to have zero-mean and to be temporally white and spatially
independent, i.e.,
Eu∗
k,iu(cid:96),j = Ru,kδk(cid:96)δij
the Kronecker delta
(3)
in terms of
function. The data
{dk(i), uk,i} are assumed to be related via the linear regres-
sion model:
(4)
where wo is the common target vector to be estimated by the
agents. In (4), the variable vk(i) ∈ C is a zero-mean white-
v,k that is assumed to be spatially
noise process with power σ2
independent, i.e.,
dk(i) = uk,iwo + vk(i)
Ev∗
v,kδk(cid:96)δij
k(i)v(cid:96)(j) = σ2
(5)
We further assume that the random processes uk,i and v(cid:96)(i)
are spatially and temporally independent for any k, (cid:96), i, and
j. Models of the form (4) are common in many applications,
e.g., channel estimation, model fitting, target tracking, etc (see,
e.g., [15]).
Let wk,i−1 denote the estimator for wo that will be available
to agent k at time i − 1. We will describe in the sequel how
agents evaluate these estimates. The corresponding a-priori
estimation error is defined by
in terms of the estimation error vector
(6)
and it measures how close the weight estimate matches the
measurements {dk(i), uk,i} to each other. In view of model
(4), we can also write
(7)
ea,k(i) (cid:44) dk(i) − uk,iwk,i−1
ea,k(i) = uk,i(cid:101)wk,i−1 + vk(i)
(cid:101)wk,i−1 (cid:44) wo − wk,i−1
(8)
Motivated by these expressions and model (4), the instanta-
neous MSE cost that is associated with agent k based on the
estimate from time i − 1 is given by
k (wk,i−1) (cid:44) Eea,k(i)2
J est
= E(cid:107)(cid:101)wk,i−1(cid:107)2
= Edk(i) − uk,iwk,i−12
+ σ2
(9)
Note that this MSE cost conforms to the strong convexity of
J est
as we mentioned before. Combined with the action by
k
agent k, the extended instantaneous cost at agent k that is
based on the prior estimate, wk,i−1, is then given by:
Ru,k
v,k
Jk(wk,i−1, ak) = Eea,k(i)2 + akck
We will not be assuming fully-connected networks or fully-
paired protocols and will deal more generally with networks
that can be sparsely connected. Later in Sec. IV we will
(10)
B. Random-Pairing Model
3
We denote by Nk the neighborhood of each agent k, includ-
ing itself. We consider a random pairing protocol for agents
to share information at the beginning of every iteration cycle.
The pairing procedure can be executed either in a centralized
or distributed manner. Centralized pairing schemes can be used
when an online server randomly assigns its clients into pairs
as in crowdsourcing applications [31], [32], or when a base-
station makes pairing decisions for its mobile nodes for packet
relaying [34]. Distributed paring schemes arise more naturally
in the context of economic and market transactions [35]. In our
formulation, we adopt a distributed pairing structure that takes
neighborhoods into account when selecting pairs, as explained
next.
We assume each agent k has bi-directional links to other
agents in Nk and that agent k has a positive probability to be
paired with any of its neighbors. Once two agents are paired,
they can decide on whether to share or not their instantaneous
estimates for wo. We therefore model the result of the random-
pairing process between each pair of agents k and (cid:96) ∈ Nk\{k}
as temporally-independent Bernoulli random processes defined
as:
(cid:26)1, with probability pk(cid:96) = p(cid:96)k
1k(cid:96)(i) = 1(cid:96)k(i) =
(11)
0, otherwise
where 1k(cid:96)(i) = 1 indicates that agents k and (cid:96) are paired at
time i and 1k(cid:96)(i) = 0 indicates that they are not paired. We are
setting 1k(cid:96)(i) = 1(cid:96)k(i) because these variables represent the
same event: whether agents k and (cid:96) are paired, which results
in pk(cid:96) = p(cid:96)k. For (cid:96) /∈ Nk, we have 1k(cid:96)(i) = 0 since such pairs
will never occur. For convenience, we use 1kk(i) to indicate
the event that agent k is not paired with any agent (cid:96) ∈ Nk \
{k} at time i, which happens with probability pkk. Since each
agent will pair itself with at most one agent at a time from its
neighborhood, the following properties are directly obtained
from the random-pairing procedure:
pk(cid:96) = 1
(12)
(cid:88)
1k(cid:96)(i) = 1,
(cid:96)∈Nk
1k(cid:96)(i)1kq(i) = 0,
(cid:88)
(cid:96)∈Nk
for (cid:96) (cid:54)= q
(13)
We assume that the random pairing indicators {1k(cid:96)(i)} for all
k and (cid:96) are independent of the random variables {uk,t} and
{vk(t)} for any time i and t. For example, a widely used
setting in the literature is the fully-pairing network, which
assumes a fully-connected network topology [32], [36], i.e.,
Nk = N for every agent k, where N denotes the set of
all agents. The size N = N is assumed to be even and
every agent is uniformly paired with exactly one agent in the
network. Therefore, we have N/2 pairs at each time instant
and the random-pairing probability becomes
for (cid:96) (cid:54)= k
for (cid:96) = k
(cid:40) 1
N−1 ,
0,
pk(cid:96) =
(14)
demonstrate a simple random-pairing protocol which can be
implemented in a fully distributed manner.
agent k is paired with some neighboring agent (cid:96), which means
1k(cid:96)(i) = 1, we get
4
k,i[dk(i) − uk,iwk,i−1]
(15)
(16)
wk,i =
αkψk,i + (1 − αk)ψ(cid:96),i,
if a(cid:96)k(i) = 0
if a(cid:96)k(i) = 1
(21)
C. Diffusion Strategy
Conventional diffusion strategies assume that the agents are
cooperative (or obedient) and continuously share information
with their neighbors as necessary [12], [13], [15]. In the adapt-
then-combine (ATC) version of diffusion adaptation, each
agent k updates its estimate, wk,i, according to the following
relations:
(cid:88)
ψk,i = wk,i−1 + µu∗
α(cid:96)kψ(cid:96),i
wk,i =
(cid:96)∈Nk
where µ > 0 is the step-size parameter of agent k, and the
{α(cid:96)k, (cid:96) ∈ Nk} are nonnegative combination coefficients that
add up to one. In implementation (15) -- (16), each agent k
computes an intermediate estimate ψk,i using its local data,
and subsequently fuses the intermediate estimates from its
neighbors. For the combination step (16), since agent k is
allowed to interact with only one of its neighbors, then we
rewrite (16) in terms of a single coefficient 0 ≤ αk ≤ 1 as
follows:
if 1k(cid:96)(i) = 1 for some (cid:96) (cid:54)= k
otherwise
(17)
We can capture both situations in (17) in a single equation as
follows:
(cid:26)αkψk,i + (1 − αk)ψ(cid:96),i,
wk,i =
ψk,i,
wk,i = αkψk,i + (1 − αk)
1k(cid:96)(i)ψ(cid:96),i
(18)
(cid:88)
(cid:96)∈Nk
In formulation (15) and (18), it is assumed that once agents k
and (cid:96) are paired, they share information according to (18).
Let us now incorporate an additional layer into the algorithm
in order to model instances of selfish behavior. When agents
behave in a selfish (strategic) manner, even when agents k and
(cid:96) are paired, each one of them may still decide (independently)
to refuse to share information with the other agent for selfish
reasons (for example, agent k may decide that this cooperation
will cost more than the benefit it will reap for the estimation
task). To capture this behavior, we use the specific notation
ak(cid:96)(i),
the action taken by
agent k on agent (cid:96) at time i, and similarly for a(cid:96)k(i). Both
agents will end up sharing information with each other only if
ak(cid:96)(i) = a(cid:96)k(i) = 1, i.e., only when both agents are in favor
of cooperating once they have been paired. We set akk(i) = 1
for every time i. We can now rewrite the combination step
(18) more generally as:
instead of ak(i),
to represent
wk,i = αkψk,i + (1 − αk)
1k(cid:96)(i)[a(cid:96)k(i)ψ(cid:96),i+
(19)
From (19), when agent k is not paired with any agent at time
i (1kk(i) = 1), we get wk,i = ψk,i. On the other hand, when
(1 − a(cid:96)k(i)) ψk,i]
(cid:88)
(cid:96)∈Nk
wk,i = αkψk,i + (1 − αk) [a(cid:96)k(i)ψ(cid:96),i + (1 − a(cid:96)k(i)) ψk,i]
(20)
It is then clear that a(cid:96)k(i) = 0 results in wk,i = ψk,i, while
a(cid:96)k(i) = 1 results in a combination of the estimates of agents
k and (cid:96). In other words, when 1k(cid:96)(i) = 1:
(cid:26)ψk,i,
In the sequel, we assume that agents update and combine
their estimates using (15) and (19). One important question
to address is how the agents determine their actions {ak(cid:96)(i)}.
III. AGENT INTERACTIONS
When an arbitrary agent k needs to decide on whether to
set its action to ak(cid:96)(i) = 1 (i.e., to cooperate) or ak(cid:96)(i) =
0 (i.e., not to cooperate), it generally cannot tell beforehand
whether agent (cid:96) will reciprocate. In this section, we first show
that when self-interested agents are boundedly rational and
incapable of transforming the past actions of neighbors into a
prediction of their future actions, then the dominant strategy for
each agent will be to choose noncooperation. Consequently, the
entire network becomes noncooperative. Later, in Sec. IV, we
explain how to address this inefficient scenario by proposing
a protocol that will encourage cooperation.
A. Long-Term Discounted Cost Function
To begin with, let us examine the interaction between a
pair of agents, such as k and (cid:96), at some time instant i
(1k(cid:96)(i) = 1). We assume that agents k and (cid:96) simultaneously
select their actions ak(cid:96)(i) and a(cid:96)k(i) by using some pure
strategies (i.e., agents set their action variables by using data
or realizations that are available to them, such as the estimates
{wk,i−1, w(cid:96),i−1}, rather than select their actions according
to some probability distributions)2. The criterion for setting
ak(cid:96)(i) by agent k is to optimize agent k's payoff, which
incorporates both the estimation cost, affected by agent (cid:96)'s
own action a(cid:96)k(i), and the communication cost, determined
by agent k's action ak(cid:96)(i). Therefore, the instantaneous cost
incurred by agent k is a mapping function from the action
space (ak(cid:96)(i), a(cid:96)k(i)) to a real value. In order to account for
selfish behavior, we need to modify the notation used in (1)
to incorporate the actions of both agents k and (cid:96). In this way,
we need to denote the value of the cost incurred by agent k
at time i, after wk,i−1 is updated to wk,i, more explicitly by
2In our scenario, the discrete action set ak(cid:96)(i) ∈ {0, 1} will be shown to
lead to threshold-based pure strategies -- see Sec. IV-B.
=
Jk(ak(cid:96)(i), a(cid:96)k(i)) and it is given by:
Jk(ak(cid:96)(i), a(cid:96)k(i))
J est
k (wk,i = ψk,i),
J est
k (wk,i = αkψk,i + (1 − αk)ψ(cid:96),i),
J est
k (wk,i = ψk,i) + ck,
J est
k (wk,i = αkψk,i + (1 − αk)ψ(cid:96),i) + ck,
if (0, 0)
if (0, 1)
if (1, 0)
if (1, 1)
(22)
For example, the first line on the right-hand side of (22)
corresponds to the situation in which none of the agents
decides to cooperate. In that case, agent k can only rely on its
intermediate estimate, ψk,i, to improve its estimation accuracy.
In comparison, the second line in (22) corresponds to the
situation in which agent (cid:96) is willing to share its estimate but
not agent k. In this case, agent k is able to perform the second
combination step in (21) and enhance its estimation accuracy.
In the third line in (22), agent (cid:96) does not cooperate while agent
k does. In this case, agent k incurs a communication cost, ck.
Similarly, for the last line in (22), both agents cooperate. In
this case, agent k is able to perform the second step in (21)
while incurring a cost ck.
We can write (22) more compactly as follows:
Jk(ak(cid:96)(i), a(cid:96)k(i)) = J act
k (a(cid:96)k(i)) + ak(cid:96)(i)ck
(23)
where we introduced
J act
k (a(cid:96)k(i))
(cid:26)J est
(cid:44)
k (wk,i = ψk,i),
J est
k (wk,i = αkψk,i + (1 − αk)ψ(cid:96),i),
if a(cid:96)k(i) = 0
if a(cid:96)k(i) = 1
(24)
The function J act
k (a(cid:96)k(i)) helps make explicit the influence
of the action by agent (cid:96) on the estimation accuracy that is
ultimately attained by agent k.
Now, the random-pairing process occurs repeatedly over
time and, moreover, agents may leave the network. For this
reason, rather than rely on the instantaneous cost function in
(22), agent k will determine its action at time i by instead
minimizing an expected long-term discounted cost function of
the form defined by (25) where δk ∈ (0, 1) is a discount factor
to model future network uncertainties and the foresightedness
level of agent k. The expectation is taken over all randomness
for t ≥ i and is conditioned on the estimate wk,i−1 when
the actions ak(cid:96)(i) and a(cid:96)k(i) are selected. Formulation (25)
is meant to assess the influence of the action selected at time
i by agent k on its cumulative (but discounted) future costs.
More specifically, whenever 1k(cid:96)(i) = 1, agent k selects its
5
action ak(cid:96)(i) at time i to minimize the expected long-term
discounted cost given wk,i−1:
min
ak(cid:96)(i)∈{0,1} J
∞
k,i[ak(cid:96)(i), a(cid:96)k(i)wk,i−1]
(26)
Based on the payoff function in (25), we can formally regard
the interaction between agents as consisting of stage games
with recurrent random pairing. The stage information-sharing
game for 1k(cid:96)(i) = 1 is a tuple (N, A, J), where N (cid:44) {k, (cid:96)} is
the set of players, and A (cid:44) Ak × A(cid:96) is the Cartesian product
of binary sets Ak = A(cid:96) (cid:44) {1, 0} representing available
actions for agents k and (cid:96), respectively. The action profile is
a(i) (cid:44) (ak(cid:96)(i), a(cid:96)k(i)) ∈ A. Moreover, J = {J∞
(cid:96),i} is
the set of real-valued long-term costs defined over A → R
for agents k and (cid:96), respectively. We remark that since J∞
k,i
depends on wk,i−1, its value generally varies from stage to
stage. As a result, each agent k faces a dynamic game structure
with repeated interactions in contrast to conventional repeated
games as in [37], [38] where the game structure is fixed over
time. Time variation is an essential feature that arises when
we examine selfish behavior over adaptive networks.
k,i, J∞
Therefore, solving problem (26) involves the forecast of
future game structures and future actions chosen by the op-
ponent. These two factors are actually coupled and influence
each other; this fact makes prediction under such conditions
rather challenging. To continue with the analysis, we adopt
a common assumption from the literature that agents have
computational constraints. In particular, we assume the agents
have bounded rationality [27], [39], [40]. In our context, this
means that the agents have limited capability to forecast future
game structures and are therefore obliged to assume that future
parameters remain unchanged at current values. We will show
how this assumption enables each agent k to evaluate J∞
k,i in
later discussions.
Assumption 1 (Bounded rationality): Every agent k solves
the optimization problem (26) under the assumptions:
for t ≥ i
wk,t = wk,i−1, 1k(cid:96)(t) = 1k(cid:96)(i),
(27)
(cid:4)
We note that the above assumption is only made by the agent
at time i while solving problem (26); the actual estimates wk,t
and pairing choices 1k(cid:96)(t) will continue to evolve over time.
We further assume that the bounded rationality assumption is
common knowledge to all agents in the network3.
3Common knowledge of p means that each agent knows p, each agent
knows that all other agents know p, each agent knows that all other agents
know that all the agents know p, and so on [41].
J
∞
k,i [ak(cid:96)(i), a(cid:96)k(i)wk,i−1] (cid:44)
=
E(cid:104)
E(cid:104)
δt−i
k
δt−i
k
∞(cid:88)
∞(cid:88)
t=i
t=i
(cid:12)(cid:12)(cid:12)wk,i−1, ak(cid:96)(i) = ak(cid:96)(i), a(cid:96)k(i) = a(cid:96)k(i)
(cid:105)
(cid:12)(cid:12)(cid:12)wk,i−1, ak(cid:96)(i) = ak(cid:96)(i), a(cid:96)k(i) = a(cid:96)k(i)
(cid:105)
Jk(ak(cid:96)(t), a(cid:96)k(t))
J act
k (a(cid:96)k(t)) + ak(cid:96)(t)ck
(25)
TABLE I.
`````````
Agent k
Agent (cid:96)
a(cid:96)k(i) = 0
a(cid:96)k(i) = 1
THE EXPECTED LONG-TERM COST FUNCTIONS J 1
k,i AND J 1
(cid:96),i.
ak(cid:96)(i) = 0
ak(cid:96)(i) = 1
(cid:96) (ak(cid:96)(i) = 0)w(cid:96),i−1]
E[J act
k (a(cid:96)k(i) = 0)wk,i−1]
E[J act
(cid:96) (ak(cid:96)(i) = 0)w(cid:96),i−1] + c(cid:96)
k (a(cid:96)k(i) = 1)wk,i−1]
E[J act
E[J act
E[J act
E[J act
E[J act
E[J act
(cid:96) (ak(cid:96)(i) = 1)w(cid:96),i−1]
k (a(cid:96)k(i) = 0)wk,i−1] + ck
(cid:96) (ak(cid:96)(i) = 1)w(cid:96),i−1] + c(cid:96)
k (a(cid:96)k(i) = 1)wk,i−1] + ck
6
B. Pareto Inefficiency
In this section, we show that if no further measures are
taken, then Pareto inefficiency may occur. Thus, assume that
the agents are unable to store the history of their actions and
the actions of their neighbors. Each agent k only has access
to its immediate estimate wk,i−1, which can be interpreted as
a state variable at time i − 1 for agent k. In this case, each
agent k will need to solve (26) under Assumption 1. It then
follows that agent k will predict the same action for future
time instants:
ak(cid:96)(t) = ak(cid:96)(i),
for t > i
(28)
Furthermore, since the bounded rationality condition is com-
mon knowledge, agent k knows that the same future actions
are used by agent (cid:96), i.e.,
a(cid:96)k(t) = a(cid:96)k(i),
for t > i
(29)
However, this resulting action profile will be Pareto ineffi-
cient for both agents if it can be verified that the alternative
action profile (1, 1), where both agents cooperate, can lead to
improved payoff values for both agents in comparison to the
strategy (0, 0). To characterize when this is possible, let us
denote the expected payoff for agent k when agent (cid:96) selects
a(cid:96)k(i) = 0 by
k,i(ak(cid:96)(i)) (cid:44) E[J act
s0
k (a(cid:96)k(i) = 0)wk,i−1] + ak(cid:96)(i)ck
(33)
Likewise, when a(cid:96)k(i) = 1, we denote the expected payoff for
agent k by
k,i(ak(cid:96)(i)) (cid:44) E[J act
s1
k (a(cid:96)k(i) = 1)wk,i−1] + ak(cid:96)(i)ck
(34)
The benefit for agent k from agent (cid:96)'s sharing action, defined
k,i(ak(cid:96)(i)), is seen
as the improvement from s0
to be independent of ak(cid:96)(i):
k,i(ak(cid:96)(i)) to s1
(cid:1)
(30)
Using (28) and (29), agent k obtains
∞
k,i [ak(cid:96)(i), a(cid:96)k(i)wk,i−1]
J
(cid:12)(cid:12)(cid:12)wk,i−1
(cid:105)
(cid:12)(cid:12)(cid:12)wk,i−1
(cid:105)
Jk(ak(cid:96)(i), a(cid:96)k(i))
Jk(ak(cid:96)(i), a(cid:96)k(i))
k
δt−i
E(cid:104)
∞(cid:88)
1 − δk · E(cid:104)
(cid:0)E[J act
t=i
1
1
1 − δk
=
=
=
k (a(cid:96)k(i))wk,i−1] + ak(cid:96)(i)ck
Therefore, the optimization problem (26) reduces to the fol-
lowing minimization problem:
ak(cid:96)(i)∈{0,1} J 1
k,i (ak(cid:96)(i), a(cid:96)k(i))
(31)
min
where
k,i (ak(cid:96)(i), a(cid:96)k(i)) (cid:44) E[J act
k (a(cid:96)k(i))wk,i−1] + ak(cid:96)(i)ck (32)
J 1
is the expected cost of agent k given wk,i−1 -- compare
with (23). Table I summarizes the values of J 1
(cid:96),i for
both agents under their respective actions. From the entries
in the table, we conclude that choosing action ak(cid:96)(i) = 0
is the dominant strategy for agent k regardless of the action
chosen by agent (cid:96) because its cost will be the smallest it can
be in that situation. Likewise, the dominant strategy for agent
(cid:96) is a(cid:96)k(i) = 0 regardless of the action chosen by agent k.
Therefore, the action profile (ak(cid:96)(i), a(cid:96)k(i)) = (0, 0) is the
unique outcome as a Nash and dominant strategy equilibrium
for every stage game.
k,i and J 1
k (a(cid:96)k(i) = 1)wk,i−1]
(cid:3) (35)
bk(i)
(cid:44) s0
= E[J act
(cid:3)
so that
E[J act
k,i(ak(cid:96)(i))
k (wk,i)wk,i−1
Now, note from definition (6) that
k,i(ak(cid:96)(i)) − s1
k (a(cid:96)k(i) = 0)wk,i−1] − E[J act
k (wk,i = ψk,i)wk,i−1
k (wk,i = αkψk,i + (1 − αk)ψ(cid:96),i)wk,i−1
(cid:3)
(cid:105)
= E(cid:2)J est
− E(cid:2)J est
E(cid:2)J est
dk(i + 1) − uk,i+1wk,i2(cid:12)(cid:12)(cid:12)wk,i−1
= E(cid:104)
= E(cid:2)J est
(cid:3)
dk(i + 1) − uk,i+1ψk,i2(cid:12)(cid:12)(cid:12)wk,i−1
= E(cid:104)
uk,i+1(cid:101)ψk,i + vk(i + 1)2(cid:12)(cid:12)(cid:12)wk,i−1
= E(cid:104)
(cid:12)(cid:12)(cid:12)wk,i−1
= E(cid:104)
(cid:105)
(cid:107)(cid:101)ψk,i(cid:107)2
where (cid:101)ψk,i (cid:44) wo − ψk,i and, similarly,
= E(cid:2)J est
= E(cid:104)
(cid:107)αk(cid:101)ψk,i + (1 − αk)(cid:101)ψ(cid:96),i(cid:107)2
k (wk,i = αkψk,i + (1 − αk)ψ(cid:96),i)wk,i−1
+ σ2
k (wk,i = ψk,i)wk,i−1
k (a(cid:96)k(i) = 0)wk,i−1]
k (a(cid:96)k(i) = 1)wk,i−1]
(cid:12)(cid:12)(cid:12)wk,i−1
E[J act
+ σ2
v,k
(cid:105)
(cid:105)
(cid:105)
Ru,k
Ru,k
(36)
(37)
(cid:3)
v,k (38)
7
(a) γk,i > 1 and γ(cid:96),i > 1
(b) γk,i < 1 and γ(cid:96),i < 1
Fig. 1.
respectively).
Illustration of the behavior of the payoffs in terms of the size of the benefit-cost ratios ("S" and "NS" refer to the actions "share" and "do not share",
Then, the benefit bk(i) becomes
bk(i) = E(cid:104)
(cid:107)(cid:101)ψk,i(cid:107)2
− E(cid:104)
(cid:107)αk(cid:101)ψk,i + (1 − αk)(cid:101)ψ(cid:96),i(cid:107)2
(cid:12)(cid:12)(cid:12)wk,i−1
(cid:105)
Ru,k
(cid:105)
(cid:12)(cid:12)(cid:12)wk,i−1
(39)
Ru,k
Note that bk(i) is determined by the variable wk,i−1 and does
not depend on the actions a(cid:96)k(i) and ak(cid:96)(i). We will explain
how agents assess the information bk(i) to choose actions
further ahead in Sec. IV-C. Now, let us define the benefit-cost
ratio as the ratio of the estimation benefit to the communication
cost:
γk(i) (cid:44) bk(i)
ck
(40)
Then, the action profile (1, 1) in the game defined in Table I
is Pareto superior to the action profile (0, 0) when both of the
following two conditions hold
(cid:26)ck < bk(i)
c(cid:96) < b(cid:96)(i)
γk(i) > 1 and γ(cid:96)(i) > 1 ⇔
(41)
On the other hand, the action profile (0, 0) is Pareto superior
to the action profile (1, 1) if, and only if,
γk(i) < 1 and γ(cid:96)(i) < 1
(42)
In Fig. 1(a), we illustrate how the values of the payoffs com-
pare to each other when (41) holds for the four possibilities of
action profiles. It is seen from this figure that when γk(i) > 1
and γ(cid:96)(i) > 1, the action profile (S,S), i.e., (1, 1) in (32), is
Pareto optimal and that the dominant strategy (NS,NS), i.e.,
(0, 0) in (32), is inefficient and leads to worse performance
(which is a manifestation of the famous prisoner's dilemma
problem [42]). On the other hand, if γk(i) < 1 and γ(cid:96)(i) < 1,
then we are led to Fig. 1(b), where the action profile (NS,NS)
becomes Pareto optimal and superior to (S,S). We remark that
(NS,S) and (S,NS) are also Pareto optimal in both cases but
not preferred in this work because they are only beneficial for
one single agent.
IV. ADAPTIVE REPUTATION PROTOCOL DESIGN
As shown above, when both γk(i) > 1 and γ(cid:96)(i) > 1,
the Pareto optimal strategies for agents k and (cid:96) correspond
to cooperation; when both γk(i) < 1 and γ(cid:96)(i) < 1, the
Pareto optimal strategies for agents k and (cid:96) reduce to non-
cooperation. Since agents are self-interested and boundedly
rational, we showed earlier that if left without incentives, their
dominant strategy is to avoid sharing information because they
cannot tell beforehand if their paired neighbor will reciprocate.
This Pareto inefficiency therefore arises from the fact that
agents are not using historical data to predict other agents'
actions. We now propose a reputation protocol to summarize
the opponent's past actions into a reputation score. The score
will help agents to form a belief of their opponent's subsequent
actions. Based on this belief, we will be able to provide
agents with a measure that entices them to cooperate. We
will show, for example, that the best response rule for agents
will be to cooperate whenever γk(i) is large and not
to
cooperate whenever γk(i) is small, in conformity with the
Pareto-efficient design.
A. Reputation Protocol
Reputation scores have been used before in the literature as
a mechanism to encourage cooperation [32], [43], [44]. Agents
that cooperate are rewarded with higher scores; agents that do
not cooperate are penalized with lower scores. For example,
eBay uses a cumulative score mechanism, which simply sums
the sellers feedback scores from all previous periods to pro-
vide buyers and sellers with trust evaluation [45]. Likewise,
Amazon.com implements a reputation system by using an
average score mechanism that averages the feedback scores
from the previous periods [46]. However, as already explained
c(i)k(i)cbb(NS,NS)(NS,S)(S,NS)(S,S)kJ1 J1k iJ1 J1k c(i)k(i)cbb(NS,NS)(NS,S)(S,NS)(S,S)kiin [44], cheating can occur over time in both cumulative and
average score mechanisms because past scores carry a large
weight in determining the current reputation. To overcome this
problem, and in a manner similar to exponential weighting in
adaptive filter designs [47], an exponentially-weighted moving
average mechanism that gives higher weights to more recent
actions is discussed in [44]. We follow a similar weighting
formulation, with the main difference being that the reputation
scores now need to be adapted in response to the evolution of
the estimation task over the network. The construction can be
described as follows.
When 1k(cid:96)(i) = 1, meaning that agent k is paired with agent
(cid:96), the reputation score θ(cid:96)k(i) ∈ [0, 1] that is maintained by
agent k for its neighbor (cid:96) is updated as:
(43)
where rk ∈ (0, 1) is a smoothing factor for agent k to control
the dynamics of the reputation updates. On the other hand, if
1k(cid:96)(i) = 0, the reputation score θ(cid:96)k(i + 1) remains as θ(cid:96)k(i).
We can compactly describe the reputation rule as
θ(cid:96)k(i + 1) = rkθ(cid:96)k(i) + (1 − rk)a(cid:96)k(i)
θ(cid:96)k(i + 1) = 1k(cid:96)(i) [rkθ(cid:96)k(i) + (1 − rk)a(cid:96)k(i)]
+ (1 − 1k(cid:96)(i))θ(cid:96)k(i)
(44)
Directly applying the above reputation formulation, however,
can cause a loss in adaptation ability over the network.
For example, the network would become permanently non-
cooperative when agent (cid:96) chooses a(cid:96)k(i) = 0 for long con-
secutive iterations. That is because, in that case, the reputation
score θ(cid:96)k(i) will decay exponentially to zero, which keeps
agent k from choosing ak(cid:96)(i) = 1 in the future. In order to
avoid this situation, we set a lowest value for the reputation
score to a small positive threshold 0 < ε (cid:28) 1, i.e.,
θ(cid:96)k(i + 1) = 1k(cid:96)(i) · max{rkθ(cid:96)k(i) + (1 − rk)a(cid:96)k(i), ε}
(45)
+ (1 − 1k(cid:96)(i))θ(cid:96)k(i)
and thus θ(cid:96)k(i) ∈ [ε, 1].
The reputation scores can now be utilized to evaluate the
belief by agent k of subsequent actions by agent (cid:96). To explain
how this can be done, we argue that agent k would expect
the probability of a(cid:96)k(t) = 1, i.e., the probability that agent
(cid:96) is willing to cooperate, to be an increasing function of both
θ(cid:96)k(t) and θk(cid:96)(t) for t ≥ i. Specifically, if we denote this
belief probability by B(a(cid:96)k(t) = 1), then it is expected to
satisfy:
∂B(a(cid:96)k(t) = 1)
∂θ(cid:96)k(t)
≥ 0,
∂B(a(cid:96)k(t) = 1)
∂θk(cid:96)(t)
≥ 0
J
∞(cid:48)
k,i [ak(cid:96)(i)wk,i−1] =
δt−i
k
E(cid:104)
∞(cid:88)
=E(cid:104)
t=i
J act
k (a(cid:96)k(t)) + ak(cid:96)(t)ck
(cid:12)(cid:12)(cid:12)wk,i−1, Ki
(cid:105)
+ak(cid:96)(i)ck +
E(cid:104)
δt−i
k
∞(cid:88)
t=i+1
J act
k (a(cid:96)k(i))
J act
k (a(cid:96)k(t)) + ak(cid:96)(t)ck
(cid:12)(cid:12)(cid:12)wk,i−1, ak(cid:96)(i) = ak(cid:96)(i), Ki
(cid:105)
(49)
8
The first property is motivated by the fact that according to
the history of actions, a higher value for θ(cid:96)k(t) indicates that
agent (cid:96) has higher willingness to share estimates. The second
property is motivated by the fact that lower values for θk(cid:96)(t)
mean that agent k has rarely shared estimates with agent (cid:96)
in the recent past. Therefore, it can be expected that agent
(cid:96) will have lower willingness to share information for lower
values of θk(cid:96)(t). Based on this argument, we suggest a first-
order construction for measuring belief with respect to both
θ(cid:96)k(t) and θk(cid:96)(t) as follows (other constructions are of course
possible; our intent is to keep the complexity of the solution
low while meeting the desired objectives):
B(a(cid:96)k(t) = 1) = θk(cid:96)(t) · θ(cid:96)k(t),
(47)
which satisfies both properties in (46) and where B(a(cid:96)k(t) =
1) ∈ [ε2, 1]. Therefore, the reputation protocol implements
(45) and (47) repeatedly. Each agent k will then employ the
reference knowledge Ki (cid:44) {θk(cid:96)(i), θ(cid:96)k(i), B(a(cid:96)k(i) = 1)} to
select its action ak(cid:96)(i) as described next.
t ≥ i
B. Best Response Rule
The belief measure (47) provides agent k with additional
information about agent (cid:96)'s actions. That is, with (47), agent
k can treat a(cid:96)k(t) as a random variable with distribution
B(a(cid:96)k(t) = 1) for t ≥ i. Then, the best response of agent
k is obtained by solving the following optimization problem:
(48)
min
∞(cid:48)
k,i [ak(cid:96)(i)wk,i−1]
ak(cid:96)(i)∈{0,1} J
where J∞(cid:48)
k,i [ak(cid:96)(i)wk,i−1] is defined by (49) and involves
an additional expectation over the distribution of a(cid:96)k(t) --
compare with (25). Similarly to Assumption 1, we assume
the bounded rationality of the agents extends to the reputation
scores θ(cid:96)k(t) for t ≥ i.
extend
the assumption of bounded rationality from (27) to also in-
clude:
Assumption 2 (Extended bounded rationality): We
θ(cid:96)k(t) = θ(cid:96)k(i),
(50)
(cid:4)
Now, using pure strategies, the best response of agent k is to
select the action ak(cid:96)(i) such that
for t ≥ i
if J∞(cid:48)
k,i [ak(cid:96)(i) = 1wk,i−1]
< J∞(cid:48)
k,i [ak(cid:96)(i) = 0wk,i−1]
0, otherwise
(51)
(46)
1,
(cid:12)(cid:12)(cid:12)wk,i−1, ak(cid:96)(i) = ak(cid:96)(i), Ki
ak(cid:96)(i) =
(cid:105)
The following lemma shows how the best response rule
depends on the benefit-cost ratio γk(i) and the communication
cost ck:
Lemma 1: With Assumptions 1 and 2, the best response rule
(cid:40)
fk(·) becomes
ak(cid:96)(i) =
where
if γk(i) (cid:44) bk(i)
1,
0, otherwise
ck
> χk
θ(cid:96)k(i)
(52)
(53)
χk (cid:44) 1 − δkrk
δk(1 − rk)
Proof: See Appendix A.
We note that the resulting rule aligns the agents to achieve
the Pareto optimal strategy: to share information when γk(i)
is sufficiently large and not to share information when γk(i)
is small.
C. Benefit Prediction
To compute the benefit-cost ratio γk(i) = bk(i)/ck, the
agent still needs to know bk(i) defined by (35), which
depends on the quantities E[J act
k (a(cid:96)k(i) = 0)wk,i−1] and
E[J act
k (a(cid:96)k(i) = 1)wk,i−1]. It is common in the literature, as
in [29], [48], to assume that agents have complete information
about the payoff functions like the ones shown in Table I.
However, in the context of adaptive networks where agents
have only access to data realizations and not to their statistical
distributions, the payoffs are unknown and need to be estimated
or predicted. For example, in our case, the convex combination
αkψk,i + (1 − αk)ψ(cid:96),i is unknown for agent k before agent (cid:96)
shares ψ(cid:96),i with it. We now describe one way by which agent
k can predict bk(i); other ways are possible depending on how
much information is available to the agent. Let us assume a
special type of agents, which are called risk-taking [49]: agent
k chooses ak(cid:96)(i) = 1 as long as the largest achievable benefit,
denoted by ¯bk(i), exceeds the threshold:
(cid:40)
ak(cid:96)(i) =
if ¯bk(i)
ck
1,
0, otherwise
> χk
θ(cid:96)k(i)
(54)
(cid:105)
bk(i)
Using (39), the largest achievable benefit ¯bk(i) can be found
by solving the following optimization problem:
¯bk(i) (cid:44) max(cid:101)ψ(cid:96),i
= max(cid:101)ψ(cid:96),i
= E(cid:104)
(cid:110)E(cid:104)
(cid:107)(cid:101)ψk,i(cid:107)2
− E(cid:104)
(cid:107)αk(cid:101)ψk,i + (1 − αk)(cid:101)ψ(cid:96),i(cid:107)2
(cid:12)(cid:12)(cid:12)wk,i−1
(cid:107)(cid:101)ψk,i(cid:107)2
(cid:101)ψ(cid:96),i = −
(cid:12)(cid:12)(cid:12)wk,i−1
(cid:105)
since the maximum occurs when
(cid:12)(cid:12)(cid:12)wk,i−1
(cid:101)ψk,i
(cid:105)(cid:111)
(55)
Ru,k
Ru,k
Ru,k
αk
1 − αk
9
k,ivk(i)
(57)
Let us express the adaptation step (15) in terms of the
estimation error as
To continue, we assume that the step-size µ is sufficiently
small. Then,
k,iuk,i)(cid:101)wk,i−1 − µu∗
(cid:101)ψk,i = (I − µu∗
(cid:12)(cid:12)(cid:12)wk,i−1
(cid:105)
E(cid:104)
(cid:107)(cid:101)ψk,i(cid:107)2
= E(cid:104)
k,iuk,i)(cid:101)wk,i−1 − µu∗
= E(cid:104)(cid:101)w∗
(cid:107)(I − µu∗
(cid:12)(cid:12)(cid:12)wk,i−1
k,i−1(I − µu∗
× (cid:101)wk,i−1
= (cid:101)w∗
k,i−1Ωk(cid:101)wk,i−1 + O(µ2)
Ru,k
(cid:105)
k,iuk,i)Ru,k(I − µu∗
u,k)σ2
v,k
+ µ2Tr(R2
k,ivk(i)(cid:107)2
Ru,k
k,iuk,i)
(cid:105)
(cid:12)(cid:12)(cid:12)wk,i−1
(58)
k
where we are collecting terms that are second-order in the step-
size into the factor O(µ2),4 and where we introduced Ωk (cid:44)
Ru,k(I − 2µRu,k). We note that for sufficiently small step-
sizes:
Ω(cid:48)
Therefore, each agent k can approximate ¯bk(i) as
(cid:44) Ru,k(I − µRu,k)2 ≈ Ru,k(I − 2µRu,k) = Ωk
¯bk(i) = (cid:101)w∗
= (cid:101)w∗
k,i−1Ru,k(I − µRu,k)2(cid:101)wk,i−1
= (cid:107)(I − µRu,k)(cid:101)wk,i−1(cid:107)2
k(cid:101)wk,i−1
k,i−1Ω(cid:48)
(59)
(60)
Ru,k
D. Real-Time Implementation
Expression (60) is still not useful for agents because it
requires knowledge of both Ru,k and (cid:101)wk,i−1. With regards
to Ru,k, we can use the instantaneous approximation Ru,k ≈
u∗
k,iuk,i to get
k,iuk,i)2(cid:101)wk,i−1
k,iuk,i(cid:101)wk,i−1
k,i−1u∗
= (1 − µ(cid:107)uk,i(cid:107)2)2(cid:101)w∗
k,iuk,i(I − µu∗
k,i−1u∗
With regards to (cid:101)wk,i−1, we assume that agents use a moving-
average filter as in [50] to approximate wo iteratively as
follows:
(61)
¯bk(i) ≈ (cid:101)w∗
(cid:98)wo
k,i = (1 − ν)(cid:98)wo
(cid:101)wk,i−1 ≈ (cid:98)wo
k,i − wk,i−1
k,i−1 + νψk,i
(62)
(63)
where ν ∈ (0, 1) is a positive forgetting factor close to 0 to give
higher weights on recent results. We summarize the operation
of the resulting algorithm in the following listing.
(56)
4This approximation simplifies the algorithm construction. However, when
we study the network performance later in (74) we shall keep the second-order
terms.
Algorithm 1 Diffusion Strategy with an Adaptive Reputation
Scheme.
Let {wk,−1 = 0} and {θk(cid:96)(−1) = 1} for all k and (cid:96). Define χk (cid:44)
1−δkrk
δk(1−rk) .
loop
k,i[dk(i) − uk,iwk,i−1]
k,iuk,i(cid:101)wk,i−1
k,i−1u∗
Generate {1k(cid:96)(i)} for all k and (cid:96).
% Stage 1 (Adaptation): For each k:
ψk,i = wk,i−1 + µu∗
¯bk(i) ≈ (1 − µ(cid:107)uk,i(cid:107)2)2(cid:101)w∗
(cid:98)wo
k,i = (1 − ν)(cid:98)wo
(cid:101)wk,i−1 ≈ (cid:98)wo
(cid:40)
% Stage 2 (Action Selection): For all k and (cid:96),
if 1k(cid:96)(i) = 1 then
1,
k,i − wk,i−1
k,i−1 + νψk,i
> χk
θ(cid:96)k(i)
ak(cid:96)(i) =
if ¯bk(i)
ck
otherwise
0,
else ak(cid:96)(i) = 0.
end if
% Stage 3 (Reputation Update): For all k and (cid:96),
θ(cid:96)k(i + 1) =1k(cid:96)(i) · max{rkθ(cid:96)k(i) + (1 − rk)a(cid:96)k(i), ε}
+ (1 − 1k(cid:96)(i))θ(cid:96)k(i)
% Stage 4 (Combination): For all k,
1k(cid:96)(i)(cid:2)a(cid:96)k(i)ψ(cid:96),i +(1 − a(cid:96)k(i)) ψk,i
(cid:3)
(cid:88)
(cid:96)∈Nk
wk,i = αkψk,i +(1 − αk)
end loop
V. STABILITY ANALYSIS AND LIMITING BEHAVIOR
In this section, we study the stability of Algorithm 1 and its
limiting performance after sufficiently long iterations. In order
to pursue a mathematically tractable analysis, we assume that
the maximum benefit ¯bk(i) is estimated rather accurately by
each agent k. That is, instead of the real-time implementation
(61) -- (63), we consider (60) that
¯bk(i) = (cid:107)(I − µRu,k)(cid:101)wk,i−1(cid:107)2
(cid:12)(cid:12)(cid:12)(cid:101)wk,i−1
k,iuk,i(cid:101)wk,i−1
k,iuk,iu∗
expression (61) given (cid:101)wk,i−1:
E(cid:104)
(1 − µ(cid:107)uk,i(cid:107)2)2(cid:101)w∗
k,i−1u∗
= (cid:101)w∗
Ru,k − 2µE[u∗
k,i−1
(cid:104)
k,iuk,i] + O(µ2)
(cid:105)
Ru,k
This consideration is motivated by taking the expectation of
(65)
By subtracting (64) from (65), we can see that the difference
between (64) and (65) is at least in the order of µ:
(64)
k,i−1
2µ(R2
u,k − E[u∗
k,iuk,iu∗
k,iuk,i]) + O(µ2)
(66)
Therefore, for small enough µ the expected value of the
realization given by (61) approaches the true value (64). The
performance degradation from the real-time implementation
error will be illustrated by numerical simulations in Sec. VI.
Under this condition, and for µ (cid:28) 1, we shall argue that
the operation of each agent is stable in terms of both the
estimation cost and the communication cost. Specifically, for
the estimation cost, we will provide a condition on the step-
size to ensure that the mean-square estimation error of each
(cid:105)(cid:101)wk,i−1
(cid:105)(cid:101)wk,i−1
(cid:101)w∗
(cid:104)
10
k
agent is asymptotically bounded. Using this result, we will
further show that the communication cost for each agent k,
and which is denoted by J com
, is upper bounded by a constant
value that is unrelated to the transmission cost ck. This result
will be in contrast to the case of always cooperative agents
where J com
k will be seen to increase proportionally with ck.
This is because in our case, the probability of cooperation,
Prob{ak(cid:96)(i) = 1}, will be shown to be upper bounded by
the ratio co/ck for some constant co independent of ck. It will
then follow that when the communication becomes expensive
(large ck), self-interested agents using the adaptive reputation
scheme will become unwilling to cooperate.
A. Estimation Performance
In conventional stability analysis for diffusion strategies, the
combination coefficients are either assumed to be fixed, as
done in [16], [19], [51] -- [54], or their expectations conditioned
on the estimates wk,i−1 are assumed to be constant, as in [55].
These conditions are not applicable to our scenario. When
self-interested agents employ the nonlinear threshold-based
action policy (54), the ATC diffusion algorithm (15) and (19)
ends up involving a combination matrix whose entries are
dependent on the estimates wk,i−1 (or the errors (cid:101)wk,i−1).
This fact introduces a new challenging aspect into the analysis
of the distributed strategy. In the sequel, and in order to
facilitate the stability and mean-square analysis of the learning
process, we shall examine the performance of the agents in
the network in three operating regions: the far-field region,
the near-field region, and a region in between. We will show
that the evolution of the estimation errors in these operating
regions can be described by the same network error recursion
given further ahead in (99). Following this conclusion, we will
then be able to use (99) to provide general statements about
stability and performance in the three regions.
To begin with, referring to the listing in Algorithm 1,
we start by noting that we write down the following error
recursions for each agent k:
(cid:101)ψk,i = (I − µu∗
(cid:88)
(cid:101)wk,i =
k,iuk,i)(cid:101)wk,i−1 − µu∗
g(cid:96)k(i)(cid:101)ψ(cid:96),i
(cid:96)∈Nk
k,ivk(i)
where the combination coefficients {g(cid:96)k(i), (cid:96) ∈ Nk} used in
(68) are defined as follows and add up to one:
(cid:88)
g(cid:96)k(i) (cid:44) (1 − αk)1(cid:96)k(i)a(cid:96)k(i) ≥ 0
gkk(i) (cid:44) 1 −
g(cid:96)k(i) ≥ 0
(cid:96)∈Nk\{k}
(67)
(68)
(69)
(70)
Note that, in view of the pairing process, at most two of
evaluating the squared weighted norm of (cid:101)ψk,i in (67), which
the coefficients {g(cid:96)k(i)} in (68) are nonzero in each time
instant. The subsequent performance analysis will depend on
is seen to be:
(cid:107)(cid:101)ψk,i(cid:107)2
Ru,k
Ru,k
k,iuk,iRu,k)
k,iuk,i)Ru,ku∗
k,iuk,i)(cid:101)wk,i−1(cid:107)2
= (cid:107)(I − µu∗
− µ(cid:101)w∗
+ µ2(cid:107)vk(i)(cid:107)2Tr(u∗
k,i−1(I − µu∗
− µv∗
k(i)uk,iRu,k(I − µu∗
(cid:88)
g(cid:96)k(i)(cid:107)(cid:101)ψ(cid:96),i(cid:107)2
(cid:107)(cid:101)wk,i(cid:107)2
E(cid:104)
(cid:88)
g(cid:96)k(i)(cid:107)(cid:101)ψ(cid:96),i(cid:107)2
E(cid:107)(cid:101)wk,i(cid:107)2
Ru,k ≤
(cid:96)∈Nk
Ru,(cid:96)
(cid:96)∈Nk
Ru,(cid:96)
Ru,k ≤
so that, under expectation,
Now, from (68) we can use Jensen's inequality and the
convexity of the squared norm to write
k,iuk,i)(cid:101)wk,i−1 (71)
k,ivk(i)
(cid:105)
(72)
(73)
(cid:105)
E(cid:104)
g(cid:96)k(i)(cid:107)(cid:101)ψ(cid:96),i(cid:107)2
= E(cid:104)
(cid:16)
We note that g(cid:96)k(i) is a function of the random variables
{1(cid:96)k(i), a(cid:96)k(i)}. The random pairing indicator 1(cid:96)k(i) is inde-
pendent of u(cid:96),i and v(cid:96)(i). As for a(cid:96)k(i), which is determined
by ¯b(cid:96)(i) and θk(cid:96)(i), we can see from expressions (64) and
(45) that both ¯b(cid:96)(i) and θk(cid:96)(i) only depend on the past data
prior to time i and therefore are independent of u(cid:96),i and v(cid:96)(i).
Consequently, g(cid:96)k(i) is independent of u(cid:96),i and v(cid:96)(i), and we
get
Ru,(cid:96)
Ru,(cid:96)
Ru,(cid:96)
(74)
g(cid:96)k(i)
we get
(cid:96),iv(cid:96)(i)
(cid:17)(cid:105)
u,(cid:96))σ2
v,(cid:96)
(cid:96),iu(cid:96),iRu,(cid:96))
(cid:96),iu(cid:96),i)Ru,(cid:96)u∗
(cid:96),iu(cid:96),i)(cid:101)w(cid:96),i−1(cid:107)2
(cid:107)(I − µu∗
− µ(cid:101)w∗
+ µ2(cid:107)v(cid:96)(i)(cid:107)2Tr(u∗
(cid:96),i−1(I − µu∗
(cid:96),iu(cid:96),i)(cid:101)w(cid:96),i−1
= E(cid:104)
(cid:105)
(cid:96) (i)u(cid:96),iRu,(cid:96)(I − µu∗
− µv∗
(cid:96),iu(cid:96),i)(cid:101)w(cid:96),i−1(cid:107)2
g(cid:96)k(i)(cid:107)(I − µu∗
+ µ2Eg(cid:96)k(i)Tr(R2
Using the fact that u(cid:96),i is independent of g(cid:96)k(i) and (cid:101)w(cid:96),i−1,
E(cid:104)
(cid:105)
(cid:96),iu(cid:96),i)(cid:101)w(cid:96),i−1(cid:107)2
(cid:12)(cid:12)(cid:12)g(cid:96)k(i), (cid:101)w(cid:96),i−1
= E(cid:104)E(cid:104)
(cid:105)(cid:105)
g(cid:96)k(i)(cid:107)(I − µu∗
(cid:96),iu(cid:96),i)(cid:101)w(cid:96),i−1(cid:107)2
(cid:105)
= E(cid:104)
g(cid:96)k(i)(cid:107)(I − µu∗
(cid:96),i−1Σ(cid:96)(cid:101)w(cid:96),i−1
g(cid:96)k(i)(cid:101)w∗
Σ(cid:96) (cid:44) E(I − µu∗
= Ru,(cid:96) − 2µR2
(cid:96),iu(cid:96),i)Ru,(cid:96)(I − µu∗
u,(cid:96) + µ2E(u∗
(cid:96),iu(cid:96),i)
(cid:96),iu(cid:96),iRu,(cid:96)u∗
(cid:96),iu(cid:96),i)
If the regression data happens to be circular Gaussian, then a
closed-form expression exists for the last fourth-order moment
term in (76) in terms of Ru,(cid:96) [47]. We will not assume
Gaussian data. Instead, we will assume that the fourth-order
moment is bounded and that the network is operating in the
slow adaptation regime with a sufficiently small step-size so
that terms that depend on higher-order powers of µ can be
where
(76)
(75)
Ru,(cid:96)
Ru,(cid:96)
(cid:105)
(cid:105)
E(cid:104)
ignored in comparison to other terms. Under this assumption,
we replace (75) by:
Ru,(cid:96)
= E(cid:104)
g(cid:96)k(i)(cid:107)(I − µu∗
= E(cid:104)
(cid:96),iu(cid:96),i)(cid:101)w(cid:96),i−1(cid:107)2
g(cid:96)k(i)(cid:101)w∗
(cid:96)(cid:101)w(cid:96),i−1
(cid:105)
(cid:96),i−1Ω(cid:48)
(77)
(cid:96)(cid:101)w(cid:96),i−1 from (64). Note that
(cid:96) = Ru,(cid:96)(I − µRu,(cid:96))2 from (59) and ¯b(cid:96)(i) =
(cid:105)
g(cid:96)k(i)¯b(cid:96)(i)
(cid:96) = O(µ2)
Σ(cid:96) − Ω(cid:48)
=E(cid:104)
(78)
(cid:105)
(cid:101)w∗
where Ω(cid:48)
(cid:96),i−1Ω(cid:48)
E(cid:104)
g(cid:96)k(i)(cid:107)(cid:101)ψ(cid:96),i(cid:107)2
Ru,(cid:96)
g(cid:96)k(i)¯b(cid:96)(i)
Eg(cid:96)k(i)
(79)
To continue, we introduce the following lemma which provides
useful bounds for ¯bk(i).
+µ2Tr(R2
u,(cid:96))σ2
v,(cid:96)
Lemma 2 (Bounds on ¯bk(i)): The values of ¯bk(i) defined
by (64) are lower and upper bounded by:
Therefore, expression (74) becomes
min(cid:107)(cid:101)wk,i−1(cid:107)2
ρ2
Ru,k ≤ ¯bk(i) ≤ ρ2
max(cid:107)(cid:101)wk,i−1(cid:107)2
Ru,k
where
ρmax (cid:44) max
1≤k≤N
ρmin (cid:44) min
1≤k≤N
λmax(I − µRu,k)
λmin(I − µRu,k)
11
(80)
(81)
(82)
Proof: We introduce the eigendecomposition of the co-
variance matrix, Ru,k (cid:44) UkΛkU∗
k , where Uk is a unitary
matrix and Λk (cid:44) diag{λ1,k, ..., λM,k} is a diagonal matrix
with positive entries. Then, Ru,k can be factored as
where
1
2
u,k
R
(cid:44) UkΛ
1
2
k U
∗
1
k , Λ
2
k
Ru,k = R
1
2
u,kR
1
2
u,k
(83)
(cid:112)
(cid:112)
(cid:44) diag{
u,k and I − µRu,k are commutable.
λM,k}
λ1,k, ...,
(84)
1
2
It is easy to verify that R
Using this property, we obtain the following inequality:
u,kR
u,k(I − µRu,k)2R
1
2
1
2
k(cid:101)wk,i−1
k,i−1(I − µRu,k)R
k,i−1R
(cid:101)w∗
k,i−1Ω(cid:48)
= (cid:101)w∗
= (cid:101)w∗
≤ λmax((I − µRu,k)2)(cid:101)w∗
max(cid:107)(cid:101)wk,i−1(cid:107)2
≤ ρ2
(cid:105)
Ru,k
maxE(cid:104)
g(cid:96)k(i)¯b(cid:96)(i)
E(cid:104)
≤ ρ2
1
2
u,k(I − µRu,k)(cid:101)wk,i−1
u,k(cid:101)wk,i−1
k,i−1Ru,k(cid:101)wk,i−1
1
2
(85)
g(cid:96)k(i)(cid:107)(cid:101)w(cid:96),i−1(cid:107)2
Ru,(cid:96)
(cid:105)
(86)
We can obtain the lower bound for ¯bk(i) by similar arguments.
Using the upper bound from Lemma 2, we have
µ2 (cid:88)
(cid:96)∈Nk
Tr(R2
u,(cid:96))σ2
v,(cid:96)
Eg(cid:96)k(i) ≤ µ2κ
max
(cid:105)
Ru,k ≤ ρ2
E(cid:107)(cid:101)wk,i(cid:107)2
Then, from (79) and (86) we deduce from (73) that
E(cid:104)
(cid:88)
g(cid:96)k(i)(cid:107)(cid:101)w(cid:96),i−1(cid:107)2
+ µ2 (cid:88)
is ready to check that {Eg(cid:96)k(i)} are
From (69) -- (70),
nonnegative and add up to 1. Therefore, the second term on
the right-hand side of (87) is a convex combination and has
the following upper bound:
Eg(cid:96)k(i)
u,(cid:96))σ2
v,(cid:96)
Tr(R2
(cid:96)∈Nk
(cid:96)∈Nk
(87)
Ru,(cid:96)
it
(88)
(89)
(cid:105)
+ µ2κ
where
κ (cid:44) max
1≤k≤N
Tr(R2
u,k)σ2
v,k
(cid:88)
E(cid:104)
(cid:96)∈Nk
g(cid:96)k(i)(cid:107)(cid:101)w(cid:96),i−1(cid:107)2
Ru,(cid:96)
Ru,k ≤ ρ2
max
Therefore, we have
E(cid:107)(cid:101)wk,i(cid:107)2
errors {(cid:107)(cid:101)wk,i−1(cid:107)2
(90)
Since the combination coefficients {g(cid:96)k(i)} and the estimation
Ru,k} are related in a nonlinear manner (as re-
vealed by (54, (64), and (69) -- (70)), the analysis of Algorithm 1
becomes challenging. To continue, we examine the behavior of
the agents in the three regions of operation mentioned before.
During the initial stage of adaptation, agents are generally
away from the target vector wo and therefore have large
estimation errors. We refer to this domain as the far-field region
of operation, and we will characterize it by the condition:
(cid:107)(cid:101)wk,i−1(cid:107)2
norm of estimation error (cid:107)(cid:101)wk,i−1(cid:107)2
where χk and ρmin are defined in (53) and (82), respectively,
and the parameter φ is close to 1 and in the range of 1 ≥
φ (cid:29) 0. That is, in the far-field regime, the weighted squared
exceeds a threshold
with high probability. We note that the far-field condition (91)
can be more easily achieved when ck is small. We also note
that when the event in (91) holds with high-probability, then
agent k is enticed to cooperate since:
Far-Field: Prob
> φ
(91)
ckχk
ρ2
minε
Ru,k >
(cid:27)
(cid:26)
Ru,k
(cid:107)(cid:101)wk,i−1(cid:107)2
Ru,k >
ckχk
ρ2
minε
(a)
⇒ ¯bk(i)θ(cid:96)k(i) > ckχk
⇒ ak(cid:96)(i) = 1
(b)
(92)
where step (a) is by (80) and the fact θ(cid:96)k(i) ∈ [ε, 1], and step
(b) is by (54). Consequently, in the far-field region it holds
with high likelihood that
Prob{ak(cid:96)(i) = 1} ≈ 1
(93)
This approximation explains the phenomenon that with large
estimation errors, agents are willing to cooperate and share
12
estimates. We then say that under the far-field condition (91),
the combination coefficients in (69) -- (70) can be expressed as
(94)
(cid:88)
g(cid:96)k(i) = (1 − αk)1(cid:96)k(i)
gkk(i) = 1 −
(cid:96)∈Nk\{k}
g(cid:96)k(i)
(95)
(96)
(97)
E(cid:107)(cid:101)wk,i(cid:107)2
(cid:107)(cid:101)w(cid:96),i−1(cid:107)2
col{(cid:107)(cid:101)w1,i(cid:107)2
with expectation values as follows:
= αk + (1 − αk)1kk(i)
In this case, expression (90) becomes
g(cid:96)k (cid:44) Eg(cid:96)k(i) = (1 − αk)p(cid:96)k
gkk (cid:44) Egkk(i) = αk + (1 − αk)pkk
g(cid:96)kE(cid:107)(cid:101)w(cid:96),i−1(cid:107)2
(cid:88)
Ru,k ≤ ρ2
Ru,(cid:96)
max
(cid:96)∈Nk
+ µ2κ
Ru,(cid:96)
. If we stack {(cid:107)(cid:101)wk,i(cid:107)2
Ru,1 , ...,(cid:107)(cid:101)wN,i(cid:107)2
EX i (cid:22) ρ2
where we used the independence between 1(cid:96)k(i) and
Ru,k} into a vector X i (cid:44)
Ru,N} and collect the combination
coefficients {g(cid:96)k} into a left-stochastic matrix G, then we
obtain the network error recursion as:
(98)
where e ∈ 1N is the vector of all ones and the notation x (cid:22)
y denotes that the components of vector x are less than or
equal to the corresponding components of vector y. Taking the
maximum norm from both sides and using the left-stochastic
matrix property (cid:107)GT(cid:107)∞ = 1, we obtain:
(cid:44) (cid:107)EX i(cid:107)∞ < ρ2
max
1≤k≤N
max(cid:107)EX i−1(cid:107)∞ + µ2κ
maxGT (EX i−1) + µ2κe
E(cid:107)(cid:101)wk,i(cid:107)2
(99)
Let us consider the long-term scenario i (cid:29) 1. The far-field
regime (91) is more likely to occur when ck is small. Let us
now examine the situation in which the communication cost
is expensive (ck (cid:29) 0). In this case, the agents will operate in
a near-field regime, which we characterize by the condition:
Ru,k
Near-Field: Prob
ckχk
ρ2
max
where ρmax is defined in (81). We note that
Ru,k <
> φ
(100)
(cid:26)
(cid:107)(cid:101)wk,i−1(cid:107)2
(cid:27)
(cid:107)(cid:101)wk,i−1(cid:107)2
Ru,k <
ckχk
ρ2
max ⇒ ¯bk(i)θ(cid:96)k(i) < ckχk
In this regime, it then holds with high likelihood that
⇒ ak(cid:96)(i) = 0
Prob{ak(cid:96)(i) = 0} ≈ 1
and the combination coefficients in (69) -- (70) then become:
that
gkk(i) = 1, g(cid:96)k(i) = 0
(103)
This means
agents will now be operating non-
cooperatively since the benefit of sharing estimates is small
relative to the expensive communication cost ck (cid:29) 0. Using
similar arguments to (97) -- (99), we arrive at the same network
recursion (99) for this regime.
(101)
(102)
Following similar arguments to (97) -- (99), we again arrive at
the same network recursion (99).
We therefore conclude that after long iterations, the esti-
mation performance can be approximated by recursion (99)
for general values of ck. Consequently, sufficiently small
step-sizes that satisfy the following condition guarantees the
stability of the network error (cid:107)EX i(cid:107)∞:
ρ2
max < 1 ⇔ µ <
max
1≤k≤N
which leads to
2
λmax(Ru,k)
lim sup
i→∞ (cid:107)EX i(cid:107)∞ ≤
µ2κ
1 − ρ2
max
13
(112)
(113)
However, there exists a third possibility that for moderate
values of ck, agents operate at a region that does not belong to
neither the far-field nor the near-field regimes. In this region,
agents will be choosing to cooperate or not depending on their
local conditions. To facilitate the presentation, let us introduce
the notation IE for an indicator function over event E where
IE = 1 if event E occurs and IE = 0 otherwise. Then, the
action policy (54) can be rewritten as:
ak(cid:96)(i) = I¯bk(i)θ(cid:96)k(i)>ckχk
min)(cid:107)(cid:101)wk,i−1(cid:107)2
(104)
From Lemma 2, we know that ¯bk(i) is sandwiched within
(cid:107)(cid:101)wk,i−1(cid:107)2
an interval of width (ρ2
. As the error
becomes smaller after sufficient iterations, the
feasible region of ¯bk(i) shrinks. Therefore, it is reasonable
to assume that ¯bk(i) becomes concentrated around its mean
¯bk(i) (cid:44) E¯bk(i) for i (cid:29) 0. It follows that we can approximate
ak(cid:96)(i) by replacing ¯bk(i) by ¯bk(i):
max − ρ2
Ru,k
Ru,k
ak(cid:96)(i) ≈ I¯bk(i)θ(cid:96)k(i)>ckχk , as i (cid:29) 1
(105)
To continue, we further assume that after long iterations, which
means that repeated interactions between agents have occurred
for many times, the reputation scores gradually become sta-
tionary, i.e., we can model {θ(cid:96)k(i)} as
θ(cid:96)k(i) = θ(cid:96)k + n(cid:96)k(i), as i (cid:29) 1
(106)
where θ(cid:96)k (cid:44) Eθ(cid:96)k(i) and n(cid:96)k(i) is a random disturbance
which is independent and identically distributed (i.i.d.) over
time i and assumed to be independent of all other random
variables. Under this modeling, we can obtain the indepen-
(cid:105)
I¯b(cid:96)(i)(θ(cid:96)k+n(cid:96)k(i))>ckχk · (cid:107)(cid:101)w(cid:96),i−1(cid:107)2
dence between n(cid:96)k(i) and (cid:101)w(cid:96),i−1 and write that for k (cid:54)= (cid:96)
E(cid:104)
g(cid:96)k(i)(cid:107)(cid:101)w(cid:96),i−1(cid:107)2
= E(cid:104)
(1 − αk)1(cid:96)k(i)a(cid:96)k(i)(cid:107)(cid:101)w(cid:96),i−1(cid:107)2
(cid:105)
≈ (1 − αk)p(cid:96)kE(cid:104)
E(cid:107)(cid:101)w(cid:96),i−1(cid:107)2
(cid:44) (1 − αk)p(cid:96)kE(cid:2)I¯bk(i)(θ(cid:96)k+n(cid:96)k(i))>ckχk
E(cid:104)
gkk(i)(cid:107)(cid:101)wk,i−1(cid:107)2
(cid:17)
= E(cid:104)(cid:16)
(cid:88)
(cid:107)(cid:101)wk,i−1(cid:107)2
E(cid:107)(cid:101)wk,i−1(cid:107)2
For (cid:96) = k, we can use similar arguments to write
(1 − αk)1(cid:96)k(i)a(cid:96)k(i)
= g
where
(cid:48)
g
(cid:96)k
(cid:96)∈Nk\{k}
≥ 0
1 −
(109)
(107)
(108)
(cid:105)
(cid:105)
(cid:105)
(cid:3)
(cid:48)
(cid:96)k
Ru,k
Ru,k
Ru,(cid:96)
Ru,(cid:96)
Ru,(cid:96)
Ru,(cid:96)
Ru,(cid:96)
(cid:48)
(cid:96)k
≈ g
where
(cid:96)∈Nk\{k}
Therefore, expression (90) becomes
E(cid:107)(cid:101)wk,i(cid:107)2
Ru,k ≤ ρ2
max
(cid:48)
g
kk
(cid:44) 1 −
(cid:88)
(cid:96)∈Nk
(cid:48)
(cid:96)k ≥ 0
g
(cid:88)
E(cid:107)(cid:101)w(cid:96),i−1(cid:107)2
(cid:48)
g
(cid:96)k
Ru,(cid:96)
Recalling that we are assuming sufficiently small µ, we have
max
1≤m≤M
max
1≤m≤M
ρ2
max = max
1≤k≤N
≈ max
1≤k≤N
(cid:44) 1 − 2µβ
(1 − µλm(Ru,k))2
1 − 2µλm(Ru,k)
β (cid:44) min
1≤k≤N
λmin(Ru,k)
(114)
(115)
where
It is straightforward to verify that the bound on the right-hand
side of (113) is upper-bounded by µκ/2β, which is O(µ).
Consequently, we conclude that
E(cid:107)(cid:101)wk,i(cid:107)2
lim sup
i→∞
= O(µ)
(116)
Ru,k
which establishes the mean-square stability of the network
under the assumed conditions and for small step-sizes.
B. Expected Individual and Public Cost
In this section we assess the probability that agents will
opt for cooperation after sufficient time has elapsed and the
network has become stable. From (116), we know that after
sufficient iterations, the MSE cost at each agent k is bounded,
say, as
for
Ru,k ≤ ηµ,
(117)
for some constant η. Based on this result, we can upper bound
the cooperation rate of every agent k, defined as the probability
that agent k would select ak(cid:96)(i) = 1 for every pairing agent
(cid:96).
i (cid:29) 1
Theorem 1: (Upper bound on cooperation rate) After suffi-
cient iterations, the cooperation rate for each agent k is upper
bounded by:
E(cid:107)(cid:101)wk,i(cid:107)2
(cid:27)
, 1
,
(cid:26) co
ck
(110)
Prob{ak(cid:96)(i) = 1} ≤ min
for any ck < ∞
(118)
where co is independent of ck and defined as
+ µ2κ (111)
co (cid:44) ηµρ2
χmin
max
, χmin (cid:44) min
1≤k≤N
χk
(119)
Fig. 2. The feasible region of the probability of cooperation Prob{ak(cid:96)(i) =
1} for agent k.
Proof: From (54), the cooperation rate of agent k is
bounded by:
Prob{ak(cid:96)(i) = 1} = Prob(cid:8)¯bk(i)θ(cid:96)k(i) > ckχk
(cid:9)
(cid:9)
≤ Prob(cid:8)¯bk(i) > ckχk
(cid:107)(cid:101)wk,i−1(cid:107)2
≤ Prob
(cid:40)
Ru,k >
ckχk
ρ2
max
(cid:41)
then
(120)
14
On the other hand, the expected estimation cost for each agent
k for i (cid:29) 0 is:
EJ est
= E(cid:107)(cid:101)wk,i−1(cid:107)2
k = Edk(i) − uk,iwk,i−12
+ σ2
Ru,k
v,k
v,k
≤ ηµ + σ2
where we use (9) and the fact that (cid:101)wk,i−1 is independent of
{dk(i), uk,i}. It follows that for i (cid:29) 1 the expected extended
cost at each agent k is bounded by
E [Jk(wk,i−1, ak(cid:96)(i))] = EJ est
k + EJ com
(124)
k
≤ ηµ + σ2
v,k + (1 − pkk)co
(125)
If we now define the public cost as the accumulated expected
extended cost over the network:
J pub (cid:44) N(cid:88)
N(cid:88)
k=1
E [Jk(wk,i−1, ak(cid:96)(i))]
N(cid:88)
σ2
v,k + co
k=1
k=1
(1 − pkk)
J pub ≤ N ηµ +
(126)
(127)
which shows that J pub is uniformly bounded by a constant
value independent of ck.
For comparison purposes, let us consider a uniform trans-
mission cost ck = c and consider the case in (18) where the
agents are controlled so that they always share estimates with
their paired agents, i.e., ak(cid:96)(i) = 1 for all k, (cid:96), and i whenever
1k(cid:96)(i) = 1. Then, the random combination coefficients are the
same as (94) -- (95) defined in the far-field since agents always
choose to cooperate. Let us denote the network mean-square-
deviation (MSD) of cooperative agents by
MSDcoop = lim
i→∞
1
N
(128)
N(cid:88)
k=1
E(cid:107)(cid:101)wk,i(cid:107)2
which has a closed-form expression provided in [55]. There-
fore, we can characterize the performance of cooperative
agents by MSDcoop and note that for i (cid:29) 0, we have
Ru,k ≥ N β · MSDcoop
(129)
where β is defined in (115). Consequently, after sufficient
iterations,
the expected public cost for cooperative agents
becomes
(cid:88)
E1k(cid:96)(i)
(cid:96)∈Nk\{k}
J pub
coop =
+ σ2
v,k + c
Ru,k
N(cid:88)
k=1
N(cid:88)
k=1
≥ N β · MSDcoop +
σ2
v,k +c
(1 − pkk)
(130)
N(cid:88)
k=1
E(cid:107)(cid:101)wk,i(cid:107)2
E(cid:107)(cid:101)wk,i(cid:107)2
N(cid:88)
k=1
where we used the fact that θk(cid:96)(i) ≤ 1 and the upper bound on
is a nonnegative random
Ru,k ≤ ηµ, we can use Markov's
Ru,k
¯bk(i) from (80). Since (cid:107)(cid:101)wk,i−1(cid:107)2
variable with E(cid:107)(cid:101)wk,i−1(cid:107)2
(cid:107)(cid:101)wk,i−1(cid:107)2
inequality [56] to write
Ru,k >
ckχk
ρ2
max
(cid:26)
Prob
max
ηµρ2
ckχk ≤
co
ck
≤
(121)
(cid:27)
Combining (120) and (121), we obtain that the cooperation
rate for i (cid:29) 1 is upper bounded by co/ck. Using the fact that
Prob{ak(cid:96)(i) = 1} ≤ 1, we get (118).
As illustrated in Fig. 2, the feasible region of Prob{ak(cid:96)(i) =
1} is the intersection area of (118) and 0 ≤ Prob{ak(cid:96)(i) =
1} ≤ 1. We note that co has an order of µ. It describes the fact
that when µ is small, the long term estimation errors reduce
and agents have less willingness to cooperate and thus the
cooperation rate Prob{ak(cid:96)(i) = 1} becomes low. Now, the
expected communication cost for each agent k is
(cid:88)
(cid:88)
(cid:96)∈Nk\{k}
(cid:96)∈Nk\{k}
EJ com
k =
=
E[1k(cid:96)(i)ak(cid:96)(i)]ck
pk(cid:96) · Prob{ak(cid:96)(i) = 1}ck
(122)
where {k} is excluded from the summation since there is
no communication cost required for using own data. From
Theorem 1, we know that when ck is large, the expected
communication cost has an upper bound which is independent
(cid:88)
of ck, i.e., for ck ≥ co,
EJ com
k ≤
(cid:96)∈Nk\{k}
pk(cid:96)
co
ck
ck = (1 − pkk)co
(123)
1=coccocProb(i)=1} a{Prob(i)=1} a{=Prob(i)=1} a{115
Comparing (127) with (130), we get J
pub
coop ≥ J pub whenever
N(cid:88)
k=1
N β · MSDcoop + c
N(cid:80)
⇔ c ≥ co +
N [ηµ − β · MSDcoop]
(1 − pkk)
k=1
(1 − pkk) ≥ N ηµ + co
(1 − pkk)
N(cid:88)
k=1
(131)
In other words, when the transmission cost c exceeds the above
threshold, self-interested agents using the reputation protocol
obtain a lower expected public cost than cooperative agents
running the cooperative ATC strategy.
VI. NUMERICAL RESULTS
Fig. 3. A network topology with N = 20 agents.
We consider a network with N = 20 agents. The network
topology is shown in Fig. 3. The noise variance profile at the
agents is shown in Fig. 4. In the simulations, we consider
that the transmission cost ck = c is uniform and the matrix
Ru,k = Ru is uniform and diagonal. Figure 5 shows the entries
of the target vector wo of size M = 10 and the diagonal entries
of Ru. We set the step-size at µ = 0.01 and the combination
weight at αk = 0.5 for all k. The parameters used in the
reputation update rule are ε = 0.1 and the initial reputation
scores θk,(cid:96)(0) = 1 for all agents k and (cid:96). The discount factor
δk and the smoothing factor rk for all k are set to 0.99 and
0.95, respectively, and the forgetting factor ν is set to 0.01.
In this simulation, we consider a distributed random-pairing
mechanism as follows. At each time instant, each agent inde-
pendently and uniformly generates a random continuous value
from [0, 1]. Then, the agent holding the smallest value in the
network, say agent k, is paired with the neighboring agent in
Nk who has not been paired and holds the smallest value in
Nk \ {k}. Then, similar steps are followed by the agent who
has not been paired and holds the second smallest value in
the network. The random-pairing procedure continues until all
agents complete these steps.
In Fig. 6, we simulate the learning curves of instantaneous
public costs for small and large communication costs. It is
seen that in both cases, using the proposed reputation protocol,
the network of self-interested agents reaches the lowest public
cost. Therefore, the network is efficient in terms of public cost.
Furthermore, we note that in these two cases, there is only
small difference between the performance of the reputation
protocol using Algorithm 1 and the real-time implementation.
To see the general effect of c, in Fig. 7 we simulate the
public cost in steady-state versus the communication cost c.
We observe that for large and small c, the reputation protocol
performs as well as the non-sharing and the cooperative
network, respectively. The only imperfection occurs around
the switching region. Without real-time implementations, the
reputation protocol has a small degradation in the range of
c ∈ [10−2, 10−1]. While using real-time implementations (61) --
(63), we can see that the degradation happens in a wider range
of c ∈ [10−4, 10−1]. In Fig. 8, we simulate the network benefit
defined as the largest achievable ¯bk(i) averaged over all agents
Fig. 4. The noise variance profile used in the simulations.
in steady state, i.e.,
bnet (cid:44) lim
i→∞
1
N
N(cid:88)
k=1
E[¯bk(i)]
(132)
where ¯bk(i) follows the real-time implementation in (61) -- (63).
We note that the network benefits, bnet, for the non-sharing and
cooperative cases are invariant for different communication
costs since the behavior of agents is independent of c. More-
over, as expected in the form of (61), cooperative networks
generally give smaller steady-state estimation errors and thus
result in lower bnet. When the communication cost c increases,
self-interested agents following the proposed reputation pro-
tocol have less willingness to cooperate, and therefore have
larger estimation errors and predict higher values of the benefit
¯bk(i) in general.
VII. CONCLUSION
In this work, we studied the distributed information-sharing
network in the presence of self-interested agents. We showed
that without using any historical information to predict fu-
ture actions, self-interested agents with bounded rationality
become non-cooperative and refuse to share information. To
entice them to cooperate, we developed an adaptive reputation
protocol which turns the best response of self-interested agents
into an action-choosing rule.
17192061112810181659413151147321234567891011121314151617181920−10−8−6−4−20 (dB)σv,k2Agent number k16
Fig. 5. Entries of wo and Ru used in the simulations.
Fig. 7. Simulations of steady-state public costs J pub.
(a) Small communication cost c = 0.0001.
Fig. 8. Simulations of average largest achievable benefit ¯bk(i) over agents.
for
t=i+1
t=i+1
δt−i
k (cid:52)J 2
k (t) < 0 (135)
δt−i
k (cid:52)J 1
k (t) +
∞(cid:48)
k,i [ak(cid:96)(i) = 1wk,i−1] < J
J
∞(cid:48)
k,i [ak(cid:96)(i) = 1wk,i−1] − J
J
= ck +
∞(cid:48)
k,i [ak(cid:96)(i) = 0wk,i−1]
Using (49), this condition translates into requiring
∞(cid:88)
∞(cid:48)
k,i [ak(cid:96)(i) = 0wk,i−1]
(cid:12)(cid:12)(cid:12)wk,i−1, ak(cid:96)(i) = 1, Ki
(cid:105)
(cid:12)(cid:12)(cid:12)wk,i−1, ak(cid:96)(i) = 0, Ki
(cid:105)
(cid:12)(cid:12)(cid:12)wk,i−1, ak(cid:96)(i) = 1, Ki
(cid:105)
(cid:12)(cid:12)(cid:12)wk,i−1, ak(cid:96)(i) = 0, Ki
∞(cid:88)
k (t) (cid:44) E(cid:104)
− E(cid:104)
k (t) (cid:44) E(cid:104)
− E(cid:104)
where, for simplicity, we introduced
(cid:52)J 1
ak(cid:96)(t)ck
J act
k (a(cid:96)k(t))
J act
k (a(cid:96)k(t))
ak(cid:96)(t)ck
(cid:52)J 2
(134)
(cid:105)
(136)
(137)
(b) Large communication cost c = 0.5.
Fig. 6. Learning curve of public cost J pub for small and large communication
costs.
APPENDIX A
We can represent
the best response rule (51) by some
mapping function, fk(·), that maps the available realizations
of θ(cid:96)k(i) and wk,i−1 to ak(cid:96)(i), i.e.,
ak(cid:96)(i) = fk(θ(cid:96)k(i), wk,i−1)
(133)
We show the form of the resulting fk(·) later in (52). For now,
we note that construction (51) requires us to find the condition
so that
ak(cid:96)(t) = ak(cid:96)(i),
for t ≥ i
(cid:52)J 1
k (t) = ck
(138)
(139)
Following similar argument to (28), we combine Assumptions
1 and 2 to conclude that
2468100.10.150.20.25Index number m(m)Entries of w2468102468Index number m(m,m)Diagonal entries of RouRuwo050100150200250−4−3−2−101234TimePublic cost (dB)c = 0.0001Non−sharingCooperative (18)Reputation (19), w/o real-time implement.Reputation (19), w/ real−time implement.pubJ050100150200250−4−3−2−101234TimePublic cost (dB)c = 0.5Non−sharingCooperative (18)Reputation (19), w/o real-time implement.Reputation (19), w/ real−time implement.pubJ10−610−410−2100−4−3−2−1012Communication costPublic cost (dB)Non−sharingCooperative (18)Reputation (19), w/o real-time implement.Reputation (19), w/ real−time implement.pubJCommunication cost10-610-410-2100Largest achievable benefit (dB)-22-20-18-16-14-12Non-sharingCooperative (15)Reputation (16), w/ real-time implement.(cid:105)
(cid:105)
(cid:12)(cid:12)(cid:12)wk,t−1
(cid:12)(cid:12)(cid:12)wk,t−1
since these two conditional expectations depend only on
wk,t−1. Therefore, expression (140) becomes:
(cid:105)
E(cid:104)
Similarly, using the assumption wk,t−1 = wk,i−1 for t ≥ i
from (27), we have
J act
k (a(cid:96)k(t))
J act
k (a(cid:96)k(t) = 1)
(cid:12)(cid:12)(cid:12)wk,i−1, ak(cid:96)(i) = j, Ki
= E(cid:104)
+ E(cid:104)
× B(a(cid:96)k(t) = 1)
(cid:12)(cid:12)(cid:12)wk,t−1, ak(cid:96)(i) = j, Ki
(cid:105)
(cid:12)(cid:12)(cid:12)wk,t−1, ak(cid:96)(i) = j, Ki
(cid:105)
J act
k (a(cid:96)k(t) = 0)
× (1 − B(a(cid:96)k(t) = 1))
(140)
for j = 0 or 1. From (37) and (38), we can write
E(cid:104)
E(cid:104)
J act
k (a(cid:96)k(t) = 0)
J act
k (a(cid:96)k(t) = 1)
J act
k (a(cid:96)k(t) = 1)
J act
k (a(cid:96)k(t) = 0)
(cid:105)
(cid:105)
(cid:105)
(cid:12)(cid:12)(cid:12)wk,t−1, ak(cid:96)(i) = j, Ki
= E(cid:104)
(cid:12)(cid:12)(cid:12)wk,t−1, ak(cid:96)(i) = j, Ki
= E(cid:104)
(cid:12)(cid:12)(cid:12)wk,i−1, ak(cid:96)(i) = j, Ki
(cid:12)(cid:12)(cid:12)wk,t−1
(cid:105)
(cid:16)E(cid:104)
− E(cid:104)
(cid:12)(cid:12)(cid:12)wk,t−1
(cid:12)(cid:12)(cid:12)wk,i−1, ak(cid:96)(i) = j, Ki
(cid:12)(cid:12)(cid:12)wk,t−1
(cid:105)
(cid:105)
(cid:105)
J act
k (a(cid:96)k(t) = 1)
J act
k (a(cid:96)k(t))
J act
k (a(cid:96)k(t) = 0)
+ B(a(cid:96)k(t) = 1) ·
J act
k (a(cid:96)k(t) = 0)
E(cid:104)
= E(cid:104)
= E(cid:104)
E(cid:104)
where we used the definition for bk(t) from (35). We note
that using (39) we have bk(t) = bk(i) due to the assumption
wk,t−1 = wk,i−1. As a result, it follows that
J act
k (a(cid:96)k(t))
= E(cid:104)
J act
k (a(cid:96)k(t) = 0)
− B(a(cid:96)k(t) = 1)bk(i)
Let us denote by θj
k(cid:96)(t) the value of θk(cid:96)(t) at time t if ak(cid:96)(i) =
j is selected at time i. We utilize the assumption θ(cid:96)k(t) =
θ(cid:96)k(i) to rewrite B(a(cid:96)k(t) = 1) as
B(a(cid:96)k(t) = 1) = θj
(141)
k(cid:96)(t)θ(cid:96)k(i)
It then follows that
E(cid:104)
(cid:12)(cid:12)(cid:12)wk,i−1, ak(cid:96)(i) = j, Ki
(cid:12)(cid:12)(cid:12)wk,t−1
(cid:105)
(cid:105)
− θj
J act
k (a(cid:96)k(t) = 0)
J act
k (a(cid:96)k(t))
= E(cid:104)
k(cid:96)(t)θ(cid:96)k(i)bk(i)
Therefore, using (137) we get
k (t) = [θ0
(cid:52)J 2
k(cid:96)(t) − θ1
k(cid:96)(t)]θ(cid:96)k(i)bk(i)
(142)
Now, we recall that following Assumption 1 and the considered
scenario 1k(cid:96)(i) = 1, we have 1k(cid:96)(t) = 1k(cid:96)(i) = 1 for t ≥ i.
As a result, the reputation update in (45) can be approximated
(cid:12)(cid:12)(cid:12)wk,t−1
(cid:105)
(cid:12)(cid:12)(cid:12)wk,t−1
(cid:105)(cid:17)
J act
k (a(cid:96)k(t) = 0)
− B(a(cid:96)k(t) = 1)bk(t)
where we introduced
χk (cid:44) 1 − δkrk
δk(1 − rk)
(cid:40)
The best response rule fk(·) therefore becomes
> χk
if γk(i) (cid:44) bk(i)
ck
θ(cid:96)k(i)
ak(cid:96)(i) =
1,
0, otherwise
17
k(cid:96)(t) and θ1
k(cid:96)(t) are given by:
by expression (43) for sufficiently small ε. Then, under (138),
the future reputation scores θ0
k(cid:96)(t) = θk(cid:96)(i)rt−i
θ0
k(cid:96)(t) = θk(cid:96)(i)rt−i
θ1
= θk(cid:96)(i)rt−i
k + (1 − rk)
k + (1 − rt−i
t−i−1(cid:88)
q=0
)
(143)
(144)
rq
k
k
k
Therefore, expression (142) becomes
)θ(cid:96)k(i)bk(i),
for t > i
(145)
Using (139) and (145), agent k then chooses ak(cid:96)(i) = 1 if
(cid:52)J 2
k
k (t) = −(1 − rt−i
∞(cid:88)
∞(cid:88)
δt−i
k
ck +
∞(cid:88)
t=i+1
δt−i
k
ck <
ck −
∞(cid:88)
t=i+1
t=i+1
δt−i
k
⇔
t=i
ck
1 − δk
⇔
⇔ γk(i) (cid:44) bk(i)
ck
< θ(cid:96)k(i)bk(i)δk ·
>
χk
θ(cid:96)k(i)
)θ(cid:96)k(i)bk(i) < 0
k
k
δt−i
(1 − rt−i
(1 − rt−i
(cid:18) 1
1 − δk −
k
)θ(cid:96)k(i)bk(i)
rk
1 − δkrk
(cid:19)
(146)
(147)
(148)
REFERENCES
[1] C.-K. Yu, M. van der Schaar, and A. H. Sayed, "Reputation design
for adaptive networks with selfish agents," in Proc. IEEE SPAWC,
Darmstadt, Germany, Jun. 2013, pp. 160 -- 164.
[2] P. Braca, S. Marano, and V. Matta, "Enforcing consensus while moni-
toring the environment in wireless sensor networks," IEEE Trans. Signal
Process., vol. 56, no. 7, pp. 3375 -- 3380, Jul. 2008.
[3] A. G. Dimakis, S. Kar, J. M. F. Moura, M. G. Rabbat, and A. Scaglione,
"Gossip algorithms for distributed signal processing," Proceedings of
the IEEE, vol. 98, no. 11, pp. 1847 -- 1864, Nov. 2010.
[4] S. Sardellitti, M. Giona, and S. Barbarossa, "Fast distributed average
consensus algorithms based on advection-diffusion processes," IEEE
Trans. Signal Process., vol. 58, no. 2, pp. 826 -- 842, Feb. 2010.
[5] R. Olfati-Saber, J. A. Fax, and R. M. Murray, "Consensus and coop-
eration in networked multi-agent systems," Proceedings of the IEEE,
vol. 95, no. 1, pp. 215 -- 233, Jan. 2007.
[6] S. Kar and J. M. F. Moura, "Distributed consensus algorithms in
sensor networks: Link failures and channel noise," IEEE Trans. Signal
Process., vol. 57, no. 1, pp. 355 -- 369, Jan. 2009.
[7] -- -- , "Convergence rate analysis of distributed gossip (linear parame-
ter) estimation: Fundamental limits and tradeoffs," IEEE J. Sel. Topics
in Signal Process., vol. 5, no. 5, pp. 674 -- 690, Aug. 2011.
[8] A. Nedic and A. Ozdaglar, "Distributed subgradient methods for multi-
agent optimization," IEEE Trans. Autom. Control, vol. 54, no. 1, pp.
48 -- 61, Jan. 2009.
[9] L. Xiao and S. Boyd, "Fast linear iterations for distributed averaging,"
Systems and Control Letters, vol. 53, no. 1, pp. 65 -- 78, Sep. 2004.
[10] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, "Randomized gossip
algorithms," IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2508 -- 2530,
Jun. 2006.
[11] C. G. Lopes and A. H. Sayed, "Diffusion least-mean squares over
adaptive networks: Formulation and performance analysis," IEEE Trans.
Signal Process., vol. 56, no. 7, pp. 3122 -- 3136, Jul. 2008.
[12] A. H. Sayed, "Adaptive networks," Proceedings of the IEEE, vol. 102,
no. 4, pp. 460 -- 497, Apr. 2014.
[13] A. H. Sayed, S.-Y. Tu, J. Chen, X. Zhao, and Z. Towfic, "Diffusion
strategies for adaptation and learning over networks," IEEE Signal
Process. Mag., vol. 30, no. 3, pp. 155 -- 171, May 2013.
[14] A. H. Sayed, Adaptation, Learning, and Optimization over Networks.
Foundations and Trends in Machine Learning, vol. 7, no. 4-5, pp. 311-
801, NOW Publishers, Jul. 2014.
[15] -- -- , "Diffusion adaptation over networks," in Academic Press Library
in Signal Processing, R. Chellapa and S. Theodoridis, Eds., vol. 4, pp.
323 -- 454, Academic Press, Elsevier, 2014.
[16] F. S. Cattivelli and A. H. Sayed, "Diffusion LMS strategies for dis-
tributed estimation," IEEE Trans. Signal Process., vol. 58, no. 3, pp.
1035 -- 1048, Mar. 2010.
[17] S. Chouvardas, K. Slavakis, and S. Theodoridis, "Adaptive robust
distributed learning in diffusion sensor networks," IEEE Trans. Signal
Process., vol. 59, no. 10, pp. 4692 -- 4707, Oct. 2011.
[18] N. Takahashi and I. Yamada, "Link probability control for probabilistic
diffusion least-mean squares over resource-constrained networks," in
Proc. IEEE ICASSP, Dallas, TX, Mar. 2010, pp. 3518 -- 3521.
J. Chen and A. H. Sayed, "Diffusion adaptation strategies for distributed
optimization and learning over networks," IEEE Trans. Signal Process.,
vol. 60, no. 8, pp. 4289 -- 4305, Aug. 2012.
[19]
[20] O. N. Gharehshiran, V. Krishnamurthy, and G. Yin, "Distributed energy-
aware diffusion least mean squares: Game-theoretic learning," IEEE J.
Sel. Topics in Signal Process., vol. 7, no. 5, pp. 821 -- 836, Oct. 2013.
[21] C.-K. Yu, M. van der Schaar, and A. H. Sayed, "Distributed spectrum
sensing in the presence of selfish users," in Proc. IEEE CAMSAP, Saint
Martin, Dec. 2013, pp. 392 -- 395.
[22] A. Filali, A. Hafid, and M. Gendreau, "Bandwidth and computing
resources provisioning for grid applications and services," in Proc. IEEE
ICC, Dresden, Germany, Jun. 2009, pp. 1 -- 6.
[23] R. Bekkerman, M. Bilenko, and J. Langford, Scaling up Machine
Learning, Parallel and Distributed Approaches. Cambridge University
Press, 2011.
[24] D. Acemoglu and A. Ozdaglar, "Opinion dynamics and learning in
social networks," Dyn. Games Appl., vol. 1, no. 1, pp. 3 -- 49, Mar. 2011.
[25] A. Jadbabaie, P. Molavi, A. Sandroni, and A. Tahbaz-Salehi, "Non-
bayesian social learning," Game. Econ. Behav., vol. 76, no. 1, pp. 210 --
225, Sep. 2012.
[26] X. Zhao and A. H. Sayed, "Learning over social networks via diffusion
adaptation," in Proc. Asilomar Conference on Signals, Systems, and
Computers, Pacific Grove, CA, USA, Nov. 2012, pp. 709 -- 713.
[27] R. S. G Gigerenzer, Bounded Rationality: The Adaptative Toolbox.
MIT Press, 2002.
[28] D. Foster and R. Vohra, "Regret in the on-line decision problem," Games
and Economic Behavior, vol. 29, no. 1-2, pp. 7 -- 35, Oct. 1999.
[29] O. N. Gharehshiran, V. Krishnamurthy, and G. Yin, "Distributed track-
ing of correlated equilibria in regime switching noncooperative games,"
IEEE Trans. Autom. Control, vol. 58, no. 10, pp. 2435 -- 2450, Oct. 2013.
[30] G. J. Mailath and L. Samuelson, Repeated Games and Reputations:
[31]
Long-Run Relationships. Oxford University Press, 2006.
J. Xu and M. van der Schaar, "Social norm design for information
exchange systems with limited observations," IEEE J. Sel. Areas Com-
mun., vol. 30, no. 11, pp. 2126 -- 2135, Dec. 2012.
18
[32] Y. Zhang and M. van der Schaar, "Reputation-based incentive protocols
in crowdsourcing applications," in Proc. IEEE INFOCOM, Orlando,
Florida, USA, Mar. 2012, pp. 2140 -- 2148.
J. Carter, E. Bitting, and A. A. Ghorbani, "Reputation formalization for
an information-sharing multi-agent system," in Computational Intelli-
gence, vol. 18, no. 4, 2002, pp. 515 -- 534.
[33]
[34] Y. Yang, H. Hu, J. Xu, and G. Mao, "Relay technologies for wimax and
lte-advanced mobile systems," IEEE Commun. Mag., vol. 47, no. 10,
pp. 100 -- 105, Oct. 2009.
[35] C. Aliprantis, G. Camera, and D. Puzzello, "A random matching theory,"
Games Econ. Behav., vol. 59, pp. 1 -- 16, 2007.
[36] G. Ellison, "Cooperation in the prisoner's dilemma with anonymous
random matching," Rev. Econ. Stud., vol. 61, no. 3, pp. 567 -- 588, 1994.
[37] Y. Shoham and K. Leyton-Brown, Multiagent Systems: Algorithmic,
Game Theoretic and Logical Foundations. Cambridge University Press,
2008.
J. Xu, Y. Song, and M. van der Schaar, "Sharing in networks of strategic
agents," IEEE J. Sel. Topics in Signal Process., vol. 8, no. 4, pp. 717 --
731, Aug. 2014.
[38]
[39] H. A. Simon, "A behavioral model of rational choice," Quart. J. Econ.,
vol. 69, no. 1, pp. 99 -- 118, Feb. 1955.
[40] H. Park and M. van der Schaar, "On the impact of bounded rationality
in peer-to-peer networks," IEEE Signal Process. Lett., vol. 16, no. 8,
pp. 675 -- 678, Aug. 2009.
[41] M. J. Osborne and A. Rubinstein, A Course in Game Theory. Cam-
bridge, MA, 1994.
[42] A. Rapaport and A. Chammah, The Prisoners Dilemma. Univ. of
Michigan Press, 1965.
[43] R. Jurca and B. Faltings, "Eliciting truthful feedback for binary reputa-
tion mechanisms," in Proc. IEEE/WIC/ACM International Conference
on Web Intelligence, Beijing, China, Sep. 2004, pp. 214 -- 220.
[44] M. Fan, Y. Tan, and A. B. Whinston, "Evaluation and design of online
cooperative feedback mechanisms for reputation management," IEEE
Trans. Knowl. Data Eng., vol. 17, no. 2, pp. 244 -- 254, Feb. 2005.
[45] D. Houser and J. Wooders, "Reputation in auctions: Theory, and
evidence from ebay," J. Econom. Manage. Strat., vol. 15, no. 2, pp.
353 -- 369, Jun. 2006.
[46] A. Jøsang, R. Ismail, and C. Boyd, "A survey of trust and reputation
systems for online service provision," Decis. Support Syst., vol. 43,
no. 2, pp. 618 -- 644, Mar. 2007.
[47] A. H. Sayed, Adaptive Filters. Wiley, NJ, 2008.
[48] A. Nayyar, A. Gupta, C. Langbort, and T. Basar, "Common information
based Markov perfect equilibria for stochastic games with asymmetric
information: Finite games," IEEE Trans. Autom. Control, vol. 59, no. 3,
pp. 555 -- 570, Mar. 2014.
[49] G. Wyatt, "Risk-taking and risk-avoiding behavior -- The impact of
some dispositional and situational variables," Journal of Psychology,
vol. 124, pp. 437 -- 447, 1990.
[50] Ø. L. Rørtveit, J. H. Husøy, and A. H. Sayed, "Diffusion LMS with
communication constraints," in Proc. 44th Asilomar Conference on
Signals, Nov. 2010, pp. 1645 -- 1649.
J. Chen and A. H. Sayed, "Distributed Pareto optimization via diffusion
strategies," IEEE J. Sel. Topics in Signal Process., vol. 7, no. 2, pp.
205 -- 220, Apr. 2013.
[51]
[52] X. Zhao and A. H. Sayed, "Performance limits for distributed estimation
over LMS adaptive networks," IEEE Trans. Signal Process., vol. 60,
no. 10, pp. 5107 -- 5124, Oct. 2012.
J. Chen and A. H. Sayed, "On the learning behavior of adaptive
networks -- Part I: Transient analysis," IEEE Trans. Inf. Theory, vol. 61,
no. 6, pp. 3487 -- 3517, Jun. 2015.
[53]
[54] -- -- , "On the learning behavior of adaptive networks -- Part II:
Performance analysis," IEEE Trans. Inf. Theory, vol. 61, no. 6, pp.
3518 -- 3548, Jun. 2015.
19
[55] X. Zhao and A. H. Sayed, "Asynchronous adaptation and learning over
networks -- Part I: Modeling and stability analysis," IEEE Trans. Signal
Process., vol. 63, no. 4, pp. 811 -- 826, Feb. 2015.
[56] A. Papoulis and S. U. Pillai, Probability, Random Variables and
Stochastic Processes. McGraw-Hill, 2002.
Chung-Kai Yu (S'08) received the B.S. and MS
degrees in electrical engineering from the National
Taiwan University (NTU), Taiwan, in 2006 and 2008,
respectively.
From 2008 to 2011, he was a Research Assistant
in the Wireless Broadband Communication System
Laboratory at NTU. He is currently working toward
the Ph.D. degree in electrical engineering at
the
University of California, Los Angeles. His research
interests include game-theoretic learning, adaptive
networks, and distributed optimization.
Mihaela van der Schaar (F'10) is Chancellor's
Professor of Electrical Engineering at University of
California, Los Angeles. She is an IEEE Fellow since
2010, a Distinguished Lecturer of the Communica-
tions Society for 2011-2012, the Editor in Chief of
IEEE Transactions on Multimedia (2011 - 2013). She
received an NSF CAREER Award (2004), the Best
Paper Award from IEEE Transactions on Circuits and
Systems for Video Technology (2005), the Okawa
Foundation Award (2006), the IBM Faculty Award
(2005, 2007, 2008), the Most Cited Paper Award
from EURASIP: Image Communications Journal (2006), theGamenets Con-
ference Best Paper Award (2011) and the 2011 IEEE Circuits and Systems
Society Darlington Award Best Paper Award. She holds 33 granted US patents.
She is also the founding and managing director of the UCLA Center for Engi-
neering Economics, Learning, and Networks (see http://netecon.ee.ucla.edu).
For more information about her research visit: http://medianetlab.ee.ucla.edu/
Ali H. Sayed (S'90-M'92-SM'99-F'01) is professor
and former chairman of electrical engineering at the
University of California, Los Angeles, USA, where
he directs the UCLA Adaptive Systems Laboratory.
An author of more than 440 scholarly publications
and six books, his research involves several areas
including adaptation and learning, statistical signal
processing, distributed processing, network science,
and biologically inspired designs.
Dr. Sayed has received several awards including
the 2014 Athanasios Papoulis Award from the Euro-
pean Association for Signal Processing, the 2013 Meritorious Service Award,
and the 2012 Technical Achievement Award from the IEEE Signal Processing
Society. Also, the 2005 Terman Award from the American Society for Engi-
neering Education, the 2003 Kuwait Prize, and the 1996 IEEE Donald G. Fink
Prize. He served as Distinguished Lecturer for the IEEE Signal Processing
Society in 2005 and as Editor-in Chief of the IEEE TRANSACTIONS ON
SIGNAL PROCESSING (20032005). His articles received several Best Paper
Awards from the IEEE Signal Processing Society (2002, 2005, 2012, 2014).
He is a Fellow of the American Association for the Advancement of Science
(AAAS). He is recognized as a Highly Cited Researcher by Thomson Reuters.
|
1605.08883 | 1 | 1605 | 2016-05-28T12:24:27 | User-based solutions for increasing level of service in bike-sharing transportation systems | [
"cs.MA",
"physics.soc-ph"
] | Bike-sharing transportation systems have been well studied from a top-down viewpoint, either for an optimal conception of the system, or for a better statistical understanding of their working mechanisms in the aim of the optimization of the management strategy. Yet bottom-up approaches that could include behavior of users have not been well studied so far. We propose an agent-based model for the short time evolution of a bike-sharing system, with a focus on two strategical parameters that are the role of the quantity of information users have on the all system and the propensity of user to walk after having dropped their bike. We implement the model in a general way so it is applicable to every system as soon as data are available in a certain format. The model of simulation is parametrized and calibrated on processed real time-series of bike movements for the system of Paris. After showing the robustness of the simulations by validating internally and externally the model, we are able to test different user-based strategies for an increase of the level of service. In particular, we show that an increase of user information can have significant impact on the homogeneity of repartition of bikes in docking stations, and, what is important for a future implementation of the strategy, that an action on only 30% of regular users is enough to obtain most of the possible amelioration. | cs.MA | cs | User-based solutions for increasing level of
service in bike-sharing transportation systems
Juste Raimbault
Graduate School, Ecole Polytechnique, Palaiseau, France
and LVMT, Ecole Nationale des Ponts et Chauss´ees,
Champs-sur-Marne, France
[email protected]
Abstract. Bike-sharing transportation systems have been well studied
from a top-down viewpoint, either for an optimal conception of the sys-
tem, or for a better statistical understanding of their working mecha-
nisms in the aim of the optimization of the management strategy. Yet
bottom-up approaches that could include behavior of users have not been
well studied so far. We propose an agent-based model for the short time
evolution of a bike-sharing system, with a focus on two strategical pa-
rameters that are the role of the quantity of information users have on
the all system and the propensity of user to walk after having dropped
their bike. We implement the model in a general way so it is applicable to
every system as soon as data are available in a certain format. The model
of simulation is parametrized and calibrated on processed real time-series
of bike movements for the system of Paris. After showing the robustness
of the simulations by validating internally and externally the model, we
are able to test different user-based strategies for an increase of the level
of service. In particular, we show that an increase of user information
can have significant impact on the homogeneity of repartition of bikes
in docking stations, and, what is important for a future implementation
of the strategy, that an action on only 30% of regular users is enough to
obtain most of the possible amelioration.
Keywords: bike-sharing transportation system, agent-based modeling,
bottom-up complex system management
1
Introduction
Bike-sharing transportation systems have been presented as an ecological and
user-friendly transportation mode, which appears to be well complementary to
classic public transportation systems ([1]). The quick propagation of many im-
plementations of such systems across the world confirms the interesting poten-
tialities that bike-sharing can offer [2]. O'Brien & al. propose in [3] a review
on the current state of bike-sharing across the world. Inspired by the relatively
good success of such systems in Europe, possible key factors for their quality
have been questioned and transposed to different potential countries such as
China ([4,5]) or the United States ([6]).
6
1
0
2
y
a
M
8
2
]
A
M
.
s
c
[
1
v
3
8
8
8
0
.
5
0
6
1
:
v
i
X
r
a
2
Bike-sharing Agent-based Modeling
The understanding of system mechanisms is essential for its optimal exploita-
tion. That can be done through statistical analysis with predictive statistical
models ([7,8,9,10]) or data-mining techniques ([3,11]), and can give broader re-
sults such as structure of urban mobility patterns. Concerning the implementa-
tion, a crucial point in the design of the system is an optimal location of stations.
That problem have been extensively studied from an Operational Research point
of view ([12,13] for example). The next step is a good exploitation of the system.
By nature, strong asymmetries appear in the distribution of bikes: docking sta-
tions in residential areas are emptied during the day contrary to working areas.
That causes in most cases a strong decrease in the level of service (no parking
places or no available bikes for example). To counter such phenomena, operators
have redistribution strategies that have also been well studied and for which
optimal plans have been proposed ([14,15,16]).
However, all these studies always approach the problem from a top-down
point of view, in the sense of a centralized and global approach of the issues,
whereas bottom-up strategies (i. e. local actions that would allow the emergence
of desired patterns) have been to our knowledge not much considered in the
literature. User-based methods have been considered in [17,18] in the case of a
car-sharing system, but the problem stays quite far from a behavioral model of
the agents using the system, since it explores the possibility of implication of
users in the redistribution process, or of shared travels what is not relevant in
the case of bikes. Indeed the question of a precise determination of the influ-
ence of users behaviors and parameters on the level of service of a bike-sharing
systems remains open. We propose an agent-based model of simulation in order
to represent and simulate the system from a bottom-up approach, considering
bikers and parking as stations as agents and representing their interactions and
evolutions in time. That allows to explore user-targeted strategies for an increase
of the level of service, as the incitation to use online information media or to
be more flexible on the destination point. Note that our work aims to explore
effects of user-based policies, but does not pretend to give recommendations to
system managers, since our approach stays technical and eludes crucial political
and human aspects that one should take into account in a broader system design
or management context.
The rest of the paper is organized as follows. The model and indicator used
to quantify its behavior are described in Section 2. Next, Section 3 presents
the implementation and results, including internal and external validations of
the model by sensitivity analysis and simplified calibration on real data, and
also exploration of possible bottom-up strategies for system management. We
conclude by a discussion on the applicability of results and on possible develop-
ments.
2 Presentation of the model
Introduction The granularity of the model is the scale of the individual biker
and of the stations where bikes are parked. A more integrated view such as
Bike-sharing Agent-based Modeling
3
flows would not be useful to our purpose since we want to study the impact
of the behavior of individuals on the overall performance of the system. The
global working scheme consists in agents embedded in the street infrastructure,
interacting with particular elements, what is inspired from the core structure
of the Miro model ([19]). Spatial scale is roughly the scale of the district; we
don't consider the whole system for calculation power purposes (around 1300
stations on all the system of Paris, whereas an interesting district have around
100 stations), what should not be a problem as soon as in- and outflows allow to
reconstruct travels entering and getting out of the area. Tests on larger spatial
zones showed that generated travel were quite the same, justifying this choice of
scale. Focusing on some particular districts is important since issues with level
of service occur only in narrow areas. Time scale of a run is logically one full
day because of the cyclic nature of the process ([20]).
Formalisation The street network of the area
is an euclidian network (V ⊂ R2, E ⊂ V × V )
in a closed bounded part of R2. The time is
discretized on a day, so all temporal evolu-
tion are defined on T = [0, 24] ∩ τN with τ
time step (in hours). Docking stations S are
particular vertices of the network for which
constant capacities c(s ∈ S) are defined, and
that can contain a variable number of bikes
pb(s) ∈ {0, . . . , c}T . We suppose that tem-
poral fields O(x, y, t) and D(x, y, t) are de-
fined, corresponding respectively to probabili-
ties that a given point at a given time becomes
the expected departure (resp. the expected ar-
rival) of a new bike trip, knowing that a trip
starting (resp. arriving) at that time exists. Boundaries conditions are repre-
sented as a set of random variables (NI (i, t)). For each possible entry point i ∈ I
(I ⊂ V is a given set of boundaries points) and each time, NI (i, t) gives the
number of bikes trips entering the zone at point i and time t. For departures,
a random time-serie ND(t) represents the number of departures in the zone at
time t. Note that these random variables and probabilities fields are sufficient to
built the complete process of travel initiation at each time step. Parametrization
of the model will consist in proposing a consistent way to construct them from
real data.
Fig. 1: Flowchart of the decision
process of bikers, from the start of
their travel to the drop of the bike.
Docking stations are fixed agents, only their functions pb will vary through
time. The other core agents are the bikers, for which the set B(t) is variable. A
biker b ∈ B(t) is represented by its mean speed ¯v(b), a distance r(b) correspond-
ing to its "propensity to walk" and a boolean i(b) expressing the capacity of
having access to information on the whole system at any time (through a mobile
device and the dedicated application for example). The initial set of bikers B(0)
is taken empty, as t = 0 corresponds to 3a.m. when there is approximately no
travels on standard days.
Des$na$on?
Info
?
YES
NO
Free
sta$on
closest
To
objec$ve
Objec$ve
Realize
Travel
At
sta$on
?
NO
Find
sta$on
Within
radius
YES
Free
parking?
YES
Drop
bike
NO
Info
?
NO
Find
sta$on
randomly
YES
Go
to
closest
with
free
parking
and
drop
bike
4
Bike-sharing Agent-based Modeling
We define then the workflow of the model for one time step. The following
scheme is sequentially executed for each t ∈ T , representing the evolution of the
system on a day.
For each time step the evolution of the system follows this process :
– Starting new travels. For a travel within the area, if biker has information,
he will adapt his destination to the closest station of its destination with free
parking places, if not his destination is not changed.
• For each entry point, draw number of new traveler, associate to each a
destination according to D and characteristics (information drawn uni-
formly from proportion of information, speed according to fixed mean
speed, radius also).
• Draw new departures within the area according to O, associate either
destination within (in proportion to a fixed parameter pit, proportion of
internal travels) the area, or a boundary point (travel out of the area).
If the departure is empty, biker walks to an other station (with bikes if
has information, a random one if not) and will start his travel after a
time determined by mean walking speed and distance of the station.
• Make bikers waiting for start for which it is time begin their journey
(correspond to walkers for which a departure station was empty at a
given time step before)
– Make bikers advance of the distance corresponding to their speed. Travel
path is taken as the shortest path between origin and destination, as effective
paths are expected to have small deviation from the shortest one in urban
bike travels [8].
– Finish travels or redirect bikers
is finished (gets out of the area)
go to a random station within r(b)
• if the biker was doing an out travel and is on a boundary point, travel
• if has no information, has reached destination and is not on a station,
• if is on a station with free places, drop the bike
• if is on a station with no places, choose as new destination either the clos-
est station with free places if he has information, or a random one within
r(b) (excluding already visited ones, implying the memory of agents).
Fig. 1 shows the decision process for starting and arriving bikers. Note that
walking radius r(b) and information i(b) have implicitly great influence on the
output of the model, since dropping station is totally determined (through a
random process) by these two parameters when the destination is given.
Evaluation criteria In order to quantify the performance of the system, to com-
pare different realizations for different points in the parameter space or to evalu-
ate the fitness of a realization towards real data, we need to define some functions
of evaluation, proxies of what are considered as "qualities" of the system.
Bike-sharing Agent-based Modeling
5
Temporal evaluation functions These are criteria evaluated at each time step
and for which the output on the all shape of the time-series will be compared.
– Mean load factor ¯l(t) = 1S
– Heterogeneity of bike distribution: we aggregate spatial heterogeneity of load
factors on each station through a standard normalized heterogeneity indica-
(cid:80)
pb(s)
c(s)
s∈S
tor, defined by h(t) =
2
s(cid:54)=s(cid:48)∈S
1
d(s,s(cid:48) )
s(cid:54)=s(cid:48)∈S
(cid:80)
·(cid:80)
(cid:12)(cid:12)(cid:12)(cid:12) pb (s,t)
c(s) − pb (s(cid:48) ,t)
c(s(cid:48) )
d(s,s(cid:48))
(cid:12)(cid:12)(cid:12)(cid:12)
Aggregated evaluation functions These are criteria aggregated on a all day quan-
tifying the level of service integrated on all travels. We note T the set of travels
for a realization of the system and A the set of travel for which an "adverse
event" occured, i. e. for which a potential dropping station was full or a starting
station was empty. For any travel v ∈ T , we denote by dth(v) the theoretical
distance (defined by the network distance between origin and initial destination)
and dr(v) the effective realized distance.
– Proportion of adverse events: proportion of users for which the quality of
service was doubtful. A =
service Dtot = 1T ·(cid:80)
v∈T dr(v)
dth(v)
A
T
– Total quantity of detours: quantification of the deviation regarding an ideal
We also define a fitness function used for calibration of the model on real data.
If we note (lf (s, t))s∈S,t∈T the real time-series extracted for a standard day by
a statistical analysis on real data, we calibrate on the mean-square error on all
time-series, defined for a realization of the model by
M SE =
1
ST
(
pb(s, t)
c(s)
− lf (s, t))2
(cid:88)
(cid:88)
t∈T
s∈S
3 Results
3.1 Implementation and parametrization
Implementation The model was implemented in NetLogo ([21]) including GIS
data through the GIS extension. Preliminary treatment of GIS data was done
with QGIS ([22]). Statistical pre-treatment of real temporal data was done
in R ([23]), using the NL-R extension ([24]) to import directly the data. For
complete reproducibility, source code (including data collection scripts, sta-
tistical R code and NetLogo agent-based modeling code) and data (raw and
processed) are available on the open git repository of the project at http:
//github.com/JusteRaimbault/CityBikes.
Concerning the choice of the level of representation in the graphical inter-
face, we followed Banos in [25] when he argues that such exploratory models
can really be exploited only if a feedback through the interface is possible. It is
necessary to find a good compromise for the quantity of information displayed in
6
Bike-sharing Agent-based Modeling
Fig. 2: Example of the graphical output of the model for a particular district (Chatelet).
The map shows docking stations, for each the color gradient from green to red gives
the current loading factor (green : empty, red : full).
the graphical interface. In our case, we represent a map of the district, on which
link width is proportional to current flows, stations display their load-factor by
a color code (color gradient from green, lf (s) = 0, to red, lf (s) = 1). Bikes are
also represented in real time, what is interesting thanks to an option that allow
to follow some individuals and visualize their decision process through arrows
representing original destination, provenance and new destination (should be im-
plemented in further work). This feature could be seen as superficial at this state
of the work but it appears as essential regarding possible further developments
of the project (see discussion section). Fig. 2 shows an example of the graphical
interface of the implementation of the model of simulation.
Data collection All used data are open data, in order to have good reproducibility
of the work. Road network vector layer was extracted from OpenStreetMap
([26]). Time-series of real stations statuts for Paris were collected automatically1
all 5 minutes during 6 month and were imported into R for treatment with [27]
and the point dataset of stations was created from the geographical coordinates
with [28].
Parametrization The model was designed in order to have real proxies for most of
parameters. Mean travel speed is taken as ¯v =14km.h−1 from [29], where data of
trips where studied for the bike system of the city of Lyon, France. To simplify, we
1 from the dedicated website api.jcdecaux.com
Bike-sharing Agent-based Modeling
7
take same speed for all bikers : v(b) = ¯v. A possible extension with tiny gaussian
distribution around mean speed showed in experiments to bring nothing more. It
has been shown in [3] that profiles of use of bike systems stays approximatively
the same for european cities (but can be significantly different for cities as Rio or
Taipei), what justify the use of these inferred data in our case. We also use the
determined mean length of travel from [16] (here that parameter should be more
sensible to the topology so we prefer extract it from this second paper although
it seems to have subsequent methodological bias compared to the first rigorous
work on the system of Lyon), which is 2.3km, in order to determine the diameter
of the area on which our approach stays consistent. Indeed the model is built in
order to have emphasis on travels coming from the outside and on travels going
out, internal travels have to stay a small proportion of all travels. In our case,
a district of diameter 2km gives a proportion of internal travels pit ≈ 20%. We
will take districts of this size with this fixed proportion in the following.
The crucial part of the parametriza-
tion is the construction of O, D fields
and random variables NI , ND from
real data. Daily data were reduced
through sampling of time-series of
load-factors of all stations and dimen-
sion of the representation of a day
was significantly reduced through a
k-means clustering procedures (classi-
cally used in time-series clustering as
it is described in [30]). These reduced
points were then clustered again in or-
der to isolate typical weekdays from
week-ends, where the use profiles are
typically different and from special
days such as ones with very bad cli-
mate or public transportation strikes.
That allowed to create the profile of a
"standard day" that was used to infer
O, D fields through a spatial Gaussian
multi-kernel estimation (see [31]). The
characteristic size of kernels 1/σ is an
essential parameter for which we have
no direct proxy, and that will have to
be fixed through a calibration proce-
dure. The laws for NI , ND were taken
as binomial: for an actual arrival, we
consider each possible travel and in-
crease the number of drawing of each binomial law of entries by 1 at the time
corresponding to mean travel time (depending on the travel distance) before
arrival time. Probabilities of binomial laws are 1/Card(I) since we assume in-
Fig. 3: Statistical analysis of outputs.
For some aggregated outputs (here the
overall quantity of detours and the pro-
portion of adverse events), we plotted his-
tograms of the statistical distribution of
the functions on many realizations of the
model for a point in the parameter space.
Two points of the parameter space, corre-
sponding to (r = 300, pinf o = 50, σ = 80)
(green histogram) and (r = 700, pinf o =
50, σ = 80) (red) are plotted here as exam-
ples. Gaussian fits are also drawn. The rela-
tive good fit shows the internal consistence
of the model and we are able to quantify the
typical number of repetitions needed when
applying the model : supposing normal dis-
tributions for the indicator and its mean, a
95% confidence interval of size σ/2 is ob-
tained with n = (2 · 2σ·1.96/σ)2 ≈ 60
DetoursFrequency1.01.21.41.61.82.002468Adverse eventsFrequency0.000.050.100.150.20024688
Bike-sharing Agent-based Modeling
dependence of travels. For departure, we just increase by one drawings of the
binomial law at current time for an actual departure.
What we call parameter space in
the following consists in the 3 dimen-
sional space of parameters that have
not been fixed by this parametriza-
tion, i. e. the walking radius r (taken
as constant on all bikers, as for the
speed), the information proportion
pinf o what is the probability for a
new biker to have information and the
"size" of the Gaussian kernels σ (note
that the spread of distributions is de-
creasing with σ).
3.2 Robustness assessment,
exploration and calibration
Fig. 4: Simplified calibration procedure.
We plot the surface of the mean-square er-
ror on time-series of load-factors as a func-
tion of the two parameters on which we
want to calibrate. For visibility purpose,
only one surface was represented out of
the different obtained for different values
of walking radius. The absolute minimum
obtained for very large kernel has no sense
since such value give quasi-uniform proba-
bilities because of total recovering of Gaus-
sian kernels. We take as best realization the
second minimum, which is located around a
kernel size of 50 and a quantity of informa-
tion of 30%, which seem to be reasonable
values afterwards.
Internal consistence of the model Be-
fore using simulations of the model to
explore possible strategies, it is nec-
essary to assess that the results pro-
duced are internally consistent, i. e.
that the randomness introduced in the
parametrization and in the internal
rules do not lead to divergences in re-
sults. Simulations were launched on a
large number of repetitions for differ-
ent points in the parameter space and
statistical distribution of aggregated
outputs were plotted. Fig. 3 shows ex-
ample of these results. The relative
good gaussian fits and the small devi-
ation of distributions confirm the in-
ternal consistence of the model. We obtain the typical number of repetitions
needed to have a 95% confidence interval of length half of the standard devia-
tion, what is around 60, and we take that number in all following experiments
and applications. These experiments allowed a grid exploration of the parame-
ter space, confirming expected behavior of indicators. In particular, the shape
of M SE suggested to use the simplified calibration procedure presented in the
following.
Robustness regarding the study area The sensitivity of the model regarding ge-
ometry of the area was also tested. Experiments described afterwards were run
on comparable districts (Chatelet, Saint-Lazare and Montparnasse), leading to
the same conclusions, what confirms the external robustness of the model.
kernel.size20406080100info.proportion020406080100mse.lf.timeseries10500110001150012000MSE on lf−time−seriesBike-sharing Agent-based Modeling
9
Reduced calibration procedure Using experiments launched during the grid ex-
ploration of the parameter space, we are able to assess or the regularity of some
aggregated criteria, especially of the mean-square error on loads factors of sta-
tions. We calibrate on kernel size and quantity of information. For different
values of the walking radius, the obtained area for the location of the minimum
of the mean-square error stays quite the same for reasonable values of the ra-
dius (300-600m). Fig. 4 shows an example of the surface used for the simplified
calibration. We extract from that the values of around 50 for kernel size and 30
for information proportion. The most important is kernel size since we cannot
have real proxy for that parameter. We use these values for the explorations of
strategies in the following.
3.3 Investigation of user-based strategies
Influence of walking radius Taking for kernel-size and quantity of information
the values given by the calibration, we can test the influence of walking radius
on the performance of the system. Note that we make a strong assumption, that
is that the calibration stay valid for different values of the radius. As we stand
previously, this stays true as soon as we stay in a reasonable range of values (we
obtained 300m to 600m) for the radius. The influence of variations of walking
radius on indicators were tested. Most interesting results are shown in figure
5. Concerning the indicators evaluated on time-series (h and ¯l(t)), it is hard
to have a significant conclusion since the small difference that one can observe
between curves lies inside errors bars of all curves. For A, we see a decreasing
of the indicator after a certain value (300m), what is significant if we consider
that radius under that value are not realistic, since a random place in the city
should be at least in mean over 300m from a bike station. However, the results
concerning the radius are not so concluding, what could be due to the presence
of periodic negative feedbacks: when the mean distance between two stations is
reached, repartitions concerns neighbor stations as expected, but the relation is
not necessarily positive, depending on the current status of the other station.
A deeper understanding and exploration of the behavior of the model regarding
radius should be the object of further work.
Influence of information For the quantity of information, we are on the contrary
able to draw significant conclusions. Again, behavior of indicators were studied
according to variations of pinf o. Most significant are shown on figure 6. Results
from time-series are also not concluding, but concerning aggregated indicators,
we have a constant and regular decrease for each and for different values of the
radius. We are able to quantify a critical value of the information for which
most of the progress concerning indicator A (adverse events) is done, that is
around 35%. We observe for this value an amelioration of 4% in the quantity of
adverse events, that is interesting when compared to the total number of bikers.
Regarding the management strategy for an increase in the level of service, that
implies an increase of the penetration rate of online information tools (mobile
10
Bike-sharing Agent-based Modeling
(a) Time series of heterogeneity indica-
tor h(t) for different values of walking
radius. Small differences between means
could mislead to a positive effect of radius
on heterogeneity, but the error bars of all
curves recover themselves, what makes any
conclusion non-significant.
(b) Influence of walking radius on the
quantity of adverse events A. After 400m,
we observe a relative decrease of the pro-
portion. However, values under 300-400m
should be ignored since these are smaller
than the mean distance of a random point
to a station.
Fig. 5: Results on the influence of walking radius.
application e. g.) if that rate is below 50%. If it is over that value, we have shown
that efforts for an increase of penetration rate would be pointless.
4 Discussion
4.1 Applicability of the results
We have shown that increases of both walking radius and information quantity
could have positive consequences on the level of service of the system, by reducing
the overall number of adverse events and the quantity of detours especially in the
case of the information. However, we can question the possible applicability of the
results. Concerning walking radius, first a deeper investigation would be needed
for confirmation of the weak tendency we observed, and secondly it appears that
in reality, it should be infeasible to play on that parameter. The only way to
approach that would be to inform users of the potential increase in the level of
service if they are ready to make a little effort, but that is quite optimistic to
think that they will apply systematically the changes, either because they are
egoistic, because they won't think about it, or because they will have no time.
Concerning the information proportion, we cannot also force users to have
information device (although a majority of population owns such a device, they
won't necessarily install the needed software, especially if that one is not user-
friendly). We should proceed indirectly, for example by increasing the ergonomics
of the application. An other possibility would to improve information displayed
at docking stations that is currently difficult to use.
0.30.40.50.60.70100200timeheterogeneity300400500600700800900radius1002003004005006007008000.0800.090radiusadverseBike-sharing Agent-based Modeling
11
(a) Influence of proportion of information
on adverse events A for two different val-
ues of walking radius. We can conclude sig-
nificantly that the information has a pos-
itive influence. Quantitatively, we extract
the threshold of 35% that corresponds to
the majority of decrease, that means that
more is not necessarily needed.
(b) Influence of information on quantity of
detours Dtot. Curves for r = 300m and
r = 700m are shown (scale color). Here
also, the influence is positive. The effect
is more significant for high values of walk-
ing radius. The inflection is around 50%
of users informed, what is more than for
adverse events.
Fig. 6: Results on the influence of proportion of information.
4.2 Possible developments
Other possible management strategies Concerning user parameters, other choices
could have been made, as including waiting time at a fixed place, either for a
parking or a bike. The parameters chosen are both possible to influence and quite
adapted to the behavioral heuristic used in the model, and therefore were consid-
ered. Including other parameters, or changing the behavioral model such as using
discrete choice models may be possible developments of our work. Furthermore,
only the role of user was so far explored. The object of further investigation
could be the role of the "behavior" of docking stations. For example, one could
fix rules to them, as close all parkings over a certain threshold of load-factor, or
allow only departures or parkings in given configurations, etc. Such intelligent
agents would surely bring new ways to influence the overall system, but will also
increase the level of complexity (in the sense of model complexity, see [32]), and
therefore that extension should be considered very carefully (that is the reason
why we did not integrate it in this first work).
Towards an online bottom-up pilotage of the bike-sharing system Making the
stations intelligent can imply making them communicate and behave as a self-
adapting system. If they give information to the user, the heterogeneity of the
nature and quantity of information provided could have strong impact on the
overall system. That raises of course ethical issues since we are lead to ask if
it is fair to give different quantities of information to different users. However,
the perspective of a bottom-up piloted system could be of great interest from
a theoretical and practical point of view. One could think of online adaptive
algorithms for ruling the local behavior of the self-adapting system, such as ant
0.060.080.100.120255075100infoadverse300400500600700radius1.21.51.82.10255075100infodetours300400500600700radius12
Bike-sharing Agent-based Modeling
algorithms ([33]), in which bikers would depose virtual pheromones when they
visit a docking station (corresponding to their information on travel that is easy
to obtain), that would allow the system to take some local decisions of redirecting
bikers or closing stations for a short time in order to obtain an overall better level
of service. Such methods have already been studied to improve level of service
in other public transportation systems like buses [34].
Conclusion
This work is a first step of a new bottom-up approach of bike-sharing systems.
We have implemented, parametrized and calibrated a basic behavioral model
and obtained interesting results for user-based strategies for an increase of the
level of service. Further work will consist in a deeper validation of the model,
its application on other data. We suggest also to explore developments such as
extension to other types of agents (docking stations), or the study of possible
bottom-up online algorithm for an optimal pilotage of the system.
References
1. Peter Midgley. The role of smart bike-sharing systems in urban mobility. JOUR-
NEYS, 2:23–31, 2009.
2. Paul DeMaio. Bike-sharing: History, impacts, models of provision, and future.
Journal of Public Transportation, 12(4):41–56, 2009.
3. Oliver O'Brien, James Cheshire, and Michael Batty. Mining bicycle sharing data
for generating insights into sustainable transport systems. Journal of Transport
Geography, 2013.
4. Zhili Liu, Xudong Jia, and Wen Cheng. Solving the last mile problem: Ensure
the success of public bicycle system in beijing. Procedia-Social and Behavioral
Sciences, 43:73–78, 2012.
5. Xue Geng, Kai TIAN, Yu ZHANG, and Qing LI. Bike rental station planning and
design in paris [j]. Urban Transport of China, 4:008, 2009.
6. Jonathan Gifford and Arlington Campus. Will smart bikes succeed as public trans-
portation in the united states? Center for Urban Transportation Research, 7(2):1,
2004.
7. Pierre Borgnat, Patrice Abry, and Patrick Flandrin. Mod´elisation statistique cy-
clique des locations de v´elo'v `a lyon. In XXIIe colloque GRETSI (traitement du sig-
nal et des images), Dijon (FRA), 8-11 septembre 2009. GRETSI, Groupe d'Etudes
du Traitement du Signal et des Images, 2009.
8. Pierre Borgnat, Eric Fleury, C´eline Robardet, Antoine Scherrer, et al. Spatial anal-
ysis of dynamic movements of v´elo'v, lyon's shared bicycle program. In European
Conference on Complex Systems 2009, 2009.
9. Pierre Borgnat, Patrice Abry, Patrick Flandrin, Jean-Baptiste Rouquier, et al.
Studying lyon's v´elo'v: a statistical cyclic model. In European Conference on Com-
plex Systems 2009, 2009.
10. Pierre Borgnat, Patrice Abry, Patrick Flandrin, C´eline Robardet, Jean-Baptiste
Rouquier, and Eric Fleury. Shared bicycles in a city: A signal processing and data
analysis perspective. Advances in Complex Systems, 14(03):415–438, 2011.
Bike-sharing Agent-based Modeling
13
11. Andreas Kaltenbrunner, Rodrigo Meza, Jens Grivolla, Joan Codina, and Rafael
Banchs. Urban cycles and mobility patterns: Exploring and predicting trends in a
bicycle-based public transport system. Pervasive and Mobile Computing, 6(4):455–
466, 2010.
12. Jenn-Rong Lin, Ta-Hui Yang, and Yu-Chung Chang. A hub location inventory
model for bicycle sharing system design: Formulation and solution. Computers &
Industrial Engineering, 2011.
13. Jenn-Rong Lin and Ta-Hui Yang. Strategic design of public bicycle sharing sys-
tems with service level constraints. Transportation research part E: logistics and
transportation review, 47(2):284–294, 2011.
14. Alvina GH Kek, Ruey Long Cheu, and Miaw Ling Chor. Relocation simulation
model for multiple-station shared-use vehicle systems. Transportation Research
Record: Journal of the Transportation Research Board, 1986(1):81–88, 2006.
15. Rahul Nair and Elise Miller-Hooks. Fleet management for vehicle sharing opera-
tions. Transportation Science, 45(4):524–540, 2011.
16. Rahul Nair, Elise Miller-Hooks, Robert C Hampshire, and Ana Busi´c. Large-scale
vehicle sharing systems: Analysis of v´elib'. International Journal of Sustainable
Transportation, 7(1):85–106, 2013.
17. Matthew Barth and Michael Todd. Simulation model performance analysis of a
multiple station shared vehicle system. Transportation Research Part C: Emerging
Technologies, 7(4):237–259, 1999.
18. Matthew Barth, Michael Todd, and Lei Xue. User-based vehicle relocation tech-
niques for multiple-station shared-use vehicle systems. TRB Paper No. 04-4161,
2004.
19. Arnaud Banos, Annabelle Boffet-Mas, Sonia Chardonnel, Christophe Lang, Nicolas
Marilleau, Thomas Th´evenin, et al. Simuler la mobilit´e urbaine quotidienne: le
projet miro. Mobilit´es urbaines et risques des transports, 2011.
20. Patrick Vogel, Torsten Greiser, and Dirk Christian Mattfeld. Understanding bike-
sharing systems using data mining: Exploring activity patterns. Procedia-Social
and Behavioral Sciences, 20:514–523, 2011.
21. U. Wilensky. Netlogo. Center for Connected Learning and Computer-Based Mod-
eling, Northwestern University, Evanston, IL., 1999.
22. QGIS Development Team. QGIS Geographic Information System. Open Source
Geospatial Foundation, 2009.
23. R Core Team. R: A Language and Environment for Statistical Computing. R
Foundation for Statistical Computing, Vienna, Austria, 2013.
24. Jan C Thiele, Winfried Kurth, and Volker Grimm. Agent-based modelling: Tools
for linking netlogo and r. Journal of Artificial Societies and Social Simulation,
15(3):8, 2012.
25. Arnaud Banos. Pour des pratiques de mod´elisation et de simulation lib´er´ees en
G´eographie et SHS. PhD thesis, UMR CNRS G´eographie-Cit´es, ISCPIF, D´ecembre
2013.
26. Jonathan Bennett. OpenStreetMap. Packt Publishing, 2010.
27. Alex Couture-Beil. rjson: Json for r. R package version 0.2, 13, 2013.
28. Timothy H Keitt, Roger Bivand, Edzer Pebesma, and Barry Rowlingson. rgdal:
bindings for the geospatial data abstraction library. R package version 0.7-1, URL
http://CRAN. R-project. org/package= rgdal, 2011.
29. Pablo Jensen, Jean-Baptiste Rouquier, Nicolas Ovtracht, and C´eline Robardet.
Characterizing the speed and paths of shared bicycle use in lyon. Transportation
research part D: transport and environment, 15(8):522–524, 2010.
14
Bike-sharing Agent-based Modeling
30. T Warren Liao. Clustering of time series data-a survey. Pattern Recognition,
38(11):1857–1874, 2005.
31. Alexandre B Tsybakov. Introduction to nonparametric estimation. (introduction
`a l'estimation non-param´etrique.). 2004.
32. Franck Varenne, Marc Silberstein, et al. Mod´eliser & simuler. Epist´emologies et
pratiques de la mod´elisation et de la simulation, tome 1. 2013.
33. Nicolas Monmarch´e. Algorithmes de fourmis artificielles: applicationsa la classifi-
cation eta l'optimisation. PhD thesis, ´Ecole Polytechnique, 2004.
34. Carlos Gershenson. Self-organization leads to supraoptimal performance in public
transportation systems. PLoS ONE, 6(6):e21469, 06 2011.
|
1603.08961 | 3 | 1603 | 2016-07-11T22:16:35 | Betting and Belief: Prediction Markets and Attribution of Climate Change | [
"cs.MA",
"physics.soc-ph"
] | Despite much scientific evidence, a large fraction of the American public doubts that greenhouse gases are causing global warming. We present a simulation model as a computational test-bed for climate prediction markets. Traders adapt their beliefs about future temperatures based on the profits of other traders in their social network. We simulate two alternative climate futures, in which global temperatures are primarily driven either by carbon dioxide or by solar irradiance. These represent, respectively, the scientific consensus and a hypothesis advanced by prominent skeptics. We conduct sensitivity analyses to determine how a variety of factors describing both the market and the physical climate may affect traders' beliefs about the cause of global climate change. Market participation causes most traders to converge quickly toward believing the "true" climate model, suggesting that a climate market could be useful for building public consensus. | cs.MA | cs |
Betting and Belief: Prediction Markets and Attribution of Climate
Change∗
John J. Nay†, Martin Van der Linden, Jonathan M. Gilligan
October 3, 2018
ABSTRACT
Despite much scientific evidence, a large fraction of the American public doubts that greenhouse gases are causing
global warming. We present a simulation model as a computational test-bed for climate prediction markets. Traders
adapt their beliefs about future temperatures based on the profits of other traders in their social network. We simulate
two alternative climate futures, in which global temperatures are primarily driven either by carbon dioxide or by solar
irradiance. These represent, respectively, the scientific consensus and a hypothesis advanced by prominent skeptics.
We conduct sensitivity analyses to determine how a variety of factors describing both the market and the physical
climate may affect traders' beliefs about the cause of global climate change. Market participation causes most traders
to converge quickly toward believing the "true" climate model, suggesting that a climate market could be useful for
building public consensus.
1 INTRODUCTION
The climate change debate has become strongly polarized over the past two decades. Although the scientific consensus
on the anthropogenic nature of climate change strongly increased, beliefs about climate change did not evolve much
within the public (Vandenbergh et al. 2014). In addition, the divide on anthropogenic climate change between liberals
and conservatives has grown steadily as the question is becoming increasingly politicized and potentially disconnected
from scientific evidence (Kahan et al. 2011). The costs of misinformed climate policies are high. If climate change is
not human-induced but is believed to be so, public resources will be spent on unnecessary efforts. On the other hand,
if climate change is human-induced but not recognized to be so, the costs of inaction could be devastating. Effective
climate policies require acting quickly, so it would be valuable to bring the public to a prompt and accurate consensus
on the issue.
Attempts to foster such consensus face many social and psychological challenges, some of which could be ad-
dressed by creating climate prediction markets where participants can "put their money where their mouths are" (Hsu
2011, Vandenbergh et al. 2014). The idea of using prediction markets to efficiently aggregate information about un-
certain event outcomes has been widely discussed (Horn et al. 2014). Prediction markets have interesting theoretical
properties (Set and Selten 1998, Hanson 2012), and perform well in terms of prediction accuracy and information
aggregation in experiments (Hanson et al. 2006, Healy et al. 2010) simulation models (Klingert and Meyer 2012,
Jumadinova and Dasgupta 2011) and the real-world (Wolfers and Zitzewitz 2006, Pathak et al. 2015, Dreber et al.
2015). However, to the best of our knowledge, the idea that prediction markets can generate consensus on the factors
affecting uncertain events has never been explored quantitatively.
Bloch, Annan, and Bowles (2010) have proposed using derivatives markets to reduce the scientific uncertainty in
estimating the impact of future climate change. Existing prediction markets (e.g. hypermind, betfair, and PredictIt)
focus on near term events such as elections months away, so it is difficult to extrapolate empirical findings to the
climate case. Furthermore, we are interested in investigating the unobservable beliefs of traders. Therefore, we turn
∗Copyright © 2016, IEEE.
†Corresponding Author: [email protected] and johnjnay.com.
1
to simulation modeling informed by climate and economic theory. We simulate a prediction market where traders
exchange securities related to climate outcomes to explore whether, and under what social and climate conditions,
prediction markets may be useful for increasing convergence of climate beliefs. Our work can be extended as part of
a computational design process for effective climate prediction markets and we release all our code along with this
paper.
From a public policy perspective, changing the explanatory models of market participants is one of the most
important roles that prediction markets might play. This is perhaps the most important social benefit of prediction
markets given the predictive power of statistical supervised learning models, which could possibly provide information
at a much lower cost than creating and maintaining a market (Goel et al. 2010). Effective climate policy not only
requires an accurate consensus on future climate outcomes.
It also requires an accurate consensus on the causal
mechanisms influencing such outcomes. If people agree that temperature will rise, but some believe it will be due to
greenhouse gases, while others believe that it will be caused by increased solar activity, inconsistent and ineffective
policies may be implemented.
2 RELATED WORK
Agent-based simulations of prediction markets have been studied (Klingert and Meyer 2012, Tseng et al. 2010, Ju-
madinova and Dasgupta 2011), including some that feature communication between agents. In these models, however,
beliefs about the uncertain outcomes are constructed in rather abstract ways. In particular, beliefs are not based on
structural models from which agents could derive causal implications, so these models are not suitable for investigating
the convergence of the underlying explanatory models agents employ for prediction.
Tseng et al. (2010) created an agent-based model (ABM) of a continuous double auction market with multiple
market strategies, including two variants of a zero-intelligence agent. They compared the behavior of their simulation
with data from a prediction market for the outcome of political elections. They found that despite their simplicity,
zero-intelligence agents capture some salient features of real market data. Klingert and Meyer (2012) compared
the predictive accuracy of different kinds of simulated markets (continuous double auctions and logarithmic market
scoring rules) and reached similar conclusions to experimental work by Hanson et al. (2006). None of these models
featured agents learning and updating their beliefs.
Jumadinova and Dasgupta (2011) created a continuous double auction model in which agents update their beliefs
about uncertain events based on newly-acquired information. The better the information set, the more likely the agents
were to put higher weight on last period's prices when revising their beliefs. However, little structure was imposed
on the information set and the way it was used to generate the weights for updating beliefs, so that model does not
permit studying the convergence of trader beliefs about predictive models. Ontan´on and Plaza (2009) studied the
effect of deliberation on a simulated prediction market, in which agents used case-based reasoning (Aamodt and Plaza
1994) to debate uncertain outcomes with their neighbors in a social network. This model could in principle be used
to assess convergence of predictive models, but this was not done and the process of forming and revising beliefs
through argumentation is not well suited to studying stochastic time series, such as those relevant to climate prediction
markets.
3 MODEL DESIGN
In our model, traders bet on global temperature anomalies six years in the future. During the six-year period, traders
buy and sell futures. Every year, traders update their models and forecast of future temperatures based on newly
available data. At the end of each six-year period, winners collect gains and traders revise beliefs about climate
models, based on their ideology and the beliefs of top earners in their social network. In this section, we describe
the models used to generate future temperature data, agents beliefs about those models, the market procedures, and
the social network connecting agents. We conclude with details on model dynamics and an overview of the model
parameters we experimentally vary. A full Overview, Design concepts and Details (ODD) specification can be found
on the project website.
2
3.1 Temperature Models
For climate time-series, we use the annual anomaly of global mean temperature. For years from 1880 -- 2014 we use
the GISTEMP global mean land-sea annual temperature anomalies (GISTEMP Team 2016, Hansen et al. 2010) and
for years from 2015 onward, we project future climates under two alternative theories: In both theories, changes in
global temperature are proportional to changes in a deterministic forcing plus a stochastic noise term. For simplicity,
we choose two alternative expressions for the deterministic climate forcing: one, which corresponds to conventional
climate science, takes the natural logarithm of the atmospheric carbon dioxide concentration in parts per million
(Archer 2012, p. 37), and the other, which corresponds to an alternative theory advocated by many who doubt or reject
conventional climate science, takes the total solar irradiance (the brightness of sunlight, in Watts per square meter, at
the top of the atmosphere) averaged over the 11-year sunspot cycle (Soon 2005). Most scientific models of the earth's
climate include many forcings, including carbon dioxide, other greenhouse gases, aerosols, total solar irradiance, and
more. In these models, the changing CO2 concentration is, by a large margin, the strongest single forcing (IPCC 2013,
p. 14). Choosing only one forcing term for each of the competing models simplifies comparison because each model
has the same number of adjustable parameters, therefore we consider only CO2.
For CO2 we used historical emissions through 2005, harmonized with RCP 8.5 representative concentration path-
way from 2005 onward (Kolp and Riahi 2009, Riahi et al. 2011) and for TSI we used the harmonized historical values,
with a projection through 2100 from Velasco Herrera et al. (2015), which is, to our knowledge, the only prediction of
TSI for the entire 21st century.
Warming coefficients for each model were determined by linear regression of historical temperatures from 1880 --
2014 against the historical values for each model's forcing term. The noise model was determined by fitting an
ARMA(p,q) model to the residuals from the regression, using the Stan probabilistic modeling language and the
rstan package (Carpenter et al. 2016). Stan proved more numerically stable than the R nlme package for fitting
ARMA noise models. We identified the optimal model for the auto-correlated noise term by performing the regression
analysis for all combinations of p,q ∈ {0,1,2} and using the Widely Applicable Information Criterion to select the
optimal noise model (Watanabe 2013, Gelman et al. 2014). In both cases (TSI and logCO2), the optimal noise model
was AR(1).
Future climates were generated by applying the future climate forcings to Eq. 1:
Tmodel(t) = βmodelFmodel(t) + ε,
(1)
where Tmodel(t) is the temperature at time t, under a given model of what causes warming, Fmodel(t) is the forcing (TSI
or logCO2) at time t, βmodel is the regression coefficient, and ε is a noise term. The coefficient β and the parameters
of the ARMA noise model were fit to the historical data (1880 -- 2014). An example realization of future climates for
both the ln(CO2) and TSI models is shown in Fig. 1.
3.2 Climate Beliefs
Traders use one of the two models (temperature depends on CO2 or TSI) to forecast future temperature. These models
are interpreted as the trader's beliefs about the true climate process, the driving factor of long-term global temperatures.
They represent pervasive positions on climate change in the public debate. In order to approximately match the current
configuration of beliefs in climate change in the United States, during model initialization, the CO2 model is randomly
assigned to half of the traders, while the TSI model is assigned to the other half of the traders. These random model
assignments are made before the market initially opens.
Both when the true data generating process is CO2 and TSI, at model initialization approximately half of the
traders use the true data-generating model to make predictions. Traders using the true model do not necessarily make
perfectly accurate predictions however. Although these traders believe in the correct functional form of the model,
they still need to calibrate their model based on limited noisy data. Therefore, the values these traders assign to the
parameters of the model will typically be different from the exact parameters in the data-generating process.
3.3 Traders and Markets
Traders are initially endowed with a single experimental currency unit (ECU). Traders use their model to forecast the
distribution of future temperature and determine their reservation price for different securities. Each security pays 1
ECU at the end of the trading sequence if the temperature at the end of the sequence falls into a certain range.
3
Figure 1: Historical measurements of temperature and a realization of possible future temperatures under two alternate
models of climate physics.
Traders are risk-neutral expected utility maximizers. Therefore, their reservation price for a security is simply
their assessment of the probability that the temperature will fall in the range covered by the security at the end of
the sequence. At each time-step (year), the agents use the new year's temperature data to re-estimate the coefficients
for the model they believe explains climate change, using Bayesian linear regression with an AR(1) noise model.
Traders use the joint posterior probability distribution of regression and noise coefficients to estimate the probability
distribution for the temperature at the end of the current trading sequence. Stan was sufficiently fast that we could
perform a full Bayesian analysis at each time step.
Traders then use this posterior probability distribution to assign reservation prices for buying and selling securities.
Based on their reservation price, agents behave as "zero-intelligence" traders (Gode and Sunder 1993). They attempt to
sell securities at a random price above their reservation, and to buy securities at a random price below their reservation.
These trading strategies are simple but provide accurate approximations of behavior in prediction markets (Klingert
and Meyer 2012), and in financial markets more broadly.
Based on traders' sell and buy orders, traders exchange securities following a continuous-double auction (CDA)
procedure (see Model Dynamics below for more details). CDAs or some close variants are common procedures to
match buy and sell orders. CDA are notably used on large stock markets (Tseng et al. 2010).
3.4 Social Network
Traders are part of a social network where each agent forms two links at random, and then forms links randomly,
ensuring that each agent is connected to at least two other agents. Every time securities are realized, each trader
looks at the performance of her richest neighbor in the network. Traders start with the same initial amount of ECU
and differences in ECU can only come from market interactions. Therefore, if some trader is poorer than her richest
neighbor, the trader interprets it as a signal that her richest neighbor may have a better model of the climate. Then,
the trader considers adopting the model of her richest neighbor. For each trader, the willingness to revise her belief
is determined by how ideologically loaded her belief is (Kahan et al. 2011), which is a parameter we vary in our
experiments.
An example of a snapshot of a social network is depicted in Fig. 2. A segmentation parameter controls the ho-
mophily of the network: the extent to which traders are preferentially linked with other traders who share their initial
belief in the cause of climate change (CO2 or TSI), as opposed to traders with the opposite intial belief. This parameter
varies from 0 (no preference for like-minded traders) to 1 (traders are only connected to like-minded traders). Although
traders can change their beliefs over time, the connections between traders do not change as the market unfolds, i.e the
4
0123419001950200020502100YearTemperature anomaly ((cid:176)C)True driver of future climateCO2TSIHistoricalFigure 2: An example of the social network among traders. Yellow and blue circles represent traders who believe in
the two different models of climate change. Lines indicate social network connections. In a highly segmented network
(seg close to 1), most links connect like-minded traders and few connect traders with opposing beliefs.
edges are fixed. We vary the segmentation parameter in our experiments.
3.5 Model Dynamics
The time periods t are grouped into trading sequences. In a given sequence, the potential payments associated with
traded securities are all based on the temperature at the end of the sequence. For instance, the third trading sequence
might start in period t = 1964 and end in period t = 1970. In this case, a security traded in the third sequence pays 1
ECU if the temperature at t = 1970 falls into the range of temperatures covered by the security.
At each time t, traders are assumed to know the past value of the temperature T0:t, carbon dioxide CO20:t, and
In a sequence finishing at time t∗, traders also have common knowledge of CO2t:t∗
total solar irradiance TSI0:t.
and TSIt:t∗, the future values of carbon dioxide and total solar irradiance up to t∗. However, at any t, traders do
not know the value of any future temperatures. Thus, the traders know the forcing terms for the rest of the trading
sequence, but do not know the value of Tt∗. Traders can only predict Tt∗ using their approximate model and their
knowledge of T0:t, CO20:t∗, and TSI0:t∗. Notice that because T0:t, CO20:t∗, and TSI0:t∗ are common knowledge, in
each period t, any two traders with the same approximate model m form the same stochastic beliefs about future
temperatures Pt,m(Tt∗ T0:t ,CO20:t∗,TSI0:t∗). The probability distribution Pt,m incorporates both epistemic uncertainty
(the trader does not know the true values of the coefficients of the climate model) and aleatory uncertainty (in addition
to deterministic warming, the temperature exhibits stochastic noise that is directly modeled).
At each time t, traders:
1. re-calibrate m, their approximate model at time t, based on the new set of temperature data available at t,
2. use the posterior probability distribution from (1) to assign beliefs about the probability distribution of future
temperatures at time t∗: Pt,m(Tt∗ T0:t ,CO20:t∗,TSI0:t∗) and use it to determine the expected value they attach to
each security, and
3. trade on the CDA market as follows:
• Every trader i chooses at random a security sB
i she will try to buy.
5
• Every trader i also chooses at random a security sS
i she will try to sell among the securities she owns a
positive amount of (if any).
• Traders then decide of their selling price pS
expected values E(sB
i ) for securities sB
approximate model at time t). Then traders set pS
(see Model Parameters below for more details).
i ) and E(sS
i and buying price pB
i . To do so, traders first compute their
i (where expected values are with respect to i's
i at random below E(sB
i )
i and sS
i at random above E(sS
i ) and pB
• Traders go to the market one at the time, in an order drawn randomly for each t.
• When trader i comes to the market, she places limit orders in the order book. These orders specify that i is
willing to buy sB
i at any price below pB
i , and to sell sS
i at any price above pS
i .
• The market maker attempts to match i's orders with some order which was put in the book before i came
to the market.
• If there are outstanding sell offers for sB
i at a price below pB
i from the seller who sells at the lowest price below pB
i , a trade is concluded. Trader i buys one unit
i , and the sell and buy offers are removed from
of sB
the order book.
• If there are outstanding buy offers for sS
the buyer who buys at the highest price above pS
book.
i at price above pS
i , a trade is concluded. Trader i sells one unit to
i , and the sell and buy offers are removed from the order
• When all traders have come to the market, any remaining outstanding offer is removed from the order
book, and the trading period is concluded.
At t∗, when the sequence ends, there is only one security s∗ associated with a range of temperatures including the
actual temperature Tt∗. At t∗, traders:
1. receive 1 ECU per unit of s∗ they own, and
2. consider adopting their neighbors' approximate model as described in the behavioral parameters sub-section
below.
3.6 Model Parameters
The model depends on the following parameters, which we vary in simulation experiments to determine their effects
on the convergence of beliefs. We group the parameters into climate, network and individual behavioral factors.
• Climate parameters:
-- true.model: temperature data-generating process (CO2 or TSI).
• Network parameters:
-- n.traders: the number of traders.
-- n.edg: the number of edges in the social network.
-- seg: the segmentation parameter for the social network.
• Behavioral parameters:
-- risk.tak : determines the distribution of risk tolerance with respect to successfully buying or selling
securities. Higher risk tolerance corresponds to demanding more aggressive prices for buying and selling,
and hence, a higher risk of not consummating a trade that would be mutually advantageous to the buyer
and seller.
For each trader i, the level of risk.taki is drawn uniformly at random from [0, risk.tak]. The higher
risk.taki, the higher the price i will demand for selling securities, and the lower the price i will offer for
buying.
Formally, in each period, trader i picks her buying or selling price for s uniformly at random in the interval
[(1− risk.taki)reservi, reservi,t ] for buying and [reservi, (1 + risk.taki)reservi,t ] for selling.
6
Figure 3: Convergence over trading sequences for different degrees of social-network connection and segmentation.
-- ideo : determines the degree of "ideology" of traders. For each trader i, the level of ideoi is drawn
uniformly at random from [0, ideo]. If ideo is high, traders will not revise their approximate models
easily, even when faced with evidence that their richest neighbor is doing better than them. Formally, for
each trader i and each sequence, ideoi is the probability that i adopts the approximate model of her richest
neighbor if that neighbor is doing better than i at the end of the sequence (in monetary terms).
4 RESULTS
4.1 Historical Climate
As a validation that the market is operating correctly, we ran the market using actual historical temperatures from 1880
to 2014, with market betting from 1931 to 2014. Greenhouse gas concentrations did not become high enough to begin
dominating natural climate variations until the 1970s or so, and it took until the 1990s for the temperature record to
show clear signs of anthropogenic interference (IPCC 2013). Consistent with this, our simulated historical trading
sequence (Fig. 3) shows convergence to belief in the TSI model until the early 1970s, after which traders converge
toward believing the CO2 model.
7
2.4 edges per trader, segmentation = 0.052.4 edges per trader, segmentation = 0.959.6 edges per trader, segmentation = 0.059.6 edges per trader, segmentation = 0.95025507510002550751000255075100025507510019311950197520002014Year% traders believing CO2 model (n=2,688)Historical climate change1931−20142.4 edges per trader, segmentation = 0.052.4 edges per trader, segmentation = 0.959.6 edges per trader, segmentation = 0.059.6 edges per trader, segmentation = 0.95025507510002550751000255075100025507510020152025205020752100Year% traders believing true model (n = 5,376)True driver of future climateCO2TSI2015−20984.2 Future Scenarios
Our primary focus is on simulating the market in future scenarios. This is more relevant for policy design and more
interesting theoretically due to the increasing divergence of global temperature values under the two future scenarios.
The sensitivity analysis is based on a Latin hypercube sampling of 500 parameter sets from the following distributions
(Beachkofski and Grandhi 2002, Carnell 2012).
• ideo ∼ Uniform(0,1)
• n.edge ∼ Uniform(100,200) (mapped into integer)
• n.traders ∼ Uniform(50,250) (mapped into integer)
• risk.tak ∼ Uniform(0,1)
• seg ∼ Uniform(0,1)
• true.model ∼ Bernoulli(0.5)
The future CO2 forcing is taken from the RCP 8.5 scenario (Riahi et al. 2011) and the future TSI forcing is taken
from a prediction of 21st Total Solar Irradiance by Velasco Herrera et al. (2015). Because of the stochastic noise term,
the temperature time series were different in each simulation.
We used the model to perform 10 full simulations for each of the 500 input parameter sets and average the 10
convergence scores. We conducted multiple simulations for the same parameter set because there is stochasticity in the
tempertature time series, the social network structure, and the agent decision models. We then conducted a partial rank
correlation coefficient analysis on the relationship between the input matrix, X, and the resulting simulated outcome
vector of mean belief convergence scores, y (Marino et al. 2008, Pujol et al. 2014, Saltelli et al. 2009). Partial
correlation computes the linear relationship between the part of the variation of Xi and y that are linearly independent
of other Xj ( j (cid:54)= i). The difference between the partial correlation and the partial rank correlation that we use here
is that we first rank-transform that data in order to capture potentially non-linear relationships. We conduct 1,000
bootstrapped estimations of the partial rank correlation coefficients to obtain 95% confidence intervals.
The sensitivity analysis averages over time and thus masks time trends. We randomly drew from the above dis-
tributions for ideology, risk tolerance, and the number of traders, and conducted an experiment crossing 95th and 5th
percentile values for the number of edges per trader and the segmentation of the social network and both values for the
true model. We collected the time series of belief-convergence across these eight designs to visualize the distributions
of convergence over time (Fig. 3). Under most parameterizations, the median fraction of traders believing in the true
model reaches 75% in 10 -- 20 years.
5 DISCUSSION
Our sensitivity analysis, Fig. 4, shows that ideology, risk tolerance, the number of traders, the number of edges per
trader, the segmentation of the social network, and the true model all statistically significantly affect convergence.
Increasing the number of edges per trader increases the flow of information through the market, which causes traders
to converge toward believing the "true" climate model.
Segmented social networks reduce convergence by creating an "echo-chamber" effect, in which lack of interac-
tion between traders with different views reduces traders' access to information that could persuade them to change
their beliefs. This is apparent in Fig. 3, where the rate of convergence in highly segmented markets (seg = 0.95) is
considerably slower, especially in the first three trading sequences (18 years), than for markets with low segmentation
(seg = 0.05).
When the true model is CO2-driven there is more convergence toward the true model. We believe this is because
when models are fit to the historical data, the residuals from the CO2-driven model are considerably smaller than those
from the TSI-driven model. Thus, projections of future climate change using the TSI model will exhibit significantly
larger stochastic noise than the CO2 models, and this noise makes it more difficult for traders to identify the true model
when the true model is TSI.
Traders with higher risk tolerance will price buy and sell orders more aggressively, so they will earn more (or
lose less) on completed trades, but will have a greater risk of failing to complete trades. Among traders with the
8
Figure 4: Estimated effects of model parameters on convergence of beliefs in future scenario. Positive numbers
accelerate convergence and negative numbers retard it. True model refers to the true climate model being CO2, so
traders converge to the true model more quickly when carbon dioxide drives climate change than when total solar
irradiance does. Bars represent 95% confidence intervals.
correct model of climate, those with higher risk tolerance will earn more profit on completed trades (and their coun-
terparties will lose more). A trader's wealth is an important source of information, and we believe this is why greater
risk taking enables traders to identify the correct model more quickly. Additionally, the risk of failing to complete
trades adds volatility, which also puts information in play. We have observed a similar phenomenon in a very differ-
ent context, where adding stochastic noise to player decisions in iterated games improves the accuracy with which
machine-learning algorithms can identify the players' strategies (Nay and Gilligan 2015).
What is not clear to us is why increasing the number of traders slows convergence, even if the number of edges per
trader remains fixed. This is a topic for future research.
6 CONCLUSIONS
We simulate two alternative climate futures: one where CO2 is the primary driver of global temperature and one where
variations in solar intensity are the primary driver. These represent the two most plausible competing views in the
public discourse and our analysis is agnostic about which is "true".
Market participation causes traders to converge toward believing the "true" climate model under a variety of model
parameterizations in a relatively short time: In markets with low segmentation, the number of traders believing the
true model rises from 50% to 75% in roughly 12 years, and even in highly segmented markets, 75% convergence
is achieved in 18 -- 24 years.
Ideally, we would like to compare belief convergence with and without a prediction
market but because the only source of climate belief in our current model is market interactions we cannot make
this comparison. However, we do use actual temperatures for our model under historical 20th century conditions and
observe convergence to the CO2 model, whereas in the real world there is no convergence of beliefs.
Both the historical and future simulation results suggest that a climate prediction market could be useful for pro-
ducing broad agreement about the causes of climate change, and could have persuasive power for people who are
not persuaded by the overwhelming consensus among climate researchers that greenhouse gases (and especially CO2)
are responsible for the majority of observed climate change (IPCC 2013). We also find that market segmentation has
9
−1.0−0.50.00.51.0IdeologyRisk tolerance# Traders# Edges/TraderSegmentationTrue modelPartial Rank Correlation Coefficienta large effect on the speed of convergence, so transparency and effective communication about the performance of
traders with different beliefs will be important.
The fact that rapid convergence to the true model occurs regardless of which model is actually "true" may persuade
those who doubt the scientific consensus that the market is ideologically neutral, and that the deck is not stacked to
produce a pre-determined result.
All code and data for the model is available at github.com/JohnNay/predMarket. This project is a computational
test-bed for public policy design: our code can be extended to test the effects of trading strategies, cognitive models,
future climate scenarios, and market designs on the evolution of trader beliefs.
ACKNOWLEDGEMENTS
We thank Yevgeniy Vorobeychik for feedback on this project and Manuel Naumovich Velasco for sharing the data
from his Total Solar Irradiance prediction. U.S. National Science Foundation grants EAR-1416964, EAR-1204685,
and IIS-1526860 partially supported this research. All views expressed are the authors' and not the funder's.
References
Aamodt, A., and E. Plaza. 1994. "Case-Based Reasoning: Foundational Issues, Methodological Variations, and System
Approaches". AI Communications 7:39 -- 59.
Archer, D. 2012. Global Warming: Understanding the Forecast. 2nd ed. Wiley.
Beachkofski, B.,
and R. Grandhi.
43rd
AIAA/ASME/ASCE/AHS/ASC Structures, Structural Dynamics, and Materials Conference. American Insti-
tute of Aeronautics and Astronautics.
"Improved Distributed Hypercube Sampling".
2002.
In
Bloch, D., J. Annan, and J. Bowles. 2010. "Cracking the Climate Change Conundrum with Derivatives". Wilmott
Journal 2:271 -- 287.
Carnell, R. 2012. "Latin Hypercube Samples". R package, Comprehensive R Archive Network.
Carpenter, B., A. Gelman, M. Hoffman, D. Lee, B. Goodrich, M. Betancourt, M. A. Brubaker, J. Guo, P. Li, and
A. Riddell. 2016. "Stan: A Probabilistic Programming Language". Journal of Statistical Software. (in press).
Dreber, A., T. Pfeiffer, J. Almenberg, S. Isaksson, B. Wilson, Y. Chen, B. A. Nosek, and M. Johannesson. 2015. "Using
Prediction Markets to Estimate the Reproducibility of Scientific Research". Proceedings of the National Academy
of Sciences 112:15343 -- 15347.
Gelman, A., J. Hwang, and A. Vehtari. 2014. "Understanding Predictive Information Criteria for Bayesian Models".
GISTEMP Team 2016. "GISS Surface Temperature Analysis (GISTEMP)". Technical report, NASA Goddard Institute
Statistics and Computing 24:997 -- 1016.
for Space Studies.
Gode, D. K., and S. Sunder. 1993. "Allocative Efficiency of Markets with Zero-Intelligence Traders: Market as a
Partial Substitute for Individual Rationality". Journal of Political Economy 101:119 -- 137.
Goel, S., D. M. Reeves, D. J. Watts, and D. M. Pennock. 2010. "Prediction Without Markets". In Proceedings of the
11th ACM Conference on Electronic Commerce, EC '10, 357 -- 366. New York, NY, USA: ACM.
Hansen, J., R. Ruedy, M. Sato, and K. Lo. 2010. "Global Surface Temperature Change". Reviews of Geo-
Hanson, R. 2012. "Logarithmic Market Scoring Rules for Modular Combinatorial Information Aggregation". The
physics 48:RG4004.
Journal of Prediction Markets:3 -- 15.
Hanson, R., R. Oprea, and D. Porter. 2006. "Information Aggregation and Manipulation in an Experimental Market".
Journal of Economic Behavior & Organization 60:449 -- 459.
Healy, P. J., S. Linardi, J. R. Lowery, and J. O. Ledyard. 2010. "Prediction Markets: Alternative Mechanisms for
Complex Environments with Few Traders". Management Science 56:1977 -- 1996.
Horn, C. F., B. S. Ivens, M. Ohneberg, and A. Brem. 2014. "Prediction markets -- A literature review 2014". The
Journal of Prediction Markets 8:89 -- 126.
Hsu, S.-L. 2011. "A Prediction Market for Climate Outcomes". University of Colorado Law Review 83:179 -- 256.
IPCC 2013. Climate Change 2013: The Physical Science Basis. Cambridge University Press.
Jumadinova, J., and P. Dasgupta. 2011. "A Multi-Agent System for Analyzing the Effect of Information on Prediction
Markets". International Journal of Intelligent Systems 26:383 -- 409.
10
Kahan, D. M., H. Jenkins-Smith, and D. Braman. 2011. "Cultural Cognition of Scientific Consensus". Journal of Risk
Research 14:147 -- 174.
Klingert, F. M., and M. Meyer. 2012. "Comparing Prediction Market Mechanisms Using An Experiment-Based Multi-
Agent Simulation.". In Proceedings 26th European Conference on Modelling and Simulation, edited by K. G.
Troitzch, Mohring, and U. Lotzmann, 654 -- 661.
Kolp, P., and K. Riahi. 2009. "RCP Database". Technical report.
Marino, S., I. B. Hogue, C. J. Ray, and D. E. Kirschner. 2008. "A Methodology for Performing Global Uncertainty
and Sensitivity Analysis in Systems Biology". Journal of Theoretical Biology 254:178 -- 196.
Nay, J. J., and J. M. Gilligan. 2015. "Data-Driven Dynamic Decision Models". In Proceedings of the 2015 Winter
Simulation Conference, edited by L. Yilmaz, W. Chan, I. Moon, T. Roeder, C. Macal, and M. Rosetti, 2752 -- 2763:
IEEE Press.
Ontan´on, S., and E. Plaza. 2009. "Argumentation-Based Information Exchange in Prediction Markets". In Argumen-
tation in Multi-Agent Systems, edited by I. Rahwan and P. Moraitis, Number 5384 in Lecture Notes in Computer
Science, 181 -- 196. Springer Berlin Heidelberg.
Pathak, D., D. Rothschild, and M. Dudik. 2015. "A Comparison of Forecasting Methods: Fundamentals, Polling,
Prediction Markets, and Experts". Journal of Prediction Markets 9:1 -- 31.
Pujol, G., B. Iooss, and A. J. Lemaitre. 2014. "Sensitivity: Sensitivity Analysis". R package, Comprehensive R Archive
Network.
nomics 1:43 -- 62.
Riahi, K., S. Rao, V. Krey, C. Cho, V. Chirkov, G. Fischer, G. Kindermann, N. Nakicenovic, and P. Rafaj. 2011. "RCP
8.5: A Scenario of Comparatively High Greenhouse Gas Emissions". Climatic Change 109:33 -- 57.
Saltelli, A., K. Chan, and E. M. Scott. 2009. Sensitivity Analysis. Chichester: Wiley.
Set, R., and R. Selten. 1998. "Axiomatic Characterization of the Quadratic Scoring Rule". Experimental Eco-
Soon, W. W.-H. 2005. "Variable Solar Irradiance as a Plausible Agent for Multidecadal Variations in the Arctic-wide
Surface Air Temperature Record of the Past 130 Years". Geophysical Research Letters 32:L16712.
Tseng, J.-J., C.-H. Lin, C.-T. Lin, S.-C. Wang, and S.-P. Li. 2010. "Statistical Properties of Agent-based Models
in Markets with Continuous Double Auction Mechanism". Physica A: Statistical Mechanics and its Applica-
tions 389:1699 -- 1707.
Vandenbergh, M. P., K. T. Raimi, and J. M. Gilligan. 2014. "Energy and Climate Change: A Climate Prediction
Market". UCLA Law Review 61:1962 -- 2017.
Velasco Herrera, V. M., B. Mendoza, and G. Velasco Herrera. 2015. "Reconstruction and Prediction of the Total Solar
Irradiance: From the Medieval Warm Period to the 21st century". New Astronomy 34:221 -- 233.
Watanabe, S. 2013. "A Widely Applicable Bayesian Information Criterion". Journal of Machine Learning 14:867 -- 897.
Wolfers, J., and E. Zitzewitz. 2006. "Prediction Markets in Theory and Practice". Working Paper 12083, NBER.
11
|
1911.04646 | 1 | 1911 | 2019-11-12T03:07:36 | LAC-Nav: Collision-Free Mutiagent Navigation Based on The Local Action Cells | [
"cs.MA",
"cs.AI"
] | Collision avoidance is one of the most primary requirement in the decentralized multiagent navigations: while the agents are moving towards their own targets, attentions should be paid to avoid the collisions with the others. In this paper, we introduce the concept of local action cell, which provides for each agent a set of velocities that are safe to perform. Based on the realtime updated local action cells, we propose the LAC-Nav approach to navigate the agent with the properly selected velocity; and furthermore, we coupled the local action cell with an adaptive learning framework, in which the effect of selections are evaluated and used as the references for making decisions in the following updates. Through the experiments for three commonly considered scenarios, we demonstrated the efficiency of the proposed approaches, with the comparison to several widely studied strategies. | cs.MA | cs |
LAC-Nav: Collision-Free Mutiagent Navigation
Based on The Local Action Cells
Li Ning and Yong Zhang
Shenzhen Institutes of Advanced Technology, Chinese Academy of Science
{li.ning, zhangyong}@siat.ac.cn
July 11, 2021
Abstract
Collision avoidance is one of the most primary problems in the decentralized
multiagent navigation: while the agents are moving towards their own targets, at-
tentions should be paid to avoid the collisions with the others. In this paper, we
introduced the concept of the local action cell, which provides for each agent a
set of velocities that are safe to perform. Consequently, as long as the local action
cells are updated on time and each agent selects its motion within the correspond-
ing cell, there should be no collision caused. Furthermore, we coupled the local
action cell with an adaptive learning framework, in which the performance of se-
lected motions are evaluated and used as the references for making decisions in
the following updates. The efficiency of the proposed approaches were demon-
strated through the experiments for three commonly considered scenarios, where
the comparisons have been made with several well studied strategies.
1
Introduction
Collision-free navigation is a fundamental and important problem in the design of the
multiagent systems, which are widely applied in the fields such as robots control and
traffic engineering. When moving the agents in an environment with static or dynamic
obstacles, it is usually a necessary requirement to well plan the trajectories such that
no collision is caused. As the number of agents increases and the environment area
becomes large, planning the realtime motions for all agents in the centralized manner
causes huge amount of the calculations, and is often restricted by the efficiency of the
communication between the agent and the planning monitor. Therefore, it is natural
(sometimes necessary) to consider the decentralized navigation approaches, by which
the individual agent is responsible for sensing the nearby obstacles and performing
the proper motion to progress towards its destination without causing any collisions.
On the other hand, as a consequence of the decentralized navigation, it is in general
difficult for the agents to fully coordinate before making the independent moves. Thus
they should also be considered and avoided as the obstacles to each other.
1
As noticed in the existing works, when avoiding collisions with the other agents,
it is important to take into account the fact that they are also intelligent to perform
the collision avoidance motions (otherwise, undesirable oscillations may be observed
during the navigation). Consequently, it is not necessary for any individual agent to
take all the responsibility of making sure that the performed motion is safe. ORCA
[9] is a well known decentralized approach that guarantees to generate the optimal
reciprocal collision-free velocities, except for some certain conditions with densely
packed agents. BVC [11] has been proposed to restrict the agents moving inside the
non-intersecting areas, and thus the collision avoidance is guaranteed. After the safe
field of the motions (i.e. the safe range of velocities or the safe area of positions) is
determined, both of the ORCA-based approaches and the BVC-based approaches usu-
ally select the motion that is closest to the preferred motion, within the safe field. Such
a greedy strategy is natural and widely used in the local-search-based optimizations.
However, it may cause the less efficient performance in the multiagent navigation, as
the agents may refuse to detour until there is no chance to approach the target. In the
worst case, with the greedy selection, agents may get stuck in a loop of two or more
situations (also known as the deadlocks). Although some tricks have been proposed to
fix such drawbacks (including the ideas described in [11]), they are not always valid in
the concrete implementations, and the improvements vary from case to case.
In this work, in order to improve the navigation efficiency, we extend the buffered
Voronoi cell [11] in the velocity space, and consider the relative velocities for their
effects on causing the potential conflicts. In the selection of the motion to perform, the
traveling progress has been also considered, and consequently the agents may detour
earlier, as long as approaching directly to the target leads to less progress in the moving
distance.
In this work, we consider a set A of the disk-shaped agents
Problem formation.
moving in the plane. For any time point, agent ai ∈ A of position pi ∈ R2 is free
to change its velocity vi ∈ R2, and after a short time δ > 0, it moves to pi + δ ·
vi, if there is no collisions between the agents (i.e. the distance between any pair of
agents is at least the sum of their radii). For a decentralized navigation approach, it
runs independently for each individual agent ai, and based on the observations of the
environment, it updates the velocity in order to guide agent ai to arrive at the given
and fixed destination/target di ∈ R2. On the measure of the approach's performance,
we want all the agents arriving at their destinations/targets as soon as possible, without
causing any collisions.
Our contributions. We introduced the concept of the local action cell to specify
the underlying choices for the selection of the motion to perform, and proposed two
approaches (LAC-Nav and LAC-Learn) that guarantee to provide the collision-free
navigations. While the LAC-Nav approach simply perform the action of the largest pe-
nalized length (among all choices in the local action cell), the LAC-Learn approach
evaluates the performed actions and adjust the selection based on an adaptive learning
framework. The experiment results have shown that the proposed approaches perform
more efficiently in the completion time (formally defined in the section of "Experi-
2
ments"), compared to several well studied approaches.
Related works. The velocity-based collision-free navigation have been extensively
studied in the last two decades. The idea of reciprocal velocity obstacles (RVO, [10])
was introduced to reduce the problem of calculating the collision-free motion to solv-
ing a low-dimensional linear program, based on the definition of velocity obstacles
[3], and it was further improved to derive the optimal reciprocal collision avoidance
(ORCA, [9]) framework, which guarantees the optimal reciprocal collision-free mo-
tions, except for some certain conditions with densely packed agents. While the safety
of the final motion is guaranteed by ORCA, the ALAN [5] online learning framework
has been proposed for adapting the preferred motions of multiple agents without the
need for offline training; and the CNav [6] is designed to allow the agents to take the
others' preferred motion into account and adjust accordingly to achieve the better co-
ordination in the crowd environments. Notice that although the efficiency of CNav has
been demonstrated through the experiments, it requires the the spreading of some pri-
vate information of the agents, such as their preferred motions or their targets, which
is often a controversial issue in the practical applications.
As the well known Voronoi diagram can be used to divide the working space into
non-intersecting areas, it has been also adopted for the collision-free path planning with
multiple robots [4, 2]. Inspired by the algorithms for the coverage control of the agents
[7], and a Voronoi-cell-based algorithm [1] which is introduced to avoid collisions
within a larger probabilistic swarm, the buffered Voronoi cell (BVC, [11]) approach
has been proposed to achieve the collision avoidance guarantee for the multiagent nav-
igation, based on only the information of the positions. With the up-to-date information
of the others' positions, the agents are restricted to move in the non-intersecting areas,
and thus there should be no collisions. In [8], a trajectory planning algorithm was pro-
posed to navigate the agents under the higher-order dynamic limits, in which BVC is
used as the low-level strategy to avoid collisions.
2 The Local Action Cells
In this paper, we assume that all the agents in A have the same radius r for the simplic-
ity of the argument (for the case when the agents have different radii, the arguments in
this paper can be directly extended by substituting the classical Voronoi diagram with
its weighted variant). Thus for any time and any pair of non-colliding agents ai and aj,
it always holds that (cid:107)pij(cid:107)2 ≥ 2r, where pij stands for pj − pi.
Recall that in [11], the buffered Voronoi cell of agent ai is defined as
+ r ≤ 0,∀j (cid:54)= i
p ∈ R2
¯Vi =
·
,
(cid:27)
(cid:26)
(cid:19)
p − pi + pj
(cid:18)
Di =(cid:8)v ∈ R2pi + δ · v ∈ ¯Vi
pij
(cid:107)pij(cid:107)2
2
(cid:9) ,
which implies a safe velocity domain
for agent ai to change and maintain its velocity in order to reach a point in ¯Vi, where δ ∈
R+ is the length of the time interval between two consecutive updates. Equivalently,
3
domain Di can be presented as
(cid:26)
Di =
v ∈ R2 v · uij ≤ (cid:107)pij(cid:107)2 − 2r
2δ
(cid:27)
,∀j (cid:54)= i
,
where uij is the unit vector along the same direction with pj−pi, i.e. uij = pij/(cid:107)pij(cid:107)2.
Obviously, domain Di is the intersection of the half-planes Pij's for each agent aj (cid:54)=
ai, with
(cid:27)
.
Assuming that agent ai is moving at velocity vi and agent aj is moving at velocity vj,
we estimate the colliding risk by calculating
(cid:26)
Pij =
v ∈ R2 v · uij ≤ (cid:107)pij(cid:107)2 − 2r
(cid:26)
(cid:107)pij(cid:107)2 − 2r
2δ
− vj · uij
(cid:27)
2δ
vij = max
0,
(cid:26)
(cid:27)
,
(cid:107)pij(cid:107)2 − 2r
vij · τ
θij = min
1,
and
and define the safe half-plane ¯Pij of agent i according to agent aj as a subset of Pij
¯Pij = {(1 − λ + θij · λ) · vv ∈ Pij} ,
where λ ∈ [0, 1] is the relax factor indicating how much the agent considers the long-
sighted decision, and it is set to 0.5 through this paper.
Now, we are ready to define the local action cell (LAC) of agent ai, denoted by Ci,
as a subset of velocities in the intersection of all the safe half-planes, i.e.
(cid:26)
Ci =
v ∈ ∩j ¯Pij (cid:107)v(cid:107)2 ≤ min{vmax,
(ρ(v) − ρ(di − pi)) mod 2π ∈ ∆
(cid:107)di − pi(cid:107)2
},
δ
(cid:27)
where vmax indicates the maximum moving speed, di is the destination/target of agent
ai, ρ(·) denotes the angle (in radians) of the clockwise rotation of the argument vector
to align with the positive direction of the x-axis, and ∆ is a set of candidate angles
which is defined by
(cid:110)
(cid:111)
∆ =
k · π
4
k ∈ Z, 0 ≤ k < 8
,
through this paper. (See Figure 1 for an illustration of the local action cell of an agent
moving through two neighbors.)
3 Collision-Free Navigation
In this section, we introduce a distributed approach, named LAC-Nav, for the collision-
free navigation with multiple agents. As shown in Algorithm 1, the approach is straight
4
Figure 1: The local action cell of an agent (the black one) moving through two neigh-
bors.
forward with the following steps executed in loops: for each agent ai, calculate the
current local action cell; and then select a proper velocity from the cell.
Algorithm 2 follows the definition of the local action cell and describes the calcu-
lation details; Algorithm 3 shows how the new velocity is selected: Given the current
local action cell Ci, each velocity v ∈ Ci is at first evaluated according to the penalized
length ζv · (cid:107)v(cid:107)2, where ζv is the factor that is initialized as 0 < ζ ≤ 1 and decreased
exponentially on the angle between v and the direction of di − pi. Finally, the velocity
of the maximum penalized length is returned as the result.
Algorithm 1: LAC-Nav(ai): The LAC-based navigation algorithm running on
agent ai.
1 while ai is not at the destination do
2
3
4
Ci := LAC(ai);
vnew
i
agent ai moves at velocity vnew
:= SelectVel(Ci);
;
i
;
·
i
(cid:107)di−pi(cid:107)2
};
δ
Algorithm 2: LAC(ai): Calculate the current local action cell of agent ai.
1 vmax
i
i := vmax
2 v0
3 for k = 1 to 7 do
4
i ) =(cid:0)ρ(v0
:= min{vmax,
di−pi
(cid:107)di−pi(cid:107)2
i such that (cid:107)vk
i k ∈ Z∗, 0 ≤ k ≤ 7};
calculate vk
2π;
5 Ci := {vk
6 for agent aj with j (cid:54)= i do
i (cid:107)2 = vmax
i ) + k · π/4(cid:1) mod
and ρ(vk
i
7
8
9
10
calculate the safe half-plane ¯Pij;
for v ∈ Ci do
Γv := {θ · v θ · v ∈ ¯Pij, 0 ≤ θ ≤ 1};
v := arg maxu∈Γv (cid:107)u(cid:107)2;
11 Return: Ci;
While calculating the local action cells, it is not necessary to consider all the agents
in the environment. When the distance between agent ai and agent aj is at least (cid:96) :=
5
Algorithm 3: SelectVel(Ci): Select a velocity inside cell Ci as the new velocity
to move at.
1 for v ∈ Ci do
2
4αv
αv := (ρ(v) − ρ(di − pi)) mod 2π;
ζv := ζ
wv := ζv · (cid:107)v(cid:107)2;
:= arg maxv∈Ci wv
π ;
3
4
5 vnew
6 Return: vnew
i
i
;
2 · vmax · τ + 2 · r, it holds directly that θij = 1 and θji = 1. Thus the corresponding
safe half-planes can be ignored in the calculation of the agents' local action cells, which
implies it is sufficient to consider only the neighbors within distance (cid:96).
Processing complexity. When considering only the agents within a distance (cid:96), the
number of an agent's neighbors is at most 3 · (cid:96)2/r2, since there is no overlap between
the neighbors and for each of them, at least 1/3 of the body is covered by the disk of
radius (cid:96). Consequently, the loop of Lines 6 − 10 is executed for a constant time within
one step of update of an individual agent. Thus, the processing complexity of LAC
is determined by the efficiency to detect the neighbors in the specified range. In the
simulations, the neighbors can be efficiently derived through querying in a KD-Tree
that maintains all the positions, and in more practical cases, the neighbor detection is
often executed in a parallel process, and it can be assume that the required information
is always ready when it is needed.
Learning with LAC.
In LAC-Nav, the new velocity is selected according to the pe-
nalized length, which can be roughly seen as an estimate of the traveling distance of
the next move. On the other hand, it is also common to evaluate the performed ac-
tions and record the results, which also provides the information that may be useful for
making decisions in the future. In the case when a specific behavior should perform
well for a period of time, selecting the action of the best known evaluation should be
more promising than trying based on the estimates only. Generally, the evaluations are
learned as the agent keeps running in the "sense-evaluate-act" cycles.
Following the ALAN learning framework [5], we propose the LAC-Learn approach,
in which the reward of the latest performed action is defined as the summation of the
penalized lengths of the velocities in the resulting local action cell. Notice that by this
definition, the reward naturally incorporates the considerations of the goal-oriented
performance and the politeness performance, which are treated as two separate com-
ponents in ALAN. In fact, the lengths of the velocities approaching to the destination
reflect how efficient the performed action is for getting the agent closer to the goal;
and the lengths of velocities in the local action cell as a whole reflects the efficiency
in avoiding the crowding situations. In spite of the definition of the action reward,
LAC-Learn selects the new velocity in a different way from the one used in ALAN.
With LAC-Learn, the selected new velocity is the one corresponding to the action that
6
maximizes a linear combination of the reward and the penalized velocity length.
Algorithm 4: LAC-Learn(ai): Navigation algorithm of agent ai while learning
with the local action cells.
1 while ai is not at the destination do
2
3
4
5
6
7
8
Ci := LAC(ai);
Wi := CalcWeights(Ci);
Ri := UpdateReward(αi, Wi, Ri);
Si := UpdateWUCB(αi, Ri, Si);
αi := SelectAct(αi, Wi, Ri, Si);
vnew
i
agent ai moves at velocity vnew
:= Ci[αi];
;
i
Algorithm 5: SelectAct(αi, Wi, Ri, Si): Select the action for agent ai to per-
form.
1 i := 0;
2 α := Null;
3 if αi = 0 then
4
5
6
if Wi[0] ≥ η · min{vmax,
} then
(cid:107)di−pi(cid:107)2
α := 0;
i := 0;
δ
7
8
else
i := min{1, i + β};
9 if α = Null then
10
11
12
take s from [0, 1] uniformly at random;
if s < 1 − i then
α := arg maxα∈∆ ((1 − γ) · Ri[α] + γ · Wi[α]);
13
14
else
α := arg maxα∈∆ Si[α];
15 Return: α;
Inside an execution cycle of some agent ai, after the local action cell is calculated
by LAC (Algorithm 2), the penalized length of each velocity in Ci is calculated as
what has been done in Line 2 − 4 of SelectVel (Algorithms 3), and saved in a set Wi.
In UpdateReward, the reward of the last performed action is updated to the sum of all
weights in Wi, as mentioned earlier.
Notice that although the velocities given by Ci may vary from step to step, in the
local view, they can always be interpreted as the actions corresponding to the angles
specified in ∆. For example, without considering the variation of the length, the veloc-
ity pointing to the destination can always be interpreted as the action corresponding to
7
angle 0 ∈ ∆. For an action/angle α ∈ ∆, we use Ci[α] to denote the velocity v ∈ Ci
such that (ρ(v) − ρ(di − pi)) mod 2π = α.
Following the ALAN learning framework, we calculate (by UpdateWUCB) and
maintain (in Si) the upper confidence bound within a moving time window (i.e. a se-
quence of consecutive time steps), which is used when the agent explores in the action
space. As defined in [5], the wUCB score of action α during the last T ∈ Z+ steps is
defined by
(cid:115)
wUCB(α) := ¯Ri(α) +
2 ln(ν)
να
,
where ¯Ri(α) is the average reward of action α, να denotes the number of times action α
has been chosen, and ν denotes the total number of performed actions, all with respect
to the moving time window.
Similar to the context-aware action selection approach proposed in [5], SelectAct
(Algorithm 5) decides with the "win-stay, lose-shift" strategy and the adaptive -greedy
strategy in which the wUCB suggested action is chosen for the exploration.
When the agent is in the winning state (i.e. the goal-oriented action αi = 0 is per-
formed in the last update and is still a good choice in the sense that the corresponding
velocity is little constrained), it is natural to keep forwarding to the goal. Otherwise, if
the agent is in the losing state, it performs the -greedy strategy to exploit on the action
that maximizes a linear combination of the action reward and the penalized length of
the corresponding velocity. With a small and adaptively adjusted probability, the agent
explores and performs the action that maximizes the wUCB score.
the hyper-parameters η ∈ [0, 1] (Line 4 in Algorithm 5) and γ ∈ [0, 1] (Line 12 in
Algorithm 5) are determined depends on the scenarios.
4 Experiments
In this section, we present the results of running experiments with LAC-Nav and LAC-
Learn, on a computer of 7 Intel Core i7-6700 CPU (3.40 GHz) processors. The simu-
lations are implemented in Python 3.5, while the update processes of individual agents
have been speeded up by applying the multitasking scheme. For one second, there are
100 updates performed for each agent, and therefore we set δ := 0.01 in the imple-
mentation of LAC-Nav and LAC-Learn.
Scenarios. For the experiments, we considered three scenarios (Figure 2): the reflec-
tion scenario, the circle scenario and the crowd scenario, where
• in the reflection scenario, two groups of agents start from the left side and right
side of the area, respectively (Figure 2(a)). For each agent, the target is the posi-
tion on the other side that is symmetric to its start position (Figure 2(d)). Through
navigating the agents to the target positions, the picture of the starting configu-
ration is reflected.
8
• in the circle scenario, the agents start in layers of circles (Figure 2(b)), and each
agent targets the antipodal position (Figure 2(e)). That is, the picture of starting
configuration is going to be "rotated" by half of a circle, around the origin/center.
• in the crowd scenario, the start positions (Figure 2(c)) and target positions (Fig-
ure 2(f)) are randomly picked from a small area.
(a) Reflection: start
(b) Circle: start
(c) Crowd: start
(d) Reflection: target
(e) Circle: target
(f) Crowd: target
Figure 2: Experiment scenarios.
For each of these three scenarios, we compare the performances of LAC-Nav and
LAC-Learn, with the performances of approaches including BVC [11], CNav [6],
ALAN [5] and ORCA [9].
In this work, we consider two measurements: the completion time and the average
detour-distance ratio, as the evaluation of the algorithm's performance for the multia-
gent navigation tasks.
• the completion time of running a navigation algorithm is defined as the time (in
seconds) when the last agent arrives at its target, assuming all the agents start
from time 0;
• the average detour-distance ratio is defined as the average of the ratios between
the actual travel distance and the optimal travel distance (i.e. the length of the
straight line from the start position to the target position), over all the agents.
• the average detour-time ratio is defined as the average of the ratios between the
actual travel time and the optimal travel time (i.e. the time of moving in a straight
line from the start position to the target position, at the maximum speed), over
all the agents.
9
While the completion time justifies the algorithm's global performance on finishing
the navigation tasks, by investigating the detour-distance/time ratio, it provides a view
on the variance of the individual agent's behavior with different algorithms.
In the experiments for all scenarios, the agent's radius is uniformly set as r = 10,
and the maximum moving speed is set as vmax = 50. In addition, as mentioned in the
beginning of this section, within each second there are 100 updates performed for each
of the agents, which implies the that the time interval between two consecutive updates
is 0.01, i.e. δ = 0.01 in all the experiments.
Recall that when calculating the local action cells, the hyper-parameter τ > 0
is needed to locate the safe half-planes. Through all experiments involving the local
action cells, we set τ = 0.05. In addition, the penalty factor ζ is also needed in the cal-
culation of the local action cells (thus it is required when running LAC-Nav and LAC-
Learn). Through the experiments, we set ζ = 0.95, with which the goal-orthogonal
action (with angle π/2 from the direction pointing to the goal) is penalized by 0.9025,
and the goal-opposite action (along the direction leaving the goal) is penalized by about
0.8145.
For LAC-Learn, we set the mixing factor (Line 12 of Algorithm 5) as γ = 0.75 for
the reflection scenario and the circle scenario, and γ = 0.95 for the crowd scenario.
and the length of the moving time window (for the calculation of wUCB) as T = 8,
which is the minimum choice as there are 8 actions in the used ∆. Furthermore, the
incremental step (for adjusting the exploration probability) is set as β = 0.1 (Line 8 of
Algorithm 5).
For ORCA, the collision-free time window is set as τ = 0.02, i.e. twice of the
update interval's length. Recall that with CNav and ALAN, ORCA is also called to
make sure the performed velocity is collision-free, where the time window are also set
as τ = 0.02. Notice that the time window τ > 0 in ORCA has different meaning from
the hyper-parameter using the same symbol in the calculation of the local action cells,
even though they are both related to the avoidance of the potential collisions.
For CNav, the hyper-parameter for mixing the goal-oriented reward and the constrained-
reduction reward is set as γ = 0.5 for the reflection scenario, and γ = 0.9 for the circle
scenario and the crowd scenario; the number of constrained neighbors of which the
action's effect is estimated is set as k = 3; the number of the neighbor-based actions is
set as s = 3.
For ALAN, the hyper-parameter for mixing the goal-oriented reward and the polite-
ness reward is set as γ = 0.5; the length of the moving time window for the calculation
of wUCB is set as T = 5; and the incremental step for adjusting the exploration prob-
ability is set as β = 0.1.
Results.
In Figure 3, it shows the experiment results for
• the reflection scenario of 100 agents (50 agents on each side);
• the circle scenario of 120 agents (in 5 circles around the same center point);
• the crowd scenario of 100 agents located in the area of size 600 × 600.
10
Overall, LAC-Nav and LAC-Learn outperform almost all the other approaches in the
completion time. The only exception is in the reflection scenario, BVC has shown the
advantages and it completes earlier than LAC-Learn.
Figure 3: Experiment results, where ctime (s) stands for the completion time (in sec-
onds); addr stands for the average detour-distance ratio; and adtr stands for the average
detour-time ratio.
In general, the efficiency of the LAC based approaches is due to the fact that it
considers both of the task to arrive at the target and the intension to move as much
as possible in every step. The later consideration prevents the agent from the non-
necessary halting before it arrives at the target. By maintaining and comparing the
penalized lengths of all the candidate actions (according to ∆), even though the agent
still has the change to move directly towards the target, it detours as long as there is
an other action that provides a better moving (penalized) velocity. As shown in the
reflection scenario, this kind of active detouring results in a more fluent navigation as
the agents (of the antagonistic moving directions) pass by each other (Figure 4).
Recall that according to the definition of the safe half-planes, the local action cell
is depressed if there are neighbors approaching. Therefore, with the same relative po-
sition, it is easier for an agent to "follow" a leaving-away neighbor, if they have the
similar preferred trajectories. As a consequence result, in the case when there are more
conflicts, such as the circle scenario, after gathered around the central area, instead of
squeezing through (as what happens with the other approaches), the agents with the
LAC based approaches spin as a whole to resolve the conflicts (Figure 5).
Although the local action cell can be seen as a variant or extension of the buffered
Voronoi cell, it should be noticed that the LAC based approaches perform distinguish-
ably from BVC, except for the simple situation such as the reflection scenario. For the
more crowding situations (like the circle scenario and the crowd scenario), the indi-
11
ReflectionCircleCrowd0102030ctime (s)18.2824.9619.5716.4525.8517.3016.5232.7822.8622.8528.4319.7125.5132.9926.8236.1134.9429.06ReflectionCircleCrowd012addr1.081.711.231.032.541.161.031.851.161.082.151.291.162.081.291.202.211.36ReflectionCircleCrowd024adtr1.112.882.811.032.992.641.043.751.861.092.362.781.212.571.451.262.551.55LAC-LearnLAC-NavBVCCNavALANORCA(a) LAC-Nav
(b) CNav
(c) ORCA
Figure 4: The antagonistic agents pass by each other in the reflection scenario, where
the points of black outline and colored (red/blue) inside are the current positions of the
agents, and the simply colored (red/blue) points are the target positions of the agents.
(a) LAC-Nav
(b) CNav
(c) ORCA
Figure 5: Agents resolve the conflicts in the circle scenario, where the points of black
outline and colored inside are the current positions of the agents, and the simply colored
points are the target positions of the agents.
vidual agents with LAC-Nav or LAC-Learn spend more time on average, while on the
other hand the global completion time is shorter. By investigating into the experiment
processes, it can be found that the LAC based approaches caused less stuck agents than
the other approaches did. This fact can also be revealed by checking the completion
time of the first 90% arrivals (Figure 6), in which the approaches' performances are
less distinguishable.
Figure 6: The completion time (in seconds) of the first 90% arrivals.
12
ReflectionCircleCrowd010203090% ctime (s)17.1524.0316.7416.4323.9312.7716.4731.4814.8719.3924.6315.9618.1527.8115.7719.7026.6415.92LAC-LearnLAC-NavBVCCNavALANORCA5 Discussions
In this work, we introduced the definition of the local action cells, and proposed two
approaches LAC-Nav and LAC-Learn, of which the efficiency in the completion time
have been experimentally demonstrated. In order to improve the approaches' perfor-
mance, besides trying with different parameter values, there are some natural directions
that also extend the proposed approaches or make a variant.
Adaptive λ. Recall that in the definition of the safe half-plane, we have set the relax
factor as λ := 0.5. Intuitively, λ indicates how much the agents would like to compro-
mise in the next move, in order to avoid the collisions that may happen in a near future.
Although it is valid to select any value [0, 1] from the theoretical respect, it should be
noted that a very small λ may cause the local action cell being depressed too much,
and a very large λ may help little for the long-sighted consideration. The value 0.5 is a
balanced choice, and it also follows from an important idea in the reciprocal collision
avoidance: each agent take half of the responsibility to avoid the coming collisions.
However, it will be more interesting if λ can be dynamic adjusted as the agents learned
more information about the environment.
Non-uniform ∆.
In the candidate set ∆ used through this paper, the angles between
any consecutive actions are uniform. While it is natural to use another uniform candi-
date set of different size, say ∆ of size 4, 12 or 16, it is also valid to include the actions
between which the angles are arbitrary, such as the neighbor-based actions considered
in CNav. In order to prevent the actions being penalized too much, it should be better
to set ζ close to 1 or bound maximum penalty, when the size of ∆ becomes large.
Continuous LAC.
In this paper, we defined the local action cells as sets of finite
number of actions. However, it may be more natural to consider the continuous area
spanned by the velocities in a cell. There is a direct way to extend the definition of
the local action cell to include all the linear combinations between every pair of the
adjacent velocities. Formally speaking, we can define,
C∗
i = {λv · v + λu · u v and u are adjacent in Ci,
λv + λu ≤ 1, λv ≥ 0, λu ≥ 0},
which is a continuous area in the velocity space. With the continuous version the local
action cell, the agents are no longer restricted to select the actions from ∆, and they
can move in any angle as long as the corresponding velocity has a positive length.
References
[1] S. Bandyopadhyay, S. Chung, and F. Y. Hadaegh. Probabilistic swarm guid-
ance using optimal transport. In 2014 IEEE Conference on Control Applications
(CCA), pages 498 -- 505, Oct 2014.
13
[2] P. Bhattacharya and M. L. Gavrilova. Roadmap-based path planning - using the
voronoi diagram for a clearance-based shortest path. IEEE Robotics Automation
Magazine, 15(2):58 -- 66, June 2008.
[3] Paolo Fiorini and Zvi Shiller. Motion planning in dynamic environments using
velocity obstacles. The International Journal of Robotics Research, 17(7):760 --
772, 1998.
[4] Santiago Garrido, Luis Moreno, and Dolores Blanco. Voronoi diagram and fast
marching applied to path planning. volume 2006, pages 3049 -- 3054, 01 2006.
[5] Julio E. Godoy, Ioannis Karamouzas, Stephen J. Guy, and Maria Gini. Adaptive
In Proceedings of the 2015 International
learning for multi-agent navigation.
Conference on Autonomous Agents and Multiagent Systems, AAMAS'15, pages
1577 -- 1585, 2015.
[6] Julio Erasmo Godoy, Ioannis Karamouzas, Stephen J Guy, and Maria L Gini.
Implicit coordination in crowded multi-agent navigation. In Proceedings of 17th
AAAI Conference on Artificial Intelligence, AAAI'16, pages 2487 -- 2493, 2016.
[7] L. C. A. Pimenta, V. Kumar, R. C. Mesquita, and G. A. S. Pereira. Sensing and
coverage for a network of heterogeneous robots. In 2008 47th IEEE Conference
on Decision and Control, pages 3947 -- 3952, Dec 2008.
[8] Baskın S¸enbas¸lar, Wolfgang Honig, and Nora Ayanian. Robust trajectory ex-
ecution for multi-robot teams using distributed real-time replanning.
In Niko-
laus Correll, Mac Schwager, and Michael Otte, editors, Distributed Autonomous
Robotic Systems, pages 167 -- 181, Cham, 2019. Springer International Publishing.
[9] Jur Van Den Berg, Stephen Guy, Ming Lin, and Dinesh Manocha. Reciprocal
n-body collision avoidance. In Robotics Research, pages 3 -- 19. Springer, 2011.
[10] Jur P. van den Berg, M. Chiao Lin, and Dinesh Manocha. Reciprocal velocity ob-
stacles for real-time multi-agent navigation. 2008 IEEE International Conference
on Robotics and Automation, pages 1928 -- 1935, 2008.
[11] D. Zhou, Z. Wang, S. Bandyopadhyay, and M. Schwager. Fast, on-line collision
avoidance for dynamic vehicles using buffered voronoi cells. IEEE Robotics and
Automation Letters, 2(2):1047 -- 1054, April 2017.
14
|
1204.4427 | 1 | 1204 | 2012-04-19T18:24:11 | Coupling Clinical Decision Support System with Computerized Prescriber Order Entry and their Dynamic Plugging in the Medical Workflow System | [
"cs.MA"
] | This work deals with coupling Clinical Decision Support System (CDSS) with Computerized Prescriber Order Entry (CPOE) and their dynamic plugging in the medical Workflow Management System (WfMS). First, in this paper we argue some existing CDSS representative of the state of the art in order to emphasize their inability to deal with coupling with CPOE and medical WfMS. The multi-agent technology is at the basis of our proposition since (i) it provides natural abstractions to deal with distribution, heterogeneity and autonomy which are inherent to the previous systems (CDSS, CPOE and medical WfMS), and (ii) it introduces powerful concepts such as organizations, goals and roles useful to describe in details the coordination of the different components involved in these systems. In this paper, we also propose a Multi-Agent System (MAS) to support the coupling CDSS with CPOE. Finally, we show how we integrate the proposed MAS in the medical workflow management system which is also based on collaborating agents | cs.MA | cs | Coupling Clinical Decision Support System with
Computerized Prescriber Order Entry and their
Dynamic Plugging in the Medical Workflow
System
Lotfi BOUZGUENDA
Miracl laboratory/ University of Sfax/ISIM
Route de Tunis, km 10. BP 242, 3021 Sakeit Ezzit, Sfax-Tunisia
[email protected]
Abstract. This work deals with coupling Clinical Decision
Support System (CDSS) with Computerized Prescriber
Order Entry (CPOE) and their dynamic plugging in the
medical Workflow Management System (WfMS). First, in
this paper we argue some existing CDSS representative of
the state of the art in order to emphasize their inability to
deal with coupling with CPOE and medical WfMS. The
multi-agent technology is at the basis of our proposition
since (i) it provides natural abstractions to deal with
distribution, heterogeneity and autonomy which are
inherent to the previous systems (CDSS, CPOE and medical
WfMS), and (ii) it introduces powerful concepts such as
organizations, goals and roles useful to describe in details
the coordination of the different components involved in
these systems. In this paper, we also propose a Multi-Agent
System (MAS) to support the coupling CDSS with CPOE.
Finally, we show how we integrate the proposed MAS in the
medical workflow management system which is also based
on collaborating agents.
Keywords: Clinical Decision Support System , Computerized
Prescriber Order Entry, Multi-agent Technology and Medical
Workflow management System .
I.
INTRODUCTION
The purpose of Clinical Decision Support System (or
CDSS for short) is to assist health professionals with
decision making tasks, as determining diagnosis or
analysis of patient data [1].
In spite of the growing multiplicity of CDSS and their
effectiveness certified in the decision making tasks at the
time and the location of care, the state of the art of the
existing CDSS ([2-6]) emphasizes four main challenges
that require to be resolved. The first challenge is that the
clinical data that must be entered is already contained
elsewhere in a digital form in that hospital’s system, and
some CDSSs (alert system, drug-drug detection system,
medicinal errors prevention system, etc.) are not able to
access and exploit this information. The second challenge
concerns the appropriate decision making by the health
professionals to a patient. Indeed, the majority of existing
CDSS exploit only the list of the actives prescripts of the
Manel TURKI
University of Monastir/ Faculty of pharmacy
Rue Ibn Sina, 5000, Monastir-Tunisia
[email protected]
patient, which is compared with a frozen source of
knowledge fulfilled under form of mapping table. In others
terms, they do not take into account the clinical context of
the patient. A such CDSS must consider several
information’s such as patient’s symptoms, medical history,
family history and genetics. It needed to interact with
others clinical data sources such as patient administrative
data, physio-pathologic profile, biological analysis data,
etc. The third challenge is that the CDSS is often not
connected to Computerized Prescriber Order Entry
(CPOE) which assists the doctor in preparing the
prescripts.
The last challenge concerns the integration issue of the
CDSS and CPOE in the medical workflow management
system. In fact, often the clinical user must stop clinical
process on the current system, switch to the CDSS or
CPOE, and reenter data necessary into the CDSS that may
already exist in another healthcare system.
An obvious example of clinical workflow is the patient
care in an accident case. In this case, various health
professionals such as the doctors, the nurses, the
pharmacists,
must
cooperate,
synchronize
their
intervention processes, share the access to the clinical data
sources and use the CDSS, the CPOE without stop the
clinical process to act in a coherent way and in order to
give care to the patient.
Giving the previous observations, the problem being
addressed in this paper can be resumed according to the
following two questions: “how to design and develop a
CDSS which considers the previous challenges? How do
we integrate the CDSS and CPOE in the medical workflow
management system?
The contribution of the paper is to provide a Multi-
Agent System (MAS) to support the coupling CDSS with
CPOE. Then, it explains how we integrate the proposed
MAS in the medical Workflow management system.
Our approach is based on the following principles:
The use of multi-agent technology, which provides
relevant high-level features to design and implement
CDSS, CPOE and clinical workflow management
-
-
system. Indeed, Agent technology provides natural
abstractions to deal with autonomy, distribution,
heterogeneity and cooperation which are inherent to
the previous systems,
A coordination model based on organizational
dimension. A good coordination model among clinical
workflow components requires an organizational
model which attributes roles to each component and
constraints their interactions,
- An engineering perspective, which takes into account
the existing standards. It defines an architecture
which is compliant with the WfMC reference model
[7] and the involved agents communicate among them
using the FIPA-ACL standard [8]. This compliance
allows a very large usability and interoperability of the
solution.
The remainder of this paper is organized as follows.
Section 2 exposes some related works regarding the design
and the development of CDSS in order to underline their
inability to deal with the challenges as mentioned
previously. Section 3 presents our Multi-Agent System
(MAS) for supporting the coupling CDSS with CPOE.
This section first justifies the interest of use of multi-agent
technology to design and develop the CDSS, CPOE and
WfMS systems. It exposes then our proposed multi-agent
system. Section 4 shows how we integrate dynamically the
proposed MAS in the medical workflow management
system and presents an organizational model based on
message methodology [9] that structures the interactions
between agents and highlights the coordination at macro
level. Section 5 concludes the paper and gives some
perspectives.
II.
RELATED WORKS
Regarding the design and development of CDSS, the
use of agent technology is not new, and several works have
been proposed in the literature ([2-6]).
[2] defends the interest of using agents to extend the
medical expert systems. Indeed, according to the [2] the
agents can resolve some issues by checking several
conditions that could be ignored by humans and as a
consequence the elimination of some mistakes from the
physicians’ decisions. More precisely, [2] proposes a new
cooperative medical diagnosis system called “Contract Net
Based Medical Diagnosis System”. This latter owns two
specific features namely the autonomy and the flexibility
during the treatment of medical diagnosis problems. The
proposed system in [2] does not support the interaction
either with the CPOE or with the medical WfMS.
[3] proposes a CDSS called “SAPHIRE”. The main
purpose of this system is to support the definition,
deploying and performing clinical guidelines to a patient.
It is composed of a set of collaborating agents running in a
heterogeneous distributed environment. SAPHIRE has
two main advantages. Firstly, it proposes a specific agent
called “EHR” agent” that is responsible to access and
extract clinical data from the Electronic Healthcare.
Secondly, it supports the interaction with several modules
in the clinical workflow. The main limits of this work are
the following: (i) the non possibility to couple with the
CPOE and (ii) the use of agent only for the design of
CDSS.
[4] provides a framework based on multi-agent system
paradigm in order to build a comprehensive clinical
decision applications aimed at various medical conditions.
This work has not addressed the coupling issue with the
healthcare systems such as CPOE, clinical workflow
system, etc.
[5] proposes a multi-agent system called IMASC to
assist physicians and other health professionals with
decision making tasks. In spite of the system is powerful,
it does not support the previous challenges, as mentioned
in introduction, and namely the coupling with CPOE and
the dynamic integration in the medical workflow
management system.
[6] provides a prototype called MET3 which aims at
data collection, diagnosis formulation and treatment
planning. MET3 is based on multi-agent technology. It
supports the interoperability issue since it runs on different
platforms. It is also capable to interact which hospital
information systems and particularly with an electronic
patient record system via HL7 messages to provide
realistic integration with existing healthcare systems.
Our work differs from the previous works on three
points. First, it addresses the coupling CDSS with CPOE
aspect which has not been addressed in the previous
works. Second, the proposed architecture for medical
Workflow management system is compliant with the
Workflow Management Coalition reference model. Third,
to the best of our knowledge, the dynamic plugging of
CDSS and CPOE in the medical Workflow management
system through the agent technology has not been
addressed. Thus, we believe that our solution is currently
unique in trying to take into account the agents to deal
with coupling CDSS with CPOE and their dynamic
integration in the medical WfMS.
III.
A MULTI-AGENT SYSTEM FOR COUPLING CDSS WITH
CPOE
This section is devoted to the motivation for using
multi-agent technology and presents our multi-agent
system for coupling CDSS with CPOE.
A. Motivation for using multi-agent technology
The multi-agent technology can help the design and
the development of CDSS, CPOE and clinical workflow
system thanks to the following high- level properties [10]:
- Autonomy of agents eases the cooperation since it
avoids regular and direct interventions of the systems:
the medical information system or clinical workflow
management system can be agentified to support the
cooperation and provides needed information to each
health professional. Agents can also play the role of
interface between the actors and the system (filtering
and notification of events, providing relevant views of
the whole system and its evolution).
- Natural abstractions to deal with cooperation. A lot of
sophisticated protocols like Contract-Net Protocols
and Negotiation mechanisms are available and could
be used to coordinate processes ([11] [12]). Agent
technology also provides organizational concepts to
abstract and structure a system as a computational
community made of groups, roles and interaction.
Pro-active and reactive attitudes of agents ease the
control and enactment of clinical processes as well as
reactions to events, and hence the synchronization of
related activities. Being able to exhibit goal-directed
behaviour, agents can take the initiative to select and
engage cooperation with others actors.
Social abilities of agents also ease the cooperation
needed to enact complex clinical workflows and to
provide an abstraction to high- level concepts like
commitments, reputations and so on.
-
-
B. The proposed MAS for coupling CDSS with CPOE
In order to support the coupling CDSS with CPOE, we
propose a Multi-Agent System (MAS) where each agent
plays a specific role or function and exploits one or several
clinical data sources. More precisely, the architecture of
our MAS is organized around five clinical data sources
and ten specialized agent. Let us detail the role/function of
each agent.
The communication between agents is assured thanks
to the FIPA-ACL language [8].
The Information Collection Agent (ICA) is responsible
to extract information’s from two clinical data sources
(patient administrative data and physio-pathologic profile)
such as name, type, date of birth, service, weight, size,
diagnosis, allergy, against indications, situations at risk
and so on. It is to signal that these information’s are
managed by a medical information system and they can be
also exploited by the others systems like CDSS and CPOE
in our context. In this case, this agent answers to the two
first challenges as mentioned in introduction i.e. we
haven’t need to enter these information’s again.
Clinica l data so urces
Computer ized Presciber Order
E ntry , CPOE
Clinical Decision
Suppo rt System, CDSS
Drug Errors De te c t ion
Agent
Informa t ion Colle c tion
Age nt
Drug Se lec t ion Agent
The ra peut ic file Agent
informat ion De l ive ry
Agent
P re sc ription ana lyze r
Age nt
Pha rma cy S toc k-
Che cke r Agent
Adminis tra tion Mode
S ele c tion Agent
P rotocols Re cording
Agent
Drug-Drug Inte rac t ion
De tec t ion Agent
Pa tient
Administrative
Data
Physio
Pathologic
profile
Data bank of
drugs
Drug
Repository
Biologica l
Analysis
data
In terac tio n b etween agen ts
b elong in g to th e same system
In teractio n be tween
ag en ts belo ng ing to the
d ifferen t systems
I nteractio n b etween
agents an d clin ica l
data sources
Figure 1. A MAS for Coupling CDSS with CPOE
The Drug Selection Agent (DSA) cooperates with the
ICA and the Pharmacy Stock Checker Agent (PSCA)
when selecting the drug form data bank of drugs. The role
of the PSCA is to verify from the drug repository if the
selected drug is available or in rupture of supply. In
unavailability case, it recommends to substitute the drug
by another generic. The DSA also interacts with the
Administration Mode Selection Agent (AMSA) who
provides relevant information’s regarding administration
mode, for each selected drug, such as unit of catch, dosage
by default, and borders dosage by catch, a day and by
kilogram of weight. To do this, it enters in connection with
the Drug Errors Detection Agent.
The Prescription Analyzer Agent (PAA) triggers two
agents to analyze and validate the current prescription: the
Drug Errors Detection Agent (DEDA) and the Drug-Drug
Interaction Detection Agent (DDIDA). More precisely, the
Drug Errors Detection Agent (DEDA) interacts with the
AMSA and DDIDA in order to verify if there is an error
such as error of dose, error of choice (i.e. a drug not
conforms to the reference), drug-drug interaction or error
of administration mode and so on. In the literature, we
distinguish two types of medicinal errors. A medicinal
error is said potential if it was discerned before drug
arrives up to the patient. It is said proved to be if it was
discerned after the catch of drug by the patient. In our
work, we support the first type of medicinal error in order
to guarantee a well service to the patient.
The Drug-Drug Interaction Detection Agent (DDIDA)
consists in proving if the association of medicaments is
likely to cause undesirable effects, allergies, etc. To do
this, it interacts with the Drug Errors Detection Agent and
exploits the biological analysis data source.
The Protocols Recording Agent (PRA) stores all types
of prescripts as protocols which will be then
called by their title. As a consequence, the time of
prescript becomes considerably reduced.
The Information Delivery Agent (IDA) is responsible
to deliver the information to the concerned clinical user
like the chemist, the nurse, etc.
The Therapeutic File Agent (TFA) preserves the
validated prescription as archived files in order to be
exploited in the future.
IV.
DYNAMIC PLUGGING OF CDSS AND CPOE IN THE
MEDICAL WORKFLOW MANAGEMENT SYSTEM
The purpose of this section is (i) to rethink the
reference model of a WfMS with agent technology in order
to deal with medical processes and (ii) to show how we
integrate the MAS that supports the coupling CDSS with
COPE in the new architecture of WfMS.
A. The reference architecture of a WfMS
According to this architecture, a WfMS includes a
Workflow Enactment Service (WES) and supports the
following interfaces (see figure 2) [7]:
Interface 1 with Process Definition,
-
Interface 2 with Workflow Client Applications,
-
Interface 3 with Invoked Applications,
-
-
-
Interface 4 with others WESs,
Interface 5 with Administration and Monitoring.
P roce s s e s
de finitions Tools
1
M onitoring and
adm inis tra tion Tools
5
Workflow Enac tm ent
Se rvice (WES) (engine )
Othe rs WES
4
3
2
C lients
Applica tions
Invoked applica tions
Figure 2. The reference model of a WfMS [7]
Two main components of this architecture are the
WES and Interface 4. The aim of the WES, on which one
imposes no constraints upon its internal structure, is to
manage the execution of one or several instances of
processes while the aim of Interface 4 is to connect WfMS
together in order to share the execution of a workflow
process between different WESs of different organizations.
However, this reference architecture is inadequate in
the clinical context since the WES must not only execute
clinical processes but also must mix different concurrent
activities including clinical decision making, analyzing
and validation of prescription, etc. In others words, the
WES need to cooperate with CDSS and CPOE.
B. Revisiting the WES with agents and dynamic
plugging of CDSS and CPOE
Figure 3 explains how we have rethought the
Workflow Enactment Service using agents. This
architecture includes (i) as many Clinical Workflow agents
as running clinical process instances, (ii) an Agent
Manager responsible for these Clinical Workflow Agents,
(iii) a Connector Agent that interacts with CDSS and
CPOE specialized respectively in clinical decision making
and prescription elaborating, and, (iv) a new interface,
Interface 6, to support the communication between a
Connector Agent and the proposed MAS.
Regarding clinical Workflow Agents, the idea is to
implement each clinical process instance (stored in the
Clinical Processes database, CP) as a software process, and
to encapsulate this instance within an (pro-) active agent.
Such a clinical Workflow Agent includes a workflow
engine that, as and when the clinical process instance
progresses, reads the CP schema definition (specified in
XML schema), and triggers the action(s) to be done
according to its current state. This clinical Workflow
Agent supports interface 3 with the applications that are to
be used to perform pieces of work associated to process’
tasks.
W ork f low
Eng ine
C linic a l
W o r kf low
A ge nt
1 , 2 ,5
A ge nt M anage r
C linic a l
P r oce sses
D a taba se
4
C lin ic a l
W ork flow
A gen t
C linica l
W or kf low
A ge nt
3
3
C onne c tion
A ge n t
6
C o m p u te r iz e d
P r e sc r ib e r O r d e r E n t r y
( C PO E )
C l in i c a l D e c is io n
S u p p o r t S y s t e m
( C D S S )
Figure 3. Dynamic plugging of the proposed MAS in the medical Workflow
Management System
The Agent Manager controls and monitors the running
of clinical Workflow Agents:
Upon a request for a new instance of a clinical process,
the agent manager creates a new instance of the
corresponding clinical process agent schema, initializes its
parameters according to the context, and launches the
running of its workflow engine.
It ensures the persistency of clinical Workflow Agents
that execute long-term clinical processes extending to a
long time in which task performances are interleaved with
periods of inactivity.
It coordinates clinical Workflow Agents in their use of
shared resources.
It assumes interfaces 1, 2 and 5 of the WfMS with the
environment.
The role of the Connector Agent is to help clinical
Workflow Agents to find the clinical information they
need. More precisely, the Connector Agent interacts with
CDSS specialized in clinical decision making. This
requires defining a new interface, Interface 6 that supports
the communication between a Connector Agent, the CDSS
and the COPE. Interface 4 of the reference architecture
cannot be used for such a communication since it only
supports the execution of a clinical process between
different workflow engines.
In our proposition, we consider coordination as a
specific component when designing and implementing a
clinical Workflow, and consequently, we separate
coordination activities from clinical processes execution.
That is why we introduced mediation infrastructure,
gathering the CDSS and COPE. This infrastructure of
course independent of the WES, and is dynamically
plugged to it only when it is necessary.
The standard FIPA-ACL (Foundations of Intelligent
Physical Agents-Agent Communication Language [8]), is
used to support the interaction, through message
exchange, between the agents inside the architecture of
WfMS. FIPA-ACL offers a convenient set of performatives
for supporting the cooperation between agents (e.g.
inform, ask, propose, agree, cfp,...). Moreover, FPA-ACL
supports exchange messages between heterogeneous
agents since (i) the language used to specify the message is
free and (ii) a message can refer to ontology. This is very
interesting in the context of inter organization clinical
processes since ontology can be used to solve semantic
interoperability problems.
C. An organizational model based on message
methodology for ruling the interaction between the
clinical workflow components
Our organizational model (see figure 4) is organized
around the following components:
-
Three organizations represented by triangles:
-
Ten agents represented by circles :
- Nine tasks represented by polygons:
-
Three roles represented by moon:
-
and three goals represented by double circles:
For clarity reason of the organizational model we give
only the tasks, goals and roles for three agents (Agent
Manager and Drug-Drug Interaction Detection Agent and
Prescription Analyzer Agent.
Agent
Ro le
Organ iza t ion
T as k
Serv ic e
GoalGoal
«int erac t ion» : WAPI4, WAPI 6, F IPA-AC L
«execut ion»
Resource
«play» , «w ish»
C rea t ing C linica l
W ork f low Agent s
C linical
Proces ses
Agen t
M anager
Perform ing
c linic al
Goal
proces ses
Superv is ing
the execut ion
of process
isnt anc es
Manager
Phys io
Pa thologic
prof ile
D ata
bank of
drugs
Superv is ing
the
Presc ript ion
Ana lyz ing
C rea t ing
Pres c rip t ion
Goal
Pat ient
Adm in
Da ta
Therapeut i
c f ile Agent
Informa t ion
C ollec t ion
Agent
I nformat ion
De livery
Agent
Agen t s
Coordinator
D rug
Selec t ion
Agen t
Presc ript io
n Ana lyser
Agent
Pharmac y
Stock
Check er
Agen t
Adm in
Mode
Se lec t ion
Agent
C l inica l
Work f low
A gent
Connec tor
Agen t
D rug
Repos itory
Computer ized Presc r iber Order Ent ry
Cl inica l W ork f low Management
Pro toc ols
R ec ording
Agen t
D SA C reation
PRA C reation
T A C rea t ion
I DA C reat ion
Bio log ical
Analys is
da ta
Drug Errors
D etec t ion
Agent
D rug-D rug
Interac t ion
De tec t ion
Agen t
Aga ins t Ind icat ion
detec t ion
Dos age Ex ceeding
D etec t ion
Allergy Det ect ion
U ndes irable Ef fec t
D tec t ion
D rug-Drug
In terac t ion
D etec tion
Analy zer
Va lida t ion of
Goal
Pres c rip t ion
C linical D ec is ion Support
Figure 4. An organizational model for structuring the communication
between CDSS, CPOE and clinical WfMS
Let us detail how each organization operates.
The Clinical Workflow Management Organization
enables one or several clinical workflow agents to interact
with their connector to which make a clinical decision or
elaborate a validated prescription.
The Computerized Prescriber
Order
Entry
Organization enables the Prescription Analyzer Agent to
interact at the first step with the drug selecting Agent.
This latter interacts in its turn with the information
collection agent, pharmacy stock checker Agent and
Administration mode selection agent. At the second time,
the Prescription Analyzer Agent connects to the Drug-
Drug interaction Detection Agent and Drug Errors
Detection Agent to analyze the current prescription. After
the validation, it offers the following services thanks to the
three agents: Information delivery, protocols recording and
therapeutic file creation.
The Clinical Decision Support Organization enables
the drug errors detection and drug-drug interaction
detection agents to enter in connection with the Connector
Agent or the Prescription Analyzer Agent in order to give
respectively help to the clinical user or assist the doctor to
validate his prescription. This organization involves only
those two agents.
CONCLUSION
V.
This paper has dealt with coupling CDSS with CPOE
and their dynamic plugging in the medical Workflow
Management System. More precisely, it has presented in
the one hand, a multi-agent system allowing the coupling
CDSS with CPOE. In the other hand, it has presented an
architecture of clinical WfMS which revisits the reference
model defined by the WfMC in terms of collaborating
agents. Some of these agents implement clinical processes,
while others are dedicated to the CDSS and CPOE.
The idea defended in this paper is that the agent
technology is appropriate to face the coupling CDSS with
CPOE and their dynamic integration in the clinical
WfMS. Several reasons motivate this idea.
Firstly, the agent technology is appropriate to model
clinical processes since it provides natural abstractions to
deal with distribution, heterogeneity and autonomy that
are inherent to clinical processes.
Secondly, the organizational dimension which is
inherent to multi-agent systems [9], is fundamental to
highlight the coordination of the different components
involved in the three systems (CDSS, CPOE and clinical
WfMS) under consideration by clearly separating the
macro-level (coordination) from the micro-level (agent).
Thus, the internal architecture of the agents may be
thought and implemented independently from their
coordination.
As future work, we plan (i) to study in depth the
behavior of all agents involved in the CDSS, CPOE and
WfMS systems, (ii) to formalize and build the knowledge’s
used by the agents in order to resolve the semantic
conflicts, (iii) to implement these agents using the Jade
[13] (Java Agent Development Framework) platform that
offers the possibility to simulate the execution of these
agents in autonomic way and in distributed mode and (iv)
to evaluate the proposed tool according to the three key
criteria: scalability, openness and efficiency.
REFERENCES
[1] Web site of Wikipedia: http//www.wekipedia.org.
[2] B. Iantovics, “Cognitive Medical Multi-agent Systems”, in
Broad Research in Artificial Intelligence and Neuroscience,
Volume 1, Issue 1, January 2010.
[3] G. B. Laleci, A. Dogac, M. Olduz, I. Tasyurt, M. Yuksel, A.
Okcan., “SAPHIRE: A Multi-Agent System for Remote Healthcare
Monitoring through Computerized Clinical Guidelines”, in Agent
Technology and e-Health, pp. 25-44, 2008.
[4] S. Wilk, W. Michalowski, D. O’Sullivan., “Engineering of a
Clinical Decision Support Framework or the Point of Care Use, in
AMIA’08 Symposium Proceedings, page – 814, 2008.
[5] G. Czibula, I. G. Czibula, G. S. Cojocar, and A. M. Guran.,
“IMASC - An Intelligent MultiAgent System for Clinical Decision
Support, Proceedings of the First International Conference on
Complexity and Intelligence of the Artificial and Natural Complex
Systems, pp.185-190, 2009.
[6] J.S. Shirabad, S. Wilk, W. Michalowski, K. Farion.,
“Implementing an Integrative Multi-agent Clinical Decision Support
System with Open Source Software”. In international journal of
Medical Systems, 2010.
[7] The Workflow Management Coalition, The Workflow Reference
Model. In: Technical Report WfMC-TC-1003, November 1994.
[8] Web site of FIPA-ACL: http://www.fipa.org.
[9] G. Caire, W. Coulier, F. Garijo, J. Gómez-Sanz, J. Pavón, P.
Kearney and P. Massonet., “The Message Methodology” Book
Chapter 9 in Methodologies and Software Engineering for Agent
Systems, Volume 11, Part III, 177-194, 2004.
[10] N.R. Jennings, P. Faratin, T.J. Norman, P. O'Brien, M.E.
Wiegand, C.Voudouris, J.L. Alty, T. Miah, E.H. Mamdani,. ADEPT.-
Managing Business Processes using Intelligent Agents Proceedings of
the 16th Annual Conference of the British Computer Society
Specialist Group on Expert Systems (ISIP Track), 1996.
[11] L. Bouzguenda, R. Bouaziz, E. Andonoff.: Dynamic plugging of
business processes in cross organizational workflow. In international
journal of computer sciences and applications, Technomatimatics
Resarch foundation, Bombay India, volume V issue IIIB, 2008.
[12] E. Andonoff, W. Bouaziz, C. Hanachi, L. Bouzguenda., "An
Agent Based Model for Autonomic Coordination of Inter-
Organizational Business Process". In International Journal of
computing and Informatics, INFORMATICA'09, 2009.
[13] Web site of Jade: http//www.jade.org.
|
1506.02796 | 1 | 1506 | 2015-06-09T06:42:06 | Agent-Based Product Configuration: towards Generalized Consensus Seeking | [
"cs.MA",
"cs.SE"
] | This paper will present an evolution of a fuzzy agent based platform which performed products configuration. As a first step, we used the notion of consensus to establish robust results at the end of the configuration process. We implemented the concept of generalized consensus which implied the consideration of consensuses from the beginning, in this way robust data are treated during the entire process and the final result enables the designer to distinguish the robust components and flexible ones in a set of configurations. | cs.MA | cs | Agent-Based Product Configuration: towards Generalized
Consensus Seeking
Benoît Beroule1, Alain-Jérôme Fougères1,2 and Egon Ostrosi1
1 University of Technology of Belfort-Montbéliard, Laboratory IRTES-M3M
{benoit.beroule, alain-jerome.fougeres, egon.ostrosi}@utbm.fr
90010 Belfort – FRANCE
2 ESTA, School of Business & Engineering
90004 Belfort – FRANCE
[email protected]
Abstract
This paper will present an evolution of a fuzzy agent based
platform which performed products configuration. As a first step,
we used the notion of consensus to establish robust results at the
end of the configuration process. We implemented the concept of
“generalized consensus” which implied the consideration of
consensuses from the beginning, in this way robust data are treated
during the entire process and the final result enables the designer
to distinguish the robust components and flexible ones in a set of
configurations.
Keywords: Fuzzy Agents, Consensus, Consensus Seeking, Agent-
Based Design, Collaborative and Distributive Design.
1. Introduction
in
The collaborative and distributive design concept raises
several issues [1, 2]. Design software must take into account
numerous parameters which all have to play a more or less
important role
the final result, furthermore much
information will transit between the different entities of
software to communicate the intermediate outcomes and
ideally update parameters if the user wishes to change one of
them during the process.
To best achieve these objectives we have chosen an agent-
based approach which will efficiently process the abundant
information and will be easy to use [3, 4, 5].
In this article, we will focus on a product configuration
platform named FAPIC (Fuzzy Agent for Product Integrated
Configuration) which
implements a collaborative and
distributive approach based on agents [6, 7]. To be as close
as possible to the real situation, the FAPIC platform agents
deal permanently with fuzzy values [8, 9]. Such values allow
a precise parameterization and consequently optimal results.
To improve the results the platform provides, the latter
implements the concept of "consensuses" [10, 11]. In
concrete terms, the agents are grouped to form clusters of
similar agents and these clusters are considered as new
agents in the process. We expect this approach will create
groups of optimal similar product configurations which will
enable robust parts of the product configuration to be
identified and creates a range of products or just chosen
among several proposals.
This paper is organized as follows: In the second part, the
agent-based product configuration process will be detailed
step by step. Then in the third part, the concept of
"consensus" and its purpose will be presented. Moreover in
the fourth part, the new concept of "generalized consensus"
and its implementation in the platform will be introduced.
Furthermore
the
configuration of an aerial conveyor will be detailed by using
several approaches previously described in detail. Finally in
the sixth part a comparison between the different approaches
will be made. The last section, the conclusion shows interest
in the proposed approach.
the example of
fifth part,
the
in
2. Agent-Based Product Configuration
2.1 Configuration Process
the product separated
The FAPIC platform is an agent-based software design to
represents
make product configuration. Each agent
information about
into several
categories we call communities [8].
The product configuration process performed by the FAPIC
platform is divided into four steps (Figure 1) [9].
First, fuzzy relationships are built between agents from the
same
communities
themselves based on the data provided by the user. The
then between
communities
the
purpose of this step is to link the agents and create a network
which will be used to compute the coming result.
In the second step, the solution agents are evaluated. A
rating is assigned to each of them depending on their
consistency with the requirements imposed by the customer,
the constraints determined by the experts and the functions
the product must perform. This rating is a fuzzy value
determined by the relationships created during the first step;
the higher the value, the more compatible the solution.
During the third step, each solution agent determines the
optimal configuration for the product concerned based on its
local point of view. Then the configurations are evaluated
considering all the points viewed in the previous steps.
Finally,
the fourth step, consensuses of optimum
configurations are created by grouping them according to
their resemblance. The purpose of this step is to provide
ranges of products instead of just a sole configuration.
in
R, F,
C, S
Building fuzzy
relationships in
product
configuration
(1)
iℜ~ }
{
F~
R~
C~
Searching the
fuzzy set of
consensual
solutions
(2)
cS~
cS~
Domains
expertise
Customer
Designers
Generating fuzzy
optimal product
solutions
S~
(3)
S~
Seeking
G~
fuzzy
consensus
(4)
R: set of requirements
iℜ~ }: fuzzy relationships
{
C~
: fuzzy set of constraints
G~ : fuzzy consensual configurations
F: set of functions
R~ : fuzy set of requirements
cS~ : fuzzy consensual solutions
C: set of constraints
F~ : fuzzy set of functions
S~ : fuzzy optimal solution
Fig. 1 Fuzzy product configuration approach
2.2 Configuration Process
=<
~,~,~,~
~
ΟΡΙΑΜα
The FAPIC platform is a fuzzy agent-based system for the
distributed and collaborative configuration of products [12].
Thus we defined a fuzzy agent-based system αM~ by Eq. (1):
(1)
Where A~ is the fuzzy set of agents, I~ is the fuzzy set of
interactions defined in αM~ , P~ is the fuzzy set of roles that
agents of A~ can play, and O~ is
the fuzzy set of
organizations defined for fuzzy agent of A~ .
>
A fuzzy agent-based system αM~ being defined, we can now
define a fuzzy agent
~α of A~ by Eq. (2):
i
.
(2)
,
)~(~
αΓ
i
)~(~
α∆
i
,
)~(~
αΠ
i
~,
ΚΦΦΦ
~
α
i
are respectively: the
~α , the
i
~α , the function of fuzzy action
i
Where
function of fuzzy observation of fuzzy the agent
function of fuzzy decision of
~α , and the fuzzy knowledge of
of
i
In concrete
the platform consists of several
communities (requirements, functions, solution and one or
~α .
i
terms,
more constraints domains) and each community contains
agents which represent elements of the community (Figure
2.a).
The agents communicate by sending and receiving messages
to and from other agents from linked communities to
establish local results.
As shown in the figure 2 b), the process is basically divided
into four parts:
ir and
jf which informed
jf and
ks which informed
lc and
ks which informed
1) Interactions between each
the other agents of R and F.
2) Interactions between each
the other agents of F and S
3) Interactions between each
the other agents of C and S
Requirements
Customer
Solutions
Constraints
Domain experts
a)
4) Interaction between each
consensual results.
ks to establish the new
Moreover the use of agents allows the platform to be
dynamic because the agents are constantly running. When
they are not computing calculus, they are waiting for
messages from other agents. Consequently, any users
(customer and/or experts) may send new data at any time. If
data are sent before step 4, thus after the computation of the
final result, the latter is recalculated. If data are sent during
the process, the former data are updated and the final result
will be changed according to the new information sent,
directly without displaying the out of date result based on
the initial data [13].
Community of fuzzy
requirement agents:
R~
Community of fuzzy
function agents:
F~
Community of fuzzy
solution agents:
S~
Community of fuzzy
constraint agents:
C~
1.1
R – {ri}
1.2
2.1
F – {fj}
3.2
2.2
4
S – {sk}
3.1
C – {cl}
:ri
1
:fj
2
:sk
3
:cl
b)
Fig. 2 a) Agent-based architecture of FAPIC platform divided in four communities of agents, and b) Illustration of interactions between fuzzy agents during
Phase 2 of the product configuration (Searching the fuzzy set of consensual solution agents).
3. Configuration Consensus Seeking
3.1 Consensus Seeking
The fourth step of the configuration process consists of
creating consensuses of agents between the solution and
configuration communities. The purpose of this step is to
create not just a sole optimal configuration but a set of
configurations divided into groups named "consensuses".
Consensuses contain one or more agents which are quite
similar regarding the constraints imposed by the different
experts of domains and the customer. These solutions allow
the
several product
configurations which best fit the imposed requirements.
customer
choose
among
to
T(
)THEN
)
Card
←
)G(
r
ENDIF
rG
r
;
)
(
/g,s
µ
i
p
j
1k
p,i
2k
p,i
=
j
∑
Gg
∈
(
= ∑
1
Gg
∉
p
j
Card
);G(
p
(
g,s
µ
i
)
)
j
/
Card
)GG(
p
−
−
α
1k
p,i
(
1
−
+
)
2k
α
p,i
byDO
agent
each
'S ←
r
r
(
receiveMsg
IF
S
update
1=
)G(
r
rto
p
FOR
=
k
p,i
ENDFOR
k
*p,i
=
S
*p
(
SIF
←
'S!
*p
*p =
diffuse
diffuse
ENDIF
WHILE
(
(
(
kmax
+
S
)r,i
k
,...,
1,i
{ }i
s
)THEN
*p
i
r
S,s(,T,G,s(
i
S
r
*p
));
G,g(,T,C,g(
G*p
j
j
*p
))
receiveMsg
T(
rG
))
To establish consensuses, the agents are divided into groups
(initially one agent per group). Then an agent evaluates its
knowledge to establish a new set of groups by merging the
previous ones according to their fuzzy value before sending
a message containing its evaluation to another agent which
will do the same. Once each agent computes its own
evaluation, new groups are created and the algorithm restarts
until the formed groups are not modified anymore (This
algorithm is detailed in the Table 1).
Table 1: Consensuses seeking algorithm (algorithm detailled in [7])
Description
Algorithm
is
// agents of S search for partition of fuzzy config. agents
// save the current partition
rS
rG
// if reception of a new partition
// update the groups of fuzzy configurations agents
// iteration on r groups of fuzzy configuration agents
// compute k1
// compute k2
]1..0∈α
[
// compute k ,
// end of iteration on r groups of fuzzy configuration agents
// max k founded in the group *p of fuzzy config. agents
// assign
// inform only if modification
// diffuse assigning to fuzzy configuration agents
is to the part of fuzzy solutions
*pS
// diffuse assigning to the fuzzy consensus cluster agents
// end of diffusion of changes
// while information of modifications is sent by agents of G
*pC
3.2 Implementation on the FAPIC platform
In the FAPIC platform, the consensus seeking algorithm
is used to create consensuses between the solutions and
the configurations agents (Figure 3).
Fig. 3 Process of configuration consensus seeking on FAPIC platform
To best present the results, they are shown in a matrix
which represents the fuzzy compatibility between solutions
and configurations. The algorithm groups the highest
values on blocks spread on the matrix diagonal. These
blocks represent the consensuses; they are made up of
agents which share sufficient characteristics
to be
considered as a range of products.
It can be necessary to rearrange some consensuses (for
instance if they contain several low values), by excluding
one or more configurations and obtaining a robust set of
results which matches as closely as possible all the
constraints and requirements.
Figure 4 shows
the
configuration of an office chair. The solutions are divided
into four groups: seat (S1 to S5), back (S6 to S10), armrest
(S11 to S15) and stand (S16 to S20). Each blue rectangle
the consensuses created by
highlights a set of configurations made up of four solutions
(one from each groups) which create a consensus.
Fig. 4 Visualization of the consensuses on FAPIC platform (Note that the matrix representation of consensus is an artificial representation, since the
consensus knowledge is distributed over all agents).
4. Generalized Consensus Seeking
4.1 Presentation
The next evolution of the platform should provide more
robust results by introducing the concept of "generalized
consensus".
The principle is to use the consensus seeking algorithm to
create consensuses from each community before starting
the main process, and then consider them as new super-
agents containing elementary agents. The process can be
run considering these super-agents which will be treated as
standard agents.
In these conditions, the consensuses will be considered
from the beginning of the process to obtain more robust
results.
4.2 Implementation on the FAPIC platform
To apply the new concept of "generalized consensus" to
the FAPIC platform, the consensuses are created directly
inside
functions and constraints
requirements,
the
the
first step of
the product
communities before
configuration process. The characteristics of the new
created super-agents are calculated averaging
those
containing elementary agents (Figure 5).
Fig. 5 Process of generalized consensus seeking on FAPIC platform
These new Agents are identical to the previous ones from a
computer science point of view, so the platform may run
the process normally with these agents to obtain an optimal
result (step 3) composed of a set of consensuses.
To create consensuses inside a community, the relations
between the agents of this community must be defined by
the operators concerned (the customer or the experts) by
filling the relative matrix directly on the user interface.
If these relations are not defined properly, the consensuses
cannot be created and the platform will use the elementary
agents during the configuration process.
5. Example – A Conveyor
5.1 Presentation
To illustrate the concept of "generalized consensus", the
process will be detailed on a concrete example. The
product to configure is an aerial conveyor used to transport
heavy loads in a factory.
In this case, the platform will be parameterized with
function, requirement and solution communities (the
constraints are not taken into account).
The requirements are defined by the customer (see Table
2). Then the set of functions are established (see Table 5)
thanks to the functional diagram (see Figure 8), with the
following notations:
- CS : Control Signal
- EE : Electrical Energy
- ME : Mechanical Energy
Finally, several solutions are proposed and evaluated to
perform each function (see Table 3). The evaluation is a
fuzzy value which represents the effectiveness of the
solution concerned. Then the set of solutions may be
deduced (see Table 4).
In this case, the requirement and the function communities
are defined with internal relations which enable the
creation of consensuses
the generalized
consensus. No constraints are taken into account and the
solution community does not need to be divided into
consensuses.
to apply
5.2 Results without the generalized consensus
If we compute the optimal configuration without using
the concept of generalized consensus, we obtain the
following optimal result (Figure 6).
S2
S10
S1
S12 S15 S18 S20 S23 S25 S28
S3
S5
S7
S9
Table 2: Convoyor’s requirements
Fig. 6 Simple optimal result
This result is considered as optimal but is accompanied
by a set of configuration consensuses. Each consensus
contains a set of configurations which are optimal
according to the local point of view of at least one
solution agent, these configurations form a group of
products which share similar characteristics.
5.3 Results with the generalized consensus
If we compute the optimal configurations using the
concept of generalized consensus, the FAPIC platform
will determine consensuses from the function and the
requirement communities. These new agents will be used
in the process to obtain the following results finally
(Figure 7).
S2
S1
S10
S12 S15 S18 S20 S23 S25 S28
S3
S9
S5
S7
S2
S1
S10
S13 S15 S18 S20 S23 S25 S29
S3
S5
S7
S9
S2
S1
S10
S12 S15 S18 S20 S23 S25 S29
S3
S5
S7
S9
S2
S1
S10
S13 S15 S18 S20 S23 S25 S28
S3
S5
S7
S9
Fig. 7 Optimal results with generalized consensus
We may notice that the former configuration determined
without using the generalized consensus is present, but this
time, there are four optimal results instead of just one. In
this case only the optimal results are displayed and they
already highlight a configuration consensus.
The base of each configuration found is the same and the
difference is in the S12 and S13 solutions on the one hand
then the S28 and S29 on the other hand in concrete terms,
these results suggest that the function "import support +
load" may be realized by a pivot (S12) or a screw (S13),
and the function "transmit load + support on rail" may be
realized thanks to welding (S28) or bending (S29). The
other solutions form a robust part of the conveyor
configuration.
Easy to assemble
Easy accessible pieces
Quick to install
Easy to dismantle
Minimize work
Min. rails degradation
Adaptable to rails
Ad. different rails
Ad. different supports
Respect security norms
R1
R2
R3
R4
R5
R6
R7
R8
R9
R10
R11 Minimize noise
R12
Support heavy loads
R13
R14
R15
R16
R17
R18
R19
R20
R21
R22
R23
R24
Environment resistant
Easily washable
Long life time
Ad. Different speeds
Not too cumbersome
Allow CAD
Elect. motor admission
Impermeability
High temper. resistant
Use client pieces
Use easy manuf. pieces
Minimize price
Table 3: Convetor’s solutions
Defined by customer
Defined by customer
Electrical wires
Direct contact
Prog. Logic controller
Contactor
Prog. Logic controller
Potentiometer
Defined by customer
Reducer
Belt
Pivot
Screw
S1
S2
S3
S4
S5
S6
S7
S8
S9
S10
S11
S12
S13
S14 Mandrel
S15 Mechanical contact
S16
S17
S18
S19
S20
S21
S22
S23
S24
S25
S26
S27
S28
S29
S30
Hydrostatic contact
Mecha. contact by sides
4 tensioners
3 tensioners
Adhesion tensioner/rail
Pinion/rack
Caterpillar/rail
Cable and kook
Metallic cable
Pivot
Screw
Mandrel
Welded
Bend
Fig. 8 Conveyor’s functional diagram
Table 4: Conveyor’s solution evaluation
Table 5: Conveyor’s Functions
F1
F2
F3
F4
F5
F6
F7
F8
F9
F10
F11
F12
F13
F14
Import CS
Import EE
Transmit EE
Activate EE
Regulate EE
Convert EE/ME
Transmit ME
Import support + load
Guide support + load
Import support + load
Transport support + load
Secure support + load
Export support + load
Transmit support + load
7. Conclusions
The purpose of the implementation of the generalized
consensus concept was to obtain more robust results. With
this approach, the notion of consensuses is present at each
step of the configuration process and we may observe that
the change affects the process because the latter takes this
notion directly into account and provides a group of
similar results which will be used to create a range of
products without further processing.
The next step is to use the concepts and models developed
in
the "city
organization". We consider the implementation may be
duplicated with several arrangements
to
numerous problems which will imply considering the
contribution of a large amount of entities.
the FAPIC platform
to respond
to apply
to
it
References
[1] O. Shai and Y. Reich, "Infused design. I. Theory", Res Eng
Design, Vol. 15, 2004, pp. 93-107.
[2] O. Shai and Y. Reich, "Infused design. II. Practice", Res Eng
Design, Vol. 15, 2004, pp. 108-121.
[3] P. Leitão, "Agent-based distributed manufacturing control: A
survey", Engineering Applications of
state-of-the-art
Artificial Intelligence, Vol. 22, No. 7, 2009, pp. 979-991.
[4] L. Monostori., J. Vancza, and S.R.T. Kumara, "Agent-Based
Systems for Manufacturin,. Annals of the CIRP, Vol. 55, No.
2, 2006, pp. 697-720.
[5] H.V.D. Parunak, A.D. Baker, and S.J. Clark, "The AARIA
agent architecture: From manufacturing requirements to
agent-based system design", Integrated Computer-Aided
Engineering, Vol. 8 No. 1, 2001, pp. 45-58
[6] E. Ostrosi, A.-J. Fougères, and M. Ferney, "Fuzzy Agents for
Product Configuration in collaborative and distributed design
Process", Applied Soft Computing, Vol. 12, No. 8, 2012, pp.
2091-2105.
[7] A.-J. Fougères and E. Ostrosi, "Fuzzy Agent-based Approach
for Consensual Design Synthesis in Product Integrated
Configuration", Integrated Computer-Aided Engineering,
Vol. 20, No. 3, 2013, pp. 259-274.
[8] E.K. Antonsson and K.N. Otto, "Imprecision in Engineering
Design". ASME Journal of Mechanical Design, Vol. 117B,
1995, pp. 25-32.
[9] B. Agard and M. Barajas, "The use of fuzzy logic in product
family development: literature review and opportunities",
Journal of Intelligent Manufacturing, Vol. 23, No. 5, 2012,
pp. 1445-1462.
[10] W. Ren and R.W. Beard, "Consensus seeking in multi-agent
systems under dynamically changing interaction topologies",
IEEE Trans. Autom. Control, Vol. 50, No. 5, 2005, pp. 655-
661.
[11] R. Olfati-Saber, J.A. Fax, and R.M. Murray, "Consensus
and cooperation
in networked multi-agent systems",
Proceedings of the IEEE, Vol. 95, No. 1, 2007, pp. 215-233.
[12] A.-J. Fougères, "A Modelling Approach Based on Fuzzy
Agents", Int. J. of Computer Science Issues, Vol. 9, No. 6,
2013, pp. 19-28.
[13] B. Beroule, A.-J. Fougères, E. Ostrosi, "Engineering change
management through consensus seeking by fuzzy agents",
Proceedings of The 2nd World Conference on Complex
Systems (WCCS14), 2014, Agadir, Morocco.
representation, and
Benoît Beroule received the B.S. degree from the department of
Computer Science of University of Technology of Belfort-Montbéliard
(UTBM). He is currently pursuing the Ph.D. degree in the Laboratory
IRTES-SeT (Systems and Transports) of UTBM.
Alain-Jérôme Fougères holds a PhD in Artificial Intelligence from
the University of Technology of Compiègne - France (1997). He is
a Professor of Computer Science at ESTA and he conducts his
research at ESTA-Lab. He is also associated with the Laboratory
IRTES-M3M of University of Technology of Belfort-Montbéliard.
Initially, his areas of interests and his scientific contributions were:
1) assistance to the redaction of formal specifications, where
problems focused on the natural language processing, the
knowledge
formal
specifications; and 2) design of agent-based systems, in particular
architecture,
interactions, communication, and cooperation
problems. Over the last ten years, his research has focused on
agent-based mediation for cooperative work.
Egon Ostrosi holds a Ph.D. from the University “Louis Pasteur” of
Strasbourg (ULP), and is currently Associate Professor in the
Laboratory of Mecatronics3M (M3M) of IRTES at the University of
Technology of Belfort – Montbéliard. His current research
concerns integrated mechanical product design and modeling,
knowledge engineering and its application in mechanical design,
and concurrent engineering. He has been actively involved with
the development of methods for concurrent product design, CAD
product modeling, product configuration, and collaborative and
distributed design process.
techniques of
the
|
1909.06711 | 1 | 1909 | 2019-09-15T02:02:22 | Cognitive swarming in complex environments with attractor dynamics and oscillatory computing | [
"cs.MA",
"cs.NE",
"cs.RO",
"nlin.AO",
"q-bio.NC"
] | Neurobiological theories of spatial cognition developed with respect to recording data from relatively small and/or simplistic environments compared to animals' natural habitats. It has been unclear how to extend theoretical models to large or complex spaces. Complementarily, in autonomous systems technology, applications have been growing for distributed control methods that scale to large numbers of low-footprint mobile platforms. Animals and many-robot groups must solve common problems of navigating complex and uncertain environments. Here, we introduce the 'NeuroSwarms' control framework to investigate whether adaptive, autonomous swarm control of minimal artificial agents can be achieved by direct analogy to neural circuits of rodent spatial cognition. NeuroSwarms analogizes agents to neurons and swarming groups to recurrent networks. We implemented neuron-like agent interactions in which mutually visible agents operate as if they were reciprocally-connected place cells in an attractor network. We attributed a phase state to agents to enable patterns of oscillatory synchronization similar to hippocampal models of theta-rhythmic (5-12 Hz) sequence generation. We demonstrate that multi-agent swarming and reward-approach dynamics can be expressed as a mobile form of Hebbian learning and that NeuroSwarms supports a single-entity paradigm that directly informs theoretical models of animal cognition. We present emergent behaviors including phase-organized rings and trajectory sequences that interact with environmental cues and geometry in large, fragmented mazes. Thus, NeuroSwarms is a model artificial spatial system that integrates autonomous control and theoretical neuroscience to potentially uncover common principles to advance both domains. | cs.MA | cs | Noname manuscript No.
(will be inserted by the editor)
Cognitive swarming in complex environments with attractor
dynamics and oscillatory computing
Joseph D. Monaco1 · Grace M. Hwang2 · Kevin M. Schultz2 ·
Kechen Zhang1
9
1
0
2
p
e
S
5
1
]
A
M
.
s
c
[
1
v
1
1
7
6
0
.
9
0
9
1
:
v
i
X
r
a
Received: date / Accepted: date
Abstract Neurobiological theories of spatial cogni-
tion developed with respect to recording data from
relatively small and/or simplistic environments com-
pared to animals' natural habitats. It has been unclear
how to extend theoretical models to large or complex
spaces. Complementarily, in autonomous systems tech-
nology, applications have been growing for distributed
control methods that scale to large numbers of low-
footprint mobile platforms. Animals and many-robot
groups must solve common problems of navigating
complex and uncertain environments. Here, we intro-
duce the 'NeuroSwarms' control framework to inves-
tigate whether adaptive, autonomous swarm control
of minimal artificial agents can be achieved by direct
analogy to neural circuits of rodent spatial cognition.
NeuroSwarms analogizes agents to neurons and swarm-
ing groups to recurrent networks. We implemented
neuron-like agent interactions in which mutually visible
agents operate as if they were reciprocally-connected
place cells in an attractor network. We attributed a
phase state to agents to enable patterns of oscilla-
tory synchronization similar to hippocampal models
of theta-rhythmic (5 -- 12 Hz) sequence generation. We
demonstrate that multi-agent swarming and reward-
approach dynamics can be expressed as a mobile form
of Hebbian learning and that NeuroSwarms supports
a single-entity paradigm that directly informs theoret-
ical models of animal cognition. We present emergent
This work was supported by NSF award NCS/FO 1835279,
JHU/APL internal research and development awards, and the
JHU/Kavli Neuroscience Discovery Institute.
1 Biomedical Engineering Department, Johns Hopkins Uni-
versity School of Medicine, Baltimore, MD, 21205, USA.
E-mail: [email protected]
2 The Johns Hopkins University/Applied Physics Laboratory,
Laurel, MD, 20723, USA.
behaviors including phase-organized rings and trajec-
tory sequences that interact with environmental cues
and geometry in large, fragmented mazes. Thus, Neu-
roSwarms is a model artificial spatial system that inte-
grates autonomous control and theoretical neuroscience
to potentially uncover common principles to advance
both domains.
Keywords swarming · multi-robot groups · place
cells · oscillations · spatial navigation · emergence
1 Introduction
Spatial cognition in rodents has been extensively stud-
ied in non-naturalistic environments such as linear or
circular tracks, radial arm mazes, and T-mazes, or small
open-field arenas such as squares or cylinders of approx-
imately 1 -- 2 m2 area. Such experimental conditions have
allowed individual place fields of hippocampal pyrami-
dal neurons (O'Keefe and Dostrovsky, 1971) and the
activity of other spatial cells (Knierim, 2006; Moser
et al., 2008; Savelli et al., 2008; Poulter et al., 2018;
Wang et al., 2018) to be exquisitely controlled and an-
alyzed, leading to a detailed neural coding account of
distributed representations that subserve spatial learn-
ing, memory, and planning in mammals (O'Keefe and
Nadel, 1978; Moser and Paulsen, 2001; Knierim and
Hamilton, 2011; Monaco and Abbott, 2011; Pfeiffer and
Foster, 2013; Hartley et al., 2014; Burgess, 2014; Schiller
et al., 2015; Foster, 2017), potentially extending to gen-
eral cognitive computations in humans (Bellmund et al.,
2018; Kunz et al., 2019). However, the multiplicity of
Poisson-distributed hippocampal place fields exposed
in larger environments (Fenton et al., 2008; Rich et al.,
2014) and species differences in mapping 3-dimensional
contexts (Yartsev and Ulanovsky, 2013; Casali et al.,
2
Monaco et al.
2019) suggest large and/or complex environments as
the next frontier in understanding spatial navigation.
Computational models of rodent spatial networks
have typically emulated the restricted environments
of experimental studies (for computational efficiency,
ease of analysis, and compatibility with published
data). Despite these limitations, recent theoretical re-
sults have demonstrated the importance of sensory
and cortical feedback in stabilizing and shaping hip-
pocampal and entorhinal cortical spatial representa-
tions (Monaco et al., 2011; Poll et al., 2016; Renn´o-
Costa and Tort, 2017; Ocko et al., 2018); this relation-
ship has been supported by experimental approaches
to the animals' own active sensing behaviors such as
lateral head scanning (Monaco et al., 2014; Yadav and
Doreswamy, 2017) and closed-loop control of orient-
ing distal cues (Jayakumar et al., 2019). Addition-
ally, extending prior theoretical frameworks such as
the attractor map formalism (Zhang, 1996; Tsodyks,
1999; Samsonovich and McNaughton, 1997; Knierim
and Zhang, 2012) to large spatial contexts has re-
vealed substantial increases in the computational and
mnemonic capacities of these network models (Hedrick
and Zhang, 2016). Thus, a theoretical approach to
naturalistic and dynamical spatial coding in large or
complex environments may require closed-loop systems
that integrate sensory information with internal spatial
maps in continuously adapting loops. Complementary
to the animal studies, investigating the behaviors and
performance of completely specified but artificial spa-
tial systems including virtual agents and/or mobile
robotics platforms may help to elucidate the compu-
tational principles of spatial cognition in naturalistic
contexts (Hasselmo, 2018; Tomov et al., 2018; Savelli
and Knierim, 2019; Gaussier et al., 2019).
Hippocampal phenomena that have been theo-
rized to support biological spatial cognition include
(1) self-stabilizing activity patterns in attractor map
networks and (2) temporal-phase organization relative
to global oscillations. On the basis of these phenomena,
we introduce a brain-inspired dynamical controller for
self-organized swarms of autonomous agents. Our key
realization was that each virtual or robotic agent can
be represented as a spatial neuron (e.g., a place cell)
whose place preference follows the location of the agent
in its local environment. The analogy of a multi-agent
group (or swarm) to a space-coding neural network
follows immediately. If we further suppose that inter-
agent distances map to 'synaptic weights' and, conse-
quently, that relative agent movements map to changes
in those weights, then spatial configurations of the
swarm constitute an attractor map network (Zhang,
1996; Tsodyks, 1999; Samsonovich and McNaughton,
1997) and the swarm's internal motion dynamics con-
stitute learning based on synaptic modification (Hebb,
1949; Oja, 1982).
Additionally, spatial activity in the rodent hip-
pocampus is strongly modulated by continuous theta
oscillations (5 -- 12 Hz) during locomotion (Vanderwolf,
1969; Buzs´aki, 2005). The resulting 'phase precession,'
a monotonic advance in timing from late to early within
each theta cycle, may enhance the precision and tempo-
ral organization of spatial codes (O'Keefe and Recce,
1993; Jensen and Lisman, 2000; Foster and Wilson,
2007; Drieu et al., 2018) in ways that support decision-
making and/or deliberative planning during subsequent
sleep or quiescent states (Buzs´aki, 1989; Johnson and
Redish, 2007; Buzs´aki and Moser, 2013; Wikenheiser
and Redish, 2015; Papale et al., 2016; Muessig et al.,
2019). Recently, in contrast to phase precession, we dis-
covered a novel class of spatial phase-coding neurons
in open field environments termed 'phaser cells' that
were located predominantly in the rat lateral septum
and characterized by a strong coupling of theta-phase
timing to firing rates (Monaco et al., 2019a). This
coupling supports an intrinsic neuronal mechanism of
phase-coding that may theoretically transform spatial
information to synchronize downstream targets using
the global theta oscillation (Monaco et al., 2019a).
Accordingly, to examine the effects of temporal phase
organization, our dynamical swarm controller considers
each agent to have an internal phase variable (anal-
ogous to the theta-phase of a place cell or phaser
cell) that may interact via oscillatory coupling with
its neighbors' phases. Such oscillator-based swarm-
ing has been previously generalized as the 'swarmala-
tors' framework (O'Keeffe et al., 2017). Thus, together
with attractor dynamics, these phenomena may pro-
vide brain-like solutions to problems of decentralized
self-organization and distributed communication in au-
tonomous swarming.
We refer to our conception of this swarm controller
as NeuroSwarms (Monaco et al., 2019b; Fig. 1A). In
this paper, we derive an operational NeuroSwarms im-
plementation (Section 2), present emergent swarming
behaviors in simulations of a fragmented and het-
erogeneous environment (Section 3.1), demonstrate
NeuroSwarms as a dual system which can be ex-
pressed through single-entity simulations that help
inform biological theory (Section 3.2), evaluate adap-
tations of reward-approach behaviors in a large hairpin
maze (Section 3.3), and discuss implications for au-
tonomous systems design and biological spatial cogni-
tion in large, complex environments (Section 4).
Cognitive swarms with attractors and oscillators
3
Fig. 1 Conceptual schematic and theoretical neuroscientific inspiration for the NeuroSwarms controller. A. An artificial spa-
tial system of mobile virtual or robotic agents communicate over sparse recurrent channels (bottom) just as spatial neurons
in biological neural circuits produce reverberating activity patterns that reflect energy minima in the dynamical state-space
of the system (e.g., fixed-point attractors; top; adapted from Knierim and Zhang, 2012). B. Example simulation of the spatial
self-organization of an activity bump on an attractor map. In an attractor map network, the environment is represented by
a continuum of locations with overlapping place fields, leading to network connectivity that produces self-reinforcing spatial
activity patterns. Adapted from Zhang (1996). C. Schematic of a minimal model of temporal-phase coding in which an exci-
tatory external input (green) is rhthmically modulated by a continuous inhibitory oscillation (blue) such as the hippocampal
theta rhythm. Adapted from Monaco et al. (2019a) as permitted by the CC-BY 4.0 International License (creativecom-
mons.org/licenses/by/4.0/).
2 Methods
instance, a rate-based network following
(cid:88)
j
,
2.1 Hippocampal model mechanisms
= −ri + g
dri
dt
Jijrj + Ii
(1)
Self-stabilizing attractor maps. Hippocampal place
cells fire within a contiguous region of the animal's local
environment, or 'place field' (O'Keefe and Dostrovsky,
1971). Place fields are thought to collectively form
cognitive maps (O'Keefe and Nadel, 1978) that are
stabilized (at least in part) via attractor dynamics,
such as fixed points or continuous manifolds of the
network energy surface, that drive activity toward low-
dimensional spatial or task representations (Fig. 1B;
Knierim and Zhang, 2012). Attractor map models have
shown that recurrent connectivity between place cells
with nonlinear integration of inputs is nearly sufficient
to achieve stable spatial attractors (Zhang, 1996; Sam-
sonovich and McNaughton, 1997; Tsodyks, 1999). For
where ri is the rate of unit i, Ii is the unit's total in-
put, and g is a sigmoidal nonlinearity, only further re-
quires that the recurrent weights Jij encode the degree
of place-field overlap between units (i.e., the strength of
learned spatial associations). Such an encoding follows
from a kernel function of field-center distances, e.g.,
Jij := F (xi − xj) = A exp
− B ,
(2)
(cid:18)
−xi − xj2
(cid:19)
σ2
where xk is the field-center position of unit k, σ is the
Gaussian scale constant, and A and B determine the
strength of local excitation vs. long-range inhibition, re-
spectively. While this formulation violates Dale's law, it
illustrates the typical parsimony of attractor map mod-
els (Tsodyks, 1999). A network constructed from equa-
4
Monaco et al.
tions (1) and (2) supports self-organization of its activ-
ity into a singular, contiguous 'bump' that emerges as
the network relaxes (Fig. 1B; Zhang, 1996). The activ-
ity bump can then respond to input changes due to, e.g.,
movement through the environment or internal pro-
cessing. These conditions are encapsulated within Neu-
roSwarms by analogizing (1) inter-agent visibility (e.g.,
for a line-of-sight communication channel) to sparse, re-
current network connectivity, and (2) a local kernel of
inter-agent distances to spatially-weighted synapses.
Oscillatory organization. Hippocampal phase preces-
sion relative to the theta rhythm is clearest on linear
tracks (O'Keefe and Recce, 1993), on which place fields
typically arrange in an unambiguous sequential order
that may enable learning of temporally compressed
'theta sequences' (Feng et al., 2015). While the phe-
nomenon is less clear in open, 2-dimensional environ-
ments, phase precession has been observed in particular
traversals of the firing fields of place cells as well as grid
cells in entorhinal cortex (Climer et al., 2013; Jeewa-
jee et al., 2014). However, our analysis of phaser cells
in the lateral septum (Monaco et al., 2019a) revealed
a more direct phase code for 2-dimensional position
that was consistent with a minimal model of temporal
phase-coding (Fig. 1C). To study how the phaser cell
code may contribute to sequence formation in open
environments, the NeuroSwarms controller adds an in-
ternal phase variable to each agent and couples the
modulation frequency of that phase to each agent's
total input (see equation (12) below).
Internalized place fields for neural control. There are
two reasons why neural swarming control must decou-
ple each agent's physical location from its internal self-
localization. First, the multiplicity of agents is a qual-
itative difference with brain circuits; every hippocam-
pal neuron in a biological network corresponds to the
same single agent (e.g., a rat) and has particular inputs
from internal processing or sensory inputs (Wang et al.,
2016) that contribute to the appearance and location of
the cell's place field. Given the analogy of agents to neu-
rons (Fig. 1A), an individual rat has many place fields
but an individual swarm agent should have only one.
Further, the location of an agent's place field cannot be
identical to the agent's physical location, which depends
on the momentary vicissitudes of a entity operating in
the external world (or a simulation thereof). Second,
experimental studies have compellingly demonstrated
that spatial path planning in hippocampal networks
may rely on activating sequences of place cells repre-
senting remote locations (Gupta et al., 2010; Pfeiffer
and Foster, 2013; ´Olafsd´ottir et al., 2018; Momennejad
et al., 2018), indicating that internal representations
should be separable from an animal's (or agent's) cur-
rent physical location. Thus, NeuroSwarms assigns a
distinct cue-based place preference to each agent.
2.2 Mobile Hebbian learning with a global oscillation
Hebbian learning in neural network models typically
increments or decrements a synaptic weight according
to a learning rate and a measure of the activity corre-
lation between the pre-synaptic (input) and the post-
synaptic (output) neurons (Hebb, 1949; Levy and Stew-
ard, 1979; Oja, 1982; Eichenbaum, 2018). For the Neu-
roSwarms controller, the conceptual similarity of the
synaptic strength relation in a neural network and the
physical distance relation in a multi-agent group allows
us to construct a neural activation and learning model
for the motion of artificial mobile agents.
ij/σ2) ,
Following the Gaussian attractor-map kernel from
equation (2), we explicitly relate a recurrent synaptic
weight matrix W ∈ RNs×Ns, prior to learning-based
updates, to swarm state via
Wij = Vij exp(−D2
(3)
for inter-agent visibility V ∈ {0, 1}Ns×Ns , inter-agent
distances D, and spatial constant σ. To provide for
environmental
interactions, we consider a minimal
reward-approach mechanism for a set of reward coordi-
nates that serve as attractive locations. Thus, we like-
wise incorporate a feedforward matrix W r ∈ RNs×Nr
for reward learning,
ik exp(−Dr
W r
(4)
for agent-reward visibility V r ∈ {0, 1}Ns×Nr , agent-
reward distances Dr, and spatial constant κ. The re-
ward weights are based on an exponential kernel to al-
low for long-range approach behaviors. (We emphasize
that the NeuroSwarms framework encompasses the gen-
eral equivalence between synaptic weights and agent
distances, but the particular implementation that we
present here is one of many possible designs.)
ik = V r
ik/κ) ,
To define neuron-like inputs, we consider that each
agent's internal place-field location derives from the
conjunction of sensory cue inputs related to a preferred
location. We define time-continuous sensory cue inputs
c ∈ RNs×Nc following
ik − ci ,
τc cik = V c
(5)
for cue k, agent-cue visibility V c ∈ {0, 1}Ns×Nc , fixed
agent-cue preferences V c∗ ∈ {0, 1}Ns×Nc, and integra-
tion time-constant τc. Thus, the product in equation (5)
yields the integer number of preferred cues visible from
ikV c∗
Cognitive swarms with attractors and oscillators
5
each agent's position. This means that place-field size
is not independently controlled but determined by the
relative cue richness of the environment: more cues will
generally increase agent heterogeneity and spatial selec-
tivity. Similarly, we compute reward inputs r ∈ RNs×Nr
following
τr rik = V r
ik − ri ,
(6)
for reward k, and integration time-constant τr. Unlike
sensory cues, all agents respond equally to all (visible)
rewards. Lastly, we define recurrent swarming inputs
q ∈ RNs×Ns following
τq qij = Vij cos(θj − θi) − qij ,
(7)
for 'post-synaptic' agent i, 'pre-synaptic' agent j, inte-
gration time-constant τq, and internal oscillatory phase
state θ. The cosine term in equation (7) confers phase-
modulation of the input in which excitation/inhibition
depends on whether units i and j are in/out of sync.
Having defined the input signals, we consider 'net
currents' as gain-modulated, visibility-normalized quan-
tities for sensory cue inputs,
Iqi =
Wijqij ,
(10)
where the parameter gains gc, gr, and gs sum to 1. Be-
cause the net inputs are bounded in equations (8) -- (10),
we simply apply linear rectification rather than a sat-
urating nonlinearity (cf. equation (1)) to their sum to
calculate post-synaptic activation
p = [Ic + Ir + Iq]+ ,
(11)
which is the remaining component needed to com-
pute Hebbian (or any two-factor) learning. In terms of
swarming, however, the agents are phase-coupled via
equation (7). Thus, in the same way that a spiking
neuron can be reduced to a phase description of its
orbit on the phase plane, we consider that p drives the
agents' internal phase state, e.g.,
θ = ω0 + ωI p ,
fi =
(12)
cik ,
W r
ikrik ,
(8)
(9)
reward inputs,
Ici =
Iri =
gc(cid:80)
k V c
ik
gr(cid:80)
k V r
ik
gs(cid:80)
j Vij
Nc(cid:88)
k=1
Nr(cid:88)
k=1
Ns(cid:88)
j=1
and recurrent swarming inputs,
where ωI sets the maximum increase in input-modulated
angular frequency above the baseline frequency ω0.
The net effect of this mechanism is that agents have
place-cell-like spatial tuning with phaser-cell-like phase
coding and synchronization.
The core of the NeuroSwarms controller comprises
the learning-based updates to W and W r. A naıve
Hebbian rule, such as dWij = ηpiqj, would cause
weights to grow unbounded, leading to ictogenesis in
recurrent networks or spatial singularities in swarms.
Instead, after updating agent activations via equa-
tion (11), we compute updated weights W (cid:48) as
ij = Wij + ∆t ηVij pi(qij − piWij) ,
W (cid:48)
with simulation time-step ∆t and learning rate η, which
effectuates a pre-synaptic normalization according to
Oja's rule (Oja, 1982). Similarly, the updated feedfor-
ward weights W r(cid:48) are computed for reward k as
W r (cid:48)
ik pi(rik − piW r
ik + ∆t ηrV r
ik = W r
ik) .
(13)
(14)
The normalization effected by equations (13) and (14)
is due to a subtractive term, quadratic in the post-
synaptic activation p, that depresses the growth of
overly active synapses. In place-cell network models,
feedback inhibition typically serves to spread out place
fields to more efficiently map an environment (Savelli
and Knierim, 2010; Monaco and Abbott, 2011), but
the lack of explicit inhibition in NeuroSwarms allows
synaptic depression to provide a similar repulsive role
due to the distance -- weight equivalence of equation (3).
2.3 Neural swarm control: closing the loop
To integrate with swarming, the controller attempts
to drive the agents' kinematic states to the equiva-
lent desired inter-agent distances, in effect replacing
the typical attraction and repulsion fields of conven-
tional swarming models (e.g., Gazi and Passino, 2011).
The updated weights W (cid:48) and W r (cid:48) can be converted
directly to desired distances by inverting the Gaussian
swarming kernel in equation (3),
D(cid:48)
ij =
(cid:113)−2σ2 log W (cid:48)
(15)
ij ,
and the exponential reward kernel in equation (4),
ij = −κ log W r (cid:48)
Dr (cid:48)
ij .
To compute the resultant swarm motion, the desired
positional shift of agent i is averaged across its visible
neighbors, i.e.,
(16)
Vij (D(cid:48)
ij − Dij)
xj − xi
xj − xi ,
(17)
2(cid:80)
1
j Vij
Ns(cid:88)
j=1
6
Monaco et al.
∆xb
i = (1 − βsi)∆xi + βsi∆xi nsi ,
(20)
vs =
and the resultant reward-related motion is similarly
computed as the average
1(cid:80)
k V r
ik
f r
i =
Nr(cid:88)
k=1
ik (Dr(cid:48)
V r
ik − Dr
ik)
k − xi
xr
xr
k − xi .
(18)
The net positional shift is calculated as a linear combi-
nation of the swarm- and reward-related shifts,
∆x = αf + (1 − α)f r ,
(19)
where α = 0.5 for all simulations presented. The re-
maining processing of ∆x in our NeuroSwarms im-
plementation serves to embed the foregoing dynamics
within 'physical' simulations of irregular or complex
2-dimensional environments. First, our example evi-
ronments (Fig. 2) of ∼500-point height (for arbitrary
points units) were processed for wall proximity and nor-
mal vectors for all interior locations. Thus, a 'barrier
aware' positional shift ∆xb is calculated as
for an exponential kernel βs = exp(−d/λ) of distance d
to the nearest wall with a constant of λ = 20 points, and
the normal vectors ns of the nearest wall. These shifts
update the internal place-field locations xs ← xs + ∆xb
of each swarm agent. Second, 'physical' agent locations
are updated based on the instantaneous velocity needed
for each agent to approach their internal field locations,
vs = (xs−x)/∆t, which is processed through a momen-
tum filter,
vµ = µv + (1 − µ)vs ,
(21)
with the actual velocity (prior to updating) v and coeffi-
cient µ; a speed-limiting nonlinearity based on a kinetic-
energy maximum Emax,
vmax =(cid:112)2Emax/m ,
(cid:18) vµi
vki = vmaxi tanh
vmaxi
(cid:19) vµi
vµi ,
(22)
(23)
where m is agent mass; and barrier avoidance as in
equation (20),
vi = (1 − βi)vki + βivki ni ,
(24)
for proximity β and normal vectors n. Finally, agent
locations are updated by x ← x + v∆t.
2.3.1 Single-entity simulations
In keeping with the neuroscientific motivation for Neu-
roSwarms (Fig. 1), our implementation allows for sin-
gleton simulations analogous to conventional models of
neural networks in an animal such as a rat navigating
a maze. With only minor adjustments, NeuroSwarms
can operate with a single agent (i.e., N = 1) that
owns a collection of 'virtual' or 'mental' swarming par-
ticles (e.g., Ns = 300) that guide the agent's spatial
behavior. In this sense, the virtual swarm represents
a highly dynamic spatial field that provides the agent
with various options for constructing a path through
the environment. The dynamics of the virtual swarm
are as described above up to equation (20). An array
V δ ∈ {0, 1}Ns indicates which particles' positions are
visible to the agent and serves to additionally mask the
learning updates in equations (13) and (14). To produce
motion, single-agent velocity is instead calculated using
a cubic-activation-weighted average of the swarm,
∆t(cid:80)
1
j V δ
j p3
j
Ns(cid:88)
i=1
V δ
i p3
i (xsi − x) ,
(25)
prior to processing the 'physical' embedding of the
agent's motion in equations (21) -- (24). Thus, the agent
constructs a path toward the most highly activated and
visible swarm particles.
2.4 NeuroSwarms simulations
Simulated environments (Fig. 2) contain fixed-position
rewards and cues depicted as gold stars and purple
shapes, respectively. Environments are otherwise de-
fined by a set of linear barrier segments (e.g., walls) that
form a closed shape defining an interior space that be-
comes the set of allowable agent locations. Simulations
are initialized by setting all velocities, input signals, and
activations to zero, randomly choosing internal phase
states, and randomly assigning agent positions to al-
lowable locations within a set of 'spawn discs' defined
in the environment. Random number generator seeds
are reused for simulations meant to compare parame-
ter values, unless otherwise specified. Environments are
specified as vector image files in Tiny SVG format with
XML text nodes defining reward, cue, and spawn disc
locations. Unless noted, parameters were set to the de-
fault values displayed in Table 1. The python source
code will be made available upon reasonable request.
Cognitive swarms with attractors and oscillators
7
Fig. 2 Example post-initialization (t = 0.1 s) swarm states for NeuroSwarms simulations. (Left) A single-agent simulation in
the 'multireward' arena, which contains 3 rewards (gold stars; northwest, southwest, southeast), 7 cues (purple shapes), and
3 spawn discs. White enclosed areas constitute the set of allowable locations for swarm agents; black regions constitute barriers
and disallowed locations. Initial particle positions are sampled from the spawn discs and initial phases are random. Green
circle in southwest: the single agent; dots: 300 virtual swarm particles with internal phase state indicated by color. (Right)
A multi-agent simulation in the 'hairpin' maze, which contains 5 connected hallways, 3 rewards, 7 cues, and 4 spawn discs.
Circles: 300 swarm agents with internal phase state indicated by color; reward (gold star) size is for visual differentiation only
and has no effect in the model.
Table 1 Parameters, default values, and descriptions (with
units) for the NeuroSwarms controller implementation.
∆t
duration
N
N
Ns
0.01
180.0
300
1
300
†
Dmax
Emax
µ
mmulti
msingle
σ†
κ†
η
ηr
ω0
ωI
1.0
3e3
0.9
0.3
3.0
1.0
1.0
1.0
1.0
0.0
1.0
s, integration time-step of simulation
s, total simulation time
no. of 'physical' agents (multi-agent)
no. of 'physical' agents (single-entity)
no. of internal fields (multi-agent) or
virtual particles (single-entity)
max. inter-agent visibility range
kg·points2/s2, max. kinetic energy
momentum coefficient of agent motion
kg, mean agent mass (multi-agent)
kg, agent mass (single-entity)
spatial scale of swarm interaction
spatial scale of reward interaction
learning rate for swarm connections
learning rate for reward connections
cycles/s, baseline oscillatory frequency
cycles/s, max. increase in oscillatory
frequency due to neural activation
gain of sensory cue inputs
gain of reward inputs
gain of swarming inputs
s, time-constant of sensory cue inputs
s, time-constant of reward inputs
s, time-constant of swarming inputs
points, reward contact radius
0.4
0.2
0.4
0.5
0.5
0.1
0.0
gc
gr
gs
τc
τr
τq
drad
† These parameter values are multiplicatively scaled to the
notional environment size, defined in points as the radius of
a disc with the same area as the set of allowable locations in
the environment's interior.
3 Results
3.1 Emergent swarming behaviors
We designed the multireward arena (Fig. 2, left) to
characterize emergent swarming and reward approach
behaviors, and the hairpin maze (Fig. 2, right) to
assess behavioral adaptation in large, fragmented en-
vironments. We observed several emergent dynamical
behaviors in simulations of both multi-agent swarm-
ing and single-entity locomotion (Section 2, Methods).
The most notable and persistent behaviors included
the emergence of phase-sorted spatial formations such
as line segments, rings, or concentric loops (Fig. 3).
These behaviors were analogous in form to (1) the
'phase wave' states observed in certain swarmalator
regimes (O'Keeffe et al., 2017), and (2) the hippocam-
pal phenomena of theta sequences and theta-rhythmic
phase assemblies (Foster and Wilson, 2007; Drieu et al.,
2018). Further, by inspection of simulation movies, we
observed two dynamical
features. First, agent sub-
groups forming line segments and rings continuously
phase-synchronized in a shared oscillation that was in-
dependent from the absolute movement or rotation of
the formation in space. Second, line or ring formations
would often break apart and re-form new configura-
tions that typically involved other agents or formations
that were able to phase-synchronize with elements of
the subgroup. These alternating disintegrative and ag-
gregative dynamics may be consistent with analyses of
8
Monaco et al.
persistent homologies in place-cell networks with tran-
sient connectivity (Babichev and Dabaghian, 2017).
These spatiotemporal dynamics are evident across
frame captures of multi-agent (Fig. 3A) and single-
entity (Fig. 3B) simulations. While phase-ordered
groups could appear far from rewards (Fig. 3A, last
two frames, smaller red circles), swarm agents typically
approached a reward location and formed a rotat-
ing ring centered on the reward position (Fig. 3A,
southeast corner, last three frames). Such reward rings
appeared in single-entity simulations, but the virtual
swarm particles (Section 2.3.1) additionally exhibited
particularly extended line segments that often traced
out phase-ordered trajectory sequences; e.g., the agent
followed an extended sequence to the reward located in
the southeast corner (Fig. 3B, last two frames). Further,
we observed that the size of reward rings decreased over
time, reflecting a relaxation of phase and momentum
given the centrally organizing reward location.
When the reward kernel's spatial scale κ (equa-
tion (4); Table 1) was increased, streams of virtual
swarm particles formed around distal rewards as the
particles' motion was modulated by agent visibility
interacting with the geometry of the environment. As
shown in the first frame of Fig. 3C, a step-like pat-
tern formed near the northwest reward location while
a wavy pattern formed near the southeast reward lo-
cation. Both virtual swarm formations presented path
choices to the single agent located in the large central
compartment of the arena. As expected (Section 2.3.1),
virtual swarm particles that were not visible to the
agent remained fixed in place due to masking of the
weight updates in equations (13) and (14). In addi-
tion to single rings, double and even triple concentric
loops of nested, non-overlapping, phase-sorted rings
were observed in some simulations. An example of a
double loop forming is shown in the southeast cor-
ner at t = 16.74 s (Fig. 3C). Strikingly, we did not
predict, expect, or adapt the NeuroSwarms controller
design to observe these emergent behaviors; we simply
implemented abstractions for place-cell spatial tuning,
phaser-cell oscillatory synchronization, and a distance --
weight equivalence for Hebbian learning with notions
of visibility and environmental geometry that provided
spatial barriers to communication (Section 2). These
behaviors would be unexpected as well from conven-
tional swarming algorithms (Gazi and Passino, 2011).
3.2 Reward-based behavior in a compartmented arena
To assess the spatial performance of NeuroSwarms,
we examined the ability of single-entity behavior to
find all three rewards in the multireward arena. We fo-
cused on the parameter constants governing the spatial
scale of swarm (σ) and reward (κ) interactions (equa-
tions (3) and (4); Table 1) and found (σ, κ) values for
which the agent approached multiple rewards regard-
less of its initial spawn location. Due to the random
initialization of location, we selected 40 simulations for
analysis in which the agent was spawned in the south-
west corner (as in Fig. 2, left). The agent successfully
captured one, two, or all three rewards in 11, 28, and
1 simulation(s) at elapsed times ranging from 4 -- 108,
20 -- 179, and ∼160 s, respectively. Frame captures of
reward approaches are shown in Fig. 4A for the simula-
tion in which all three rewards were found. The ability
of the agent to approach multiple fixed rewards over
time was an unexpected and emergent behavior: based
on our NeuroSwarms implementation, we had predicted
that the rewards would serve as stable attractors in the
absence of additional mechanisms such as adaptation
or reward learning. However, in accordance with those
expectations, we observed simulations which failed to
explore much of the environment after approaching a
single reward location. For the same parameters but a
different random seed than shown in Fig. 4A, a failed
exploration occurred (Fig. 4B) when the virtual parti-
cles split into two fixed-point, out-of-phase attractors
that essentially 'trapped' the agent.
To counteract these unsuccessful equilibria, we
implemented a 'reward capture' mechanism in the
NeuroSwarms controller based on a minimum con-
tact radius, drad. This feature causes rewards to cease
being attractive locations to the virtual swarm par-
ticles upon contact by the agent, thus releasing the
agent from reward-related attractors before further
exploration is prevented. Indeed, having capturable
rewards with drad = 12 points enabled a simulation
that was otherwise identical to the failed case (Fig. 4B)
to successfully navigate the arena to capture all three
rewards (Fig. 4C). Thus, a notion of reward adaptation
or reward consumption may be crucial to achieving
continuous exploration.
For the 40 single-entity simulations with fixed re-
wards, the bottom panel of Fig. 5A reveals strong at-
tractors at the southeast and northwest corners of the
arena associated with reward locations. To demonstrate
the effect of the contact radius on exploration when re-
wards were capturable, the trajectories resulting from
contact radii of 1, 4, 10, and 15 points are shown in the
top row of Fig. 5A; these values produced 1, 3, 8, and
30 (out of 40) simulated trajectories, respectively, that
successfully contacted all three rewards (Fig. 5A, red
traces). In a few simulations, the single-entity agent
spawned in the southwest corner, found the southeast
Cognitive swarms with attractors and oscillators
9
Fig. 3 Temporal evolution of swarming and single-entity approaches to rewards. A. Three agent-clusters were initially popu-
lated in the multireward arena. The internal place-field location of each agent is indicated by a small black dot (e.g., t = 1.26 s,
inset, top right). Phase sorting is indicated by sequentially ordered colors of the circle markers representing agent positions.
A reward-centered phase ring was created (t = 9.71 s) with a decreasing diameter over time (southeast corner, t = 22.49 s
and t = 24.32 s). NeuroSwarms parameters: σ = 1.5, gc = 0.2, gr = 0.3, gs = 0.5; Table 1. B. A single-entity agent (green
circle) was guided by Ns = 300 virtual particles (phase-colored dots). Swarm particles formed phase sequences leading the
agent from the southwest corner to the reward location in the southeast corner of the arena by t = 20.3 s. NeuroSwarms
parameters: σ = 4, κ = 1.5, gc = 0.2, gr = 0.3, gs = 0.5; Table 1. C. Step-like patterns of particles appeared near rewards
that were occluded from the perspective of the single agent by corners in the environmental geometry. While the agent became
'indecisive' around t = 10.24 s, as it was pulled simultaneously in both directions, the agent ultimately found its way to the
southeast reward by t = 16.74 s. NeuroSwarms parameters: σ = 4, κ = 8, gc = 0.2, gr = 0.3, gs = 0.5; Table 1.
reward first, and then later returned to the southwest
corner in order to collect all three rewards; such a wan-
dering trajectory suggests that the model might qualify
as an ergodic system under these conditions, but that
hypothesis would be appropriately addressed by future
analytical studies. These results demonstrate that the
sensitivity of reward capture modulates exploratory
variability by mitigating the effect of reward-related
attractors. Histograms of the time-to-capture profile
across agent spawn sites and reward locations reflect
the structure of the environment as well as the different
possible sequences of reward contact (Fig. 5B). Thus,
the contact radius for capturable rewards exerted sub-
stantial control over the likelihood of the single-entity
agent finding all rewards in the environment.
3.3 Behavioral adaptation in large hairpin mazes
A key challenge facing current state-of-the-art swarm
controllers is the inability to rapidly adapt to dynamic
changes in complex environments. The hairpin maze
is well suited to study such adapation because swarm
agents spawned from certain hallways do not have line-
of-sight visibility to rewards that may be located in ad-
jacent hallways. A form of behavioral adapation can be
assessed based on whether agents spawned into reward-
free hallways can nonetheless navigate to rewards in
other parts of the maze.
We examined multi-agent swarming dynamics in the
hairpin maze under several conditions: pure swarming
(equation (13); Fig. 6A); swarming with sensory cue
inputs (equation (8); Fig. 6B); and swarming with sen-
sory cue inputs and reward approach (equation (14);
Fig. 6C). The sample frames shown in Fig. 6 demon-
strate the emergence of phase-ordered structures in
each of these conditions with the clear distinction that
tightly configured reward rings became prevalent when
reward learning was activated (Fig. 6C). In that condi-
tion, with the same NeuroSwarms features as studied
above in the multireward arena, it was also clear that
agents in the second and third hallways had difficulty
leaving to find another hallway with a reward. We ex-
pected this was due to (1) the parity of swarming and
reward spatial constants (σ, κ), which perhaps overem-
phasized swarming at the cost of reward-following in
highly-partitioned environments, and (2) the need for
more sensitive reward-capture. Thus, we simulated
a condition with fixed and capturable rewards using
drad = 10 points but also increased the spatial constants
10
Monaco et al.
Fig. 4 Single-entity reward-approach behavior with fixed or capturable rewards. The agent was initialized to the spawn disc
in the south west corner of the multireward arena. A. A rare example in which the single agent (green circle) captured all three
rewards when rewards were fixed (i.e., they remained attractive despite previous contact with the agent): southwest reward at
∼8.9 s, southeast reward at ∼33 s, and northwest reward at ∼160 s. Movie frames show the initial contacts with each reward
(gold stars). NeuroSwarms parameters: σ = 4, κ = 1.5, gc = 0.2, gr = 0.3, gs = 0.5; Table 1. B. With the same parameters as
(A) but initialized with a different random seed, this final frame of a simulation shows the converged state after the agent was
attracted to the southwest corner and remained there for the duration. The red ellipse highlights that the agent was 'stuck'
between two fixed-point attractors that formed through mutual phase-desynchronization. C. With the identical parameters
and random seed as (B), rewards were made to be 'capturable' at a minimum contact radius of drad = 12 points. Thus,
rewards ceased to be attractive locations once the agent made initial contact. The agent captured the southwest reward at
∼5 s, the southeast reward at ∼27 s, and the northwest reward at ∼60 s. Transparent/white stars indicate captured rewards.
NeuroSwarms parameters: σ = 4, κ = 1.5, gc = 0.2, gr = 0.3, gs = 0.5, drad = 12; Table 1.
with 3.3-fold bias for the reward value (σ, κ) = (2, 6.6)
(equations (3) and (4); Table 1). Multi-agent trajec-
tories for this enhanced reward-exploration regime are
shown in Fig. 6D: with fixed rewards (top panel), the
reward attractors dominate the dynamics and agents
generally stayed within their initial hallways; with
capturable rewards (bottom panel), there was sub-
stantially more path variability between agents, spatial
coverage increased (cf. the spiral patterns characteristic
of agents' exits from reward locations after contact),
and many more agents were able to traverse from one
hallway to the next.
To assess the converged state of multi-agent dynam-
ics in the hairpin maze, we simulated N = 300 agents
for 300 s using the same parameters and fixed rewards
as the top panel of Fig. 6D. The temporal progression of
swarm state across the simulation frames presented in
Fig. 7 shows distinct stages exhibited by the four initial
clusters of the swarm. The two clusters that spawned in
reward-free hallways eventually found their way around
the barriers to adjacent hallways after milling in vari-
ous line segment or ring formations for nearly a minute
(Fig. 7). All of the clusters successfully converged onto
the three reward locations in the maze, but the two that
traversed hallways left some agents behind. The pro-
gression of those swarm clusters from initial positions
to ring/arc formations to linear trajectory sequences to
fixed-point reward attractors illustrates a high degree
of spontaneous adaptation to the circumstances in the
hairpin maze. These dynamics were self-organized and
emergent, providing behaviors that resulted in nearly
complete convergence to reward locations. Thus, Neu-
roSwarms demonstrated autonomous spatial navigation
to unknown, occluded, and remote rewards in a large
and complex environment.
Cognitive swarms with attractors and oscillators
11
Fig. 5 Dispersion of exploratory trajectories with capturable rewards. A. Superimposed agent trajectories are shown from
40 single-entity simulations of 180 s duration in which the agent was initialized to the southwest corner (Section 2.3.1). With
fixed (non-capturable) rewards, only 1 simulation (bottom, red trace) contacted all three rewards in the arena (see Fig. 4A)
and there was minimal variance in the exploratory paths taken by the agent in the other simulations (black traces). The dense
sampling of the northwest and southeast reward location indicates these were strong attractors for the agent. With increasing
contact radii of 1, 4, 10, or 15 points (top), exploratory variance increased, the reward attractors became relatively weaker, and
higher proportions of agent trajectories successfully visited all three rewards (red traces). NeuroSwarms parameters: σ = 4,
κ = 1.5, gc = 0.2, gr = 0.3, gs = 0.5. Gold stars: reward locations. B. For 700 single-entity simulations with random initial
agent locations and drad = 15, histograms for each of the agent spawn locations (central, southeast, or southwest) display the
time-to-capture profile of each of the three rewards. NeuroSwarms parameters same as the top right panel of (A).
4 Discussion
We introduced the NeuroSwarms controller as a model
for studying neural control paradigms of artificial
swarming agents. We demonstrated that NeuroSwarms
also acts as a two-way bridge between artificial systems
and theoretical models of animal cognition. This reci-
procity arises due to a single-entity paradigm in which
NeuroSwarms controls a single agent in which an inter-
nal, virtual 'cognitive swarm' guides the agent's spatial
behavior. Both modes of operation, multi-agent and
single-entity, share the same underlying neural mech-
anisms (with differences described in Section 2.3.1).
This duality enables developments in artificial sys-
tems to also inform advances in neurobiological theo-
ries of spatial cognition. Additionally, this duality will
aid discovery of neural dynamics in large, uncertain,
and/or complex environments based on closed-system
approaches to distributed spatial coding. We presented
behaviors responding to environmental complexities
such as multiple reward sites (that optionally interact
with the system by being 'consumed' by agents), het-
erogeneous agent-based preferences for neutral-valued
spatial cues, and geometric constraints that occlude
agents' visibility of cues, rewards, and other agents.
Swarms governed by NeuroSwarms self-organize
into emergent, transitory configurations in position
and phase that directly recall spatial attractor dy-
namics (Zhang, 1996; Tsodyks, 1999; Samsonovich and
McNaughton, 1997; Hedrick and Zhang, 2016; Knierim
and Zhang, 2012) and sequential oscillatory phenom-
ena (O'Keefe and Recce, 1993; Foster and Wilson,
2007; Drieu et al., 2018; Monaco et al., 2019a) that
have been theorized to operate within hippocampal
circuits. We explicitly designed NeuroSwarms to com-
bine features of attractor maps and oscillatory comput-
ing using robust transformations (such as the spatial
kernels of distance converted to synaptic strengths in
12
Monaco et al.
Fig. 6 Dynamics of a multi-agent swarm in a large hairpin maze. Movie frame captures are shown for simulations with N = 300
agents in a rectangular environment (885×519 points including borders) partitioned into 5 hallways in a hairpin pattern. Three
hallways contain rewards which are substantially occluded from the other maze sections. Emergent formations are circled in red.
A. Frames from a pure swarming simulation, without reward or sensory cue influence. NeuroSwarms parameters: dmax = 1.5,
η = 1, ηr = 0, gc = 0, gr = 0, gs = 1; Table 1. B. Frames from a capturable-rewards simulation with 1:1 swarm/cue input
gains but no reward influence. NeuroSwarms parameters: dmax = 1.5, η = 1, ηr = 0, gc = 0.5, gr = 0, gs = 0.5; Table 1. C.
Frames from a capturable-rewards simulation with equalized swarm, reward, and cue input gains. NeuroSwarms parameters:
dmax = 1.5, ηs = 1, ηr = 1, gc = gr = gs = 1/3; Table 1. D. Multi-agent trajectories are shown from two 80 s simulations:
fixed rewards (top) and capturable rewards with drad = 10 points (bottom). Compare with multireward arena simulations in
Fig. 5A. NeuroSwarms parameters: dmax = 1.5, σ = 2, κ = 6.6, gc = 0.1, gr = 0.1, gs = 0.8; Table 1.
equations (3) and (4)). However, we did not antici-
pate how readily such a system would self-organize
into a variety of dynamic spatiotemporal structures
that recombined in complex patterns while supporting
navigation through our environments. A weakness of
the presented implementation was the use of a global,
shared oscillation without allowing for noise, drift,
or independent perturbations (cf. Zilli and Hasselmo,
2010; Monaco et al., 2011, 2019a). A more decentral-
ized approach might utilize resonant agent-oscillators
that self-organize local oscillations depending on avail-
able information, task requirements, or context. Such
bottom-up oscillations might aggregate into a global,
swarm-wide oscillation under certain conditions, which
should be studied in future models.
To leverage inertial, energetic, and cost benefits of
small-scale robots, critical future applications of au-
tonomous technologies may depend on coordinating
large numbers of agents with minimal onboard sens-
ing and communication resources. However, a critical
problem for autonomous multi-robot groups is that
state-of-the-art control schemes break down as robotic
agents are scaled down (decreasing agent resources)
and the numerical size of swarms is scaled up (increas-
ing communication and coordination requirements)
(Murray, 2007; Hamann et al., 2016; Yang et al., 2018;
Chung et al., 2018). NeuroSwarms addresses the hy-
pothesis that a similar distributed scaling problem may
have been solved by the evolved neural architecture
of mammalian brains. Compared to signal compre-
hension, signal production errors may be particularly
deleterious to large-scale, distributed and decentral-
ized computations (Salahshour et al., 2019). Thus,
onboard suites for future cognitive swarming platforms
based on NeuroSwarms principles should emphasize re-
liable transmission of low-bandwidth data packets (e.g.,
spikes or continuous phase signals). Low fidelity inputs
are more easily compensated by distributed processing;
Cognitive swarms with attractors and oscillators
13
Fig. 7 Multi-agent ring formations and trajectory sequences in the hairpin maze. Frames from a single simulation are shown
for elapsed simulation times (s) from left-to-right, top-to-bottom: 0.89, 1.85, 3.73, 5.81, 9.63, 12.06, 41.43, 48.99, 297.65.
NeuroSwarms parameters: duration = 300.0, dmax = 1.5, σ = 2, κ = 6.6, gc = 0.1, gr = 0.1, gs = 0.8.
i.e., sensor designs should emphasize energy and cost
to maximize deployment duration and swarm size.
In summary, we made the explicit analogy from
agents and swarms to neurons and neural circuits. This
analogy permitted the tools of theoretical neuroscience
to be leveraged in developing a model artificial spa-
tial system. The NeuroSwarms controller required two
features to support cognitive swarming: (1) an inter-
nal phase state, and (2) decoupling of physical location
from internal self-localization. The phase state natu-
rally encapsulated neural activation (cf. equation (12))
and could be used to drive spike generation, if desired,
in future models. Phase-based organization additionally
leveraged the expressive complexity of mobile oscilla-
tors revealed by the swarmalator formalism (O'Keeffe
et al., 2017; Monaco et al., 2019b). The separation of
position vs. self-localization allowed swarm motion dy-
namics to be interpreted as Hebbian learning in an oscil-
latory place-coding neural network (Section 2.2). Thus,
theorized hippocampal phenomena such as attractor
map formation and oscillatory sequence generation pro-
vide a framework for advances in decentralized swarm
control and, reciprocally, the theoretical neuroscience of
spatial navigation in complex, changing environments.
Acknowledgements The authors
thank Marc Burlina
and Marisel Villafane-Delgado for preliminary analyses
and Robert Chalmers for helpful discussions about the
manuscript.
Conflict of interest
The authors have no conflicts of interest to declare.
References
Babichev A, Dabaghian Y (2017) Transient cell assem-
bly networks encode stable spatial memories. Scien-
tific Reports 7(1):3959
Bellmund JLS, Gardenfors P, Moser EI, Doeller CF
(2018) Navigating cognition: Spatial codes for human
thinking. Science 362(6415)
Burgess N (2014) The 2014 nobel prize in physiology or
medicine: A spatial model for cognitive neuroscience.
Neuron 84(6):1120 -- 1125
Buzs´aki G (1989) Two-stage model of memory trace
formation: a role for "noisy" brain states. Neuro-
science 31(3):551 -- 70
14
Monaco et al.
Buzs´aki G (2005) Theta rhythm of navigation: link
between path integration and landmark naviga-
tion, episodic and semantic memory. Hippocampus
7(15):827 -- 40
Buzs´aki G, Moser EI (2013) Memory, navigation and
theta rhythm in the hippocampal-entorhinal system.
Nat Neurosci 16(2):130
Casali G, Bush D, Jeffery K (2019) Altered neural
odometry in the vertical dimension. Proceedings of
the National Academy of Sciences 116(10):4631 -- 4636
Chung SJ, Paranjape AA, Dames P, Shen S, Kumar
V (2018) A survey on aerial swarm robotics. IEEE
Transactions on Robotics 34(4):837 -- 855
Climer JR, Newman EL, Hasselmo ME (2013) Phase
coding by grid cells in unconstrained environments:
two-dimensional phase precession. Eur J Neurosci
38(4):2526 -- 41
Drieu C, Todorova R, Zugaro M (2018) Nested
sequences of hippocampal assemblies during be-
havior support subsequent sleep replay. Science
362(6415):675 -- 679
Eichenbaum H (2018) Barlow versus Hebb: When is
it time to abandon the notion of feature detectors
and adopt the cell assembly as the unit of cognition?
Neuroscience Letters 680:88 -- 93
Feng T, Silva D, Foster DJ (2015) Dissociation between
the experience-dependent development of hippocam-
pal theta sequences and single-trial phase precession.
J Neurosci 35(12):4890 -- 902
Fenton AA, Kao HY, Neymotin SA, Olypher A, Vayn-
trub Y, Lytton WW, Ludvig N (2008) Unmasking
the CA1 ensemble place code by exposures to small
and large environments: more place cells and multi-
ple, irregularly arranged, and expanded place fields
in the larger space. J Neurosci 28(44):11250 -- 62
Foster DJ (2017) Replay comes of age. Annu Rev Neu-
rosci 40:581 -- 602
Foster DJ, Wilson MA (2007) Hippocampal theta se-
quences. Hippocampus 17(11):1093 -- 1099
Gaussier P, Banquet JP, Cuperlier N, Quoy M, Aubin
L, Jacob PY, Sargolini F, Save E, Krichmar JL,
Poucet B (2019) Merging information in the entorhi-
nal cortex: what can we learn from robotics experi-
ments and modeling? Journal of Experimental Biol-
ogy 222(Suppl 1)
Gazi V, Passino KM (2011) Swarm stability and opti-
mization. Springer Science & Business Media
Gupta AS, van der Meer MAA, Touretzky DS, Redish
AD (2010) Hippocampal replay is not a simple func-
tion of experience. Neuron 65(5):695 -- 705
Hamann H, Khaluf Y, Botev J, Divband Soorati M,
Ferrante E, Kosak O, Montanier JM, Mostaghim S,
Redpath R, Timmis J, et al. (2016) Hybrid societies:
challenges and perspectives in the design of collec-
tive behavior in self-organizing systems. Frontiers in
Robotics and AI 3:14
Hartley T, Lever C, Burgess N, O'Keefe J (2014) Space
in the brain: how the hippocampal formation sup-
ports spatial cognition. Philos Trans R Soc Lond B
Biol Sci 369(1635):20120510
Hasselmo ME (2018) A model of cortical cognitive func-
tion using hierarchical interactions of gating matrices
in internal agents coding relational representations.
arXiv e-prints p arXiv:1809.08203
Hebb DO (1949) The Organization of Behavior: A Neu-
ropsychological Theory. Wiley and Sons, New York
Hedrick KR, Zhang K (2016) Megamap: flexible rep-
resentation of a large space embedded with nonspa-
tial information by a hippocampal attractor network.
Journal of Neurophysiology 116(2):868 -- 891
Jayakumar RP, Madhav MS, Savelli F, Blair HT,
Cowan NJ, Knierim JJ (2019) Recalibration of
path integration in hippocampal place cells. Nature
566(7745):533 -- 537
Jeewajee A, Barry C, Douchamps V, Manson D, Lever
C, Burgess N (2014) Theta phase precession of grid
and place cell firing in open environments. Philos
Trans R Soc Lond B Biol Sci 369(1635):20120532
Jensen O, Lisman JE (2000) Position reconstruction
from an ensemble of hippocampal place cells: con-
tribution of theta phase coding. J Neurophysiol
83(5):2602 -- 9
Johnson A, Redish AD (2007) Neural ensembles in CA3
transiently encode paths forward of the animal at a
decision point. J Neurosci 27(45):12176 -- 89
Knierim JJ (2006) Neural representations of location
outside the hippocampus. Learn Mem 13(4):405 -- 415
Knierim JJ, Hamilton DA (2011) Framing spatial cog-
nition: Neural representations of proximal and dis-
tal frames of reference and their roles in navigation.
Physiological Reviews 91(4):1245 -- 1279
Knierim JJ, Zhang K (2012) Attractor dynamics of spa-
tially correlated neural activity in the limbic system.
Annu Rev Neurosci 35:267 -- 85
Kunz L, Maidenbaum S, Chen D, Wang L, Jacobs J,
Axmacher N (2019) Mesoscopic neural representa-
tions in spatial navigation. Trends in Cognitive Sci-
ences
Levy WB, Steward O (1979) Synapses as associa-
tive memory elements in the hippocampal formation.
Brain Res 175(2):233 -- 45
Momennejad I, Otto AR, Daw ND, Norman KA (2018)
Offline replay supports planning in human reinforce-
ment learning. eLife 7:e32548
Monaco JD, Abbott LF (2011) Modular realignment of
entorhinal grid cell activity as a basis for hippocam-
Cognitive swarms with attractors and oscillators
15
pal remapping. J Neurosci 31(25):9414 -- 25
Monaco JD, Knierim JJ, Zhang K (2011) Sensory feed-
back, error correction, and remapping in a multiple
oscillator model of place-cell activity. Front Comput
Neurosci 5:39
Monaco JD, Rao G, Roth ED, Knierim JJ (2014) Atten-
tive scanning behavior drives one-trial potentiation
of hippocampal place fields. Nat Neurosci 17(5):725 --
731
Monaco JD, De Guzman RM, Blair HT, Zhang
K (2019a) Spatial
from
coupled rate-phase neurons. PLoS Comput Biol
15(1):e1006741
synchronization codes
Monaco JD, Hwang GM, Schultz KM, Zhang K (2019b)
Cognitive swarming: an approach from the theoreti-
cal neuroscience of hippocampal function. In: Micro-
and Nanotechnology Sensors, Systems, and Applica-
tions XI, International Society for Optics and Pho-
tonics, vol 10982, p 109822D
Moser EI, Paulsen O (2001) New excitement in cogni-
tive space: between place cells and spatial memory.
Curr Opin Neurobiol 11(6):745 -- 751
Moser EI, Kropff E, Moser MB (2008) Place cells, grid
cells, and the brain's spatial representation system.
Annu Rev Neurosci 31(1):69 -- 89
Muessig L, Lasek M, Varsavsky I, Cacucci F, Wills TJ
(2019) Coordinated emergence of hippocampal re-
play and theta sequences during post-natal develop-
ment. Current Biology 29(5):834 -- 840.e4
Murray RM (2007) Recent research in cooperative con-
trol of multivehicle systems. Journal of Dynamic Sys-
tems, Measurement, and Control 129(5):571 -- 583
Ocko SA, Hardcastle K, Giocomo LM, Ganguli S (2018)
Emergent elasticity in the neural code for space. Proc
Natl Acad Sci U S A 115(50):E11798 -- E11806
Oja E (1982) Simplified neuron model as a principal
component analyzer. Journal of Mathematical Biol-
ogy 15(3):267 -- 273
O'Keefe J, Dostrovsky J (1971) The hippocampus as a
spatial map: preliminary evidence from unit activity
in the freely-moving rat. Brain Res 34(1):171 -- 175
O'Keefe J, Nadel L (1978) The Hippocampus as a Cog-
nitive Map. Clarendon Press, Oxford, UK
O'Keefe J, Recce ML (1993) Phase relationship between
hippocampal place units and the EEG theta rhythm.
Hippocampus 3(3):317 -- 30
O'Keeffe KP, Hong H, Strogatz SH (2017) Oscilla-
tors that sync and swarm. Nature communications
8(1):1504
´Olafsd´ottir HF, Bush D, Barry C (2018) The role of
hippocampal replay in memory and planning. Curr
Biol 28(1):R37 -- R50
Papale AE, Zielinski MC, Frank LM, Jadhav SP, Redish
AD (2016) Interplay between hippocampal sharp-
wave-ripple events and vicarious trial and error be-
haviors in decision making. Neuron 92(5):975 -- 982
Pfeiffer BE, Foster DJ (2013) Hippocampal place-cell
sequences depict future paths to remembered goals.
Nature 497(7447):74 -- 9
Poll DB, Nguyen K, Kilpatrick ZP (2016) Sensory feed-
back in a bump attractor model of path integration.
J Comput Neurosci 40(2):137 -- 55
Poulter S, Hartley T, Lever C (2018) The neurobi-
ology of mammalian navigation. Current Biology
28(17):R1023 -- R1042
Renn´o-Costa C, Tort ABL (2017) Place and grid cells in
a loop: implications for memory function and spatial
coding. J Neurosci 37(34):8062 -- 8076
Rich PD, Liaw HP, Lee AK (2014) Large environments
reveal the statistical structure governing hippocam-
pal representations. Science 345(6198):814 -- 817
Salahshour M, Rouhani S, Roudi Y (2019) Phase tran-
sitions and asymmetry between signal comprehension
and production in biological communication. Scien-
tific Reports 9(1):3428
Samsonovich A, McNaughton BL (1997) Path integra-
tion and cognitive mapping in a continuous attractor
neural network model. J Neurosci 17(15):5900 -- 5920
Savelli F, Knierim JJ (2010) Hebbian analysis of
the transformation of medial entorhinal grid-cell in-
puts to hippocampal place fields. J Neurophysiol
103(6):3167 -- 83
Savelli F, Knierim JJ (2019) Origin and role of path
integration in the cognitive representations of the
hippocampus: computational insights into open ques-
tions. J Exp Biol 222(Pt Suppl 1)
Savelli F, Yoganarasimha D, Knierim JJ (2008) Influ-
ence of boundary removal on the spatial representa-
tions of the medial entorhinal cortex. Hippocampus
18(12):1270 -- 1282
Schiller D, Eichenbaum H, Buffalo EA, Davachi L, Fos-
ter DJ, Leutgeb S, Ranganath C (2015) Memory and
space: Towards an understanding of the cognitive
map. J Neurosci 35(41):13904 -- 13911
Tomov M, Yagati S, Kumar A, Yang W, Gershman S
(2018) Discovery of hierarchical representations for
efficient planning. bioRxiv 499418
Tsodyks M (1999) Attractor neural network mod-
els of spatial maps in hippocampus. Hippocampus
9(4):481 -- 9
Vanderwolf CH (1969) Hippocampal electrical activ-
ity and voluntary movement in the rat. Electroen-
cephalogr Clin Neurophysiol 26(4):407 -- 18
Wang C, Chen X, Lee H, Deshmukh SS, Yoganarasimha
D, Savelli F, Knierim JJ (2018) Egocentric coding of
16
Monaco et al.
external items in the lateral entorhinal cortex. Sci-
ence 362(6417):945 -- 9
Wang Y, Roth Z, Pastalkova E (2016) Synchronized ex-
citability in a network enables generation of internal
neuronal sequences. Elife 5
Wikenheiser AM, Redish AD (2015) Hippocampal
theta sequences reflect current goals. Nat Neurosci
18:289 -- 294
Yadav CK, Doreswamy Y (2017) Scale invariance in lat-
eral head scans during spatial exploration. Physical
Review Letters 118(15):158104
Yang GZ, Bellingham J, Dupont PE, Fischer P, Floridi
L, Full R, Jacobstein N, Kumar V, McNutt M, Merri-
field R, et al. (2018) The grand challenges of Science
Robotics. Science Robotics 3(14):eaar7650
Yartsev MM, Ulanovsky N (2013) Representation of
three-dimensional space in the hippocampus of fly-
ing bats. Science 340(6130):367 -- 72
Zhang K (1996) Representation of spatial orientation
by the intrinsic dynamics of the head-direction cell
ensemble: a theory. J Neurosci 16(6):2112 -- 26
Zilli EA, Hasselmo ME (2010) Coupled noisy spiking
neurons as velocity-controlled oscillators in a model
of grid cell spatial firing. J Neurosci 30(41):13850 -- 60
|
1403.5734 | 2 | 1403 | 2015-12-07T19:06:31 | Software Agents Interaction Algorithms in Virtual Learning Environment | [
"cs.MA",
"cs.CY"
] | This paper highlights the multi-agent learning virtual environment and agents communication algorithms. The researcher proposed three algorithms required software agents interaction in virtual learning information system environment. The first proposed algorithm is agents interaction localization algorithm, the second one is the dynamic agents distribution algorithm (load distribution algorithm), and the third model is Agent communication algorithm based on using agents intermediaries. The main objectives of these algorithms are to reduce the response time for any agents changes in virtual learning environment (VLE) by increasing the information exchange intensity between software agents and reduce the overall network load, and to improve the communication between mobile agents in distributed information system to support effectiveness. Finally the paper describe the algorithms of information exchange between mobile agents in VLE based on the expansion of the address structure and the use of an agent, intermediary agents, matchmaking agents, brokers and their entrepreneurial functions | cs.MA | cs | World of Computer Science and Information Technology Journal (WCSIT)
ISSN: 2221-0741
Vol. 4, No. 2, 18-25, 2014
Software Agents Interaction Algorithms in Virtual
Learning Environment
Dr. Zahi A.M. Abu Sarhan
Faculty of Information Technology: Software Engineering Department
Applied Science Private University
Amman, Jordan
Abstract— This paper highlights the multi-agent learning virtual environment and agent's communication algorithms. The
researcher proposed three algorithms required software agent’s interaction in virtual learning information system environment. The
first proposed algorithm is agents interaction localization algorithm, the second one is the dynamic agents distribution algorithm
(load distribution algorithm), and the third model is Agent communication algorithm based on using agents intermediaries. The
main objectives of these algorithms are to reduce the response time for any agents’ changes in virtual learning environment (VLE)
by increasing the information exchange intensity between software agents and reduce the overall network load, and to improve the
communication between mobile agents in distributed information system to support effectiveness. Finally the paper describe the
algorithms of information exchange between mobile agents in VLE based on the expansion of the address structure and the use of
an agent, intermediary agents, matchmaking agents ,brokers and their entrepreneurial functions.
Keywords- multi-agent system; agent interaction models; Intermediary Agents; Virtual Learning Environment; Brokering Agents;
Matchmaking Agents.
I.
INTRODUCTION
At present, most of information system in various fields
based on software agents technology, these systems can
implemented as distributed information systems as centralized
information systems, and one of these complex systems is
distance or electronic learning systems. For the e-learning
systems wildly used centralized technology development and
information systems operation. The situation is still likes the
90's of the last century, when there were a large number of
scattered, technically and semantically mixed databases, used
locally. Different kinds of attempts to create a central system
for utilization all information system resources to achieve
valuable functionality and flexibility have yielded little success.
The wildly used today's Internet technologies and software
agents techniques with web access, solves the problem
partially. In this way, there is a distributed access to
information and the information resources and by the way it
keeps it to be centralized, which makes them not always
sufficiently relevant, high redundancy, technological, and
semantic diversity [1].
In this context, it is urgent the task to think about creating a
fully decentralized peer information systems to support e-
learning process, enabling flexible integration into virtual and
logical platform intelligently accomplish requested task and
usefully invoking all available information resources, thus
creating a unified virtual learning platform for fully efficient
interaction of all learning subjects. Effective technology for
implementation distributed information systems of this class is
the mobile software agents’ technology [1, 2]. These systems
must not only distribute access to information, but also
decentralized data storage and processing, and solving
problems related with information resources semantic diversity.
The developed multi-agent system implements a virtual
learning environment (VLE), in which real learning processes
related with development and
implementation of all
comprehensive forms of academic technological innovation in
learning and education and any comprehensive ideas that can
be implemented as relevant information processes[4]. The
subjects of learning can be presented as software agents that
interact with each other in a single VLE and perform the
interest of its owners, forming an open multi-agent system with
a decentralized architecture.
Software agent is computer system, which is found in some
environment and is capable of autonomous action in this
environment in order to meet its design objectives [4]. Software
agents have characteristics that make them suitable for complex
functions. Such features
interaction,
reactivity, activity, intelligence and mobility [5, 6].
include: autonomy,
18
WCSIT 4 (2), 18 -25, 2014
minimizing the data losses possibility and the transmitting
messages between agents delay time. The proposed solution in
this paper based on the expansion of the agent address structure
and the information about its current location in the network
and local caching this information on the system hosts, which
will allow sending messages directly from the sender agent to
the recipient agent, as well as provide the ability to search
agents with the joint action through intermediary agents, using
their brokering services [11] and matchmaking services [12]
functions. Algorithm searching agents’ initiators executed in
the agents intermediaries address space.
III. MULTI-AGENT VIRTUAL LEARNING ENVIRONMENT
The modern virtual learning environment (VLE) is a
software system designed to support teaching and learning.
VLEs generally function on the World Wide Web, and,
therefore, they can be utilized both on and off-campus,
provided that the users are authorized and can access the
Internet [12]. This surmount over the restriction of traditional
face-to-face learning, and guarantees that learning is neither
limited to location nor time. VLEs can contains complex of
interactions between teachers, learners and learning contents,
by adding agents and environment to this structure, the VLE
can be presented as a complex of agents interaction and every
agent represents
learning structure
components, such as learner agent, teacher agent, content
agent, and every agent
to
accomplish requested task. However the set of interacted
agents can contain “learner –learner interaction agent, learner-
teacher interaction agent, learner-content interaction agent,
teacher-teacher interaction agent, teacher-content interaction
agent, content-content interaction agent, learner-environment
interaction agent,
interaction agent,
content-environment interaction agent”, VLEs become more
popular and included in many college organizations all over the
world. It is not only because of their versatility, but also
because they provide an extensive range of tools or features,
such as content distribution, evaluation, emails[14, 15].
interacts with other agents
teacher-environment
interest of
the
the
Based on
the
representation of VLE can be presented as a set of agents that
interact together, shown in figure 1.
learning process
components
the
in
This paper presents the software agents interaction models
and the algorithms for learning activities in the virtual learning
information systems environment, enabling faster response to
changes
the agents virtual environment simulating
innovative field by increasing the intensity of information
exchange between the agents and to reduce the overall load on
the network. Indicating ways to enhance the interaction among
mobile agents in an apportioned multi-agent system of
information to back up learners and teachers action.
II. PROBLEM STATEMENT
Multi-agent systems (MAS) technology - a new pattern of
information technology, focused on the sharing of scientific
and technological achievements and benefits which provide
ideas and methods of artificial intelligence (AI), the current
local and global computer networks, distributed databases and
distributed computing, hardware and software tools to support
the theory of distribution and transparency.
Relevance of distributed AI and MAS, in accordance with
the works [7, 9], determined by the complexity of diversity
modern organizational and technical systems, complexity, and
tasks distributions, large volumes of Information flow and
information processing
is
widely used in various fields that required solutions for
complex distributed tasks such as combined product design, re-
engineering information processes and the construction of
virtual systems, and e-commerce systems, distributed computer
programs development.
time. Agent-oriented approach
The greatest complexity in the theoretical studies and
practical modern MAS implementations are issues related to
the agents’ interaction processes in the collective solving
problems with high practical complexity and relevance, as each
agent solves specific subtask, has only a partial idea about the
general task and should continuously interact with other
agents. Therefore, at present the most relevant in the MAS
theory and technology is the issues related with creating
intelligent agents interaction models in the MAS.
In inter-host software agents interaction in a virtual learning
environment, arise a set of issues related with increasing the
network load, and reducing the information exchange intensity
between agents which depends on the speed and bandwidth of
the network connections. Increasing the request delivery time
and the needs time to find the correct agent for interaction. As a
suitable solution for these problems, proposed a method based
on the decomposition a common information space in which
agents operate in virtual platform (platform represents some
separate network host) and move intensively interacting agents
to these platforms in order to combining agents in coalition.
The proposed solution can be implemented in two mutually
complementary algorithms software agents’ interaction: the
algorithm
interaction
(Transformation the inter-host agent’s interaction to intra-host
interaction) and software agent’s dynamic allocation algorithm
(balancing load between system hosts) [10].
inter-host
software
of
agent’s
However, the architecture design of decentralized open
information systems, arise problem related with determining
the location of dynamically distributed mobile agents, that are
moving between network hosts over
time, as well as
Figure 1. Virtual learning environment based on multi-agents architecture.
19
Learner-Content Interaction AgentTecher-Content Interaction AgentLearner-Learner Interaction agentLearner-Teacher Interaction AgentTeacher-Teacher Interaction agentContent-Content Interaction agentWCSIT 4 (2), 18 -25, 2014
IV. AGENTS COMMUNICATION MODEL
the
direct
following
interaction
categories:
and moderating
Agents Communication Model in an open multi-agent
information system that supports e-learning process, according
to the work [14], can be classified by the interaction character
(point-to-point
in
communication),
(throw
intermediaries or server agents) interaction. In point to point
agents’ model communication message delivered directly from
agent sender to the agent receiver, even if the agent receiver is
a mobile agent (a message can be sent through a set of
computer network host’s). In the intermediary agent model
communication mainly uses agents brokering services or
matchmaking services agent’s intermediaries, which allow
agents to communicate with each other, this model provides
multipoint and anonymous agent’s interaction. These two types
of services have their advantages and disadvantages: brokering
services are more efficient, while matchmaking services are
more flexible [10].
Depending on the agent-receiver location in the network
agent’s communication model, according to [6, 9], may be also
classified as follows: inter-host communication and intra-host
communication. When the agent-sender and agent-receiver
located on the same network host, the messages transmission
between these both agents called intra-host communication.
When they were located on two different network hosts, the
messages transmission between agents delivered via the
network nods, and this type of communication called the inter-
host communication. Even if the Internet data rate has greatly
increased, inter-host agent’s communication still would take
greater time than interaction with intra-host communication.
Therefore,
inter-host
communication to intra-host communication, which would
reduce the time required for messages transmission and
increase the interaction intensity in the agent’s communication
process.
to reform agent’s
is advisable
it
The main disadvantages of presented agent’s interaction
models can be listed as follows:
– At inter-host interaction: the network over load increases,
and the information exchange intensity between agents reduced
due to increasing message delivery times, agents reaction for
dynamically changing events of environment or the absence of
any response to change the environment in message losing
case;
– At the agents’ migration between system hosts there was
a problem of the needed responder agent location determining
for interaction during any time moment, which in its turn
results to increasing in messages loss probability during their
transfer and reducing the effectiveness of synchronized agent’s
interaction.
V. AGENT-BASED ALGORITHMS VIRTUAL LEARNING
PLATFORMS FORMATION
The higher effect obtained from using the virtual learning
environment (VLE), based on the biggest of its internal volume
(the number of registered requests), Agents representing the
Learning subjects interests, and placement of information
databases hosts [17]. However, the naturally growth of the
20
system volume leads to increase the information elements
search task complexity, and the selection of learning structures
options due polynomial growth of alternatives quantity. In
order that the system no longer runs under its own unrestricted
growth, needed some self-organization algorithms, allowing
dynamically reorganize its internal structure to reduce the
amount of processed and transmitted over the communication
lines data during the learning offerings placement and retrieval
on the media hubs, and forming a potentially effective learning
structures.
Self-organization is the automatic generation within-VLE
virtual learning platforms (VLP), combining agents with
similar interests in groups. Formation the VLP based on a the
register distribution support method for peer-to-peer hosts with
the implicit treelike organization [9] in which as an organizing
structure tree uses the hierarchical learning domain model.
Learning platforms formation carried out by displaying the
agent’s purposes on the treelike conceptual domain model,
Subsequent localization the main part of search and other
agents requests inside the group and further analysis the
communications activity with each other. The
interests
similarity leads to the fact that the most active and informative
agents communication focused
learning platform,
whereas outside platform the information exchange is less
active, thus an exchange object generalized (smaller by
volume) agents learning offers or requests [18].
inside
the
in
to
transfer
reducing
inter-host
transform
This approach allows not only
total
communication amount between agents, but also due to the use
of mobile agents
intra-host
communication. This, in turn, reduces the network load in case
of the distributed system implementation. The main agent
based algorithms that enhance e-leaning systems efficiency are
agent interactions localization algorithm within hosts by
forming groups actively communicates agents (virtual learning
platforms) and dynamic
load redistribution by
implementing agents group migration algorithm. These
algorithms provide ultimately, the conversion agents inter host
interactions in intra-host. In order to convert the inter-host
interactions in intra host interactions, the system agents can be
distributed the network hosts depending on their interaction
nature and behavior. Since the agents interaction nature can be
continuously changed, the agents distribution on the network
hosts should be dynamic. In this case, the agents automatically
distributed on multiple network hosts, depending on their
interaction nature, some hosts may be overwhelmed by the
several migrating agents to them. Therefore, the proposed
agents dynamic distribution algorithm, that based on their
interaction behavior should be complemented by another
agents distribution algorithm which support uniform load
distribution between network hosts.
In the proposed multi-agent system [7], each host equipped
with an agent-based platform (agent representative), which is a
agents local execution environment, in which software agents
operate and interact with each other. Implemented agents
interaction algorithms involve a sequence of similar operating
phases and use common components that are present on each
agent platform.
WCSIT 4 (2), 18 -25, 2014
To arrange a dynamic agents distribution on each agent
system platform the following components should operate. The
Message Manager (MM), coordinating the messages exchange
between the system agents; and the System Monitor (SM),
periodically checking the load on the current network host; and
the Agent Distribution Manager (ADM), is responsible for the
agents dynamic distribution and analysis the models of agents
interaction behavior and character; and finally the Agent
Migration Manager (AMM), displacing agents on other
platforms (hosts) and managing agents migration between
network hosts.
A. Agents interaction Localization algorithm
The agent’s interaction localization algorithm will contain
four phases as shown in figure 2.
Analysis phase. The Agent’s Distribution Manager
(ADM) evaluates inter-host and intra-host system
agents’ communications intensity, involving in this
stage system monitor and messages manager. ADM
also uses all information as about agent-sender, as
about agent-receiver host. ADM periodically evaluates
communication
dependency
at
time
between the agent
and agents host
as follows:
(1)
Where
- the number of messages sent by the agent
to host
agents over the time period
- is the
coefficient, which characterizes the relative dependency of new
information in relation to the outdated (expired) and used to
ignore the temporary intensive interaction with the agents in
,
particular agent platform;
- is defined as the value
of the same communication dependency in the previous time
interval.
stage
Agents Distribution Phase. After a specified number of
analysis
the
communication dependency coefficient between the
current host agent n and all other hosts in the system.
between
Communication dependency coefficient
repetitions ADM calculates
agent and host
agents can be given by:
(2)
When
the maximum value of
the communication
dependency coefficient over a predefined edge
, ADM
current host includes under consideration the agent in a group
of agents, located on a remote system host:
(3)
Where
is an agent
,
indicates the agents group
,
and under
hereinafter understood operation that returns
the value of
, where the ratio of communication dependence
coefficient
takes the maximum value.
Interaction Phase. Before moving the selected agents
group from the host
to the receiver host
ADM
host
interacts with ADM host
. ADM
checks
the current memory host state, CPU utilization, and the
21
Figure 2. Agent’s interaction localization algorithm
ADM Host P1StartEvaluate inter-host and intra-host communications intensityCollect Information about Agent Sender And Agent Receiver HostEvaluate communication dependency Done?NoYesADM Host P1System MonitorMessage Manager Add Agent I to group G YesNoADM P1 Requests available recourses on Host P2 Calculate the communication dependency coefficient ADM Host P2Enough recourses on Host P2?ADM P2 permits migrationYesNoMigrate Agents group to host P2 EndADM Host P1Analysis PhaseDistribution phaseInteraction phaseMigration phaseijDt12,tTttij()()()ijijijikkR(t)Dt=+1-Dt-1R(t)ddaeö÷ç÷ç÷ç÷ç÷ç÷ç÷÷çèøåijDtij12,ttTijDt-1ijMij,ijijinDMjnDargmaxjijikikBMMGiikGkargjjijM1P2P1P2P2PWCSIT 4 (2), 18 -25, 2014
number of agents hosted in this host, by using system
monitor. If the host
has enough free system
between the agents and the locally formed agents groups on
different network hosts [10].
resources for new agents, ADM host
authorizes
Communication dependence of
between agent
the agents group migration from host
to host
.
Agents’ Migration Phase. Accomplishing the agents’
selection operation for migration and receiving positive
response from ADM receiver host, the sender host
ADM jointly with Agents Migration Manager (AMM)
initiates the selected agents’ group migration to the
receiver host.
Agents’ interaction localization algorithm assumes the
analysis of dynamic changes in interaction patterns (models)
between agents, but this algorithm can overloaded some system
hosts due to the large number of agents which can be moved to
the hosts.
When a host is overloaded, the system monitor detects this
state and activates the agents’ redistribution process, which is
not only based on individual agent movement between network
hosts, but the whole interacting agents group intensively
interacts with each other.
B. The agents dynamic distribution algorithm
The
algorithm
agents dynamic distribution
(load
distribution algorithm) among system hosts consists five
phases: Analysis phase agents grouping phase, agent groups
distribution phase, agents interaction phase and the agents
migration phase.
Analysis Phase. Each system host monitor periodically
checks the agent platform state in which agents
interacting on this host. And by calling special system
functions collects information about the host physical
resources such as (current CPU load and free memory
space). When the system monitor defines that the host
is overloaded, it will activate the agents’ distribution
procedure between system hosts. As a host overload
criterion can be offered the maximum number of
agents operated on the host.
When ADM gets notification about congestion from the
system monitor, it starts the local agents interaction monitor
procedure, preliminary in order to locally splitting interacted
and cooperated agents into groups.
The group formed from agents that have most similar
interests and goals, which are intensively, interact with each
other by exchanging messages. Information about agents and
agents groups registered in the special register. The information
analysis provided on the register, allows to evaluate the load on
the system hosts and determine the intensity between agents
and intergroup and inter-host communication levels, which, in
turn, allows to select loaded and unloaded hosts in the system,
and implement the dynamic agents redistribution and agents
groups among the system hosts, in other words the agents or
agents groups movement with certain characteristics from
overloaded hosts to less loaded hosts in the system, containing
similar potential agents interests. After a predetermining the
time interval ADM updates communication dependences
22
and agents group
formula:
at the moment
can be determined by the
(4)
Where
- is the number of messages sent by the
agent
to the agents group
- over the time period
,
- is the coefficient, which characterizes the relative
importance of new information in relation to the outdated
(expired) and used. In this case the expression
shows the number of messages sent by agent
jointly functioning on the common host.
to any agent
Agents Grouping Phase. After accomplishing a number
agent is
of monitoring phases repetitions each
overridden in local agents group with new index
and given by:
(5)
Where
indicates
- local group agents.
Monitoring and agents grouping phases are repeated several
times. After each agents grouping phase information about
local communication dependencies between agents zeroed.
Agent Groups Distribution Phase. After performing a
certain number repetitions of monitoring and agents
grouping phases, ADM depending on agent platform
status takes the decision to move the agents group to
other system host. The selection of moved agents based
on the communication dependence between agent
groups and the system hosts.
Communication Dependence
between
- agents group
and the
system host based on the summation of the
communication dependence between all members of agents
group and the system host:
(6)
Where
- all agents indexes set, belonging to
- agents
group, and
- communication dependence between
agent
and
system host in the current time
. The agents
group
host and can be selected by the following rule:
, which have a smallest dependence on the current
2P2P1P2PijDtijt11ijijijiKKRtDtDtRtijDtij12,ttTiKKRtii*j**(cid:160)jijijjargmaxMtA*jA*jijWijiijkjkAWtCtiAikjCtkjt*iWCSIT 4 (2), 18 -25, 2014
(7)
Where
is the current host (Agent platform) number [10].
The receiving agent platform
, selected by
agents
group determined using communication dependence between
agents group and
system host as follows:
(8)
Where
is the current host (Agent platform) number.
interaction with
Agents Interaction Phase. When in the network defined
the receiving host for agent groups, the sender host
ADM begins
the corresponding
receiving host ADM. If the receiving ADM allows
agents movement, sending host ADM starts the agents
migrating phase. Otherwise, the sending host ADM
polls other system hosts ADM as long as it finds a
suitable host for a scheduled agents migration
(movement). If no host is unable to take the agents
group, the interaction phase fails and after a certain
time period
(allocation)
algorithm on the sending host restarted, and the process
repeats again.
the agents distribution
Agents interaction phase of this algorithm is similar to the
agents interaction localization algorithm. Yet, the interaction
level between these two algorithms is very different: agents’
interaction localization algorithm occurs at the agent level,
whereas the algorithm load distribution between the system
hosts implemented at the agent groups level. If the agent
receiver-platform
system
resources for all agents belong to the selected local agents
group, ADM agent receiver-platform representation may
authorize the agents’ group movement. Otherwise, the system
receiver host rejects the request to move the selected agents
group; the host is unable to accept only part of agents group.
representation has
sufficient
Agents Migration Phase. When ADM sender host
receives a response with acceptance to move the agents
group from ADM receiver host, ADM sender host
initiates migration the selected local agents group to
the receiver host.
Each agent-based representation independently performs its
own agents distribution algorithm in accordance with the
available information about the load on the system host, where
it is located, and the agents interaction character functioning in
agents platform [10]. The agents dynamic distribution
algorithm shown in figure 3.
Figure 3. Agent’s dynamic distribution algorithm
C. Agent communication model based on using agents
intermediary
In open multi-agent systems with extremely dynamic
character (in any time may come in or/and go out new agents,
23
*,ijijjninWiargmaxWn*jii*j*(cid:160),(cid:160)jijjargmaxWjnnADM sender HostStartEvaluate agents platform stateCollect Information about Host physical resourcesIs the host overloaded?NoYesSystem MonitorADM sender Requests migration validation from ADM receiver Host Valid response?Request migration validation from another ADM Host YesNoMigrate Agents group to selected host EndADM receiver HostActivate Agents distribution procedureLocally split interacted and cooperated agents into groupsUpdate communication dependency Done?NoYesADMADMCreate local Agents group Get communication dependency equals to zeroCalculate the communication dependenceSelect Agent receiving hostSelect Agent Group For movmentAnalysis PhaseDistribution phaseInteraction phaseMigration phaseGrouping phaseWCSIT 4 (2), 18 -25, 2014
and be connect new hosts), each individual agent cannot have
full information about all other agents in the same information
and communication environment. In this environment, a joint
operation of network services agents intermediaries (brokerage
and matchmaking services) are highly effective in finding
potential agents for interaction [19, 22]. Software agents can
find the other agents names using matchmaking services or
send messages to other agents using brokering services, using
their attributes, such as methods, operation modes, features or
nicknames instead of their real names. To register the agents
names in distributed virtual learning environment can be used
the dedicated server for agents’ names. Agent Intermediary
functions
its
architecture, or they can be implemented as an independent
specialized application called agents intermediaries [24].
implemented as a separate component
in
algorithms provided by agents’ initiators. This is the main
difference between the proposed method of using intermediary
agents and their features compared to the existing ones.
VI. CONCLUSION
This paper discusses separated agent-based algorithms for
Virtual learning environment information system effective
functioning and distributed hosts
interaction algorithms.
Described various
implementation approaches of agents
communication algorithms. Analyzed the existent software
agents communication models. Identified weaknesses of these
models, based on that proposed approaches to improve the
mobile agents cooperation in distributed Virtual learning
environments.
Interaction mediating between the agents includes brokers’
agents or matchmakers’ agents. Brokers forward the messages
given by the agent sender to the network hosts where the agent
receiver located, whereas matchmakers’ only provides the
agents intending to send messages, all information about the
agent receiver location, in other words the final message was
delivered to the agent receiver brokers, while the matchmakers
only help sender agents to deliver messages to the agent
receiver, providing
locations.
Considering the number of steps within transmitting massages,
it can be concluded that the brokerage services are more
effective than matchmakers, since brokerage services typically
require two steps to transmit massage, while matchmakers
requires three steps.
information about
their
Using shared memory area, that called data fragments
space, which controlled by intermediary agents, agents can
register their attributes together with the names in this area, and
they can communicate each other by using the attributes
information about other agents, this information can be
extracted from this area. The basis of most developed
intermediary agents is Linda-model [9, 10]. The proposed
model presented in figure 4.
Figure 4. Agent communication model based on using agents intermediary
The model allows software agents to use intermediary
agents, and the provided services by them to search agents with
the similar interests and provides the basis method of using
intermediary agents and their functions. The intermediaries
agents don’t only control the data fragments, but can be also
used as own agents search algorithms “joint activity” and
24
Based on the modification of existing agents interaction
models, developed algorithms for data exchange among mobile
software agents
the agents efficiency for
distributed data processing and reduce the total transmitted data
amount over the network:
increase
that
Agent communication algorithm based on the using
agents brokers and their functions;
in virtual
information
system activities
However, developed software agents interaction algorithms
learning
for
environments,
that allowing faster agents response for
environment changes in which an agent functioning, by
increasing information exchange intensity between agents and
reduce the overall load on the network, those algorithms are
Agents interaction localization algorithm transformation inter-
host communication to interact as intra-host communication;
and agents dynamic distribution algorithm (balancing load
between the system hosts).
Based on developed software agents interaction models and
algorithms, proposed the minimizing inter-host communication
in problem-oriented distributed systems method. The method is
based on software agents classification in semantic space,
presented as conceptual domain model, and agents inter-host
communication transformation in intra-host. Implementation
this method provides a
in communication
infrastructure load and improving availability coefficient for
software agents application services.
reduction
ACKNOWLEDGEMENT
The author is grateful to the Applied Science Private
University, Amman, Jordan, for the financial support granted to
cover the publication fee of this research article
REFERENCES
[1] А. Маслобоев, Мультиагентная
технология формирования
едином информационно-
виртуальных бизнес-площадок
коммуникационном пространстве развития инноваций, Publisher,
City, 2009.
в
[2] B.M. Balachandran, M. Enkhsaikhan, Developing multi-agent e-commerce
applications with JADE, in: Knowledge-Based Intelligent Information
and Engineering Systems, Springer, 2007, pp. 941-949.
[3] D. Tavangarian, M.E. Leypold, K. Nölting, M. Röser, D. Voigt, Is e-
learning the Solution for Individual Learning, Publisher, City, 2004.
Massages QueueMsg 1Msg 2Msg nData Fragments AreaTasks QueueTask 1Task 2Task n……MatchmakersData Fragment ManagerBrokersORWCSIT 4 (2), 18 -25, 2014
[4] T. Erl, A. Karmarkar, P. Walmsley, H. Haas, L.U. Yalcinalp, K. Liu, D.
Orchard, A. Tost, J. Pasley, Web service contract design and versioning
for SOA, Prentice Hall, 2009.
[5 F.P. Brooks Jr, The design of design: Essays from a computer scientist,
Pearson Education, 2010.
[6] E. Platon, N. Sabouret, S. Honiden, Tag Interactions in MultiAgent
Systems: Environment Support, Publisher, City, 2005.
[7] S. Alouf, F. Huet, P. Nain, Forwarders vs. centralized server: an evaluation
of two approaches for locating mobile agents, Publisher, City, 2002.
[8] N. Carriero, D. Gelernter, Linda in context, Publisher, City, 1989.
[9] B. Chen, H.H. Cheng, J. Palen, Integrating mobile agent technology with
multi-agent systems for distributed traffic detection and management
systems, Publisher, City, 2009.
[10] А.В. Маслобоев, Модели и алгоритмы взаимодействия программных
агентов в виртуальной бизнес-среде развития инноваций, Publisher,
City, 2009.
[11] K. Malik, Use of knowledge brokering services in the innovation process,
in: Management of Innovation and Technology (ICMIT), 2012 IEEE
International Conference on, IEEE, 2012, pp. 273-278.
[12] T.A. Farrag, A.I. Saleh, H.A. Ali, Semantic web services matchmaking:
Semantic distance-based approach, Publisher, City, 2013.
[13] Z. Xu, Z. Yin, A. El Saddik, A Web Services Oriented Framework for
Dynamic E-Learning Systems, Publisher, City.
[14] A. Targamadze, R. Petrauskiene, Classification of distance learning
agents, Publisher, City, 2010.
[15] E.M. Van Raaij, J.J. Schepers, The acceptance and use of a virtual
learning environment in China, Publisher, City, 2008.
[16] A. Di Stefano, C. Santoro, Locating mobile agents in a wide distributed
environment, Publisher, City, 2002.
[17] W.F. McComas, Virtual Learning Environment, in: The Language of
Science Education, Springer, 2014, pp. 110-110.
[18] E. Sangineto, An Adaptive E-Learning Platform for Personalized Course
Generation, Publisher, City, 2008.
[19] S.L. Greenspan, E. Hadar, Using cloud brokering services for an
opportunistic cloud offering, in, Google Patents, 2013.
[20] S. Muthaiyah, L. Kerschberg, Brokering Web Services via a Hybrid
Ontology Mediation Approach Using Multi Agent Systems (MAS),
Publisher, City, 2010.
[21] P. Khanna, B. Babu, Cloud Computing Brokering Service: A Trust
Framework, in: CLOUD COMPUTING 2012, The Third International
Conference on Cloud Computing, GRIDs, and Virtualization, 2012, pp.
206-212.
[22] J.-b. LI, C.-h. LI, Research on the Development of the Cooperation
among Governments, Enterprises, Universities, Research Institutes,
Financial Units and Intermediary Agents [J], Publisher, City, 2010.
AUTHORS PROFILE
Dr. Zahi A. M. Abu Sarhan Received the
M.S. and PhD degrees in Computerized
Control Automated Systems
and
Progressive Information Technologies
from Kharkov National University of
Radio Electronics, Kharkov in 1998
and 2004, respectively. During 2004-
2008, I was an Assistant Professor at the
Economics and Administrative science/
MIS Department at Applied Science University. Since 2008, I am an Assistant
Professor at the Faculty of Information technology, Applied Science
University in Jordan. Research interests include: Information system
reengineering, Service oriented architecture, software agents, agents
theory, agents behavior.
25
|
0707.1558 | 1 | 0707 | 2007-07-11T05:05:57 | Autonomy with regard to an Attribute | [
"cs.MA"
] | This paper presents a model of autonomy called autonomy with regard to an attribute applicable to cognitive and not cognitive artificial agents. Three criteria (global / partial, social / nonsocial, absolute / relative) are defined and used to describe the main characteristics of this type of autonomy. A software agent autonomous with regard to the mobility illustrates a possible implementation of this model. | cs.MA | cs | Autonomy with regard to an Attribute
Eric Sanchis
Laboratoire de Gestion et Cognition
Université Paul Sabatier
115 route de Narbonne
31077 Toulouse, France
[email protected]
Abstract
This paper presents a model of autonomy called
autonomy with regard to an attribute applicable to
cognitive and not cognitive artificial agents. Three
criteria (global / partial, social / nonsocial, absolute /
relative) are defined and used to describe the main
characteristics of this type of autonomy. A software
agent autonomous with regard
to
the mobility
illustrates a possible implementation of this model.
1. Introduction
Since the second half of the Nineties, autonomous
agents are used more and more in the design and in the
implementation of complex computer systems. The
association of the concepts of agent and autonomy was
explored and commented on in many theoretical
works, primarily in the MultiAgent Systems (MAS)
area. A first point of view which was developed by
researchers such as Jennings and Wooldridge, or
Franklin and Graesser was to consider autonomy as a
global property, i.e. a property which applies to the
agent in its totality.
For Jennings and Wooldridge [7], “an agent is a
computer system situated in some environment, and
that
is capable of autonomous action
in
this
environment in order to meet its design objectives”.
The situated aspect means that the agent perceives its
environment and that it is able to modify it. Autonomy
means that the agent is able to act without the direct
intervention of human beings or other agents, and that
it is able to control its own actions and its internal
state. For the authors, autonomous agents are not an
innovation because systems like software daemons (ex:
xbiff) or a simple thermostat can be classified as
autonomous agents.
Franklin and Graesser [6] synthesize their point of
view on the agents with the following definition: “an
autonomous agent is a system situated within and a
part of an environment that senses that environment
and acts on it, over time, in pursuit of its own agenda
and so as to effect what it senses in the future”. For the
authors, the software agents are present in many fields
but any software program is not an agent: for example,
according to their definition a payroll program cannot
be considered as an agent. On the contrary, a
thermostat fully satisfies their definition of an agent,
i.e. an entity provided with autonomy.
The main purpose of the autonomy model that we
propose is to remove a major defect present in the two
models outlined previously: the global aspect of
autonomy. Indeed, a problem of global autonomy is
that it is carrying paradox and confusion [8]. Let us
illustrate this problem with an example. The definition
of an autonomous agent as an agent able to act without
the direct intervention of other agents and having a
control on its own actions and its internal state is not
entirely satisfactory. One can notice that even the
human agents do not have this control neither on their
internal state nor on all the actions they carry out.
However, a (partial) autonomy of a human agent
cannot be seriously questioned. This apparent paradox
seems to result from an insufficient decomposition of
the agent.
Moreover, as many researchers had already noticed,
autonomy is not an ordinary property but a complex
property. More precisely, our work
led us
to
distinguish two categories of properties of deeply
different nature: qualities and attributes [10]. Qualities
characterize properties with vague and elastic
contours, difficult (perhaps impossible) to have an
intimate knowledge. They are properties which content
changes according to the point of view which one can
have. They authorize multiple modelizations and
different interpretations, when these interpretations are
not contradictory. Some properties which can be
identified as qualities are autonomy and intelligence.
Attributes are properties intrinsically less difficult to
encircle than qualities. Examples of attributes are
mobility, replication or perception. They are generally
reduced to a mechanism with one or more well defined
procedures. Contrary to qualities, it is always possible
to say if an agent has or does not have a specific
attribute. Attributes play a significant role in the type
of autonomy which we propose.
Lastly,
in
the MAS field several models of
autonomy were designed for goal-directed cognitive
agents. For such an agent, a goal corresponds to a
cognitive representation which an agent has of the
world in which it is immersed. It results that these
models of autonomy are not appropriate to non
cognitive agents. The model of artificial autonomy
described in section 4 is sufficiently general to apply to
cognitive and non cognitive agents.
The paper is structured as follows. Section 2
presents the main characteristics of the autonomy
models generally associated to artificial agents. In the
next section, the significant features of these models
are used to define a set of criteria which will be used to
compare these models and to introduce the autonomy
with regard to an attribute. Lastly, section 4 will
describe the theoretical and practical aspects of this
model and some possible extensions.
2. Artificial Autonomy approaches
Autonomy is a typical example of what we have
called a quality. Indeed, autonomy characteristics seem
difficult to be synthesized with only one theory or
model. In fact, reducing autonomy to a single model
removes the essence of this property. This is why
many models of autonomy were proposed by
researchers in the Artificial Intelligence area. Various
aspects can be brought out from these models: the
organic autonomy of biological inspiration (Varela,
Bourgine), the social autonomy based on the power
relationships between agents (Castelfranchi, Scerri)
and the decisional autonomy founded on the choice of
the agent (Barber, Vendryès), only to quote the most
representative types of autonomy.
The autonomy models briefly outlined below
partially illustrate the significant disparity of the points
of view generated by this property.
The works of Luck and D’Inverno [9] on autonomy
is integrated into a more general theory on the
interactions between agents being based on
the
concepts of goal and motivation. The authors
distinguish two very different points of view about
autonomy: autonomy as the possibility for the agent to
generate its own goals and autonomy as relations of
dependence of an agent upon others. According to the
first point of view, autonomous agents generate their
own goals from their own motivations. According to
the second point of view, the autonomy of an agent is
modulated by the existence of relations of dependence
between agents. This distinction separates what we
will call thereafter social autonomy and nonsocial
autonomy.
Barber and al. [1], [2], consider autonomy as the
possibility for an agent to influence the decision-
making process in the resolution of a given problem.
Four levels of autonomy are defined. First level: the
agent carries out the orders which are provided to it by
another agent. Second level: the agent collaborates
with other agents in order to achieve a common goal.
Third level: the agent plans and carries out its own
actions. Lastly, on the fourth level, the agent plans the
actions for itself and for other agents. The agent is
completely autonomous when it completely manages
the decision-making process. It is partially autonomous
when it shares this decision-making with other agents.
Finally an agent which does not take part in this
process is heteronomous.
Castelfranchi and Falcone [3], [4], connect the
concept of autonomy to the concept of dependence.
They explain why on the one hand, autonomy is a
relational concept - relation between an active entity
and its environment or other active entities (social
autonomy) -, and why on the other hand this relation
also derives from the properties of the internal
architecture of the entity.
Adjustable autonomy describes the property of an
autonomous system to change its level of autonomy
among several levels while the system continues to
function. A level of autonomy indicates a particular
distribution between manual operations and automatic
operations
[5]. The distribution of autonomy
dynamically changes in order to optimize the global
performances of the system [12].
3. Criteria for a partial classification
In order to compare in a uniform manner the
autonomy with regard to an attribute and the preceding
models, three criteria of analysis were defined:
- Autonomy as a global or partial property of the
agent
- Autonomy as a social or nonsocial property
- Autonomy as an absolute or relative property.
Global or partial autonomy. Autonomy is said
global when the definition applies to the entire agent.
In the field of MAS, researchers generally use the
expression “autonomous agent” [6] [7]. Another
definition which typically illustrates this global aspect
of autonomy is: autonomy is the condition of a person
or a community who determines by itself the law to
which it is subjected. In this definition, this quality
also applies to the entity considered (agent, individual
and group) in its totality. On the other hand, the nature
of the law determined by the entity is not specified. We
interpret this general information in the following way:
as soon as an agent is able to create a law, it is globally
autonomous. By replacing the concept of law by the
concept of goal, we can qualify the model presented in
[9] as global autonomy.
Autonomy is partial when the property does not
apply any more to the entire agent but to a part of it.
The agent is in this case autonomous with regard to
something. The model presented in [2] can be
described as an example of partial autonomy because
the autonomy is defined for each agent goal and the
agent can be non autonomous (heteronomous) with
regard to a specific goal.
Social or nonsocial autonomy. Autonomy is
social when
described
as
its definition or
characterization explicitly refers to one (or several)
other(s) agent(s). It is nonsocial in the contrary case.
The (X, Y, B) triplet defined in [4] perfectly
characterizes social autonomy: the autonomy of agent
X from agent Y about goal B. The presence of agent Y
is essential to the various variations of this model
(collaborative autonomy, non collaborative autonomy,
etc). Models which use a decision-making process
shared by several agents, as defined in adjustable
autonomy [12] or in [2] are also and naturally models
of social autonomy. The agents considered in the
models of social autonomy are not of unspecified
nature but are cognitive agents, i.e. provided with a
certain type of intelligence.
The autonomy presented in [9] is nonsocial because
it is based on the possibility of an agent to generate a
goal without implying the presence of another agent.
However, it should be noted that a model of autonomy
described as nonsocial does not mean that this model is
inapplicable when several agents are in relation. This
qualifier simply means that the definition of the model
does not impose the presence of another agent.
Absolute or relative autonomy. Autonomy is
absolute when only one level of autonomy is defined:
the agent (or part of the agent) is autonomous or is not
autonomous [9].
levels of
is relative when several
Autonomy
autonomy are defined. The interest is to be able to
define a measurement of the autonomy of an agent. In
[2], the status of the agent can pass from simple
executant to decision maker.
It must be noticed that we distinguish carefully
types of autonomy and levels of autonomy. A type of
autonomy underlines the nature of this one: autonomy
of goals, autonomy of plan, autonomy from the
environment, etc. Our work on autonomy concerns a
specific type of autonomy: autonomy with regard to an
attribute.
Summary. The preceding criteria are useful
- To analyze existing models: the autonomy of an
agent presented in [2] is partial (because defined for
each goal), relative (several levels of autonomy were
identified) and social (some relations of dependence
exist between the agents). The model developed in [9]
is a global autonomy model (the agent is able or not
able to create a goal, its nature not being specified),
absolute (only one level is defined) and nonsocial (the
presence of another agent is not essential), and
- To design new models: we developed a model of
autonomy called autonomy with regard to an attribute.
This autonomy is partial, absolute and nonsocial. It is
(1) partial, because it applies only to a part of the
agent: a specific attribute, (2) absolute: the agent is
autonomous or is not autonomous with regard to this
attribute, (3) nonsocial: the model does not require the
presence of a second agent (Table 1).
Table 1. Partial taxonomy of some autonomy models.
global
X
partial
X
X
Barber
Luck
Sanchis
social
X
non social
absolute
relative
X
X
X
X
X
4. Autonomy with regard to an Attribute
Autonomy with regard to an attribute is a model of
decisional autonomy. It is stated in the following way:
an agent is autonomous with regard to an attribute A if
it can choose in a nondeterministic way a policy of use
p among several and if it can change this one during its
execution time.
An attribute corresponds to a simple and non
ambiguous property of an agent. A policy of use means
in our context a succession of actions which carries out
a particular and well identified functioning mode. Let
us illustrate the concepts of attribute and use policies
with two examples: replication and mobility.
Replication is an attribute which makes it possible
for an agent to create a clone of itself on the local or a
remote host. The diversity of replication policies can
(among other possibilities) come from the replication
rate (one and only one clone per site, not more than
one clone per site, at least one clone per site) and from
replication hosts (replication on all the sites accessible
to the agent, sites meeting a specific criterion).
Another example of attribute is mobility. It is this
attribute which will be used to illustrate the various
aspects of the model.
4.2. Model
Two elements characterize autonomy with regard to
an attribute:
- A set of operating modes of this attribute
- A two-component choice module.
Functioning modes. If mobility is taken as an
example of an attribute, one can distinguish various
migration policies:
- Navigation according to a route (the site of arrival
is different from the starting site)
- Circular navigation (the site of arrival is the
starting site)
- Navigation directed according
to a certain
criterion (ex: transfer to the less loaded host or to the
site having the greatest free disk space)
- Random navigation (the next site to reach is
chosen at random).
Circular navigation and navigation according to a
route consist of several elementary hops. Other
operating modes require only one transfer: directed
navigation and random navigation are mono-hop
strategies.
Broadly speaking, the set of policies can be static or
dynamic. It is static if the number or the nature of an
operating mode cannot be modified after the agent
creation. It is dynamic in the contrary case. To
simplify, we considered only static sets of policies.
Indeed, the implementation of a dynamic set of
policies can induce a substantial modification of the
choice module [11].
Choice Module. The decision-making process used
to choose a policy does not obligatorily imply a
possibility of reasoning, rational choice or cognitive
structure related to a particular model of intelligence.
Indeed, the module of choice splits up into two parts: a
deterministic component and a nondeterministic
component.
Provided with inputs and outputs, we will say that a
component is deterministic if to the same inputs always
correspond the same outputs. It is not deterministic if
at two different moments T and T ', the same inputs
can produce different outputs. The terms of inputs and
outputs were selected for simplicity reasons and must
be understood in our context in their most general
meaning (internal or external conditions, stimuli,
states, etc).
inputs
Deterministic Choice
outputs
inputs
Pi
Nondeterministic
Choice
outputs
Pj
Figure 1. Choice Module.
The deterministic part of the choice module is
provided with N functioning policies Pi (1≤i≤N, N>1).
With the mobility example, migration policies could be
the ones previously presented.
The nondeterministic part includes an additional
policy P0 corresponding to the empty policy. It means
that no policy is triggered by the agent. It models the
situation where, although the choice module of an
attribute A was activated, no policy of A is started:
there is an inhibition of the policy resulting from the
deterministic choice.
the
the activation of
That means
that after
nondeterministic part of the choice module, the policy
Pj (0≤j≤N) finally elected can be different from the
policy Pi previously selected by the deterministic
component.
Each part of the choice module has its own utility.
The presence of the deterministic module of choice
provides the agent with a coherent behavior (rational
choice) directed by the conditions of inputs. The
nondeterministic module of choice ensures the agent
the decoupling between
its
its autonomy and
monitoring. It protects the agent from all recurring
forms of explicit or implicit command.
If the agent included only the deterministic choice,
it would be a simple program; if the nondeterministic
choice were only present, the agent would not be
autonomous because
lacking
in
rationality and
condemned to a chaotic behavior.
It is to be noticed that within an agent, it is neither
obligatory nor necessary that the two components of
the choice module of an attribute must be spatially
adjacent: according to the general architecture of the
agent and
the properties
it
implements,
the
deterministic choice can be a part of another
component of the agent (for example, when several
deterministic parts of choice modules of different
attributes are located at the same place). Consequently,
Figure 1 must be understood as an abstract
representation of a choice module.
4.2. An implementation example
We have implemented a software agent immersed
into a real environment (network of Linux systems), an
agent autonomous with regard to the mobility and
having to carry out the same task on each visited site.
The purpose of this application was multiple:
- To characterize in a fine way the various
properties (qualities or attributes) present in the agent
- To define and implement several migration
policies
- To study the realization of a complete choice
module
and
deterministic
containing
(i.e.
nondeterministic components) as well as its relations
with the defined policies
- To verify that the absence of the agent migration
control by a user did not prevent the application from
functioning correctly
- To evaluate the potential of extension of this
autonomy model.
Agent task. The task carried out by the agent on
each visited site consists in collecting the users’ names
locally logged. Before finishing its execution, the
agent transmits to the user by electronic mail the result
of its various displacements, this result including the
temporarily inaccessible sites (stopped machines), the
sites prohibited to the agent (it does not have the
necessary authorizations or
the site presents an
inappropriate execution environment).
Navigation policies. The policies at the disposal of
the agent are the random transfer (P1) and the circular
navigation (P2). These moving policies were selected
for the following reasons:
- The random transfer offers the agent to randomly
draw the name of the next site to be visited. This
policy was introduced in order to differentiate it from
the nondeterministic choice: in the first case, the
random draw relates to the name of the next site to
reach (i.e. a parameter of the policy), in the second
case, the drawing of a policy among N (with N=2).
navigation
circular
- The
the
requires
implementation of a multi-hop mechanism which
implies the construction of a route and to keep up to
date the list of the sites to be visited. In this
configuration of navigation, the follow-up of the agent
is more complex because the "umbilical link" between
the agent and its launching site is broken. Lastly, it
makes it possible to implement the stop of a multi-hop
policy during its execution after the agent choice.
Choice module. The choice module breaks up into
two strictly ordered contiguous
levels and
is
the autonomous_choice
materialized by
function
(written in a script language). For simplicity reasons in
the design and in the functioning, the set of the
navigation policies and the choice module are static:
no policy is removed or added during the execution of
the agent and
the choice module (deterministic
component and nondeterministic component) remains
fixed during the lifespan of the agent.
The function autonomous_choice sequentially calls
deterministic_choice
two
functions,
and
nondeterministic_choice:
function autonomous_choice
{
deterministic_choice
nondeterministic_choice
}
The deterministic_choice
selects or
function
maintains the current navigation policy. There is a
selection of a new policy when the preceding policy
has
is
the current policy
finished, otherwise
maintained. After execution of this function, the policy
Pi (1≤i≤2) is positioned (random or circular). It will be
maintained or modified by the nondeterministic part.
The nondeterministic part is implemented by the
nondeterministic_choice function which provides a
random choice among the three following possibilities:
it preserves the policy fixed by the deterministic
component (with the probability Pr1) or it forces the
execution of the random policy (Pr2) or starts the
empty policy P0 (Pr3). This one means that no
navigation policy is activated. In our application, P0
causes the end of the execution of the agent. Indeed, as
the agent’s activity mainly consists in carrying out a
service (a task) on the local site then to move, it was
decided that when the empty policy would be started it
would cause the stopping of the agent on its local site.
In an application where the agent would be richer in
properties, the empty navigation policy would allow
the agent to continue its execution without moving, the
future of the agent depending on the properties it
integrates.
Qualities and attributes of the agent. As well as
autonomy (quality) and mobility (attribute), the agent
integrates two other attributes, these two being relative
to perception. The first is the perception by the agent
of a clone of itself, i.e. a residual "incarnation" of the
agent. The presence of this type of entity indicates a
dysfunction of the application (and not the presence of
a replication attribute into the agent). The second
attribute is the site perception.
The agent is autonomous with regard to the
mobility and non autonomous with regard to the other
two attributes relative to perception because for each
one of them, the agent integrates only one use policy
and no choice module.
4.3. Possible extensions
The work undertaken on autonomy with regard to
an attribute offers several tracks to be explored or
deepened. We will mention four of them:
- To apply the model of autonomy to an attribute
other than mobility. A candidate attribute already
mentioned is the replication of the agent. It is also
possible to build an agent autonomous with regard to
the task it has to carry out
- For a given attribute, to make the set of policies
eligible by the choice module dynamic. That induces a
more or
two
the
less major modification of
components of this module. If there is integration
within the agent of one or more policies which are by
design external to it, it can be interesting to provide the
agent with a software architecture which makes it
physically open [11]
- To design an agent autonomous with regard to two
different attributes. There are then two deterministic
components and two nondeterministic components. A
meticulous study of the interactions between the four
components will have then to be undertaken. The
problems to be resolved seem similar to those posed by
the fitting or the organization into a hierarchy of
autonomous subsystems within a broader entity,
problems already identified in the biological and social
fields [8]
- To integrate in the agent various models of
autonomy: autonomy with regard to an attribute and,
for example, a model of social autonomy.
5. Conclusion
As a quality, autonomy is a complex property,
difficult to encircle. Nevertheless, it is possible to
distinguish if an agent is or is not autonomous with
regard to a particular attribute. By being nonsocial, the
suggested autonomy model spares the introduction of
an additional source of complexity in the guise of a
second agent and with it, the complexity carried by the
interactions which it can produce with the first agent.
By
being
partial,
it
avoids
contradictory
interpretations: an agent
is autonomous or non
autonomous with regard to an attribute. Lastly, the
model being built on the concepts of choice and uses
policies, entities such as a thermostat or the xbiff
daemon cannot be considered within this model as
autonomous agents. Although provided with many
assets, this model (like the others) does not exhaust all
the richness of autonomy when it is considered as a
quality.
However, combining at the same time rational
choice and non determinism, this model offers a
conceptual framework making it possible to think how
to implement a sort of freedom of an artificial agent.
6. References
[1] Barber, K. S., Martin, C. E., Agent Autonomy:
Specification, Measurement, and Dynamic Adjustment.
Third International Conference on Autonomous Agents
(Agents 1999), Proceedings of the Autonomy Control
Software Workshop, May 1-5 1999, Seattle (Washington),
USA.
[2] Barber, K., Gamba, S., I. M., Martin, C. E., Representing
and Analyzing Adaptive Decision-Making Frameworks. In:
Hexmoor, H., Castelfranchi, C., Falcone, R. (eds.): Agent
Autonomy. Kluwer Academic Publishers, March 2003.
[3] Castelfranchi, C., Guarantees for autonomy in cognitive
agent architecture. In: Wooldridge, M., Jennings, N.R. (eds.):
Intelligent Agents: Theories, Architectures and Languages.
Lecture Notes in Artificial Intelligence, Vol. 890, Springer
Verlag, 1995.
[4] Castelfranchi, C., Falcone, R., From Automaticity to
Autonomy: The Frontier of Artificial Agents. In: Hexmoor,
H., Castelfranchi, C., Falcone, R. (eds.): Agent Autonomy.
Kluwer Academic Publishers, March 2003.
[5] Dorais, G., Bonasso, R. P., Kortenkamp, D., Pell, B.,
Schreckenghost, D., Adjustable Autonomy for Human-
Centered Autonomous Systems on Mars. Mars Society
Conference, August 1998.
[6] Franklin S., Graesser, A., Is it an Agent, or just a
Program? A Taxonomy for Autonomous Agents. In: Müller,
J. P., Wooldridge, M., Jennings, N. (eds.): Intelligent Agents
III – Proceedings of the Third International Workshop on
Agent Theories, Architectures and Languages (ATAL 96).
Lecture Notes in Artificial Intelligence, Vol. 1193, Springer
Verlag, 1996.
[7] Jennings, N., Wooldridge, M., Applications of Intelligent
Agents. In: Jennings, N. R., Wooldridge, M. (eds.): Agent
Technology: Foundations, Applications, and Markets.
Springer Computer Science, 1998.
[8] Koestler, A., The Ghost in the Machine, Hutchinson,
London, 1967.
[9] Luck, M., D'Inverno, M., Autonomy: A Nice Idea in
Theory. In: Castelfranchi and Lesperance (eds.): Intelligent
Agents VII: Proceedings of
the Seventh International
Workshop on Agent Theories, Architectures and Languages,
Lecture Notes in Artificial Intelligence, Vol. 1986, Springer
Verlag, 2001.
[10] Sanchis, E., Designing new Agent Based Applications
Architectures with the AGP Methodology. In: Proceedings of
the twelfth IEEE International Workshops on Enabling
Technologies: Infrastructure for Collaborative Enterprises
(WETICE 2003). IEEE Computer Society, 2003.
[11] Sanchis, E., A Systemic Framework for Open Software
Agents. In: Second International Workshop on Radical Agent
Concepts (WRAC 2005), Greenbelt (Maryland), USA,
Lecture Notes in Computer Science, Vol. 3825 (2006), p.
222-232.
[12] Scerri, P., Reed, N.E., Designing Agents for Systems
with Adjustable Autonomy. In: IJCAI-01, Workshop on
Autonomy, Delegation, and Control:
Interacting with
Autonomous Agents, August 6, 2001, Seattle (Washington),
USA
|
cs/0502094 | 1 | 0502 | 2005-02-27T18:16:30 | Coalition Formation: Concessions, Task Relationships and Complexity Reduction | [
"cs.MA"
] | Solutions to the coalition formation problem commonly assume agent rationality and, correspondingly, utility maximization. This in turn may prevent agents from making compromises. As shown in recent studies, compromise may facilitate coalition formation and increase agent utilities. In this study we leverage on those new results. We devise a novel coalition formation mechanism that enhances compromise. Our mechanism can utilize information on task dependencies to reduce formation complexity. Further, it works well with both cardinal and ordinal task values. Via experiments we show that the use of the suggested compromise-based coalition formation mechanism provides significant savings in the computation and communication complexity of coalition formation. Our results also show that when information on task dependencies is used, the complexity of coalition formation is further reduced. We demonstrate successful use of the mechanism for collaborative information filtering, where agents combine linguistic rules to analyze documents' contents. | cs.MA | cs | Coalition Formation: Concessions, Task Relationships and Complexity Reduction
Samir Aknine
LIP6, Paris 6
8 Rue du Capitaine Scott
75015, France
[email protected]
Abstract
formation problem
the coalition
to
Solutions
commonly assume agent rationality and, correspondingly,
utility maximization. This in turn may prevent agents from
making compromises. As shown
in recent studies,
compromise may
formation and
facilitate coalition
increase agent utilities. In this study we leverage on those
new results. We devise a novel coalition formation
mechanism that enhances compromise. Our mechanism
can utilize information on task dependencies to reduce
formation complexity. Further, it works well with both
cardinal and ordinal task values. Via experiments we
show that the use of the suggested compromise-based
coalition
formation mechanism provides significant
savings
communication
the computation and
in
complexity of coalition formation. Our results also show
that when information on task dependencies is used, the
complexity of coalition formation is further reduced. We
demonstrate successful use of
for
the mechanism
collaborative information filtering, where agents combine
linguistic rules to analyze documents' contents.
1 Introduction
Coalition formation mechanisms are often used as a
means for agent coordination. Coalition formation is
necessary when agents need to perform tasks which they
cannot carry out efficiently alone. Several coalition
formation models have been suggested to date (e.g.
[5,6,7]), based on var ious assumptions. Recently, a
solution that suggests that agents compromise their gains
to promote coalition formation was suggested [3]. In this
article, we address the coalition formation problem and
suggest compromise too. However, prior work assumes
that the value at which compromise is beneficial is
known, or can be arr ived at experimentally. In many real
applications where coalitions are necessary,
th is
assumption does not hold. In our coalition formation
mechanism, we do not assume
that
the optimal
compromise poin t is known in advance. Rather, we
provide agents with means to gradually arr ive at an
agreed compromise via a series of concessions. Such a
Onn Shehory
IBM Haifa Research Lab, Ha ifa University
Haifa 31905, Israel
[email protected]
solution is more flexible and more applicable to real
problems compared to previous solutions. Our coalition
formation method utilizes dependence relations among
tasks to guide agent search for coalitions. Searching the
coalition space based on task combinations serves as a
means for agents to arrive at compromise. Our approach,
in difference from other coalition formation solutions,
suggests that agents first attempt to reduce conflicts
amongst themselves, and only then form the coalition.
Conflict reduction in turn reduces negotiation time
between agents, as our experimental evaluation explicitly
shows. In addition, our solution considers the complex
relationships among tasks in the search for coalitions.
Such use of task complexity to improve the coalition
formation is not present in other solutions, as task
relationships are seldom considered.
Several reasons accredit the use of task structure
analysis for coalition search in the multi-agent system.
The presence of
task
relationships,
for
instance
dependencies between tasks, introduces a certain form of
dependence between the agents which will perform them.
Consequently, dependencies between
the coalitions
formed by the agents may arise. When these dependencies
exist, it would be preferable that agents identify them in
advance, as such knowledge can promote compromise
and simplify coalition formation. Thus, it should be
advantageous to manage dependencies between tasks
prior to their assignment to agents. This implies that
agents must reason about the tasks they will perform prior
to making a decision on the coalitions they join .
Dependencies between tasks can be revealed prior to
coalition formation via search. Leaving dependencies
between tasks unidentified does not avoid conflicts, it
merely postpones
their
resolution. When conflict
resolution is postponed to a late stage of the coalition
formation process, agents might form coalitions that they
will need to break when conflicts are found, thus require
further negotiation and re-formation.
Another significant reason for searching the coalition
space based on task dependencies is the reciprocal interest
of the agents. For instance, an agent A may take part in
the execution of a task T; task T may be of significance
for another agent B; Agent A might need B's support in
future tasks. If A and B know th is in advance, they are
motivated to be more cooperative, and in turn apply
compromise regarding the execution of T and other tasks.
In this article we illustrate the method we propose in
the context of a European project. The project provides a
multilingual system for the analysis and detection of racist
and revisionist content on the Internet. In this application
domain, agents are used
to dynamically combine
linguistic rules for document analysis. Agents, each
implementing a linguistic rule, form coalitions. The
coalition formation method consists of clustering tasks
into task partitions based on relationships identified
among the tasks. Task relationships we consider include
dependence, similarity, covering, etc. Task clustering
simplifies coalition formation and consequently reduces
the negotiation time between agents.
This article is organized as follows. Section 2
introduces the coalition formation problem and the
document filtering application context for which we solve
it. In section 3, we present the concepts of the coalition
formation model, first the principles of th is model, then
the behaviors of the agents in the model. Section 4
presents the results of the experiments carried out. We
then conclude and discuss future work in section 5.
2 The problem
In this section we formally define the coalition formation
problem we solve and describe the context of the solution.
2.1 Problem description
Consider a set of agents C = {C1, C2, ... ,Cn} and a set
of tasks T = {T1, T2, ... ,Tm}. The agents in C need to
execute the tasks in T and can negotiate over their
execution. Several relationships are defined on T. Tasks in
T can be combined into sets of tasks, and negotiation can
be performed over such sets. Each agent in C has its own
utility function that it tries to maximize. The goal of an
agent is to determine the coalitions to which it should
belong and the tasks or task sets to perform in these
coalitions, such that its utility is maximized.
2.2 Application context
The application addressed in this study concerns web
document filtering. The tracking of racist documents on
the Internet faces a number of obstacles, which make it
impossible to rely only on the classical keyword-based
approach, neural network techniques, etc. [1,4] Racist
discourse spans from hate speech
to more subtle
insinuations, with different themes: racist, revisionist,
anti-semitic, etc. Different genres are used in these
documents pseudo-scientific articles, pamphlets, etc.
From the analysis of large sets of racist, anti-racist and
non-racist documents, a number of criteria for identifying
racist content have been identified by the teams of
linguists working on the project: (1) Unique racial
expressions used only by racist people, for example
“Rahowa” standing for “Racial Holy War”; (2) Average
frequencies of certain words in racist documents differ
from their average in general documents. These words are
not necessarily racist ones but more common words (like
“their” or “white”); (3) Combined frequencies of certain
word pairs are relevant, e.g. the combination of “our”
with “civilization”, “race” or “religion”; (4) Suffixes like
“al”, “ence”, “ism” are good indicators for separating
racist and anti-racist documents.
One difficulty of the document filtering system we try
to build is that a single criterion is not sufficient for
indicating racism; convergence of several criteria is
required for such indication; however, this indication may
be valid only provided that there are no concomitant
indications of an ti-racism. Hence the number of criteria
(several
thousands),
their correlations and relative
relevance, increase the overall complexity. To address
this problem, we in troduce a solution based on the use of
a multi-agent system. In particular, we employ a coalition
formation model to support criteria combination for the
information retrieval and filtering problem at hand.
3 Coalitions of criteria agents
As stated above, the analysis of documents in the
problem domain addressed here employs multiple
evaluation criteria. In practice, each document should be
evaluated based on a combination of several linguistic
criteria. Since combinations vary across documents, and
the right combination for each document is not known in
advance,
there is a need for a dynamic, flexible
mechanism for criteria selection and combination. In this
work this need is addressed via multi-agent coordination.
We in troduce a set of criteria agents, each representing a
single linguistic criterion, and provide them with a
dynamic coordination mechanism – coalition formation –
to address the criteria combination problem. Following,
we present the coalition formation model used by the
criteria agents. Each agent, given a document, has to
produce a set of characteristics of that document, using
both
its own processing methods and
information
produced by other criteria agents. To this end, the
important contribution of our work is in the collaborative
use of information produced by multiple agents. This
collaboration improves the quality of document and site
classification compared to results achieved without such
collaboration.
3.1 Model preliminaries
Based on a single criterion, an agent cannot
individually provide a defin itive judgment on a document.
Hence, agents must dynamically join together to produce
defin itive judgments. In our solution, this is achieved by
agents forming coalitions to analyze documents. A
coalition is a temporary association between agents to
reach join t goals. For the application domain addressed
here, the purpose of a coalition of agen ts is to categorize a
document as racist, revisionist, anti-racist, etc.
The details of a coalition formation protocol depend
on the type of problem studied. For instance, varying trust
relations or agents' objectives, might require different
protocols. To enable the agents to form coalitions, most
current protocols (an exception is found in [2,3]) assume
that the utility functions of agents, which measure their
degree of satisfaction with each suggested solution, must
be comparable or the same. This means that agents must
be able to agree (for each task or task combination) on a
common utility function. This assumption is acceptable
for many multi-agent systems, in particular for economic
cases where utilities can often be calculated in terms of
profit. However, in many cases comparing the utilities of
agents, and even more so their aggregation, is nontrivial.
The numerical measurement of the utility of an agent is
already a strong assumption for itself.
In this work we propose a new coalition formation
model which does not require aggregation of agent
preferences and utilities. This model does not force the
agents to follow a particular order while participating in
the coalition formation process; it guaranties an equitable
processing of agents' choices. The protocol suggested is
particularly suitable for problems with complex tasks
(where there is a need for several agents and for
coalitions) and for dynamic scenaria where tasks may be
added and others cancelled or modified, and where the
agents have different utility functions. Agents are self-
interested, i.e. they do not necessarily trust each other.
However they respect all the commitments to which they
agreed. We assume that the utility functions of the agents
are not known by the other agents and do not need to be
cardinal, an ordinal utility is enough.
Our mechanism starts with each agent building partial
solutions which better account for
its preferences.
Individual partial solutions are then merged by agents, a
process in which agents make concessions. A complete
solution may eventually be arrived at by a group of
agents, thus a coalition is formed. In this model agents
seek gradual and
reciprocal concessions. Without
concessions, solutions will not be reached and the agents
will not reach their objectives. The concessions are made
gradually. Step by step, each agent is asked to make a
compromise that will set its preferences closer to the
others'. We re-emphasize here that making concessions is
a rational behavior (as suggested in [3]), as it increases
the expected utility of the conceding agent. In the
example problem domain we study, the criteria agents
should make concessions regarding the documents to
which they will be applied first. At the first stage of their
processing, these agents draw a list of documents they
prefer to analyze and give them an order of priority. At
the coalition formation stage, agents should modify their
preferences regarding either the documents to be analyzed
or their priorities. Prioritizing is necessary since applying
all the criteria to a document is infeasible, as there are
thousands of cri teria which could be applied.
3.2 Definitions
Before presenting
the details of
the coalition
formation protocol and agent behaviors, we introduce
some definitions. We initially define the concepts on
which the coalitions and the solutions agents search for
are based. We proceed with defining various types of
relationships between tasks.
Definition 1: Coalition. A set of agents that joined
together to perform a task or a combination of tasks.
Definition 2: Coalition structure. A set of coalitions
that, together, can address all of the tasks and task
combinations to be performed at a given moment. If a
coalition structure is approved by all agents, it is
considered a solution. A solution guarantees that all of the
tasks are executed by the agents. The set of tasks and task
combinations that the coalitions in the solution will
perform is called the support of the coalition structure.
Definition 3: Group of coalition structures. A set of
coalition structures that each provides a specific agent
with the same utility. For brevity, it will be referred to as
a group of structures or simply a group.
Definition 4: Context. A set of parameters which must be
stable during a negotiation step.
A context is particularly important in the application
domain we address, because the locations of documents
change rapidly. Example context parameters are date and
time.
Definition 5: Utility function. Measures the satisfaction
of the agent with, or its surplus from, its collective and
individual actions. It is used to represent the preferences
of the agents. It may be ordinal or cardinal. In our case,
measuring the utility of a structure of coalitions means
comparing it with a reference state. The reference state
will be the same one throughout the negotiation.
Definition 6: Reference state. In order for the agents to
know whether they should accept a coalition structure as a
solution, they need to be able to compare it with their
minimal guaranteed gain during the negotiation. This
minimum is the reference state. If there are already
formed coalitions, the reference is the current coalitional
state.
To guarantee a solution after a negotiation, the
reference state needs to be feasible and identical across all
of the criteria agents. Otherwise, solutions arrived at by
different
agents might be
inconsistent
amongst
themselves.
Definition 7: Acceptable coalition structure. A
coalition structure is acceptable for an agent if it is
preferred over, or equivalent, to the current reference
state.
Definition 8: Signature of a coalition structure Ei,
denoted Sig(Ei ), defines the set of criteria agents that have
approved this coalition structure.
Definition 9: Knowledge K(Ci ) of an agent Ci is the set
of coalition structures, and the corresponding signatures,
known to Ci .
Definition 10: Unacceptable coalition structures: a set of
coalition structures Out(Ci ) for which agent Ci, notifies
the other agents of it being unacceptable for it. An
unacceptable coalition structure cannot be proposed as a
solution by any agen t.
The search for the support of a solution considers
relationships between tasks. Below, we define some types
of these relationships and provide examples. First, we
introduce the relationships between tasks by considering
the agents which will perform them; then, we consider
relationships based on the structure of the tasks.
Definition 11: Total covering. Tasks Ti and Tj are in a
total covering relationship if the agents selected to carry
out Ti can also carry out Tj and inversely, and the tasks do
not conflict (resource conflicts, etc.).
In the case of total covering, tasks Ti and Tj could be
carried out either sequentially or in parallel, since possible
conflicts are avoided.
Definition 12: Inclusive covering. Tasks Ti and Tj are in
inclusive covering if a subset of the agents selected to
carry out one of the two tasks can carry out the other.
Definition 13: Partial covering. Tasks Ti and Tj are in
partial covering if a subset of the agents selected to carry
out Ti can also carry out a part of Tj and inversely.
Definition 14: Total complementary tasks. Tasks Ti and
Tj are totally complementary if each of them can reuse the
results of the other task.
As an example, consider two documents Di and Dj
indexed by
the same site. Based on preliminary
experiments we performed, we know that, (a) frequently,
documents found at the same site are similar to one
another (in the linguistic sense); (b) because of their
similarity, the results obtained when analyzing Di subject
to certain criteria, may be applicable to Dj too. For
instance, computing the frequencies of one or several
words in a document could be a shared result. This
introduces a complementary relationship.
Definition 15: Dependent tasks. Tasks Ti and Tj are
dependent if only one of the two tasks needs the results of
the other task to perform its execution.
The dependence relationship between tasks allows
grouping of agents based on their shared interests. For
example, in order to analyze a document Di at a given
site, several criteria are necessary, among which some
may be relevan t to the analysis of another document Dj at
the same site. Such criteria sharing may promote the
formation of a coalition for performing the two analysis
tasks of Di and Dj.
Definition 16: Competitive tasks. Tasks Ti and Tj are
competitive if Ti and Tj compute the same indicators using
different methods. Ti and Tj should not be par t of the
support of a same solution. Recognizing competitive tasks
makes it possible to prune the solutions search space.
3.3 The coalition formation method
The aim of th is method is to solve the agent coalition
formation problem without having to aggregate the
preferences of the agents, and to allow a dynamic and fast
reorganization of these coalitions according to changes in
the problem domain. The method we propose is based on
two concurrent behaviors of the agents: task analysis, and
negotiation. Task analysis consists of grouping of tasks
into combinations, based on relationships among the
tasks, where each combination is to be performed by a
coalition. To simplify and optimize the search among
those combinations of tasks, a binary tree is constructed,
and combinations are placed in its nodes. Additionally,
from each combination of tasks competitive combinations
(defined below) can be isolated. The advantage of the
suggested method is in directing the search of the support
of the solutions towards preferred tasks, thus reducing
search complexity.
Definition 17: Competitive combination of tasks. Two
combinations of tasks CT1 and CT2 are competitive for an
agent ai if its utility from CT1 ,U(ai, CT1), is equal to its
utility from CT2 , U(ai , CT2), and CT1 and CT2 do not
belong to the support of the same solution.
Definition 18: Tree of task combinations is constructed
based on combinations' preference. The preferred
combination of the agent that constructs the tree is placed
in the root. The rest of the nodes are populated in a
descending preference order. Two branches emanate from
each node N: a positive branch labeled with (+),
indicating that N is in the support of the solution; a
negative branch labeled with (-), which indicates that N is
out of the support of the solution.
The supports of the coalition structures in this tree are
read starting from the root and by retaining only the nodes
when branches emanating from them are labeled with a
positive sign. For instance, in Figure 3 the support S3 is
only formed of the combinations <{T1, T2, T3}, {T5, T6}>
since on the path starting from the root to the leaf node S3,
the node {T4, T5} is negatively labeled on the branch of
this path. Hence, this node does not belong to the support
S3.
The tree of combinations is incrementally constructed.
To develop this tree an agent selects the combinations that
it organized first in partitions. We define a partition of
task combinations as a set of combinations concerned
with one task and containing all the combinations where
this task appears. Each combination of tasks belongs to
only one partition (cf. Figure 2).
For instance, consider four agents C1,…,C4, eight tasks
T1,…,T8 and seven possible coalition structures E0,…,E6,
where E0 is the initial state. Of these structures, only three
are Pareto optima (E1, E3 and E6). Let Ui (E) be the utility
of agent Ci for the coalition structure E. We represent the
coalition structures in Figure 1 according to the utility that
they bring to each agent. To build its coalition structures,
agent C1 computes some task combinations. This is done
with respect to its preferences. For instance, C1 computes
the following preferred combinations: {T1, T2, T3}, {T1,
T2}, {T4, T5}, {T5, T6}, {T3, T4, T5}, {T6, T7} and {T6, T7,
T8}.
U2
E1
E5
E3
E4
E2
E0
Sub-optimal so lution
Optimal so lution
U1 : Agent C1 util ity U2 : Agent C2 util ity
E6
U1
Figure 1. Possible coalition structures in a utility
space
In this example, these combinations are used to build the
coalition structure E1 as explained hereafter. To simplify
the construction of, and the search in, the tree of the
supports for the solutions, these combinations are first
classified into several partitions (P1, P2 and P3 in Figure
2) and ordered in decreasing preference order. The
preference degree of each partition is computed based on
the preference degrees of the combinations it includes.
The first partition p1 has the highest preference degree
and is thus placed at the top. In building the tree, the
preferred combination of agen t C1 ,{T1, T2, T3}, is attached
to the root of its tree (cf. Figure 3). Then, the agent
creates
the next
for
two branches and searches
combination to be considered. In the positive branch, the
combination must be selected from a partition other than
P1, because combinations in p1 share at least the task T1,
and a support of a coalition structure should have only
one instance of each
task. The agent selects
the
combination {T4, T5} from P2. As for the negative branch,
the agent selects the combination {T1, T2} from P1. The
tree is further built in the same manner. For instance, the
following positive combination is {T6, T7} form P3.
Note that singleton combinations (containing one task)
are not immediately in tegrated into the tree. To avoid
building unnecessarily deeper
trees, singletons are
directly added to the support once formed. Searching the
tree and selecting the nodes from which positively labeled
branches emanate gives us already several possible
supports, for
instance, S3. S3
is formed of
two
combinations <{T1, T2, T3}, {T5, T6}>. If among the
singleton combinations, there are some that the agent
would like to perform, they are added to the support. E.g.,
if C1 is interested in tasks {T4} and {T7}, S3 becomes <{T1,
T2, T3}, {T5, T6}, {T4}, {T7}>.
Once the agent has identified the supports in the tree
of task combinations, and in particular its most preferred
coalition structures, it is ready to start the negotiation
phase. In particular, it will send coalition structures it has
found as part of coalition formation proposals to peer
agents. Each agent computes its own tree. Each tree may
provide several supports of different coalition structures,
and such supports may vary across trees. Th is in turn
the coalition
to
allows several different solutions
formation problem, as each task or combination of tasks
in each support can be allocated to different coalitions of
agents.
T1 , T2, T3
{P1}
{P2}
{P3}
{T1, T2, T3}
{T1, T2}
{T4, T5}
{T5, T6}
{T3,T4, T5}
{T6,T7}
{T6,T7, T8}
Figure 2. Partitions of
task combinations
-
+
T1, T2
-
+
T4, T5
-
+
…
…
T5, T6
T6, T7
+
-
T6, T7, T8
S3
+
S1
+
S2
Figure 3. Supports tree
3.3.1 Initiation of the negotiation. The negotiation
process we propose is based on three phases: initialization
of the negotiation and transfer of tasks, the core
negotiation, and transmission of the solution. There is no
pre-established order among the agents. Agents can
initiate negotiation and participate at any
time.
Negotiation may be in itiated when new documents to be
analyzed are sent by the search engines or by a peer
criterion agent. Each agent asks the other agents to send it
their tasks, prioritized. Upon such a request, each agent
computes and sends the vector of its conditional choices.
We assume that agents are cooperative in this respect. For
instance, in our application domain, tasks are documents
to be analyzed. An agent Ci may send a vector, e.g.,
Want(Ci )=(t1:D1D2D3, t2:D4 if Cj(cid:7507)D4 ,:D5). This vector
indicates that Ci wants to analyze documents D1, D2 or D3
first (at time t1). It wants to analyze document D4 second
(at time t2), if the necessary resources are provided by
agent Cj. It has no demands for document D5.
After task vectors with preferences are transmitted,
each agent holds the set of tasks and can compute
coalitions to be proposed or agreed to. The in itiator agent
computes
the preferred combinations of
tasks.
It
constructs a tree of supports as described above. Each
support in this tree will provide a set of coalition
structures. Indeed, for each task or combination of tasks
in this support, the initiator agent finds its preferred
agents which will perform them. The agent then gathers
these coalition structures in groups in order to initiate the
negotiation.
3.3.2 The negotiation model. Once the initiator agent
computes the coalition structures, it chooses an agent to
which these coalition structures will be sent (as proposals
for coalition formation). This choice is based on the
agent’s
strategies. The agent
also declares
its
unacceptable coalition structures. The initiator initially
sends its most preferred coalition structures, signed in
Sig(Ei ); it may iteratively send, in a decreasing order of
preference, its other coalition structures. This may be
continued until there are no more coalition structures at
least equivalent to the current state. However, before
sending a less preferred coalition structure, the agent may
wait until it receives a message from another agent either
about the former coalition structure it has proposed or
about a new coalition structure proposed by that agent.
Each of the other agents also computes its preferred
coalition structures. It then computes the coalition
structures that it will choose in second position and so on.
When an agent R receives a group of coalition
structures from a sender agent S, it sorts those coalition
structures in order of preference into homogeneous new
groups. In each of these groups, all coalition structures are
equivalent in terms of utility of S. R updates its
knowledge on the coalition structures in K(R). When the
utility of a new group is equivalent to the utility of a
group which is already known to R, these groups are not
merged by R, since for S their utility is not the same. R
only sorts coalition structures that are at least equivalent
to the reference state and the others are not considered. If
there is at least one coalition structure which is preferable
or equivalent to R's best choice, it forwards this coalition
structure CS to the next agent that it wishes to include in
the negotiation. R signs CS and adds it to Sig(CS). This
information indicates that CS has been approved by R and
by all the preceding senders as well. When R finds in the
set it receives unacceptable coalition structures, it has to
declare them unacceptable to the other agents in Out(R).
Out(R) also contains the coalition structures that R itself,
locally, identified as unacceptable.
Information on unacceptable structures is useful
because it prevents the need of other agents computing
coalition structures that will be systematically refused.
However, its transmission is expected only when agents
trust each other. With no trust, agents would not transmit
this information, to prevent the others from using the
information
instance, such
their strategies. For
in
information could enable agents to know which coalition
structures an agent may accept, thus gaining an advantage
in negotiation. When a combination of tasks in a support
of a coalition structure is unacceptable for an agent, it
should also indicate that. This combination of tasks is
then deleted from the partitions of tasks to prevent it from
being considered as part of a support of another coalition
structure. The tree is also revised in order to erase the
supports containing this combination of tasks.
In case that a coalition structure CS is acceptable for
agent A, but its utility is inferior to its top choice, A may
nevertheless decide to forward CS to the next agent B.
Consequently the number of agents having approved CS
grows and CS is thus reinforced. A may also decide to
temporarily block CS but indicates in K(A) that it has
received it, if it considers that there is still enough
negotiating time to reach a consensus. In this case the
agent sends to B the coalition structures it prefers.
A possible end point of the negotiation occurs when
an agent C receives a group of coalition structures
approved by all other agents. C sorts the coalition
structures into groups. If at least one of the coalition
structures is better than, or equivalent to, C's reference
state, and if negotiation time is about to expire, it can
consider the suggested structure as its best group. All the
coalition structures of th is group are Pareto optima, so C
can arbitrarily choose one of them as a solution for the
negotiation. In case that negotiation time has not expired
and provided that C has some undeclared groups of
coalition structures, it can continue the negotiation.
Once the last agent has identified a Pareto optimal
solution which is approved by all, it sends this coalition
structure to the other agents, which accept it as the
solution for
the negotiation, as
they have already
confirmed it in Sig(Ei ) and are thus committed to it.
3.3.3 Negotiation example. We illustrate the negotiation
model using the previous example. For simplicity, we
limit our discussion to two agents, C1 and C2. Agent C1
initiates
the negotiation and
it builds
its
tree of
combinations of tasks. Then C1 generates a set of
coalition structures it considers acceptable. It then sorts
them into equivalent groups of coalition structures:
G1(E6) ; G2(E4;E3) ; G3(E2) ; G4(E0;E1). In each group,
coalition structures have the same preference (cf. Figure
4). E5 is not sorted as the reference state (E0) is better.
G4
E1
E5
E0
U1=0
G3
E2
G2
E3
E4
G1
E6
U1
Figure 4. Group of coalition structures of agent C1
Groups G1, G2, G3 and G4 are acceptable to agent C1
as they correspond to a state which is as satisfactory as
the initial reference state, or better. In the same way,
agent C2 also searches for its preferred acceptable
coalition structures and sorts them into equivalent groups
of coalition structures (Figure 5): G’1(E1); G’2(E2;E3);
G’3(E4); G’4(E5); G’5(E0). E6 is not sorted as the reference
state E0 is better.
G’4
E5
G’3
G’2
E3
E2
E4
G’5
E0
U2=0
E6
G’1
E1
U2
Figure 5. Group of coalition structures of agent C2
Groups G’1, G’2, G’3, G’4 and G’5 are acceptable to
agent C2 as they correspond to a state which is as
satisfactory as the initial reference state, or better. Thus
C1 starts by sending its first preferred group G1. Agent C2
starts by receiving G1 and evaluates it (cf. Figure 6). The
unique coalition structure E6 in G1 is unacceptable for C2
because it leads to a state less satisfactory than the initial
state. Agent C2 does not send this coalition structure. It
notifies C1 that it rejects G1(E6). If one or more coalitions
in the coalition structure E6 is appropriate for C2, it may
indicate it to C1.
U2
U2 =0
E6
Figure 6. First group received by agent C2
Agent C1 must then wait for a new proposal from
agent C2. Thus C2 sends its preferred set, i.e. G’1(E1). This
group contains only coalition structure E1 which is
acceptable to agent C1 but which corresponds at the same
time to its least preferred choice. For E1 the utility of C2 is
the same as that of its reference state E0 (cf. Figure 5).
Agent C1 does not reject th is coalition structure but it still
has a possibility to propose a new group to agent C2. C1
thus sends its second preferred group G2(E3; E4).
U1
U1 =0
E1
E0
Figure 7. First group received by agent C1
Agent C2 receives G2 and separates its two coalition
structures into two groups. E3 of G2 now belongs to its
group G’2 which corresponds to its second preferred
group. As for coalition structure E4, it belongs to group
G’3 its third choice. E3 is acceptable. As all the other
agents have already par ticipated in the negotiation, agent
C2 cannot send it to others. Coalition structure E3 of G’2
can thus be a solution. Agent C2 has no other Pareto
optimal choices left. Either it sends E3 to agent C1 in order
to indicate to it the final result of the negotiation, or it
waits until C1 gives way on coalition structure E1 which is
also Pareto optimal considering the fact that agent C2 has
already refused one of the coalition structures that agent
C1 proposed to it. The negotiation between the two agen ts
inevitably fin ishes on one of the two Pareto optima and
before expiration of the pre-set negotiation time. Note that
classical game theoretic analysis might bring the two
agents to an equilibrium where no coalition is formed
(and both lose). Yet, as shown in [3], and reinforced in
our work, it is in the best in terest of agents, even if they
are self-interested,
to compromise. Implementing a
compromise strategy, one of these agents will normally
yield to allow for a solution to be arrived at.
4 Experimental evaluation
To evaluate it, the model suggested in this study was
implemented and experimented with. The code was
written in Java and run on a Windows 98 host, 1.4 GHZ
processor and 256 MB RAM. We in itially performed
experiments on
the basis of
some dependence
relationships. In order to evaluate the protocol, we have
analyzed
its performance by observing
several
parameters: the number of exchanged messages, the size
of these messages (the number of coalition structures they
contain), the number of coalition structures that have been
evaluated and the negotiation runtime. The results
obtained are summarised in the following figures. It
should be noted that each point in the graphs is the
average of 10 tests carried out under the same conditions.
Runt i me (ms)
4000
F ig ure 8 : Neg o t iat io n runt ime
3500
3000
2500
2000
1500
1000
500
0
# agents
10
9
8
7
6
5
4
3
2
Figure 8 shows negotiation runtimes obtained in
milliseconds with the number of agents varying between 2
and 10. The negotiation runtime increases in this figure.
This is due to the h igher number of proposals that agents
would compute and exchange. However the search time
remains acceptable even when the number of agents
grows. Figure 9 shows the number of coalition structures
sent by the agents. For instance in our experiments, with 4
agents and 4 documents, 18 coalition structures were
transmitted, and for 10 agents with 10 documents, only
5058 coalition structures have been sent, compared to
45927 coalition structures expected in a case where
dependencies are not considered (the latter was computed
offline). The number of messages sent varies considerably
according to the incompatibility of the preferences of the
agents.
Fi gur e 9: Number of coal i t i on st r uc t u r es sent dur i ng a negot iat ion
# st r uc t u r es
6 00 0
500 0
4 00 0
3 00 0
2 00 0
100 0
0
# ag ent s
2
3
4
5
6
7
8
9
10
Figure 10 shows the number of evaluated coalition
structures and allows measuring the effectiveness of the
search when handling of dependence relationships is
employed. Had agents not considered dependencies, for
instance in the case of 4 agents and 4 tasks, the number of
coalition structures they should have evaluated would
have been 6561. As the graph shows, the actual number is
by far smaller. This holds for larger numbers of agents
too: 10 agents have only examined 8983 coalition
structures, compared to 45927 possible ones when
dependencies are not handled.
# st ruct ur es
10000
8000
6000
4000
2000
0
# agents
Figur e 10: Number o f eva luat ed coal i t i on st r uc t u r es du r ing a negot iat ion
2
3
4
5
6
7
8
9
10
task
the use of
the gains from
To evaluate
dependencies as part of the coalition formation process,
we performed two experiments where in each the same
tasks were provided to the agents, however in one
experiment they used task dependencies and in the other
they did not. Comparative results between these two
experiments are presented in Figure 11. As seen there, the
gains of coalition formation with the handling of task
dependencies are, on average, about 13% higher than the
gains without it. This gain in computation results from
task
combinations
that
are
facilitated by
task
dependencies. By using task combinations, the agents
reduce the number of coalit ions they need to consider.
For instance, without the use of the combinations, an
agent that has 4 tasks must examine the 4 corresponding
coalitions. But with task combinations, for the same 4
tasks, the number of coalitions may decrease. E.g., if the
tasks are gathered in two task combinations, the agent will
have to examine only 2 corresponding coalitions.
# structures
20000
Figure 11: Total number of evaluated coalitions with and without
handling dependenc ies
15000
10000
5000
0
# agents
2
3
4
5
6
7
8
9
10
Note that although the results presented here refer to
10 agents, we have performed additional experiments in
larger systems, exceeding 50 agents. The subset presented
is merely aimed at providing the essence of the results.
5 Conclusion
Classical solutions to the coalition formation problem
assume cardinal ordering of task values. Additionally, it is
commonly assumed that agents behavior rationally, and
should thus not compromise their utility. Further, existing
solutions hardly analyze complex task dependencies.
Recently, it was shown [3] that compromise strategies in
coalition formation may dominate other strategies. In this
study we leverage on this new result. We advocate that,
for some problem domains, compromise is necessary not
only to facilitate the formation of coalitions; it is also
necessary to reduce the complexity of coalition formation.
We further claim that task dependencies can by utilized to
prune the coalition formation search space. As we show in
our experiments, the use of the compromise-based
coalition formation model we present provides significant
savings
the computation and communication
in
complexity of coalition formation. Our results also show
that when information on task dependencies is used, the
complexity of coalition formation is further reduced.
This study should be extended to address several issues.
Firstly, the sizes of the systems examined were relatively
small. Since in our experiments we observed a steep
growth in computational costs, scale-up of the proposed
mechanism may face difficulties, in spite of it performing
much better than a naïve approach. Secondly, the
mechanism should be check in other domains. Although it
was specifically designed, and proved successful, for
tracking racist documents, it is desirable to prove it
applicable to other domains. In future work we in tend to
pursue these directions. The current results are already
very promising, as were able to utilize a MAS technique –
coalition formation – for solving an important real-world
problem.
References
[1] Cardie, C. Empirical Methods
Information
in
Extraction, AI Magazine, 18(4):65-80, 1997.
[2] Kraus, S., Shehory, O., Tasse, G. Coalition Formation
with Uncertain Heterogeneous Information, AAMAS,
1-8, 2003.
[3] Kraus, S., Shehory, O., Tasse, G., The Advantages of
Compromising
in Coalition Formation with
Incomplete Information, AAMAS, 588-595 2004.
[4] Letsche, T. Berry, M.W. Large-scale Information
Retrieval with Latent Semantic Indexing. Information
Sciences, 100:105–137, 1997.
[5] Sandholm T.W., Lesser V.R. Coalitions among
Computationally Bounded Agents, AI, 99-137, 1997.
[6] Sandholm T.W., Larson K., Andersson M., Shehory
O., Tohmé F. Coalition Structure Generation with
Worst Case Guarantees, Artificial Intelligence, 111,
209-238, 1999.
[7] Shehory O, Kraus S. Methods for Task Allocation via
Agent Coalition Formation, AI, 165-200, 1998.
|
1802.01730 | 1 | 1802 | 2018-02-05T23:30:55 | Local Wealth Redistribution Promotes Cooperation in Multiagent Systems | [
"cs.MA",
"cs.AI",
"cs.GT"
] | Designing mechanisms that leverage cooperation between agents has been a long-lasting goal in Multiagent Systems. The task is especially challenging when agents are selfish, lack common goals and face social dilemmas, i.e., situations in which individual interest conflicts with social welfare. Past works explored mechanisms that explain cooperation in biological and social systems, providing important clues for the aim of designing cooperative artificial societies. In particular, several works show that cooperation is able to emerge when specific network structures underlie agents' interactions. Notwithstanding, social dilemmas in which defection is highly tempting still pose challenges concerning the effective sustainability of cooperation. Here we propose a new redistribution mechanism that can be applied in structured populations of agents. Importantly, we show that, when implemented locally (i.e., agents share a fraction of their wealth surplus with their nearest neighbors), redistribution excels in promoting cooperation under regimes where, before, only defection prevailed. | cs.MA | cs | Local Wealth Redistribution Promotes Cooperation in
Multiagent Systems
Flávio L. Pinheiro
Collective Learning Group, The MIT Media Lab
Massachusetts Institute of Technology, 22 Ames Street,
Cambridge, Massachusetts
[email protected]
Fernando P. Santos
INESC-ID and Instituto Superior Técnico,
Universidade de Lisboa
2744-016 Porto Salvo, Portugal
[email protected]
8
1
0
2
b
e
F
5
]
A
M
.
s
c
[
1
v
0
3
7
1
0
.
2
0
8
1
:
v
i
X
r
a
ABSTRACT
Designing mechanisms that leverage cooperation between agents
has been a long-lasting goal in Multiagent Systems. The task is
especially challenging when agents are selfish, lack common goals
and face social dilemmas, i.e., situations in which individual inter-
est conflicts with social welfare. Past works explored mechanisms
that explain cooperation in biological and social systems, provid-
ing important clues for the aim of designing cooperative artificial
societies. In particular, several works show that cooperation is able
to emerge when specific network structures underlie agents' in-
teractions. Notwithstanding, social dilemmas in which defection
is highly tempting still pose challenges concerning the effective
sustainability of cooperation. Here we propose a new redistribu-
tion mechanism that can be applied in structured populations of
agents. Importantly, we show that, when implemented locally (i.e.,
agents share a fraction of their wealth surplus with their nearest
neighbors), redistribution excels in promoting cooperation under
regimes where, before, only defection prevailed.
CCS CONCEPTS
• Computing methodologies → Multi-agent systems; Coop-
eration and coordination;
KEYWORDS
Emergent behaviour; Social networks; Social simulation; Simulation
of complex systems; Cooperation
1 INTRODUCTION
Explaining cooperation among selfish and unrelated individuals has
been a central topic in evolutionary biology and social sciences [23].
Simultaneously, the challenge of designing cooperative Multiagent
Systems (MAS) has been a long standing goal of researchers in
artificial intelligence (AI) [10, 19]. More than thirty years ago it was
already clear that "Intelligent agents will inevitably need to interact
flexibly with other entities. The existence of conflicting goals will
Proc. of the 17th International Conference on Autonomous Agents and Multiagent Systems
(AAMAS 2018), M. Dastani, G. Sukthankar, E. Andre, S. Koenig (eds.), July 2018, Stockholm,
Sweden
© 2018 International Foundation for Autonomous Agents and Multiagent Systems
(www.ifaamas.org). All rights reserved.
This is the author's version of the work. It is posted here for your personal use. Not
for redistribution. The definitive Version of Record was published in Proceedings
of Proc. of the 17th International Conference on Autonomous Agents and Multiagent
Systems (AAMAS 2018), M. Dastani, G. Sukthankar, E. Andre, S. Koenig (eds.), July 2018,
https://doi.org/doi.
need to be handled by these automated agents, just as it is routinely
handled by humans." [10].
In Cooperative multiagent interactions, agents need to collabo-
rate towards common goals, which introduces challenges associated
with coordination, communication and teamwork modeling [19, 28].
Self-interested interactions, in contrast, require the design of indi-
rect incentive schemes that motivate selfish agents to cooperate
in a sustainable way [7, 19]. Cooperation is often framed as an
altruistic act that requires an agent to pay a cost (c) in order to
generate a benefit (b) to another. Refusing to incur in such a cost is
associated with an act of defection and results in no benefits gener-
ated. Whenever the benefit exceeds the cost (b > c) and plays occur
simultaneously, agents face the Prisoner's Dilemma, a decision-
making challenge that embodies a fundamental social dilemma
within MAS [21]: rational agents pursuing their self-interests are
expected to defect, while the optimal collective outcome requires
cooperation. If defection is the likely decision of rational agents,
however, how can we justify the ubiquity of cooperation in the real
world? Evolutionary biology has pursued this fundamental question
by searching for additional evolutionary mechanisms that might
help to explain the emergence of cooperative behavior [22, 23].
Some of these mechanisms allowed to develop solutions that found
applications in computer science, such as informing about ways of
incentivizing cooperation in p2p networks [9, 11], wireless sensor
networks [2], robotics [47] or resource allocation and distributed
work systems [43] – to name a few.
Network reciprocity is one of the most popular mechanisms to
explain the evolution of cooperation in social and biological systems
[24, 26, 30–32, 38]. In this context, populations are structured and
interactions among agents are constrained. These constraints are
often modelled by means of a complex network of interactions.
Applications of this mechanism have been explored in the design
of MAS that reach high levels of cooperation [1, 17, 29, 34]. Despite
these advances, cooperation on structured populations is still hard
to achieve when considering social dilemmas with high levels of
temptation to defect. Additional complementary mechanisms are
required.
Here we consider that agents contribute a percentage of their
surplus (defined below), which is later divided among a Benefi-
ciary Set of other agents. In this context, we aim at answering the
following questions:
operation?
• Does redistribution of wealth promote the evolution of co-
• How should Beneficiary Sets be selected?
• What are the potential disadvantages of such a mechanism?
AAMAS'18, July 2018, Stockholm, Sweden
Flávio L. Pinheiro and Fernando P. Santos
Using methods from Evolutionary Game Theory (EGT) [44] and
resorting to computer simulations, we explore how wealth redis-
tribution impacts the evolution of cooperation on a population of
agents without memory (i.e. unable to recall past interactions) and
rationally bounded (i.e. lacking full information on payoff struc-
ture of the game they are engaging). We assume that agents resort
to social learning through peer imitation, which proves to be a
predominant adaptation scheme employed by humans [36]. Also,
we consider that strategies are binary – Cooperate and Defect –
opting to focus our attention on the complexity provided by 1)
heterogeneous populations, 2) the redistribution mechanism and 3)
the self-organizing process of agents when adapting over time. The
role of larger strategy spaces (such as in [29, 34, 41]) lies outside
the scope of the present work.
With redistribution, we show that cooperation emerges in a
parameter region where previously it was absent. Moreover, we
show that the optimal choice of redistributing groups consists in
picking the nearest neighbors (local redistribution). This result fits
with a local and polycentric view of incentive mechanisms [27, 46]
in MAS, which may not only be easier to implement but, as we
show, establish an optimal scale of interaction in terms of eliciting
cooperation.
2 RELATED WORK
The problem of Cooperation is a broad and intrinsically multidisci-
plinary topic, which has been part of the MAS research agenda for
a long time [10, 19]. In the realm of evolutionary biology, several
mechanisms were proposed to explain the evolution of cooperation
[22]. Kin selection [13], direct reciprocity [45], indirect reciprocity
[25, 42] and network reciprocity [26, 38] constitute some of the
most important mechanisms proposed. Remarkably, these mech-
anisms have been applied in AI in order to design MAS in which
cooperation emerges. For example, Waibel et al. associated kin se-
lection with evolutionary robotics [47]; Griffiths employed indirect
reciprocity to promote cooperation in p2p networks while Ho et al.
investigated the social norms that, through a system of reputations
and indirect reciprocity, promote cooperation in crowdsourcing
markets [12, 16]. Similarly, Peleteiro et al. combined indirect reci-
procity with complex networks to design a MAS where, again,
cooperation is able to emerge [29]. On top of that, Han applied
EGT – as performed in our study – in order to investigate the role
of punishment and commitments in multiagent cooperation, both
in pairwise [14] and group interactions [15]. Regarding alterna-
tive agent-oriented approaches to sustain cooperation in MAS, we
shall underline the role of electronic institutions [4, 8] whereby
agents' actions are explicitly constrained so that desirable collective
behaviors can be engineered.
The role of population structure and network reciprocity is, in
this context, a prolific area of research. In [31] it was shown that
complex networks are able to fundamentally change the dilemma
at stake, depending on the particular topology considered [18, 31];
Ranjbar-Sahraei et al. applied tools from control theory in order to
study the role of complex networks on the evolution of cooperation
[34]. Importantly, the role of dynamic networks – i.e., agents are
able to rewire their links – was also shown to significantly improve
the levels of cooperation, especially in networks with a high average
degree of connectivity [32, 39]. A survey on the topic of complex
networks and the emergence of cooperation in MAS can be accessed
in [17].
Previous works found that cooperation in structured population
substantially decreases when the temptation to defect increases
(see Model for a proper definition of Temptation). Thereby, here
we contribute with an additional mechanism of cooperation on
structured populations. We consider a mechanism of redistribu-
tion, inspired in the wealth redistribution mechanisms that prevail
in modern economic/political systems, mainly through taxation.
We are particularly interested in understanding how to sample re-
distribution groups in an effective way. In this context, we shall
underline the works of Salazar et al. and Burguillo-Rial, in which
a system of taxes and coalitions was shown to promote coopera-
tion on complex networks [37] and regular grids [5]. While [37]
and [5] do an excellent job showing how coalitions – leaded by a
single agent – emerge, here we consider a simpler/decentralized
model (e.g. no leaders are considered and taxes are redistributed
rather than centralized in a single entity) and focus our analysis on
showing that local redistribution sets are optimal. Our approach
does not require additional means of reciprocity, memory, leader-
ship, punishment or knowledge about features of the network. We
cover a wide range of dilemma strengths and explicitly show when
the local redistribution promotes cooperation by itself. Notwith-
standing, the analysis performed in [37] and [5] surely provides
important insights to address in future works, on how to explicitly
model the adherence to beneficiary sets and guarantee their stabil-
ity. Also, while here we assume an egalitarian redistribution over
each individual in the Beneficiary Set, we shall note that different
redistribution heuristics may imply different levels of allocation
fairness [33]. In this context, a recent work introduces the concept
of Distributed Distributed Justice [20] and shows that local inter-
actions may provide a reliable basis to build trust and reputation
between agents, which can be used to regulate, in a decentralized
way, the levels of justice in agents' actions. This way, it is reward-
ing to note that local interactions not only constitute an optimal
scale to form cooperative Beneficiary Sets (as we show, see below),
but also provide the convenient interaction environment to allow
justice in contributions to be sustained.
3 MODEL
3.1 Three Stage Redistribution Game
Here we propose a sequential game dynamics made of three stages.
Focusing on an arbitrary agent i, these stages can be described as
follows:
(1) Agent i participates in a one-shot game (here a Prisoner's
Dilemma) with all his/her neighbors j. From each interaction
j, he/she obtains a payoff πi, j. After all interactions, agent i
accumulates a total payoff Πi =
j πi, j;
(2) Next, agent i contributes a fraction α of his/her payoff sur-
plus (Πi − θ) to be redistributed. The group that benefits
from agent i contribution is called Beneficiary Set i (Bi).
(3) Finally, agent i receives his/her share from each Beneficiary
Set that he/she is part of.
We refer to α as the level of taxation, as it defines the fraction of
the surplus that agents contribute, while θ is the threshold level of
Local Wealth Redistribution Promotes Cooperation in Multiagent Systems
AAMAS'18, July 2018, Stockholm, Sweden
Figure 1: Solutions for the two-person game with wealth re-
distribution. Each curve indicates the critical taxation levels
(α∗) above which the nature of the social dilemma changes,
for different payoff thresholds (θ) and as a function of the
Temptation parameter (T ).
payoff that defines the surplus. By definition, agents with negative
payoff cannot contribute (i.e., θ > 0); they might, however, receive
benefits from the Beneficiary Sets. Each agent i contributes only to
one Beneficiary Set Bi from which they cannot be part of, that is,
agents do not receive from the Beneficiary Set they contribute to.
A central question of this work is how to select Bi for each i. As
we show, this decision has a profound and non-trivial impact on
the overall cooperation levels in the system.
3.2 The Prisoner's Dilemma Game
In general, all the possible outcomes of a two-strategy two-player
game, in which two agents engage in a one-shot interaction that
requires them to decide – independently and simultaneously –
whether they wish to Cooperate (C) or to Defect (D), can be sum-
marized in a payoff matrix, such as
C D
C R
D T
S
P
which reads as the payoff obtained by playing the row strategy
when facing an opponent with the column strategy. Here, R rep-
resents the Reward payoff for mutual cooperation and P the Pun-
ishment for mutual defection. When one of the individuals Defects
and the other Cooperates, the first receives the Temptation payoff
(T ) while the second obtains the Sucker's payoff (S). In this manu-
script we consider that agents interact according to the Prisoner's
Dilemma (PD). Agents are said to face a PD whenever the relation-
ship between the payoffs is such that T > R > P > S [44]. In such
a scenario, rational agents seeking to optimize their self-returns
are expected to always Defect. However, since the best aggregated
outcome would have both players cooperating (2R > 2P), agents are
said to face a social dilemma: optimizing self-returns clashes with
optimizing the social outcome. In this sense, mutual cooperation
is Pareto Optimal and contributes to increase both average payoff
(over mutual defection) and egalitarian social welfare (over unilat-
eral cooperation) [6]. It is noteworthy to mention that other situa-
tions – with different optimal rational responses – arise when the
Figure 2: Graphical depiction of the specific structures used
in this work. a) Homogeneous Networks correspond to a
structure in which all nodes have the same degree. b) Het-
erogeneous Networks are characterized by a high variance
among the degree of nodes. The color of each node indicates
its degree: blue tones represent lower degree and red tones
higher degree. Panel c) and d) show, respectively, the degree
distributions of the Homogeneous and Heterogeneous net-
works under analysis. In particular, we use scale-free net-
works as representatives of heterogeneous structures; these
have a degree distribution that decays as a power law.
parameters take a different relationship [21]: the Stag Hunt game
when R > T > P > S; the Snowdrift Game when T > R > S > P;
the Harmony Game when R > T > S > P; or the Deadlock Game
when T > P > R > S, to name a few. Notwithstanding, the PD is
by far the most popular metaphor of social dilemmas [44] and the
one that presents the biggest challenge for cooperation to emerge.
For these reasons, PD shall be the main focus of study in this man-
uscript. We further simplify the parameter space by considering
that R = 1, P = 0, S = 1 − T and 1 < T ≤ 2 with the game being
fully determined by the Temptation value (T). In that sense, higher
temptation creates more stringent conditions for the emergence of
cooperation.
3.3 Prisoner's Dilemma with Wealth
Redistribution
As an introductory example, let us start by analyzing the particular
case of two interacting agents (i and j) in a one-shot event. In this
case, the Beneficiary Sets of each agent (Bi and Bj) are composed
only by the opponent. Wealth/payoff redistribution can thus be
analyzed by considering a slightly modified payoff matrix, that
takes into account the second and third stages. The resulting payoff
matrix becomes
C
1
C
D T − α(T − θ)
D
1 − T + α(T − θ)
0
1.9Temptation parameter, T1.0critical level of taxation, ⍺* = 0.90 = 0.99 = 0.75 = 0.50 = 0.25 = 0.000.80.60.40.20.02.01.81.71.61.51.41.31.21.11.0a)homogeneous networkHeterogeneous Networkb)c)d)degree (z)fraction of nodesfraction of nodesdegree (z)D(z)⇡z single peakover hziAAMAS'18, July 2018, Stockholm, Sweden
Flávio L. Pinheiro and Fernando P. Santos
where θ is the payoff threshold and α is the level of taxation. The
rationale to arrive at this payoff structure is the following: whenever
both players choose to act the same way the payoff remains the
same as their contributions (from taxes) and benefits (from receiving
the contributions of their opponent) cancel out. A Defector playing
against a Cooperator sees his payoff of T subtracted by an amount
α(T − θ) while not receiving any benefit, since the Cooperator has
negative payoff and does not contribute. Likewise, the Cooperator
is exempt from contributing but receives an additional contribution
of α(T − θ), which represents the amount taxed to the Defector.
To inspect whether wealth redistribution changes the nature of
the social dilemma (i.e. from a Prisoner's Dilemma to another type
of game) we have to inspect whether there is a difference in the
relationship between the payoffs R and T or P and S. This sums up
to solving a single inequality,
(1)
T − α(T − θ) < 1
which results in the critical values of α,
T − 1
(T − θ)
∗
α
>
(2)
Hence, depending on the choice of θ and for a given T , α∗ is the
minimum level of taxation required to observe a change in the
nature of the game faced by agents. It is straightforward to notice
that the nature of the game changes from a Prisoner's Dilemma to
an Harmony Game as the relationship moves from T > R > P > S
to R > T > S > P. Figure 1 shows α∗ for different values of T and θ.
Clearly, in well-mixed populations and under the simple scenario of
a MAS composed by two agents, the redistribution mechanism has
the simple effect of reshaping the payoff matrix, trivially changing
the nature of the dilemma. Such a trivial conclusion cannot be
drawn with large populations playing on networks, where we will
show that different ways of assigning the Beneficiary Sets have a
profound impact on the ensuing levels of cooperation.
3.4 Structured Populations
Let us consider a population of Z agents in which agents correspond
to the nodes/vertices of a complex network, while links dictate who
interacts with whom. The structure reflects the existence of con-
straints that limit interactions between agents. These constraints
can arise from spatial or communication limitations.
The number of interactions that each agent i participates in de-
fines his/her degree zi. The distribution of degrees, D(z), describes
the fraction of agents that has degree z. In this work we consider
two structures: Homogeneous Random Graphs [40, 41] and Scale-
Free Barabási Networks [3].
Homogeneous Random Graphs are generated by successively
randomizing the ends of pairs of links from an initially regular
graph (e.g. Lattice or Ring). The resulting structure has a random
interaction structure but all nodes in the network have the same
degree. Figure 2a) depicts graphically an example of such structures
and Figure 2c) the corresponding Degree distribution.
Scale-free networks are generated by an algorithm of growth
and preferential attachment [3]. This algorithm is as follows: 1)
start from three fully connected nodes; 2) add, sequentially, each
of the Z − m remaining nodes; 3) each time a new node is added,
it connects to m pre-existing nodes, selecting preferentially nodes
Figure 3: Level of Cooperation on Homogeneous Random
Networks (a) and Heterogeneous (Scale-free) Networks (b).
Each plot shows the level of cooperation under a different
combination of taxation level, α, and Temptation, T . In all
cases the fitness threshold is fixed at θ = R = 1.0. Blue indi-
cates regions where Cooperation dominates, Red delimits re-
gions dominated by Defectors. Top bars above each panel in-
dicate the level of cooperation in the absence of wealth redis-
tribution, as a function of the Temptation payoff parameter.
The level of cooperation is computed by estimating the ex-
pected fraction of cooperators when the population reaches
a stationary state. To that end we run 104 independent sim-
ulations that start with 50% cooperators and 50% defectors.
Population size of Z = 103 and intensity of selection β = 1.0.
with higher degree. Here we have used m = 3 The resulting network
is characterized by a heterogeneous degree distribution (one which
decays as a power law), in which the majority of the nodes have few
connections while a few have many. Figure 2b) shows a graphical
example of such structure and Figure 2d) the degree distribution.
In the following we explore the case of networks with Z = 103
z zD(z) = 4. During the
nodes and average degree of ⟨z⟩ =
a)1.00.90.80.60.70.50.30.40.20.00.11.01.11.21.31.41.51.61.71.81.92.0Temptation Parameter, Tlevel of taxation, ⍺ = 1.00b)1.00.90.80.60.70.50.30.40.20.00.11.01.11.21.31.41.51.61.71.81.92.0Temptation Parameter, Tlevel of taxation, ⍺ = 1.00HomogeneousHeterogeneouslevel of cooperation0.501.000.000.250.75level of cooperation0.501.000.000.250.75Local Wealth Redistribution Promotes Cooperation in Multiagent Systems
AAMAS'18, July 2018, Stockholm, Sweden
Figure 4: Level of cooperation on Heterogeneous (a) and Ho-
mogeneous (b) populations for different values of the payoff
threshold (θ) as a function of the Temptation payoff param-
eter (T ). Gray Dashed line shows the results obtained in the
absence of a wealth redistribution scheme. Population size
of Z = 103 and intensity of selection β = 1.0.
simulations we make use of 20 independently generated networks
of each type.
3.5 Games on Networks
We study the expected level of cooperation attained by the popu-
lation. We estimate this quantity through computer simulations.
The level of cooperation corresponds to the expected fraction of
cooperators in a population that evolved after 2.5 × 106 iterations.
We estimate this quantity by averaging the observed fraction of
cooperators at the final of each simulation, over 104 independent
simulations.
Each simulation starts from a population with an equal compo-
sition of Cooperators and Defectors, which are randomly placed
along the nodes of the network. In between each update round,
each agent i plays once with all his/her zi nearest neighbors (i.e.,
agents they are directly connected with). The accumulated payoff
over all interactions an agent i participates can be computed as
i T − σi(1 − T)(nD
i )
i + nC
Πi = nC
(3)
where nD
(nC
i ) is the number of neighbors of i that Defect (Co-
i
operate) and σi is equal to 1 if i is a Cooperator and 0 otherwise.
Figure 5: Comparison between the effects of assigning the
nearest neighbors of an agent i to the corresponding Bene-
ficiary Set Bi (dark blue line) and when agents are assigned
at random to Bi (light blue), on the level of cooperation in
the domain of the Temptation payoff parameter, T. Panel a)
shows the results on Heterogeneous populations and panel
b) the impact on Homogeneous populations. Population size
of Z = 103 and intensity of selection β = 1.0.
From the accumulated payoff, agents contribute to a pool a fraction
α of the surplus Π − θ. The fitness fi of an agent i results from
subtracting from his/her accumulated payoff his/her contributions
plus the share he/she obtains from each of the Beneficiary Sets j
he/she participates in. We shall underline that, while T is the same
for all agents (that is, the dilemma is the same for everyone in the
population), heterogeneous populations introduce an additional
complexity layer by implying that different agents may vary in the
maximum values of accumulated payoff that they are able to earn.
This can be formalized as
fi = (1 − α)(Πi − θ) +
δi, j
Z
j
α(Πj − θ)
Bj
(4)
where δi, j is equal to one if i is part of the Beneficiary Set towards
which j contributes and zero otherwise, while Bj denotes the size
of set Bj.
Evolution in the frequency of strategies adopted in the popula-
tion happens through a process of imitation or social learning. At
each iteration a random agent, say i, compares his fitness with the
a)b)1.11.21.31.41.51.61.71.81.92.0Temptation Parameter, T1.01.11.21.31.41.51.61.71.81.92.0Temptation Parameter, T1.01.00.80.60.40.20.0Level of Cooperation1.00.80.60.40.20.0Level of CooperationHomogeneous[⍺=0.8]Heterogeneous[⍺=0.5]Legend = 0.0 = 0.4 = 0.8 = 1.2 = 1.6 = 2.0No WealthRedistributiona)1.11.21.31.41.51.61.71.81.92.0Temptation parameter, T1.01.00.80.60.40.20.0level of cooperationNearest Neighbors(d = 1)Random Groupb)1.11.21.31.41.51.61.71.81.92.0Temptation parameter, T1.01.00.80.60.40.20.0level of cooperationHeterogeneous[ = 0.80, ⍺ = 0.50]Homogeneous[ = 1.00, ⍺ = 0.90]Nearest Neighbors(d = 1)Random GroupAAMAS'18, July 2018, Stockholm, Sweden
Flávio L. Pinheiro and Fernando P. Santos
fitness of a neighbor, say j. Depending on the fitness difference, i
adopts the strategy of j with probability
p =
1
1 + Exp(−β(fj − fi))
(5)
The meaning of this sigmoid function can be understood as follows:
if j is performing much better than i, then i updates his/her strategy,
adopting the strategy of j. Conversely, if j is performing much worse,
i does not update the strategy. The parameter β, often called the
intensity of selection and akin to a learning rate, dictates how sharp
is the transition between these two regimes, as fj − fi approaches
zero. Large β means that individuals act in a more deterministic
way, updating strategies at the minimum difference; small β means
that individuals are prone to make imitation mistakes.
4 RESULTS
4.1 Wealth Redistribution and the Level of
Cooperation in Structured Populations
In this section we start by analyzing the scenario in which the Bene-
ficiary Set of each agent i corresponds to his/her nearest neighbors.
Hence, the size of the Beneficiary set of i is Bi = zi. These are
also the agents from whom he/she interacts with and obtains a
payoff from. Figure 3 shows the achieved levels of cooperation
when the payoff threshold is set to θ = R = 1.0, as a function of the
Temptation payoff (T ) and the level of taxation (α). Figure 3a shows
the results on Homogeneous networks, and Figure 3b on Hetero-
geneous. We find that, for a fixed payoff threshold (θ), increasing
the level of taxation results in an increase in the levels of cooper-
ation. This effect diminishes with an increase in the Temptation
(T ). That is, when increasing T the minimum value of α necessary
to promote cooperation increases as well. The same behavior is
observed in both structures. However, there is a larger degree of
cooperation on Heterogeneous networks, where there is always a
level of taxation for a given Temptation that guarantees a 100% level
of cooperation. Hence, in order for cooperation to be evolutionary
viable on homogeneous networks, more stringent conditions are
necessary, e.g. higher tax levels.
Figure 4 shows how the level of cooperation depends on varia-
tions of the fitness threshold (0 ≤ θ ≤ 2.0, in intervals of 0.4) while
keeping a fixed level of taxation (α = 0.5) under different levels
of the Temptation payoff (T ). Figure 4a shows the results obtained
for Heterogeneous networks and panel b) the results on Homoge-
neous structures. For a constant level of taxation, α, decreasing the
payoff threshold, θ, increases the range of Temptation, T , under
which cooperation can possibly evolve. This is the case in both
types of structures. However, once again, the effect is more limited
in homogeneous populations.
Both Figure 3 and 4 highlight the positive impact of a local wealth
redistribution mechanism in the enhancement of cooperation. It
also puts in evidence that the success of such mechanism depends
on the volume of payoff that is redistributed. Ultimately, this can
be done by either increasing the level of taxation, α or decreasing
the payoff threshold, θ, that defines the taxable payoff.
Figure 6: Panel a) compares how extending beneficiary sets,
from the nearest neighbors (d = 1) to nodes at a distance up
to d = 4 links away, impacts the level of cooperation on Het-
erogeneous networks. Panel b) shows how extended benefi-
ciary sets impact the level of cooperation on Homogeneous
networks. In both cases extending the set of beneficiaries
has a negative a negative impact in the levels of cooperation.
Population size of Z = 103 and intensity of selection β = 1.0.
4.2 Randomized Beneficiary Set
Next we explore to which extent the results obtained depend on the
way agents are being assigned to each Beneficiary Set. To that end,
we compare two cases: i) nearest set assignment – the Beneficiary
Set of each agent corresponds to her/his nearest neighbors, as above;
and ii) random set assignment – agents are assigned at random
to each Beneficiary Set. The number of agents assigned to each
set is equal to the degree of the contributing agent, in both cases,
which guarantees that the collected payoffs from each agent are
distributed among the same number of individuals in both i) and
ii).
Figure 5a and b show the results obtained, respectively, on Het-
erogeneous and Homogeneous networks. We consider θ = 0.5,
α = 0.9 and explore the domain 1.0 ≤ T ≤ 2. Dark blue curves
show the results obtained under the nearest set assignment and
light blue curves the results obtained under a random set assign-
ment. The results show that the ability of a wealth redistribution
mechanism lies in the redistribution of the taxed payoff among the
agents that are spatially related. A random assignment of agents
a)1.11.21.31.41.51.61.71.81.92.0Temptation parameter, T1.01.00.80.60.40.20.0level of cooperationNearest Neighbors(d = 1)d=4b)1.11.21.31.41.51.61.71.81.92.0Temptation parameter, T1.01.00.80.60.40.20.0level of cooperationLegendd = 1d = 2d = 3d = 4Homogeneous[ = 1.0, ⍺ = 0.90]Heterogeneous[ = 0.8, ⍺ = 0.50]Legendd = 1d = 2d = 3d = 4Nearest Neighbors(d = 1)d = 2d = 3d = 2Local Wealth Redistribution Promotes Cooperation in Multiagent Systems
AAMAS'18, July 2018, Stockholm, Sweden
conclusion that wealth redistribution is only efficient when agents
return, in form of taxes, a share of the accumulated payoffs to the
agents they have engaged with. We shall underline that here both
distance and size of Bi play a role on the obtained results, while
in the previous section the size of Bi was kept constant for each i
across the different treatments, thus disambiguating the effect of
Bi size and distance on the resulting cooperation levels.
4.4 What is the cost of wealth redistribution?
Figure 7a and b shows the fixation times of populations when θ =
1.0 along the domain bounded by 0.0 ≤ α ≤ 1.0 and 1.0 ≤ T ≤ 2.0.
The fixation times correspond to the expected number of gener-
ations (i.e., sets of Z potential imitation steps) for the population
to reach a state in which only one strategy is present in the popu-
lation. These plots map directly into Figure 3a and b, allowing to
compare the relative fixation times of regions with high/low levels
of cooperation.
We observe that the evolution of cooperation is associated with
an increase in the fixation times. This increase can be in some
situations an order of magnitude higher. The regions that exhibit
larger fixation times lie in the critical boundary that divides areas of
defectors and cooperators dominance (Figure 3). Hence, promoting
cooperation by redistributing wealth also requires a longer waiting
time for the population to reach a state of full cooperation. However,
setting higher taxation values than the bare minimum necessary for
the emergence of cooperation allows populations to reach fixation
quicker.
Figure 7: Panel a) shows the fixation times (in generations)
on homogeneous networks. Panel b) shows the fixation
times (in generations) in heterogeneous networks. A gener-
ation corresponds to Z iteration steps and the fixation times
indicate the expected time that the population takes to ar-
rive to a state dominated by Cooperators or Defectors when
starting from a state with equal abundance of both strate-
gies. Population size of Z = 103 and intensity of selection
β = 1.0.
drastically decreases the levels of cooperation obtained in both
networks. But to which extent do the Beneficiary Sets need to be
constrained spatially?
4.3 Extended Beneficiary Set
To answer the previous question, we explore the case in which all
nodes (up to a distance of d links) are assigned to the Beneficiary
Set of a focal agent i; when d = 1 the previous results are thereby
obtained.
Figure 6a and b show the results up to d = 4 on Heterogeneous
and Homogeneous networks respectively. In both cases, we see
that an expansion in the size of the Beneficiary Set leads to a de-
crease in the levels of cooperation. This result further reinforces the
4.5 Multiple Contribution Brackets
In the real world, taxes are unlikely to be defined by a single thresh-
old (θ) that separates agents who contribute from those that do not.
In reality taxes are progressive, in the sense that taxation levels
(α) increase with increasing level of income (in this case accumu-
lated payoff). In this section we implement a similar approach and
inspect the impact of increasing the number of taxation brackets.
Let us consider that, instead of a single threshold we now have B
taxation brackets divided by B−1 threshold levels. For each bracket
we define αb as the effective tax and θb as the bottom threshold of
bracket b, where b ∈ {0, 1, 2, ..., B − 1, B}.
By definition B = 0 corresponds to the case in which no taxes
are collected, and the redistribution of wealth is absent. Moreover,
B = 1, implies the existence of a single bracket were all individuals
would contribute, a case that we do not explore in this manuscript.
B = 2, corresponds to the case in which there are two brackets,
which is the scenario that we have explored until now.
We consider the case in which taxation increases linearly with
increasing brackets. Let us define θb = bθ/B. Individuals in bracket
b have their payoff surplus taxed by αb = (b − 1)α/B when their
accumulated payoff falls into θb < Π ≤ θb+1 for b < B − 1. For
b = B the tax level is αb = α and affects all individuals with Π > θ.
As an example, for B = 3 each bracket would be characterized
by the following tax levels
b = 0) αb = 0 for all individuals with Π ≤ θ/3;
b = 1) αb = α/3 for all individuals with θ/3 < Π ≤ 2θ/3;
b = 2) αb = 2α/3 for all individuals with 2θ/3 < Π ≤ θ;
b = 3) αb = α for all individuals with Π > θ.
a)1.00.90.80.60.70.50.30.40.20.00.11.01.11.21.31.41.51.61.71.81.92.0Temptation Parameter, Tlevel of taxation, α =1.0b)1.00.90.80.60.70.50.30.40.20.00.1Temptation Parameter, Tlevel of taxation, α = 1.0HomogeneousHeterogeneousnumber of generations1.01.11.21.31.41.51.61.71.81.92.03161003210number of generations10003161001032AAMAS'18, July 2018, Stockholm, Sweden
Flávio L. Pinheiro and Fernando P. Santos
5 CONCLUSION
To sum up, we show that wealth redistribution embodies an effective
mechanism that significantly helps cooperation to evolve. It works
by fundamentally changing the nature of the dilemma at stake: by
appropriately choosing the level of taxation (α) and payoff threshold
(θ) it is possible to shift from a Defector dominance to a Cooperator
dominance dynamics. Moreover, we find that in Heterogeneous
populations allow us to ease the redistribution mechanism – that is,
imposing lower taxation rates and/or lower taxable surplus values
when compared with Homogeneously structured populations.
Additionally, we show, for the first time, that different assign-
ments of Beneficiary Sets significantly impact the ensuing levels of
cooperation. Local Beneficiary Sets, where agents receive the con-
tributions from their direct neighbors, constitute a judicious choice
when compared with Beneficiary Sets that are formed by 1) agents
randomly picked from the population or 2) by including agents at
higher distances. Naturally, a Local wealth redistribution scheme
may not only prove optimal in terms of achieved cooperation levels,
but also reveal much simpler to implement, by exempting the need
of central redistribution entities and by minimizing the number of
peers that agents need to interact with. We shall highlight, how-
ever, that promoting cooperation through a wealth redistribution
mechanism bears longer fixation times, in terms of the number of
iterations required to achieve overall cooperation.
Here we assume that the redistribution mechanism is externally
imposed. Agents are not able to opt out from the taxation scheme.
Given that this mechanism increases the overall cooperation and
average payoff in the system, an argument for its acceptance - by
rational agents - can be formulated based on the infamous veil of
ignorance proposed by John Rawls [35]: Agents should decide the
kind of society they would like to live in without knowing their
social position. Agents would, this way, prefer a cooperative soci-
ety where redistribution exists, provided that here average payoff
is maximized. Notwithstanding, future research shall analyze the
role of more complex strategies that give opportunity of agents to
voluntarily engage (or not) in the proposed redistribution scheme.
Alongside, effective mechanisms that discourage the second or-
der free riding problem (i.e., free riding by not contributing to the
redistribution pot, while expecting others to do so) shall be exam-
ined. Future works shall also evaluate whether alternative taxation
schemes are prone to be more efficient than the one proposed here.
In all these cases, an evolutionary game theoretic framework –
such as the one here developed – constitutes a promising toolkit to
employ.
6 ACKNOWLEDGMENTS
The authors acknowledge the useful discussions with Francisco C.
Santos, Jorge M. Pacheco and Aamena Alshamsi. F.L.P. is thankful
to the Media Lab Consortium for financial support. F.P.S. acknowl-
edges the financial support of Fundação para a Ciência e Tecnologia
(FCT) through PhD scholarship SFRH/BD/94736/2013, multi-annual
funding of INESC-ID (UID/CEC/50021/2013) and grants PTDC/EEI-
SII/5081/2014, PTDC/MAT/STA/3358/2014.
Figure 8: Relative wealth inequality after the redistribution
step, in a heterogeneous population dominated by coopera-
tors and for different combinations of taxation level (α) and
threshold (θ). We quantify the relative wealth inequality af-
ter the redistribution step as the ratio between the variance
of the fitness distribution (V arf , i.e. variance in gains across
the population after redistribution) and the variance of the
accumulated payoff distribution (V arp, i.e. variance in gains
before redistribution). Population size of Z = 103 and inten-
sity of selection β = 1.0.
In this way we use θ and α as the upper level bound and only
parameters in this condition.
We find that variations in the number of taxation brackets (B=3,4,5)
have only a marginal impact in the overall levels of cooperation
observed when compared with the scenarios studied so far (B=2).
4.6 Wealth Inequality
Finally, we discuss the effect of wealth redistribution on fitness
inequality. First, it is important to highlight that the observed levels
of inequality depend, by default, on the distribution of strategies and
network degree. In homogeneous structures, if every agent adopts
the same strategy – either Defectors or Cooperators – everyone
obtains the same fitness. In heterogeneous structures, a Cooperation
dominance scenario bounds the feasible equality levels, given the
degree distribution of the population. In fact, some agents engage
in more interactions than others and Beneficiary Sets have different
sizes, depending on the particular connectivity of agents. We shall
focus on this scenario.
We compare the variance of fitness (i.e. gains after the redistribu-
tion step) and the variance of accumulated payoff (i.e. gains before
the redistribution step) in order to quantify the relative inequality
after we apply the proposed redistribution mechanism. In particular,
we use the ratio between the variance of fitness and the variance
of accumulated payoff as a metric of resulting wealth inequality.
Figure 8 shows how higher levels of θ and α reduce the resulting
inequality. In fact, while increasing payoff threshold limits taxation
to the richer agents, increasing level of taxation increases the flow
of fitness from rich agents to their Beneficiary Sets. In the most
strict case – high θ and α – the variance of the fitness distribution
is reduced to as low as 7% of the accumulated payoff distribution.
���������������level of taxation, ⍺payoff threshold, 2.00.01.02.03.04.00.10.51.52.53.50.20.30.40.50.60.70.80.91.0Varf / Varpdecreasing inequalityLocal Wealth Redistribution Promotes Cooperation in Multiagent Systems
AAMAS'18, July 2018, Stockholm, Sweden
International Foundation for Autonomous Agents and Multiagent Systems, 669–
676.
[30] Flávio L. Pinheiro and Dominik Hartmann. 2017. Intermediate Levels of Network
Heterogeneity Provide the Best Evolutionary Outcomes. Scientific Reports 7, 1
(2017), 15242.
[31] Flavio L Pinheiro, Jorge M Pacheco, and Francisco C Santos. 2012. From local to
global dilemmas in social networks. PloS ONE 7, 2 (2012), e32114.
[32] Flávio L Pinheiro, Francisco C Santos, and Jorge M Pacheco. 2016. Linking
individual and collective behavior in adaptive social networks. Physical Review
Letters 116, 12 (2016), 128702.
[33] Jeremy Pitt, Julia Schaumeier, Didac Busquets, and Sam Macbeth. 2012. Self-
organising common-pool resource allocation and canons of distributive justice.
In Self-Adaptive and Self-Organizing Systems (SASO), 2012 IEEE Sixth International
Conference on. IEEE, 119–128.
[34] Bijan Ranjbar-Sahraei, Haitham Bou Ammar, Daan Bloembergen, Karl Tuyls,
and Gerhard Weiss. 2014. Theory of cooperation in complex social networks. In
Proceedings of AAAI'14. AAAI Press.
[35] John Rawls. 2009. A theory of justice. Harvard University Press.
[36] Luke Rendell, Robert Boyd, Daniel Cownden, Marquist Enquist, Kimmo Eriksson,
Marc W Feldman, Laurel Fogarty, Stefano Ghirlanda, Timothy Lillicrap, and
Kevin N Laland. 2010. Why copy others? Insights from the social learning
strategies tournament. Science 328, 5975 (2010), 208–213.
[37] Norman Salazar, Juan A Rodriguez-Aguilar, Josep Ll Arcos, Ana Peleteiro, and
Juan C Burguillo-Rial. 2011. Emerging cooperation on complex networks. In
Proceedings of the 2011 International Conference on Autonomous Agents and Multi-
agent Systems. International Foundation for Autonomous Agents and Multiagent
Systems, 669–676.
[38] Francisco C Santos and Jorge M Pacheco. 2005. Scale-free networks provide a
unifying framework for the emergence of cooperation. Physical Review Letters
95, 9 (2005), 098104.
[39] Francisco C Santos, Jorge M Pacheco, and Tom Lenaerts. 2006. Cooperation
prevails when individuals adjust their social ties. PLoS Computational Biology 2,
10 (2006), e140.
[40] Francisco C Santos, JF Rodrigues, and Jorge M Pacheco. 2005. Epidemic spreading
and cooperation dynamics on homogeneous small-world networks. Physical
Review E 72, 5 (2005), 056128.
[41] Fernando P Santos, Jorge M Pacheco, Ana Paiva, and Francisco C Santos. 2017.
Structural power and the evolution of collective fairness in social networks. PloS
ONE 12, 4 (2017), e0175687.
[42] Fernando P. Santos, Jorge M. Pacheco, and Francisco C. Santos. 2018. Social
norms of cooperation with costly reputation building. In AAAI'18. AAAI Press.
[43] Sven Seuken, Jie Tang, and David C Parkes. 2010. Accounting Mechanisms for
Distributed Work Systems. In AAAI'10. AAAI Press.
[44] Karl Sigmund. 2010. The calculus of selfishness. Princeton University Press.
[45] Robert L Trivers. 1971. The evolution of reciprocal altruism. The Quarterly Review
of Biology 46, 1 (1971), 35–57.
[46] Vítor V Vasconcelos, Francisco C Santos, and Jorge M Pacheco. 2015. Cooperation
dynamics of polycentric climate governance. Mathematical Models and Methods
in Applied Sciences 25, 13 (2015), 2503–2517.
[47] Markus Waibel, Dario Floreano, and Laurent Keller. 2011. A quantitative test of
Hamilton's rule for the evolution of altruism. PLoS Biology 9, 5 (2011), e1000615.
REFERENCES
[1] Stéphane Airiau, Sandip Sen, and Daniel Villatoro. 2014. Emergence of conven-
tions through social learning. Autonomous Agents and Multi-Agent Systems 28, 5
(2014), 779–804.
[2] Ian F Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci. 2002.
Wireless sensor networks: a survey. Computer Networks 38, 4 (2002), 393–422.
[3] Réka Albert and Albert-László Barabási. 2002. Statistical mechanics of complex
networks. Reviews of Modern Physics 74, 1 (2002), 47.
[4] Josep Ll Arcos, Marc Esteva, Pablo Noriega, Juan A Rodríguez-Aguilar, and
Carles Sierra. 2005. Engineering open environments with electronic institutions.
Engineering Applications of Artificial Intelligence 18, 2 (2005), 191–204.
[5] Juan C Burguillo-Rial. 2009. A memetic framework for describing and simulating
spatial prisoner's dilemma with coalition formation. In Proceedings of AAAI'09.
AAAI Press, 441–448.
[6] Ulle Endriss and Nicolas Maudet. 2003. Welfare engineering in multiagent
systems. In International Workshop on Engineering Societies in the Agents World.
Springer, 93–106.
[7] Eithan Ephrati and Jeffrey S Rosenschein. 1996. Deriving consensus in multiagent
systems. Artificial Intelligence 87, 1-2 (1996), 21–74.
[8] Marc Esteva, Bruno Rosell, Juan A Rodriguez-Aguilar, and Josep Ll Arcos. 2004.
AMELI: An agent-based middleware for electronic institutions. In Proceedings of
the Third International Joint Conference on Autonomous Agents and Multiagent
Systems. IEEE Computer Society, 236–243.
[9] Michal Feldman and John Chuang. 2005. Overcoming free-riding behavior in
peer-to-peer systems. ACM SIGecom Exchanges 5, 4 (2005), 41–50.
[10] Michael R Genesereth, Matthew L Ginsberg, and Jeffrey S Rosenschein. 1986.
Cooperation without communication. In Proceedings of AAAI'86. AAAI Press.
[11] Philippe Golle, Kevin Leyton-Brown, Ilya Mironov, and Mark Lillibridge. 2001.
Incentives for sharing in peer-to-peer networks. In Electronic Commerce. Springer,
75–87.
[12] Nathan Griffiths. 2008. Tags and image scoring for robust cooperation. In Proceed-
ings of the 2008 International Conference on Autonomous Agents and Multi-agent
Systems. International Foundation for Autonomous Agents and Multiagent Sys-
tems, 575–582.
[13] William D Hamilton. 1964. The genetical evolution of social behaviour. Journal
of Theoretical Biology 7, 1 (1964), 17–52.
[14] TA Han. 2016. Emergence of Social Punishment and Cooperation through Prior
Commitments. In Proceedings of AAAI'16. AAAI Press, 2494–2500.
[15] TA Han, Luís Moniz Pereira, Luis A Martinez-Vaquero, and Tom Lenaerts. 2017.
Centralized vs. Personalized Commitments and their influence on Cooperation
in Group Interactions. In Proceedings of AAAI'17. AAAI Press.
[16] Chien-Ju Ho, Yu Zhang, Jennifer Vaughan, and Mihaela Van Der Schaar. 2012.
Towards social norm design for crowdsourcing markets. In AAAI'12 Technical
Report WS-12-08. AAAI Press.
[17] Lisa-Maria Hofmann, Nilanjan Chakraborty, and Katia Sycara. 2011. The evolu-
tion of cooperation in self-interested agent societies: a critical study. In Proceed-
ings of the 2011 International Conference on Autonomous Agents and Multi-agent
Systems. International Foundation for Autonomous Agents and Multiagent Sys-
tems, 685–692.
[18] Genki Ichinose, Yoshiki Satotani, and Hiroki Sayama. 2017. How mutation
alters fitness of cooperation in networked evolutionary games. arXiv preprint
arXiv:1706.03013 (2017).
[19] Nicholas R Jennings, Katia Sycara, and Michael Wooldridge. 1998. A roadmap of
agent research and development. Autonomous Agents and Multi-agent Systems 1,
1 (1998), 7–38.
[20] David Burth Kurka and Jeremy Pitt. 2016. Distributed distributive justice. In
Self-Adaptive and Self-Organizing Systems (SASO), 2016 IEEE 10th International
Conference on. IEEE, 80–89.
[21] Michael W Macy and Andreas Flache. 2002. Learning dynamics in social dilemmas.
Proceedings of the National Academy of Sciences 99 (2002), 7229–7236.
[22] Martin A Nowak. 2006. Five rules for the evolution of cooperation. Science 314,
[23] Martin A Nowak. 2012. Evolving cooperation. Journal of Theoretical Biology 299
5805 (2006), 1560–1563.
(2012), 1–8.
Nature (2005).
[24] Martin A Nowak and Robert M May. 1992. Evolutionary games and spatial chaos.
Nature 359, 6398 (1992), 826–829.
[25] Martin A Nowak and Karl Sigmund. 2005. Evolution of indirect reciprocity.
[26] Hisashi Ohtsuki, Christoph Hauert, Erez Lieberman, and Martin A Nowak. 2006.
A simple rule for the evolution of cooperation on graphs. Nature 441, 7092 (2006),
502.
[27] Elinor Ostrom. 2015. Governing the commons. Cambridge University Press.
[28] Liviu Panait and Sean Luke. 2005. Cooperative multi-agent learning: The state of
the art. Autonomous Agents and Multi-agent Systems 11, 3 (2005), 387–434.
[29] Ana Peleteiro, Juan C Burguillo, and Siang Yew Chong. 2014. Exploring indirect
reciprocity in complex networks using coalitions and rewiring. In Proceedings of
the 2014 International Conference on Autonomous Agents and Multi-agent Systems.
|
1002.0169 | 1 | 1002 | 2010-02-01T01:38:32 | Moment-Based Analysis of Synchronization in Small-World Networks of Oscillators | [
"cs.MA",
"cs.CE",
"cs.DM",
"nlin.AO"
] | In this paper, we investigate synchronization in a small-world network of coupled nonlinear oscillators. This network is constructed by introducing random shortcuts in a nearest-neighbors ring. The local stability of the synchronous state is closely related with the support of the eigenvalue distribution of the Laplacian matrix of the network. We introduce, for the first time, analytical expressions for the first three moments of the eigenvalue distribution of the Laplacian matrix as a function of the probability of shortcuts and the connectivity of the underlying nearest-neighbor coupled ring. We apply these expressions to estimate the spectral support of the Laplacian matrix in order to predict synchronization in small-world networks. We verify the efficiency of our predictions with numerical simulations. | cs.MA | cs | Moment-Based Analysis of Synchronization in Small-World Networks
of Oscillators
Victor M. Preciado and Ali Jadbabaie
0
1
0
2
b
e
F
1
]
A
M
.
s
c
[
1
v
9
6
1
0
.
2
0
0
1
:
v
i
X
r
a
Abstract- In this paper, we investigate synchronization in
a small-world network of coupled nonlinear oscillators. This
network is constructed by introducing random shortcuts in a
nearest-neighbors ring. The local stability of the synchronous
state is closely related with the support of the eigenvalue distri-
bution of the Laplacian matrix of the network. We introduce,
for the first time, analytical expressions for the first three
moments of the eigenvalue distribution of the Laplacian matrix
as a function of the probability of shortcuts and the connectivity
of the underlying nearest-neighbor coupled ring. We apply these
expressions to estimate the spectral support of the Laplacian
matrix in order to predict synchronization in small-world
networks. We verify the efficiency of our predictions with
numerical simulations.
I. INTRODUCTION
In recent years, systems of dynamical nodes intercon-
nected through a complex network have attracted a good deal
of attention [20]. Biological and chemical networks, neural
networks, social and economic networks [9], the power grid,
the Internet and the World Wide Web [8] are examples of
the wide range of applications that motivate this interest
(see also [15], [4] and references therein). Several modeling
approaches can be found in the literature [8], [22], [1]. In
this paper, we focus our attention on the so-called small-
world phenomenon and a model proposed by Newman and
Strogatz to replicate this phenomenon.
Once the network is modeled, one is usually interested in
two types of problems. The first involves structural prop-
erties of the model. The second involves the performance
of dynamical processes run on those networks. In the latter
direction, the performance of random walks [12], Markov
processes [6], gossip algorithms [5], consensus in a network
of agents [16], [10], or synchronization of oscillators [21],
[17], are very well reported in the literature. These dynamical
processes are mostly studied in the traditional context of
deterministic networks of relatively small size and/or regular
structure. Even though many noteworthy results have been
achieved for large-scale probabilistic networks [13]– [2],
there is substantial reliance on numerical simulations.
The eigenvalue spectrum of an undirected graph contains
a great deal of information about structural and dynamical
properties [7]. In particular, we focus our attention on the
spectrum of the (combinatorial) Laplacian matrix uniquely
associated with an undirected graph [3]. This spectrum
This work was supported by ONR MURI N000140810747, and AFOR's
The
authors
complex networks program.
and Sys-
tems Engineering, University of Pennsylvania, 3451 Walnut Street,
{preciado,jadbabai}@seas.upenn.edu
are with the Department of Electrical
contains useful information about, for example, the number
of spanning trees, or the stability of synchronization of a
network of oscillators. We analyze the low-order moments
of the Kirchhoff matrix spectrum corresponding to small-
world networks.
The paper is organized as follows. In Section II, we
review the master stability function approach. In Section
III, we derive closed-form expressions for the low-order
moments of the Laplacian eigenvalue distribution associated
with a probabilistic small-world network. Our expressions
are valid for networks of asymptotically large size. Section
IV applies our results to the problem of synchronization
of a probabilistic small-world network of oscillators. The
numerical results in this section corroborate our predictions.
II. SYNCHRONIZATION OF NONLINEAR OSCILLATORS
In this section we review the master-stability-function
(MSF) approach, proposed by Pecora and Carrol in [17],
to study local stability of synchronization in networks of
nonlinear oscillators. Using this approach, we reduce the
problem of studying local stability of synchronization to the
algebraic problem of studying the spectral support of the
Laplacian matrix of the network. First, we introduce some
needed graph-theoretical background.
A. Spectral Graph Theory Background
In the case of a network with symmetrical connections,
undirected graphs provide a proper description of the net-
work topology. An undirected graph G consists of a set of N
nodes or vertices, denoted by V = {v1, ...,vn}, and a set of
edges E, where E ∈ V ×V . In our case, (vi,v j) ∈ E implies
(v j,vi) ∈ E, and this pair corresponds to a single edge with no
direction; the vertices vi and v j are called adjacent vertices
(denoted by vi ∼ v j) and are incident to the edge (vi,v j). We
only consider simple graphs (i.e., undirected graphs that have
no self-loops, so vi 6= v j for an edge (vi,v j), and no more
than one edge between any two different vertices). A walk
on G of length k from v0 to vk is an ordered set of vertices
(v0,v1, ...,vk) such that (vi,vi+1) ∈ E, for i = 0,1, ...,k − 1; if
n k = n 0 the walk is said to be closed.
The degree di of a vertex vi is the number of edges incident
to it. The degree sequence of G is the list of degrees, usually
given in non-increasing order. The clustering coefficient,
introduced in [22], is a measure of the number of triangles in
a given graph, where a triangle is defined by the set of edges
{(i, j) , ( j,k) , (k,i)} such that i ∼ j ∼ k ∼ i. Specifically, we
define clustering as the total number of triangles in a graph,
T (G) , divided by the number of triangles in a complete (all-
to-all) graph with N vertices, i.e., the coefficient is equal to
T (G).(cid:0)N
3(cid:1) .
It is often convenient to represent graphs via matrices.
There are several choices for such a representation. For
example, the adjacency matrix of an undirected graph G,
denoted by A(G) = [ai j], is defined entry-wise by ai j = 1
if nodes i and j are adjacent, and ai j = 0 otherwise. (Note
that aii = 0 for simple graphs.) Notice also that the degree
di can be written as di = (cid:229) N
j=1 ai j. We can arrange the
degrees on the diagonal of a diagonal matrix to yield the
degree matrix, D = diag (di). The Laplacian matrix (also
called Kirchhoff matrix, or combinatorial Laplacian matrix)
is defined in terms of the degree and adjacency matrices
as L(G) = D(G) − A(G). For undirected graphs, L(G) is a
symmetric positive semidefinite matrix [3]. Consequently, it
has a full set of N real and orthogonal eigenvectors with real
non-negative eigenvalues. Since all rows of L sum to zero, it
always admits a trivial eigenvalue l 1 = 0, with corresponding
eigenvector v1 = (1,1, ...,1)T .
The moments of the Laplacian eigenvalue spectrum are
central to our paper. Denote the eigenvalues of our N × N
symmetric Laplacian matrix L(G) by 0 = l 1 (G) ≤ ... ≤
l N (G). The empirical spectral density (ESD) of L(G) is
defined as
m G (l ) =
d (l − l i) ,
1
N
N(cid:229)
i=1
where d (·) is the Dirac delta function. The k-th order moment
of the ESD of L(G) is defined as:
N(cid:229)
l i(G)k
qk(G) =
1
N
i=1
(which is also called the k-th order spectral moment1).
In the following subsection, we illustrate how a network
of identical nonlinear oscillators synchronizes whenever the
Laplacian spectrum is contained in a certain region on
the real line. This region of synchronization is exclusively
defined by the dynamics of each isolated oscillator and the
type of coupling [17], [11]. This simplifies the problem of
synchronization to the problem of locating the Laplacian
eigenvalue spectrum.
B. Synchronization as a Spectral Graph Problem
Several techniques have been proposed to analyze the
synchronization of coupled identical oscillators. In [23],
well-known results in control theory, such as the passivity
criterion, the circle criterion, and a result on observer design
are used to derive synchronization criteria for an array
of identical nonlinear systems. In [19],
the authors use
contraction theory to derive sufficient conditions for global
synchronization in a network of nonlinear oscillators. We
pay special attention to the master-stability-function (MSF)
1Given that our interest is in networks of growing size (i.e., number of
nodes N), a more explicit notation for m and qk would perhaps have been
m (N) and q(k)
k . However, for notational simplicity, we shall omit reference
to N in there and other quantities in this paper.
approach, [17]. This approach provides us with a criterion
for local stability of synchronization based on the numerical
computation of Lyapunov exponents. Even though quite
different in nature, the mentioned techniques emphasize the
key role played by the graph eigenvalue spectrum.
In this paper we consider a time-invariant network of
N identical oscillators, one located at each node, linked
with 'diffusive' coupling. The state equations modeling the
dynamics of the network are
xi = f (xi) + g
N(cid:229)
j=1
ai jG (x j − xi) , i = 1, ...,N
(1)
where xi represents an n-dimensional state vector corre-
sponding to the i-th oscillator. The nonlinear function f (·)
describes the (identical) dynamics of the isolated nodes. The
positive scalar g can be interpreted as a global coupling
strength parameter. The n × n matrix G
represents how
states in neighboring oscillators couple linearly, and ai j are
the entries of the adjacency matrix. By simple algebraic
manipulations, one can write down Eq. (1) in terms of the
Laplacian entries, L(G) = [li j], as
xi = f (xi) − g
N(cid:229)
j=1
li jG x j, for i = 1, ...,N.
(2)
We say that the network of oscillators is at a synchronous
equilibrium if x1(t) = x2(t) = ... = xN(t) = f (t), where
f (t) represents a solution for x = f (x). In [17], the authors
studied the local stability of the synchronous equilibrium.
Specifically, they considered a sufficiently small perturbation,
denoted by e i(t), from the synchronous equilibrium, i.e.,
xi(t) = f (t) + e i(t).
After appropriate linearization, one can derive the following
equations to approximately describe the evolution of the
perturbations:
e i = Df (t) e i(t) − g
n(cid:229)
j=1
li, jG
e j(t), for i = 1, ...,N.
(3)
where Df (t) is the Jacobian of f (·) evaluated along the
trajectory f (t). This Jacobian is an n × n matrix with time-
variant entries. Following the methodology introduced in
[17], Eq. (3) can be similarity transformed into a set of linear
time-variant (LTV) ODEs of the form:
i (G)) G
x i= [Df (t) + (gl
]x i, for i = 1, ...,N,
(4)
where {l i (G)}1≤i≤N is the set of eigenvalues of L (G). Based
on the stability analysis presented in [17], the network of
oscillators in (1) presents a locally stable synchronous equi-
librium if the corresponding maximal nontrivial Lyapunov
exponents of (4) is negative for i = 2, ...,N.
Inspired in Eq. (4), Pecora and Carroll studied in [17]
the stability of the following parametric LTV-ODE in the
parameter s :
x = [Df (t) + s
]x ,
(5)
G
where Df (t) is the linear time-variant Jacobian in Eq. (3).
The master stability function (MSF), denoted by F (s ), is
defined as the value of the maximal nontrivial Lyapunov
exponent of (5) as a function of s . Note that F (s ) de-
pends exclusively on f (·) and G
, and is independent of the
coupling topology, i.e., independent of L (G). The region of
synchronization is, therefore, defined by the range of s > 0
for which F (s ) < 0. For a broad class of systems,
the
MSF is negative in the interval s ∈ [0,s max] ≡ S (although
more generic stability sets are also possible, we assume,
for simplicity, this is the case in subsequent derivations). In
order to achieve synchronization, the set of scaled nontrivial
Laplacian eigenvalues, {gl
i}2≤i≤N, must be located inside
the region of synchronization, S. This condition is equivalent
to: gl
2 > 0 and gl N < s max.
We illustrate how to use of the above methodology in the
following example:
Example 1: Study the stability of synchronization of a
ring of 6 coupled Rossler oscillators [14]. The dynamics of
each oscillator is described by the following system of three
nonlinear differential equations:
xi = − (yi + zi) ,
yi = xi + a yi,
zi = b + zi (xi − c) .
The adjacency entries, ai j, of a ring graph of six nodes
are ai, j = 1 if j ∈ {(i + 1) mod 6, (i − 1) mod 6}, for i =
1,2, ...,6, and ai j = 0 otherwise. The dynamics of this ring
of oscillators are defined by:
xi
yi
zi
− (yi + zi)
xi + a yi
=
b + zi (xi − c)
+ g
where we have chosen to connect the oscillators through
their xi states exclusively. Our choice is reflected in the
structure of the 3 × 3 matrix, G
, inside the summation in
Eqn. (6).
j∈R(i)
x j − xi
0
0
(6)
Numerical simulations of an isolated Rossler oscillator
unveil the existence of a periodic trajectory with period
T = 5.749 when the parameters in Eqn. (6) take the values
a = 0.2, b = 0.2, and c = 2.5 (see Fig. 1). We denote this
periodic trajectory by f (t) = [f x (t) ,f y (t) ,f z (t)]. In our
specific case, the LTP differential equation (5) takes the
following form:
−1 −1
0
a
0
+ s
c
1
0
0
0
0
0
0
0
0
x ,
(7)
0
1
f z (t)
x =
where the leftmost matrix in the above equation represents
the Jacobian of the isolated Rossler evaluated along the
periodic trajectory f (t) , and the rightmost matrix represents
.
In Fig. 2, we plot the numerical values of the maximum
Floquet exponent of Eqn. (7) for s ∈ [0,15], discretizing at
intervals of length 0.2. This plot shows the range in which
Fig. 1.
Periodic trajectory with period T = 5.749 in a Rossler oscillator
when the parameters in Eqn. (6) take the values a = 0.2, b = 0.2, and c = 2.5.
Fig. 2. Numerical values of the maximum Floquet exponent of Eqn. (7)
for s ∈ [0,15], discretizing at intervals of length 0.2.
the maximal Floquet exponent is negative. This range of
stability is S = (0,s ∗), for s ∗ ≈ 4.7. The MSF criterion
introduced in [17] states that the synchronous equilibrium
is locally stable if the set of values {g l
i (G)}i=2,...,n lies
inside the stability range, S. For the case of a 6-ring
configuration, the eigenvalues of L (G) are {0,1,1,3,3,4},
so the set {gl
i}i=2,...,n is {g ,g ,3g ,3g ,4g } . Therefore, we
achieve stability for g ∈ (0,s ∗/l n (G)), where in our case
s ∗/l n (G) ≈ 1.175.
We now illustrate this result with several numerical sim-
ulations. First, we plot in Fig. 3.a the temporal evolution of
the xi states of the 6-ring when g = 1.0. Observe how, since
g ∈ (0,1.175), we achieve asymptotic synchronization. On
the other hand, if we choose g = 1.3 /∈ (0,1.175), the time
evolution of the set of oscillators does not converge to a
common trajectory (see Fig. 3.b); instead, the even and odd
nodes settle into two different trajectories.
In the next subsection, we propose an approach to estimat-
ing the support of the eigenvalue distribution of large-scale
probabilistic networks from low-order spectral moments.
This allows us to predict synchronization in a large-scale
Chung-Lu network.
(cid:229)
G
In Fig. a, we plot the temporal evolution of the xi states of the 6-ring when g = 1.0. In Fig.b, we plot the time evolution of the set of oscillators
Fig. 3.
for g = 1.3 /∈ (0,1.175).
III. SPECTRAL ANALYSIS OF SMALL-WORLD
NETWORKS
In this section we study the Laplacian eigenvalue spectrum
of a variant of Watts-Strogatz small-world network [22].
After describing the model, we use algebraic graph theory to
compute explicit expressions for the Laplacian moments of
a small-world network as a function of its parameters. Our
derivations are based on a probabilistic analysis of the ex-
pected spectral moments of the Laplacian for asymptotically
large small-world networks.
A. Small-World Probabilistic Model
We consider a one-dimensional
i.e., vi
(cid:8)v j : j ∈ [(i − k)modN, (i + k)modN](cid:9). Then,
{v1, ...,vN}, with periodic boundary conditions,
a ring, and connect each vertex vi
est neighbors,
lattice of N vertices,
i.e., on
to its 2k clos-
is connected to the set of nodes
instead of
rewiring a fraction of the edges in the regular lattice as
proposed by Watts and Strogatz [22], we add some random
'shortcuts' to the one-dimensional lattice. These shortcuts are
added by independently assigning edges between each pair of
nodes (i, j) , 1 ≤ i < j ≤ N with probability p. The resulting
small-world graph is intermediate between a regular lattice
(achieved for p = 0) and a classical random graph (achieved
for p = 1). In general, small-world networks share properties
with both the regular grid and the classical random graph for
0 < p < 1. In particular, they show the following apparently
contradictory features:
(i) most nodes are not neighbors of one another (such as
in a regular grid), and
(ii) most nodes can be reached from every other node by
a small number of steps (such as in a random graph).
An interesting property observed in this model was the
following: for small probability of rewiring, p ≪ 1,
the
number of triangles in the network is nearly the same as that
of the regular lattice, but the average shortest-path length is
close to that of classical random graphs. In the rest of the
paper we assume we are in the range of p in which this
property holds, in particular, we will prescribe p to be r/N,
for a given parameter r.
In the coming sections we shall study spectral properties
of the Laplacian matrix associated to the above small-world
model. In our derivations we will need the probabilistic
distribution for the degrees. It is well known that, for asymp-
totically large graphs, the degree distribution of a classical
random graph with average degree r is a Poisson distribution
with rate r. Hence, the degree distribution of the above small-
world network is
Pr(di = d) =( 0,
rd−2ke−r
(d−2k)! ,
for d < 2k,
for d ≥ 2k,
(8)
which corresponds to a Poisson with parameter r 'shifted' 2k
units. The Poisson distribution is shifted to take into account
the degree of the regular 2k-neighbors ring superposed to the
random shortcuts.
Furthermore, it is well known that the clustering coeffi-
cient (or, equivalently, the number of triangles) of the regular
2k-neighbors rings is very lightly perturbed by the addition
of random shortcuts for p = r/N. In particular, one can prove
the following result:
E[T ] = (1 + o(1))
1
3
N(cid:18)2k
2(cid:19),
(9)
3 N(cid:0)2k
where the dominant term, 1
number of triangles in a 2k-neighbors ring with N nodes.
2(cid:1), corresponds to the exact
In the following section, we shall derive explicit ex-
pressions for the first low-order spectral moments of the
Laplacian matrix associated with the small-world model
herein described. Even though our analysis is far from
complete,
in that only low-order moments are provided,
valuable information regarding spectral properties can be
retrieved from our results.
B. Algebraic Analysis of Spectral Moments
In this section we deduce closed-form expressions for the
first three moments of the Laplacian spectrum of any simple
graph G. First, we express the spectral moments as a trace
using the following identity:
qk (G) =
1
N
N(cid:229)
i=1
l i (G)k =
1
N
tr L (G)k .
(10)
This identity is derived from the fact that trace is conserved
under diagonalization (in general, under any similarity trans-
formation). In the case of the first spectral moment, we obtain
q1 =
1
N
tr (D − A) =
1
N
N(cid:229)
i=1
di.
where d is the average degree of the graph. For analytical
and numerical reasons, we define the normalized Kirchhoff
moment as
where T = 1
3
network.
(cid:229) N
i=1 ti is the total number of triangles2 in the
It is worth noting how our spectral results are written in
terms of two widely reported measurements, [15]: the degree
sequence and the clustering coefficient (which provides us
with the total number of triangles.) This allows us to compute
low-order spectral moments of many real-world networks
without performing an explicit eigenvalue decomposition.
(11)
C. Probabilistic Analysis of Spectral Moments
In this section, we use Eq. (15) to compute the first
three expected Laplacian moments of the small-world model
under consideration. The expected moments can be computed
if we had explicit expressions for the moments of the
degrees, E[di], E[d2
i ], and the expected number
of triangles, E[T ]. Since we know the degree distribution (8)
for this model, the moments of the degrees can be computed
to be:
i ], and E[d3
(16)
E[di] = r + 2k,
E[d2
E[d3
i ] = r2 + (1 + 4k) r + 4k2,
i ] = r3 + 15 (3 + 6k) r2 +(cid:0)1 + 6k + 12k2(cid:1) r − 8k3.
We can therefore substitute the expressions (9) and (16) in
Eq. (15) in order to derive the following expressions for the
(non-normalized) expected Laplacian moments for N → ¥
:
E[q1] → r + 2k,
E[q2] → r2 + (4k + 2) r + 4k2 + 2k,
E[q3] → r3 + (6k + 6) r2 +(cid:0)12k2 + 18k + 4(cid:1) r
+8k2 + 8k3 + 2k.
(17)
In the following table we compare the numerical values
of the Laplacian moments corresponding to one random
realization of the model under consideration with the an-
alytical predictions in (17). In particular, we compute the
moments for a network of N = 512 nodes with parameters
p = r/N = 4/N and k = 3. It is important to point out that the
indicated numerical values are obtained for one realization
only, with no benefit from averaging.
Moment order
Numerical realization
Analytical expectations
Relative error
3rd
1st
1,467.6
10.14
10
1,431
1.38% 2.53% 2.49%
2nd
116.96
114
In the next subsection, we use an approach introduced in
[18] to estimate the support of the eigenvalue distribution
using the first three spectral moments. In coming sections,
we shall use this technique to predict whether the Laplacian
spectrum lies in the region of synchronization.
2A triangle is defined by a set of (undirected) edges {(i, j) ,( j,k) ,(k,i)}
such that i ∼ j ∼ k ∼ i.
qk =
1
N
N(cid:229)
i=1(cid:0)l i/d(cid:1)k
=
1
N dk tr (D − A)k .
The fact that D and A do not commute forecloses the pos-
sibility of using Newton's binomial expansion on (D − A)k.
On the other hand, the trace operator allows us to cyclically
permute multiplicative chains of matrices. For example,
tr (AAD) =tr (ADA) =tr (DAA). Thus, for words of length
k ≤ 3, one can cyclically arrange all binary words in the
expansion of (11) into the standard binomial expression:
a
a (cid:19) (−1)
dkN
a
tr(cid:16)A
Dk−a (cid:17) ,
for k ≤ 3.
(12)
Also, we can make use of the identity tr(cid:0)Aa Dk−a (cid:1) =
i=1 (Aa
(cid:229) N
to write
qk =
qk =
k(cid:229)
a =0(cid:18) k
)ii dk−a
k(cid:229)
N(cid:229)
i=1(cid:18) k
a =0
i
a
a (cid:19) (−1)
dkN
dk−a
i
a
(A
)ii ,
for k ≤ 3.
(13)
Note that this expression is not valid for k ≥ 4. For example,
for k = 4, we have that tr(AADD) 6=tr(DADA) .
We now analyze each summand in expression (13) from
a graph-theoretical point of view. Specifically, we find a
closed-form solution for each term tr(cid:0)AiD j(cid:1), for all pairs
1 ≤ i + j ≤ 3, as a function of the degree sequence and the
number of triangles in the network. In our analysis, we make
use of the following results from [3]:
Lemma 2: The number of closed walks of length a
in a
graph G, joining node i to itself, is given by the i-th diagonal
entry of the matrix Aa .
Corollary 3: Let G be a simple graph. Denote by ti the
number of triangles touching node i. Then,
(A)ii = 0, (cid:0)A2(cid:1)ii = di, and (cid:0)A3(cid:1)ii = 2ti.
(14)
After substituting (14) into (13), and straightforward al-
gebraic simplifications, we obtain the following exact ex-
pression for the low-order normalized spectral moments of
a given Kirchhoff matrix K:
qk =
1,
1
1
N d2(cid:0)(cid:229) N
N d3(cid:2)(cid:0)(cid:229) N
i=1 d2
i=1 d3
i + (cid:229) N
i=1 di(cid:1) ,
i + 3(cid:229) N
i=1 d2
i(cid:1) − 6 T(cid:3) ,
for k = 1,
for k = 2,
for k = 3,
(15)
D. Piecewise-Linear Reconstruction of the Laplacian Spec-
trum
Our approach, described more fully in [18], approximates
the spectral distribution with a triangular function that ex-
actly preserves the first three moments. We define a triangular
distribution t (l ) based on a set of abscissae x1 ≤ x2 ≤ x3 as
h
x2−x1
h
(l − x1) ,
(x2−x3) (l − x3) ,
0,
for l ∈ [x1,x2) ,
for l ∈ [x2,x3] ,
otherwise.
where h = 2/ (x3 − x1). The first
distribution, as a function of the abscissae, are given by
three moments of this
(x1 + x2 + x3) ,
(18)
Fig. 4.
Comparison between the histogram of the eigenvalues of one
random realization of the Laplacian matrix of a small-world model with
parameters N = 512, p = 4/N and k = 3, and the triangular function that
fits the expected spectral moments.
t (l ) :=
M1 =
M2 =
M3 =
1
3
1
1
6(cid:0)x2
10(cid:0)x3
+ x2
1 + x2
2 + x2
1 + x2
2x3 + x3
1x2 + x2
3 + x2
2 + x2
1x3 + x3
3 + x1x2 + x1x3 + x2x3(cid:1) ,
3x2 + x1x2x3(cid:1) .
3x1 + x2
2x1
Our task is to find the set of values {x1,x2,x3} in order to fit
a given set of moments {M1,M2,M3}. The resulting system
of algebraic equations is amenable to analysis, based on the
observation that the moments are symmetric polynomials3.
Following the methodology in [18], we can find the abscissae
{x1,x2,x3} as roots of the polynomial:
x3 − P
1x2 + P
2x − P
3 = 0,
where
1 = 3 M1,
2 = 9 M2
3 = 27 M3
1 − 6 M2,
1 − 36 M1M2 + 10 M3.
The following example illustrates how this technique pro-
vides a reasonable estimation of the Laplacian spectrum for
small-world Networks.
Example 4: Estimate the spectral support of the small-
world model described in Subsection III-A for parameters
N = 512, p = 4/N and k = 3. In subsection III-C we
computed the expected spectral moments of this particular
network to be {M1 = 10,M2 = 114,M3 = 1,431}. Thus, we
apply the above technique with these particular values of the
moments to compute the following set of abscissae for the tri-
angular reconstruction {x1 = 1.577,x2 = 8.662,x3 = 19.76}.
In Fig. 4 we compare the triangular function that fits the
expected spectral moments with the histogram of the eigen-
values of one random realization of the Laplacian matrix. We
also observe that any random realization of the eigenvalue
histograms of the Laplacian is remarkably close to each
other. Although a complete proof of this phenomenon is
beyond the scope of this paper, one can easily proof using
the law of large numbers that the distribution of spectral
moments in (15) concentrate around their mean values.
3A symmetric polynomial on variables (x1,x2,x3) is a polynomial that is
unchanged under any permutation of its variables.
(19)
(20)
Fig. 5. Comparison between the values of the triangular abscissae x1 and
x3 with the extreme points of the Laplacian spectral support, l 2 and l n, for
a small-world network with N = 512 nodes, k = 3, and p in the range of
values [1/N : 0.01/N : 10/N] .
We observe that the above estimation is valid for a large
range in the values of the parameters. For example, in Fig.
5, we compare the values of the triangular abscissae x1 and
x3 with the extreme points of the Laplacian spectral support,
l 2 and l n, for a small-world network with N = 512 nodes,
k = 3, and p in the range of values [1/N : 0.01/N : 10/N]. It
is important to point out that, in this case too, the numerical
values for the eigenvalues are obtained for one realization
only, with no benefit from averaging. In the next section,
we propose a methodology which uses results presented
in previous sections to predict the local stability of the
synchronous state in a small-world network of oscillators.
IV. ANALYTICAL ESTIMATION OF SYNCHRONIZATION
In this section we use the expressions in (17) and the
triangular reconstruction in the above subsection to predict
synchronization in a large small-world network of coupled
nonlinear oscillators. Specifically, we study a network of
coupled Rossler oscillators, as those in Example 1. We build
our prediction based on the following steps:
1) Determine the region of synchronization following
the technique presented in Subsection II-B. As illus-
trated in Example 1, the set of scaled eigenvalues
{gl
}i=2,...,N must lie in a certain region of stability,
(K)
i
P
P
P
S, to achieve synchronization (in our example S =
(0,s ∗ ≈ 4.7)).
2) Compute the expected spectral moments of the Lapla-
cian eigenvalue spectrum for a given set of parameters
using the set of Eqns. in (17).
i
3) Estimate the support of the Laplacian eigenvalue spec-
trum, {l (K)
}i=2,...,N, using the methodology presented
in Subsection III-D. From Example 4, we have that
sl = 1.57 and su = 19.76 are good estimates of the
lower and upper extremes of the spectral support,
respectively.
4) Compare the region of stability in Step 1 with the
i.e.,
estimation of the spectral support
(1.57 g ,19.76 g ).
in Step 3,
Following the above steps, one can easily verify that our
estimated spectral support, (1.57 g ,19.76 g ), lies inside the
region of stability, (0,s ∗ ≈ 4.7), for 0 < g < 4.7/19.76 ≈
0.238. Therefore, the small-world network of 512 coupled
Rossler oscillators is predicted to synchronize whenever the
global coupling strength satisfies g ∈ (0,0.238).
A. Numerical Results
In this section we present numerical simulations support-
ing our conclusions. We consider a set of identical 512
Rossler oscillators (as the one described in Example 1)
interconnected through the Small–World network defined
in Example (p = 4/N and k = 3). Using the methodology
proposed above, we have predicted that the synchronous state
of this system is locally stable if the coupling parameter g
lies in the interval (0,0.238). We run several simulations with
the dynamics of the oscillators presenting different values of
the global coupling strength g . For each coupling strength,
we present two plots: (i) the evolution of the 512 x-states of
the Rossler oscillators in the time interval 0 ≤ t ≤ 40, and (ii)
the evolution of xi (t)− ¯x(t) for all i, where ¯x (t) = 1
i xi (t).
N
Since our stability results are local, we have to carefully
choose the initial states for the network of oscillators. For
our particular choice of parameters, the (isolated) Rossler
oscillator presents a stable limit cycle. For our simulations,
we have chosen as initial condition for each oscillator in
the network a randomly perturbed version of a particular
point of this stable limit cycle. This particular point is s0 =
(3.5119, −3.5332,0.2006). We have chosen the perturbed
initial state for the i-th oscillator to be s0 + ei, where ei is a
uniformly distributed random variable in the 3-dimensional
cube [−2,2]3, and ei is independent of e j for i 6= j.I
In our first simulation, we use a coupling strength g =
0.1 ∈ (0,0.238); thus, we predict the synchronous state to
be locally stable. Fig. 6 (a) and (b) represents the dynamics
x-states for the 512 oscillators in the small-world network.
In this case, we observe a clear exponential convergence of
the errors to zero. In the second simulation, we choose g =
0.3 /∈ (0,0.238); thus, we predict the synchronous state to
be unstable. In fact, we observe in Figs. 7.a and 7.b how
synchronization is clearly not achieved.
V. CONCLUSIONS AND FUTURE RESEARCH
In this paper, we have studied the eigenvalue distribu-
tion of the Laplacian matrix of a large-scale small-world
networks. We have focused our attention on the low-order
moments of the spectral distribution. We have derived ex-
plicit expressions of these moments as functions of the
parameters in the small-world model. We have then applied
our results to the problem of synchronization of a network
of nonlinear oscillators. Using our expressions, we have
studied the local stability of the synchronous state in a large-
scale small-world network of oscillators. Our approach is
based on performing a triangular reconstruction matching the
first three moments of the unknown spectral measure. Our
numerical results match our predictions with high accuracy.
Several questions remain open. The most obvious extension
would be to derive expressions for higher-order moments of
the Kirchhoff spectrum. A more detailed reconstruction of
the spectral measure can be done based on more moments.
VI. ACKNOWLEDGMENTS
The first author gratefully acknowledges George C. Vergh-
ese and Vincent Blondel for their comments and suggestions
on this work.
REFERENCES
[1] A. L. Barab´asi, and R. Albert, "Emergence of Scaling in Random
Networks," Science, vol. 285, pp. 509-512, 1999.
[2] M. di Bernardo, F. Garofalo, and F. Sorrentino, "Effects of Degree
Correlation on the Synchronization of Networks of Oscillators," In-
ternational Journal of Bifurcation and Chaos, vol. 17, pp. 3499-3506,
2007.
[3] N. Biggs, Algebraic Graph Theory, Cambridge University Press,
second edition, 1993.
[4] S. Boccaletti S., V. Latora, Y. Moreno, M. Chavez, and D.-H. Hwang,
"Complex Networks: Structure and Dynamics," Physics Reports, vol.
424, no. 4-5, pp. 175-308, 2006.
[5] S. Boyd, A. Ghosh, B. Prabhakar and D. Shah, "Randomized Gossip
Algorithms," IEEE Trans. Inf. Theory, vol. 52, pp. 2508-2530, 2006.
[6] P. Bremaud, Markov Chains: Gibbs Fields, Monte Carlo Simulation,
and Queues, Springer, 2001.
[7] F.R.K. Chung, Spectral Graph Theory, AMS: CBMS series, vol. 92,
1997.
[8] S.N. Dorogovtsev, and J.F.F. Mendes, Evolution of Networks: From
Biological Nets to the Internet and WWW, Oxford University Press,
2003.
[9] M.O. Jackson, Social and Economic Networks, Princeton University
Press, 2008.
[10] A. Jadbabaie, J. Lin, and A. Morse, "Coordination of Groups of Mobile
Autonomous Agents Using Nearest Neighbor," IEEE Trans. Autom.
Control, vol. 50, no.1, 2003.
[11] X. Li, and G. Chen, "A Time-Varying Complex Dynamical Network
Model and Its Controlled Synchronization Criteria," IEEE Trans.
Autom. Control, vol. 50, no.1, 2005.
[12] L. Lov´asz, "Random Walks on Graphs: A Survey," Combinatorics,
Paul Erdos is Eighty (vol. 2), pp. 1-46, 2003.
[13] J. Lu, X. Yu, G. Chen and D. Cheng, "Characterizing the Synchro-
nizability of Small-World Dynamical Networks," IEEE Trans. Circuits
Syst. I, vol. 51, pp. 787-796, 2004.
[14] S.C. Manrubia, A.S. Mikhailov, and D. Zanette, Emergence of Dy-
namical Order, World Scientific, 2004.
[15] M.E.J. Newman, "The Structure and Function of Complex Networks,"
SIAM Review vol. 45, pp. 167-256, 2003.
[16] R. Olfati-Saber, J.A. Fax, and R.M. Murray, "Consensus and Cooper-
ation in Networked Multi-Agent Systems," Proc. IEEE, vol. 95, pp.
215-233, 2007.
(cid:229)
Fig. 6. We plot the dynamics of the x-states for 512 Rossler oscillators (as the one described in Example 1) interconnected through the Small–World
network with p = 4/N and k = 3, in Fig.a. In Fig.b, we observe a clear exponential convergence of the errors towards zero.
Fig. 7. We plot the dynamics of the x-states for the 512 Rossler oscillators for g = 0.3 /∈ (0,0.238) in Fig.a. We observe in Fig.b. how the errors do not
converge to zero.
[17] L.M. Pecora, and T.L. Carroll, "Master Stability Functions for Syn-
chronized Coupled Systems," Phys. Rev. Lett., vol. 80, no. 10, pp.
2109-2112, 1998.
[18] V.M. Preciado, Spectral Analysis for Stochastic Models of Large-Scale
Complex Dynamical Networks, Ph.D. dissertation, Dept. Elect. Eng.
Comput. Sci., MIT, Cambridge, MA, 2008.
[19] J.-J.E. Slotine and W. Wang, "A Study of Synchronization and Group
Cooperation using Partial Contraction Theory," in Cooperative Control
(S. Morse, N. Leonard, and V. Kumar, eds.), Lecture Notes in Control
and Information Science, vol. 309, Springer-Verlag, 2004.
[20] S.H. Strogatz, "Exploring Complex Networks," Nature, vol. 410, pp.
268-276, 2001.
[21] S.H. Strogatz, Sync: The Emerging Science of Spontaneous Order,
New York: Hyperion, 2003.
[22] D.J. Watts, and S. Strogatz, "Collective Dynamics of Small World
Networks," Nature, vol 393, pp. 440-42, 1998.
[23] C.W. Wu, "Synchronization in Arrays of Coupled Nonlinear Systems:
Passivity, Circle Criterion, and Observer Design," IEEE Trans. Circuits
Syst. I, vol. 48, pp. 1257-1261, 2001.
|
1911.01165 | 1 | 1911 | 2019-11-04T12:42:14 | A Comprehensive Study on Pedestrians' Evacuation | [
"cs.MA",
"physics.soc-ph"
] | Human beings face threats because of unexpected happenings, which can be avoided through an adequate crisis evacuation plan, which is vital to stop wound and demise as its negative results. Consequently, different typical evacuation pedestrians have been created. Moreover, through applied research, these models for various applications, reproductions, and conditions have been examined to present an operational model. Furthermore, new models have been developed to cooperate with system evacuation in residential places in case of unexpected events. This research has taken into account an inclusive and a 'systematic survey of pedestrian evacuation' to demonstrate models methods by focusing on the applications' features, techniques, implications, and after that gather them under various types, for example, classical models, hybridized models, and generic model. The current analysis assists scholars in this field of study to write their forthcoming papers about it, which can suggest a novel structure to recent typical intelligent reproduction with novel features. | cs.MA | cs | Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
A Comprehensive Study on Pedestrians' Evacuation
https://doi.org/10.3991/ijes.v7i4.11767
Danial A. Muhammed ()
University of Sulaimani, Sulaymaniyah, Kurdistan, Iraq
[email protected]
Soran Saeed
Sulaimania Polytechnic University, Sulaymaniyah, Kurdistan, Iraq
Tarik A. Rashid
University of Kurdistan Hewler, Hewler, Kurdistan, Iraq
Cite as: Danial Muhammed, Soran Saeed, Tarik A. Rashid (2019). A Comprehensive Study on
Pedestrians' Evacuation, International Journal of Recent Contributions from Engineering,
Science & IT (iJES), Vol. 7, No. 4 : DOi: 10.3991/ijes.v7i4.11767
Abstract -- Human beings face threats because of unexpected happenings,
which can be avoided through an adequate crisis evacuation plan, which is vital
to stop wound and demise as its negative results. Consequently, different typical
evacuation pedestrians have been created. Moreover, through applied research,
these models for various applications, reproductions, and conditions have been
examined to present an operational model. Furthermore, new models have been
developed to cooperate with system evacuation in residential places in case of
unexpected events. This research has taken into account an inclusive and a 'sys-
tematic survey of pedestrian evacuation' to demonstrate models methods by fo-
cusing on the applications' features, techniques, implications, and after that
gather them under various types, for example, classical models, hybridized
models, and generic model. The current analysis assists scholars in this field of
study to write their forthcoming papers about it, which can suggest a novel
structure to recent typical intelligent reproduction with novel features.
Keywords -- Emergency evacuation; Participants' emergency behavior; Evac-
uation time; Environment; Evacuation models.
1
Introduction
Some emergency cases will not be controlled easily and will be obstacles in front
of the evacuation process because of perplexity, dread and even uncertainty and un-
easiness to mass dwellers [1]. There are many factors that affect evacuation processes
such as the surrounding, how they react with each other, and various environmental
conditions, that is why many evacuation approaches occur like protective, preventive
rescue and constructive evacuation [2]. The issue of evacuation proceeds to the
1
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
crowd's movement and it is affected by the physical and social environment, such as
the high degree of danger, pressure, and lack of data, which is a mixture of environ-
mental hazards; population demographics and the attendee's conduct [3]. A crowd is
gathering of a group of people [4] that has many features, during simulation a number
of potential behaviors are anticipated [5], and simulation is a way of guessing behav-
iors through answering for the "what-if" conditions [6]. Hence, Crowd evacuation is a
way to aping the behavior of participants in the same situation [4], in the last 20 years
many types of research have been done, practicing evacuation have been considered
to lower the damages; deaths and injuries in emergency situations involving pedestri-
ans [7-13]. The sole purpose of the investigations is to improve a managing emergen-
cy situation that is why many models are enhanced to see how people react in differ-
ent scenarios in emergencies [14-20]. One way of finding solutions is modeling thus
after the careful examination because of the originality of the procedure it has been
renamed a model [4]. The models could be divided into three groups; classical, hy-
bridized and generic models, each of which is subdivided. These models have been
used to explore crowd evacuation in normal and emergency situations.
This research has been conducted with the aim of First is to gather a huge number
of papers about different 'applications' conducted on the evacuation of the pedestri-
ans. The second is to examine characteristics, 'techniques' and the indications of
various applications. Third, is to learn from the first two aforementioned points to
decide to scheme a novel smart and dependable model to pretend attendees' 'appear-
ing emergency' conducts and evacuation efficacy when an area is in need of emer-
gency evacuation. Thus, the current research sheds light on the pedestrian evacuation
specifically and generally. Yet it is a chance for the scholars to gain relevant infor-
mation with ease and decide about how their forthcoming papers be directed.
The current paper will contribute to the literature by benefiting from the existing
studies to assist scholars to utilize it in different cases. It can guide them to master
their forthcoming expected studies, firstly. It can assist the researchers and those who
specialize in design relying on the obtained results which were obtained through in-
vestigation of the past studies with the intention of making a decision in a better way
for designing and implementing a novel smart 'simulation model' comprising recent
capacities, secondly.
The following is the structure of this research: In the second section, 'evacuation
models for the crowd' is presented. In the third section, the previous models and the
relevant methods in various applications are demonstrated. The final section contains
the conclusion and suggestions for further research.
2
Evacuation Models for Crowd
The crowd is performing a bunch of people together [4]. It is the only condition in
which reverse could be the alternative of panic rather than being touched [21]. In
1895 presenting La Psychologie des foules by LeBon was the starting of researchers'
concern for crowd dynamics [22]. On the other hand, Helbing in 1991 presented a
widespread work, which was one of the attempts for such reason to display the motion
2
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
of pedestrians [23]. Scientists, until 2001, had previously created relating models
going for alleviating clog and obstacle wonders dependent on experimental infor-
mation [24]. Meanwhile, different fields studied crowd dynamics when pedestrians'
dynamic was presented [25]. Irregular movement, the effect of congestion and the
occurrence of own-arrangement were specified [26]. Numbers of applications were
simulated via this crowd evacuation model [25-30]. For displaying crowd evacuation
from building various methods developed, such as cellular automata method, social
force method, lattice gas method and agent-based method [31-33]. Hence, these
methods based on the ability to know the detail of the individuals in the crowd cov-
ered via three different models macroscopic model, mesoscopic model and micro-
scopic model [34, 35]. On the other hand, different hybridized methods were devel-
oped, such as zone based, layer based, and sequentially based [36]. Another method
generic framework was presented from the previous mentioned hybridized models
[34].
Figure 1 shows an overview of the developed models for crowd evacuation. The
crowd models are categorized into three main models; these are a classical model, a
hybridized model, and a generic model. Each model has its own approaches to inves-
tigate the flow of people and their behaviors during the evacuation process.
Fig. 1. An overview of the developed models for crowd evacuation
3
People BehaviourSocio-Psycological studiesMathematical Simulation StudiesExperimental StudiesPedestrian CrowdSwarm SimulationCrowd FormationTraffic simulation Crowd EvacuationHybridize ModelClassical ModelGeneric ModelMicroscopicModelMesoscopicModelMacroscopicModelLayer BasedModelZone BasedModelSequential Based ModelTransiTUMgreat density and flow of people(homogenous)Great Size and individual movementPrecise information of individual movement (heterogeneous) FluidCombination of CA and Gas Kinetic approacheSocial Force (SF)Agent Based (AB)Game TheoreticalExperimentation With animalLattice Gas (LG)Cellular Automata (CA)Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
3
Models and Their Approaches in Different Applications
In this section, the models and approaches are described, and emphasis on high-
lighting the features, techniques, and implications of current simulation models. Table
1 shows information for future use.
3.1
Classical Models
The classical model can be divided into three different models; macroscopic,
mesoscopic and microscopic. Each model was to design different approaches to know
how humans move and behave during movements from one place to another of the
specified area. These models are described in the following subsections:
Macroscopic Model: Macroscopic is one of the classical models and with such a
model flow of people is noticed and individual features are neglected due to dealing
with the homogenous people. Figure 2 illustrates the macroscopic model. In the mac-
roscopic model, the fluid dynamic was designed.
Fig. 2. Macroscopic model
In previous decades, fluid-like characteristics had been represented as a pedestrian
crowd. There were numbers of connections between fluid and pedestrians, for in-
stance, movement on all sides of the obstructions shows follow "streamlines", so, it
was not an unexpected situation, especially, such as the premature models of pedestri-
ans, which is vehicular dynamics took motivation hydrodynamics or gas-kinetic theo-
ry [37-40]. Henderson believed that a person on foot flocks acts comparably to gases
or fluid [41]. Bradley estimated that the Navier -- Stokes conditions administering
smooth movement could be utilized to depict movement in groups at high densities
[42]. Helbing et al. abridged that at medium and high densities, the movement of a
person on foot flocks demonstrated some hitting analogies with the movement of
fluid. For example, the impressions of people on foot in snow seem to be like stream-
lines of liquids or, once more, the surges of walkers through standing groups are prac-
tically equivalent to riverbeds [43]. Liquid powerful models portray how thickness
and speed change after some time with the utilization of halfway differential condi-
tions [44].
In 2002, Hughes designed a continuum theory for the flow of pedestrians. The
present hypothesis is intended for the advancement of general strategies to compre-
hend the movement of vast groups. Nevertheless, it is additionally helpful as a prog-
nostic instrument. The manner anticipated by these conditions of movement is com-
4
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
pared with the existing reaction for the Jamarat Bridge close Mecca, Saudi Arabia
[45]. In 2003, Hughes built up a continuum model distinct from a classical fluid in
light of the property that a group has the ability to think, fascinating new physical
thoughts are associated with its investigation. This property made many intriguing
applications scientifically controllable. To do this, models were given in which the
hypothesis had been utilized to give conceivable help with the yearly Muslim Hajj, to
comprehend the Battle of Agincourt, and shockingly, to find obstructions that really
increment the stream of people on foot over that when there are no hindrances present
[46]. Moreover, in 2004, Colombo and Rosini displayed a continuum show for the
person on foot stream to represent normal highlights of this sort of stream, namely, a
few impacts of fear. Specifically, this model depicts the conceivable over compres-
sions in a group and the fall in the surge through an entryway of a freezing swarm
stick. They considered the circumstance where a gathering of individuals needs to
leave a passageway through an entryway. On the off chance that the maximal surge
permitted by the entryway is low, the progress to freezing in the group moving toward
the entryway may almost certainly cause an emotional decrease in the real outflow,
reduction the outflow much more [47].
Microscopic Model: There are several old models of which microscopic is one.
Within which everything is realized accurately such as full information about individ-
ual and individual manners. Nevertheless, it is not perfect in examining the huge
number of attendees. Figure 3 illustrates the microscopic model. Several objects are
designed in microscopic such as cellular automata, lattice gas, social force, agent-
based, game theory, and experimental approaches. Details about cellular automata and
its applications are demonstrated below:
Fig. 3. Microscopic model
Cellular Automata
The accurate invention of physical methods in which 'time and space' are a remote
and liable set of dissimilar values being approved inside the corporeal dimensions is
called cellular automata. Cell automation includes a normal identical network, which
is to some extent perpetual in grade with a different variable at every position (cell).
The status of each cellular automation is mostly based on the approximations of the
total reasons for all sites. The development of cellular automation in distinct stages,
with the speculation of the 'variable' at a site undergoing influence of the reasons at
endpoints 'in its neighborhood on the' start of the previous procedure. For the area of
5
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
site (cell) it is essential to take into account two things: the 'site' and the 'neighboring
locales'. The causes at all the sites are to be up to date together at the same time in
order, in the light of the speculations of all the causes in their neighborhood at the
start of the previous process, and for the distinctive preparation of local instructions in
the corporeal abilities. They have been connected and reintroduced for a wide assort-
ment of purposes and alluded to by an assortment of names, including tessellation
automata homogeneous structures, cell structures, cellular structures, and iterative
arrays. Von Neumann and Ulam were the ones who introduced cell automata first,
which they called it cell spaces, like imaginable idealizing of 'organic' outlines (Von
Neumann, 1963, 1966), which has a unique enthusiasm behind showing 'natural self-
multiplication'. For a variety of reasons they have been linked and reinstated and
referred to by a variety of names such as tessellation automata homogeneous struc-
tures, cell structures, cellular structures, and iterative arrays [48].
In the last two decades, cellular automata models have been created to consider an
evacuating group of individuals under different circumstances. These models can be
categorized into two groups. The first depends on the associations among situations
and walkers. For example, in 2002, Perez et al. illustrated a cellular automata model
to study pedestrian exit dynamics that distributed within a single room and content to
leave through an experienced way out at the earliest possible time. The possible direc-
tion of pedestrians' movement was cardinal movement (or forward, backward, left,
and right) which relied on the empty neighbor grid and specify coercion to their cor-
poreal ability relation with neighbors and movement in conformity with ordinary
instructions. This investigation presented the arching behavior due to the jamming
effect at the way outs. Moreover, in the simulation of the way out output it observed
various features, such as flowing and disorderly intervention. Furthermore, widths of
the rooms' way out that create the possibility of pedestrians' exit at the same time
caused to pedestrians leave the room in various sizes of bursts [49].
In 2002, Kirchner and Schadschneider demonstrated leaving process imitation uti-
lized a new presented cellular automaton model for pedestrian dynamics. The idea of
chemotaxis utilized in this model, which used a bionic method to define communica-
tion between pedestrians. In this research, some relatively simple conditions were
examined, for instance, leaving a big room with a single or a couple of way outs. In
addition, it was found that changing in dimensions of the model can define manner
from regular to panic in various forms. Furthermore, it is discovered that for accom-
plishing best leaving times an appropriate amalgamation of herding manner and utili-
zation of way out familiarity was essential [50]. In 2003, Kirchner et al. enhanced a
new proposed cellular automaton model for pedestrian dynamics with adding friction
parameters. This research investigated the effect of pedestrians' collisions. Friction
parameter applied to prevent the possibility of moving conflicted participants into the
same space at the same time step. Hence, this type of conflict is possible, but elimi-
nating such situation is crucial in the precise definition of the dynamics. Besides,
creating local compression among pedestrians in the model due to the friction pa-
rameter made the model have a role in an area with great density. Large room with a
single exit door used for the evacuation simulations' experimentations. From the
6
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
experimentation's result, it was discovered that the friction parameter in arching be-
havior participated in both of the quantitative influences and qualitative fluctuate [51].
In 2005, Yang et al. utilized a two-dimensional Cellular Automata model in mim-
icking leaving the process with kin manner. Within the real leaving process several
attraction occurrences, such as confusion, congestion, assembly, step back and wait-
ing, pretended due to the difference in constructing of the building, the organizing
participants, choosing a path and the interesting for the kin manner. From the simula-
tion results noticed some times walking in mass could be safe, there was no difference
in leaving with one exit door and two exit doors from the aspect of kin manner, leav-
ing efficiency greatly affected by sub-groups number and size of the sub-groups, as
well as waiting and steps back decreased leaving efficiency [52]. In 2005, Li et al.
presented a distinctive procedure based on human behavior to make the rules more
practical for pedestrian movement, and then via assuming the bi-direction walker
motion in a corridor bottom-up and top-down walkers' motion was illustrated, as well
as probability of the influence of walkers' swapping locations was identified [53].
In 2006, Zhao et al. offered a two-dimensional cellular automata model to imitate
participant leaving through exit dynamics. This study emphasized on two features,
way out width and door partition. Hence some convenient aspects appeared, such as
the width of the way out ought to be higher than a critical value, and door partition
ought to be medium not too large and not too small. Moreover, One way out's width
increment resulted in reducing the flow out for each unit width, nonetheless entire
flow out greater than before. Whole way out's flow out was a cumulative nonlinear
function of the way out width. Furthermore, way out width assessment did not effect
on door partition's best value, and way out design had better be balanced. These as-
pects improve the efficiency of building design [54]. In 2006, Georgoudas et al. uti-
lized a two-dimensional cellular automata model and applied a computational intelli-
gent technique to examine pedestrians dynamic within a wide space. In addition, this
recommended model differs from the previous ones when the model treated with a
heterogeneous crowd. In fact, replying heterogeneous parts to the instruction, artifi-
cially arranged manner in the crowd, and made pedestrian attain one of the way outs.
Finally, characteristics of pedestrians' actions utilized to examine different assump-
tions such as pedestrians' collision during the leaving process, collective effects, sus-
pending issues, and fixed and movable obstructions [55].
In 2007, Varas et al. utilized a two-dimensional cellular automaton model to imi-
tate the process of leaving from a single and double door classroom with complete
ability. In this study, to each grid, the structure of the room, obstructions spreading,
floor field were measured. Moreover, the effect of panic as a counted dimension was
calculated which % 5 possibilities of not moving. The model applied the random
selection to cope with collision issue. Therefore, the proposed model changed into
non-deterministic via these characteristics. From the simulation result, it was clearly
observed that the best locations of the door and evacuation efficiency were not en-
hanced by substituting double door with two distinct doors. Finally, for the evacuation
time, a number of persons and way out width were considered due to suggesting sim-
ple scaling law [56].
7
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
In 2007, Yamamoto et al. demonstrated a real-coded cellular automata (RCA)
model dependent on real-coded lattice gas to simulate the left from an area with one
way out of different widths. The method of changing the pedestrian's position was
exposed. In the former developed cellular automata model, the movement was partly
simple, while they mimicked the over straight line movement and avoiding the per-
verse direction. Hence, observing the precise duration of evacuation was difficult. In
this developed model, pedestrians allowed to move in the desired direction and meas-
ured the rational duration of the evacuation. From the simulation results, congestion
observed at the exit of the big room. In fact, a critical number of pedestrian investi-
gated who made congestion.
The correlation between the number of people in the room and the total evacuation
time was achieved. Two regions region 1 and region 2 were tested. Inside region 1,
however the number of pedestrians increased, the evacuation time remained steady.
In contrast, inside region 2, people in the room needed more time to evacuate when an
initial number of people increased [57].
In 2011, Alizadeh put forward a CA model to examine the procedure of evacuation
in a place which was provided with 'obstructions' which had various configuration of
the place, like places of exit and obstruction, 'the width of the exit, light' of the place,
psychological status of the evacuee and the dispersal of the people gathered. Its influ-
ence was clearly seen in the process of evacuation. A restaurant and a classroom were
taken as a case of this model. The way the evacuees distributed, 'location and with of
the door on of the evacuation' discussed and production of the model was made ready
for comparison with some motionless models [58]. In 2014, Guo, Ren-Yong made a
model relied on 'CA with a better separation of the area and advanced speed of walk-
ing' to show going away of people who are walking from a place with one door for
exit. Two factors affected the shape of the people gathered during the experiments;
'the advanced speed of walking and the separation of area' interval of people at dif-
ferent places and the efficacy of the people who left their houses shown through
clocks. Moreover, the connection of 'width and flow of the exit' was demonstrated
through this archetype [59].
In 2015, Li and Han proposed a model for simulating pedestrian evacuation relied
on widened cellular automata to support various behavioral tendencies in people.
Understanding and violence were two of the selected social tendencies to be looked at
through this archetype. When examining this simulation, social constraints and pedes-
trians flow orders were confirmed. The results of the study show that evacuation time
does not increase with an individual's knowledge and does not decrease when the
individual's condition is noticed as aggressiveness. It is quite obvious that when the
individual avoids aggressiveness in his conduct, the best type of evacuation will be
recorded [60]. In 2018, Kontou et al. made a model of crowd evacuation on cellular
automata (CA) parallel computing tool to simulate and evaluate manners and different
features of pedestrians in the evacuation area; including disables. The simulation
process was made in a school where disables existed. A center of education in Xanthi,
which contained disable people, was selected for the simulation process. With observ-
ing and prevailing earthquake, the school organized security application; the total
8
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
time of the emptying was noted. Lastly, suggested archetype through the experimental
data validated and there was a suitability implication to the particular location [61].
Lattice Gas Models
In 1982 by Fredkin and Toffoli and in 1983 by Wolfram Lattice gases were pro-
moted, which is a unique instance of cellular automata [62-64]. The individual on the
grid of lattice gas models is measured as an active element. Possibility and measure-
ment were considered to help these models to investigate individuals' crowd charac-
teristics [44]. Individuals are fixed with L × W in this model, one individual is for one
location. Based on executing a biased random walk with no back steps, the individu-
als move to a special direction, and available locations are allowed solely [65].
In 2001, Tajima et al., used lattice gas models of biased-random walkers to pre-
tend walker channel stream at a bottleneck under the open boundaries. Then they
noticed changing free flow into chocking flow under serious appearance density,
filling flow proportion and changing the measure of density, and connection between
flow rate and scaling law [66]. In 2002, Itoh and Nagatani presented a lattice gas
model of pedestrians to simulate moving of the gathering of people between two halls
through a door, and they noticed an ideal admission time for moving the viewers. The
time has effect on the gate when visitors want to enter the hall because with decreas-
ing the admission time to under optimal time jammed state occurs and the viewers
have no ability to enter the inner hall while arrival pedestrians stopped by the depar-
ture pedestrians from entering [67]., in 2003 by Helbing et al. They made experiments
and simulations for leaving process from a classroom. For the experimentation, they
utilized video cameras for recording leaving students from a classroom and leaving
time of each student recorded. Alternatively, for the simulation, they applied lattice
gas model of pedestrian flows to compare with the experimentation results. They
noticed disorganization specification empirically is well repeated in the evacuation
process, and initial location has a major role in leaving time. Jamming or queuing
state at the exit has a great effect on increasing leaving time [68].
In addition, this lattice gas model was utilized to think of group evacuation under
various circumstances. For instance, in 2004, Nagai et al., made experimentations and
simulations to present leaving the process in a room without visibility with a number
of exits. In the experimentations, sightless students wearing eye covers imitate indi-
viduals in a room without visibility. Additionally, the video camera was applied to
record the evacuation of confused students, and then the student path and leaving time
were evaluated. On the other hand, students' detected manners were mimicked via the
extended lattice gas model wherein sightless students are simulated through biased
random walkers. Further, the mean value of the leaving time and students' leaving
dynamic patterns were measured and made a comparison with the output of the exper-
imentations. In this study, the exact emphasis was on the leaving time distribution
[69].
In 2005, Nagai et al., made experimentations and simulations to show two types of
counter-flow of students going on all fours in an open boundaries channel. In the
experimentation, video camera utilized for recording and capacities of each student
9
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
arrival times were calculated. Experimentally features of counter-flow were elucidat-
ed.
This research made a comparison between pedestrian counter-flow and the coun-
ter-flow of students on all fours. In this study, lattice gas simulation was applied to
imitate the experiment, and a biased random walker utilized to pretend students crawl-
ing [70]. In 2006, Song et al., they made up a new lattice gas model ''multi-grid mod-
el'' due to presenting force concept of social force model into a lattice gas model.
Therefore, better lattice participated which made the walkers reside in more than one
grid, and constructed instructions for walkers and walkers and structures. This new
model was used to simulate leaving walkers from a big room with an exit door, thus,
the effect of collaboration force and drift factor on leaving time were evaluated. Final-
ly, a common limitation of the two factors on the leaving process was discovered
[71].
In 2007, Fukamachi and Nagatani Studied sidle influence on counter-flow pedes-
trian and investigated manners of sidle walkers within the crowd in the counter-flow
pedestrian. Individuals within the crowd change his moving into sideways in order to
be far from congestion and barrier. In this study, the influence of sidle investigated
with the enhanced biased random walk model. Three models were demonstrated; 1)
face to face usual pace, 2) only sidelong pace, 3) during crowd and barriers change
usual walk into sideways, and get back to usual walk when mass left. They noticed
the usual pace was slower compare to sidelong pace due to rising congestion, and
emergent jamming state in the transference points. In the model number 3, jam clus-
ter nearby middle of the channel extremely fluctuating near the jamming transference
point [72], also, various ways joined with lattice gas models to deal with leaving pro-
cess research.
In 2012, Guo et al. created a varied lattice gas model via utilizing both models of
cellular automata (CA) and mobile lattice gas model (MLG model) to simulate evacu-
ation processes during an emergency. Inside this model concept of local population
density presented, and in this new model, this concept with a factor of exit crowded
degree applied to update rule. Besides, drift D that is a significant parameter has an
impact on the evacuation process and can be changed with considering the presented
concept. The nonlinear function of the corresponding distance used to define commu-
nications, such as friction, attraction, and repulsion between every two walkers and
walkers with building dividers. When spaces between them get smaller, repulsion
forces increase severely. Simple characteristics of pedestrian evacuation, such as
clogging and arching phenomena could be taken from numerical examples [73].
In 2013, Guo et al. offered an agent-based and fire and pedestrian interaction (FPI)
model to investigate the leaving process during an existing emergency. It was thought
that the environmental temperature field creates an effect on probability direction of
the movement. Besides, the multi-grid method was applied to define decreasing speed
by low transparency in the fire and pedestrian interaction (FPI). Hence, the authors
created an extended heterogeneous lattice gas (E-HLG), model. Inside this new model
factor of altitude was added to define the height location of lattice locations. Due to
the model and experimentations, characteristics of the left in a terrace classroom were
studied. Outputs from the extended HLG model were close to the experiments. In
10
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
addition, leaving controlled due to the altitude factor, and the different decision of
choosing evacuation paths and annoying high-temperature field causes to local jam-
ming and clogging [74].
In 2016, song et al., created an evacuation scene based on cellular automata and a
lattice gas model to simulate behaviors of selfless and selfish for the pedestrians dur-
ing the evacuation and competitiveness behaviors, meanwhile to present the influence
of them on pedestrians' strategies. Furthermore, some experimentation performed on
the width of the building exit door and analyzed. Outputs of the simulation tests
demonstrated that individuals with self-behavior caused more deficiency and rise
evacuation duration. Conversely, sympathy caused to decrease evacuation duration
and more collaborators. Finally, an important factor for the duration of the evacuation
was the exit door width. When the size was less than six cells of the size of 50 x 50,
evacuation time increased, conversely, the time was seriously decreased with increas-
ing the width. However, this would be no noticeable when the door exit width much
more increased [75].
Social Force Model
In 1995, Helbing and Molnar presented that pedestrian movements can comply
with 'social forces'. The movement of the pedestrian is controlled by the accompany-
ing principle impacts, which are first, pedestrian needs to achieve a specific goal.
Secondly, pedestrian keeps a specific separation from different people on foot. The
third one is that pedestrian additionally keeps a specific separation from the edge of
obstructions, for example, dividers. Fourthly, a pedestrian is some of the time is
pulled in by different people or objects [76].
In 2000, to simulate fear conditions Helbing et al. built an alternative social force
model. In this model combination of physical forces and socio-psychological with
people mass behaviors referred [77]. In 2002, Zheng et al made a combination of the
social force model (Helbing et al., 1995) and neural network as a model to simulate
different conditions of walkers for collective behaviors [78]. In 2005, Parisi and
Dorso applied the social force model, which presented by Helbing and assistants in
2000 to permits investigation of various levels of fear in evacuation within a single
exit door room. In this research, presenting concept 'faster is slower' participated in
changing manners and the rising chance of congestion suspensions, and also this con-
cept with the blocking clusters made a robust connection, whereas, size effect for exit
door was concisely debated [79].
In 2006, Seyfried et al. applied the adapted social force model which was present-
ed by Helbing and assistants in 1995 to specifically examine the effect of various
methodologies for communication between walkers, which are self-driven objects
moving in a continuous space on the velocity-density relation's output. Consequently,
they noticed it is possible to simulate the usual arrangement of the fundamental dia-
gram when individual space and current speed are increased. Additionally, they pre-
sent distant force has an effect on velocity-density relation [80]. Besides, the social
force models are joined with different models to examine swarm departure. In 2006,
Lin et al., suggested a system for evacuation crowds during emergencies via dynamic
model to propose a standard framework for future studies. Carrying out standard func-
11
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
tions was the main task, and emphasized on framework constancy and capable of
being extended to propose new required tasks in the future. This study tried to en-
hance framework independency and better system execution. Hence, experimenta-
tions were executed in a certain construction to evaluate the effectiveness of the
crowd evacuation, thus, in the experimentations results specifically interpreted crowd
manner, construction, and density of the people were mean of the effect [81]. Later in
2007, utilized the social force model to make pedestrians be dynamic, and then exam-
ined 200 pedestrians leaving process from a room during a panic situation. Parameter
such as υd, which was denoted aspiring speed for pedestrians to move, was applied to
control panic levels. In this study, the effect of "faster is slower" concept according to
the attempts with applying various forces was known. When υd efficiency of the
evacuation starting to reduction swiftly and flaw rate reaches to the peak, exponential
mass distribution changes into ''U-shaped'' [82].
In 2008, Guo and Huang proposed a mobile lattice gas model based on utilizing
both social force model and lattice gas model benefits. The model specifies each pair
walkers' communication and structure partition with pedestrian communication due to
space and pace size in motion. The output of this emergency simulation model
demonstrated 1) walkers' evacuation simple features, such as arching and clogging
behavior and practically produced a mean of the evacuation time 2) load computation
not as much as social force model and gain duration of the evacuation more precisely
[83].
In 2011, Okaya and Takahashi utilized a BDI model to simulate the behavior of
communications in the crowd, which usually occurred during evacuation. Inside such
a model, evacuation behaviors were influenced due to people interactions. Hence,
Helbing's social force model adapted in order to consider the intentions of the pedes-
trians. The output of the experiment's simulation demonstrated that as usual interac-
tions among pedestrians due to congestion made the evacuation take a longer time. In
addition, evacuation of family members together increased evacuation duration. Addi-
tionally, evacuation behaviors were influenced by directing the evacuation process
[84]. In 2014, Hou et al. applied a modified social force model to simulate the influ-
ence of the number and location of the evacuation guiders on evacuation dynamics in
partial visibility rooms. Inside this model, guiders who are qualified can identify the
exit location precisely, and others compliance with the guiders' locations and instruc-
tions. Experimentations' output reveals for one exit, one or two guiders put a signifi-
cant impact. Alternatively, for more than one exit position without adequate benefit
from the whole exit, the evacuation gets slower. Consequently, it was obvious to
increase the effect of guider on making evacuation faster, a number of exits with the
number of evacuation guiders should be equal and guiders properly inside the room
centralized of the multi-exits [85].
In 2017, Han and Liu applied a modified social force model involving an infor-
mation transmission mechanism to simulate behaviors of walkers, when the majority
walkers were unfamiliar with the evacuation location during a disaster. This improved
model considers the approach of preventing collision and disappearing information.
The difference between this adapted model and the previous model was this altered
model defines the way of finding and selecting the correct direction, and the previous
12
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
model was applied to eliminate the pedestrians collide. The output of the simulation
demonstrated that due to information transmission mechanism walkers could deter-
mine the right motion direction, although walkers' real behavior could be simulated
when emergency exists. Furthermore, there were different outcomes from the simula-
tion was obtained to enhance the evacuation. Firstly, utilizing all exit door via the
occupied extensively reduce time and rise efficiency of the evacuation. Secondly,
using exits with more width completely causes the decreasing time of the evacuation
and enhancing evacuation efficiency. Thirdly, in the start of evacuation walkers were
restricted to select exits with greater width with fewer densities for their evacuation
route. Lastly, at the start of the evacuation process essential directing was vital [86].
Agent-Based Model
ABMs are computational models that assemble social structures from the '' bottom-
up '', by reproducing people with virtual agents and making promise associations out
of the task of principles that run connections among operators [87]. Bonabeau main-
tained the perspective of the following manner. In describing agent, the manner of
mutual fear is an occurrence, which is growing due to the generally complex individ-
ual-level manner and cooperation among agents. Therefore, the agent-based model
(ABM) appeared to be perfectly suited to give significant prudence into the method
and prerequisites for fear and overcrowd by incoordination [88]. Nearly a a couple of
decades, the ABM method has been utilized to contemplate crowd evacuation in dif-
ferent circumstances. ABMs compare to other methods, such as cellular automata,
social force, lattice gas or fluid-dynamic models are commonly more computationally
costly. Besides, dealing with heterogeneous people is considerably easier due to
ABMs' capacity to enable every agent to have distinctive manners [44].
In 2004, Zarboutis and Marmaras demonstrated a method of modeling and simulat-
ing a metro system with an existing fire state in a tunnel. The ability of the simulation
method to search for an effective strategy in the rescue was debated. This system
included various subsystems and made multifaceted adjustable system. Hence, they
established an agent-based simulation to support fitting dynamic illustration of the
difficulties in the designed area, and 1) made the serious reliance and robustness of
the system be captured by the designer, 2) described the intended rescue plan via the
determined characteristics by the designer, 3) evaluated their proficiency. From the
experimentations, output demonstrated different arrangements with different situa-
tions for metro personnel's activities [89]. In 2005, Braun et al., dependent on social
force model exhibited an agent-based model (Helbing et al., 2000) to simulate effects
of various floors, walls, and obstructions on agents, and cooperation among agents in
emergency conditions. In the model, XML script was utilized to define the probability
of reproducing various scenarios. Danger incident exhibited and visualized, multifac-
eted environment measured alarms organization were spread and considered through
the environment, which led to reducing dead agents' numbers [90].
In 2006, Toyama et al., dependent on cellular automata suggested an agent-based
model (ABM) denote various walkers' features, for example, room geometry
knowledge, speed; gender, obstacle avoidance behavior, and herding behavior. They
investigated the effect of various designs, various number of pedestrians in groups,
13
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
and features on pedestrians dynamics and system's macroscopic manners [91]. In
2007, Pelechano et al. introduced High-Density Autonomous Crowds (HiDAC) mod-
el, which was a multi-agent model. This model relies upon psychological and geomet-
rical instructions while it is a parameterized social force model. It very well may be
adjusted to mimic different kinds of the crowd, extending from the high-density
crowd under quiet conditions (exit from a cinema after a movie) to extreme fear cir-
cumstances (fire leaving) [92].
In 2012, Simo et al. demonstrated a model, which employed the social force model
extensively, and agents' movement defined via Newtonian manner to simulate coun-
ter-flow conditions for mediators' behavior, which attempt to eliminate the colliding
with approaching mediators. Inside this model, mediators noticed the moving path of
head mediators, and their activities were selected based on that observation [93]. In
2012, Ha and Lykotrafitis applied self-moving particles system and movement was
directed via social force model to simulate how various conditions, such as, multifac-
eted structure of the building, size of the room exit, main exit size, friction factor, and
preferred speed influence on the evacuation time in which conditions enhancement
occurred in evacuation efficiency. The output of the simulation demonstrated evacua-
tion in a single room with small size for the exit, defined high speed takes longer time
due to occurring overcrowding. With increasing, door size overcrowding disappeared.
Friction had a significant effect on overcrowding, with minimizing the factor of fric-
tion overcrowding quickly disappeared.
On the other hand, for a floor with two rooms, one main exit door, and a hallway,
a smaller the door room size may enhance evacuation efficiency. Because the number
of the evacuee agents would be smaller from the room into the hallways, thus, the
number of evacuees for the main exit would be smaller and agents can go out without
occurring serious congestion. Conversely, with increasing room door size and agents'
speed of the evacuation time decreased, while serious congestion occurred near the
main exit door [94]. In 2018, Poulos et al. employed an agent-based evacuation model
to simulate the school's staff and nearly 1500 children of an inclusive evacuation
process executed for the whole city. This study emphasizes on kindergarten to 12th-
grade school and examines the movements of various mediators. This simulation
certified via comparing the real event, which shot video of the event, and expected a
result from the developed model simulation, errors between the real and expected was
the only % 7.6. Hence, output said that utilizing a mathematical model in evacuation
for adapting logistical issues in an emergency arrangement is fair [95].
Game Theoretic Models
On the off chance that the intelligent choice procedure of the evacuees is reasona-
ble, a game theoretic methodology can be embraced to display the choice circum-
stance [96]. In a game, the evacuees survey the majority of the accessible choices and
select the elective that augments their utility. Every evacuee's last utility adjustments
will rely upon the activities picked by all evacuees. Game is the determination of a
cooperative state via a group of individuals, conceivable approaches of every individ-
ual, and the group of all conceivable utility adjustments. For one leave, the competi-
tive behavior of the walkers in crisis departure could be deciphered in a game hypo-
14
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
thetical manner [97]. For a few ways out, Lo et al., built up a non-agreeable game
hypothesis display for the dynamic leave choice procedure of evacuees. The model
inspects how the reasonable communicating conduct of the evacuees will influence
the clearing designs. For the leave determination process, a blended procedure is con-
sidered as the likelihood of leave decision. The blended methodology Nash Equilibri-
um for the amusement depicts the balance for the evacuees and the blockage condi-
tions of ways out [96].
In 2006, Lo et al., presented an original method to show the dynamic process of
participants' way out choice. In a space with the extensive crowd, density participants
manage his/her plan of evacuation on crowd's action, movement space to the way out,
and influence of environmental motivation and way out familiarity. This plan is due
to observing activities of participants and environmental conditions via other partici-
pants and reply to their familiarity to choose their egress path. This research presented
a non-cooperative game theory framework. The model looked at how evacuation
patterns and leaving time of an area with numbers of the way out influenced via the
participants' collaborating manner. A merged procedure is considered for a way out
determination as to the way out the choice possibility. The merged procedure Nash
Equilibrium for the game defines the stability for the participants and the overcrowd-
ing conditions of way outs [96].
Approaches Based on Experiments with Animals
The utilization of creatures is another methodology for examining swarm depar-
ture. Tests in real departure freeze are troublesome, particularly with people in view
of conceivable moral and even legitimate concerns. The elements of evacuation re-
striction are not totally comprehended in light of the fact that reviews have been
largely kept to numerical recreations [98].
In 2003, Saloma et al., examined the dynamics of outflow fear in mice getting
away from a water pool to a dry stage through an exit entryway. The investigation
demonstrated how the engineering of the space in which they are kept affected in the
manner of fearing groups. The investigation output exposed that for a basic inspecting
interim their outflow manners concurred with the numerically anticipated exponential
and power-law frequency distributions of the leave burst measure notwithstanding for
brief time spans [98]. In 2005, Altshuler et al. used ants as a model of pedestrians to
demonstrate herding behavior. In the experimentations, the ants were applied in one
cell with equally placed two exits. Ants nearly used both exits to abandon in the same
way when the situation was normal, however, with setting panic due to expeller liquid
select one of the exits more severely. Hence, they modified the former hypothetical
model, which comprised herding related to the panic element as the main element to
simulate noticed dynamics outflow in detail. Moreover, from the experimentation
outputs, emerged hypothetical models, preferred that during the leaving the process
with the existing panic situation there are some common characteristics of the social
manners between humans and ants [99].
15
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
Mesoscopic Model: Mesoscopic is one of the classical models and in these model
movements of large size of people are investigated and somehow individual features
are specified, Figure 4 illustrates the mesoscopic model. In mesoscopic, cellular au-
tomata and gas Kinetic approaches are combined. The following describes cellular
automata and gas Kinetic approach:
Fig. 4. Mesoscopic Model
Cellular Automata and Gas Kinetic
Cellular Automata (CA) with Gas Kinetic methodology made a mesoscopic
model, which utilized into the motion of individuals observation. Besides, this model
presents and imitates the great size of the group [100]. CA is a model, which is divid-
ed into numbers of grids; every grid has adjacent and different state [4]. In addition,
CA to interact with simulating the departure of agents depends on separation, distribu-
tion, and utilizes an irregular way. CA thinks about the collecting manner of the
agents. A key part of the CA display is more suitable to speak to pedestrian stream in
perspective of its straightness, flexibility, and effectiveness [101].
3.2
Hybridized Models
Via using both macro and micro models of the classical models, a model, such as
hybridized models designed and it can be divided into three different models; zone
based, layer based, and sequential based. These models deal with the area of the evac-
uation and motion of the participants during the evacuation. These models are de-
scribed in the following subsections:
Zone-Based Model: In this methodology, the area of simulation is partitioned into
numerous zones. In light of use needs, each zone is reproduced either for the micro-
scopic or macroscopic model. Zone imitation under macroscopic procedure gives in
the general stream of the group, though zone mimicked with microscopic model of-
fers singular dimension practices perception. Largely, the proposed procedures run
the two models all the while on pre-defined zones [102-104].
In 2011, Wei et al. utilized Hybrid Grid Simulation Infrastructure to simulate a
leaving process of a high-density mass in an urban area. Three heterogeneous models
had been built that were a computational microscopic crowd model, a pedestrian
agent model, and a vehicle agent model to depict different parts and features of the
16
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
big and compound simulated situation. From the output exhibited that suggested in-
frastructure is a feasible and capable method for big and compound simulation system
[103]. In 2011, Sewall et al., for shared simulation of largescale vehicle traffic for
virtual universes and enlarged airborne maps exhibited a different strategy, which
dynamically combines continuum and discrete approaches. Accepting these two
unique approaches at the same time in various areas takes into account an adaptable
simulation system where the client can without much of a stretch and naturally ex-
change quality and effectiveness at runtime. They had employed this method to the
mimic of extensive systems of vehicle traffic dependent on artificial engineered urban
situations, real-world information, and accomplished more prominent than continuous
execution [105].
In 2012, Anh et al. showed a hybrid modeling method for evacuation simulation to
increase the speed of pedestrians' movement and worked on the arrangement problem
of both micro and macro models. Initial outputs demonstrated that to simulate leaving
strategy in road network via the hybrid model more effective than via micro model
alone [102]. In 2012, Xiong et al. wanted to use the benefits of macroscopic and mi-
croscopic models together. These two models in a simulation worked concurrently
and performed within various shared special partitions. Through each step of simula-
tion execution, each model had self-governing. Nevertheless, for crowd entering to
opposite partition was allowed for each of the models. Models could join at edge
border via using the various interactions of aggregation and disaggregation to swap
information. From the output, it was exhibited that this hybrid model was more effi-
cient than the microscopic model, and made quality enhancement compare to the
macroscopic model [104].
Layer Based Model: Accepting way of applying both micro and macro methods
partly into various layers is another method to deal with mass imitation. These applied
methods are used in the whole area of the imitation in order to determine plane mass
movement and additionally motion forms of the agents in the mass. This new method
for both distinct layers does the arrangement of the global path, evasion of local ob-
stacle and other wanted manners of the mass [106-108]. Inside this proposed method,
the macro method applied to mimic mass motion in accordance set of rules in the first
layer and the mass motion manner from this layer goes to the second layer as input.
Hereafter, in the second layer micro method is using to mimic motion individuals
independently and with rising density protect the cost-effectiveness.
In 2008, Banerjee et al. displayed an augmentation of the layered knowledge strat-
egy that is prevalent in the amusement business for adaptable group recreation. They
noticed a few navigation behaviors could be applied effectively in this system. The
central preferred standpoint of this system is broadened capacity, where new behav-
iors can be included by including separate layers, without influencing the current
layers. The edge rates have been observationally demonstrated to be adequate to han-
dle huge groups continuously. A few angles have been distinguished where this simu-
lation framework can be moved forward [107]. A natural way exhibited to deal with
direct recreation of virtual groups using objective coordinated route capacities. The
methodology effectively showed for a wide assortment of reproduction to produce
17
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
diverse plainly visible practices and characteristic looking movement designs, resolve
clog and perform an objective coordinated route. Mostly, this methodology offers a
straightforward, yet incredible technique to direct or control swarm reenactments.
In 2011, Patil et al. exhibited a natural way and employed navigation functions to
deal with the direct simulation of virtual groups. This approach effectively showed to
produce diverse macroscopic behaviors and natural looking movement designs, re-
solve to clog and perform goal-directed navigation. This procedure was an incredible
technique for controlling and directing the crowd simulation process [108]. In 2012,
Tissera et al. exhibited a hybrid simulation model to check behavior patterns in an
emergency leaving. Both environmental (EsM) and pedestrian (PsM) sub-models
shared inside the hybrid model. Constructing a synthetic location occupied with inde-
pendent cooperative agents due to the combination of the model with the computa-
tional procedure. Authors made sequence investigations; for instance, check the envi-
ronment to the individuals leaving that were behaviors was available for the "adjacent
door". After that, check the effect of familiarity of the individuals into the environ-
ment, outside motivation to instruct the individuals was utilized to the other conceiva-
ble outflow exit. The behavior of people reacting to this improvement is expected to
"get out the entryway quicker" [106].
Sequential Based Model: Like layer based hybrid models, another methodology is
a sequential hybrid procedure, which additionally runs both large scale (macro) and
small-scale (micro) models for the entire group. It first runs a large-scale model to
direct the motion forms of group and after that applies a small-scale model to the
same group for watching the individual manners. It executes the two models in a
successive way where a synchronization technique is required to exchange the group
state between the two modes [109,110].
In 2011, Park et al. demonstrated a hybrid framework for crowd simulation due to
applying both continuum-based and agent-based methodologies. The model catches
the dynamics of the crowd in a vast group besides the individual behaviors of every
agent. From outputs of the performance demonstrated that their methodology made a
good balance in big and great determination simulated environment. Another promis-
ing benefit of this methodology is map field development due to the capability of the
model to link to any possibilities for the map field, which gives the ability to enlarge
the continuum-based simulation with non-lattice based paths [36]. In 2013, Xiong et
al. suggested a hybrid model due to utilizing both macroscopic and microscopic mod-
els to simulate crowd in dynamic environments. Movement tendency for the crowd
was simulated via the macroscopic model. On the other hand, determining the veloci-
ty and moving direction was due to the microscopic model. According to the outputs
of the simulation appeared there is a good performance to show the features of crowd
movement and human [109].
3.3 Generic Model
Due to crowd density, the Simulation of an application nearby requires using most
suitable software, the needed dimension of individual manners (corporeal, mental and
18
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
collective), and execution time. Simulation software projects are reliant on fundamen-
tal models that cannot be changed according to end client necessity. Hence, the gener-
ic model would be an important need to give the ability to choose models on user
selection for detecting different crowd dynamics [111]. The following describes the
transit approach:
TransiTUM Model: The latest attempt exhibited to build up a conventional struc-
ture for multiscale coupling of walker imitation models for transition zones [112].
Grouping different models, such as mesoscopic and microscopic models need the
autonomous of these models. Besides that, essential parameters, such as speed, cur-
rent location, subsequent goal, max speed and so on could be moved between them
via assisting a data file. The displayed model concentrated on autonomous of related
models and in this manner can be connected to any mix of mesoscopic and micro-
scopic models. With the assistance of an outer information record, models can openly
exchange essential parameters (speed, current location, subsequent goal, max speed
and so on) between themselves. It has employed the idea of transit area and relaxation
zones to flawlessly move the people from one model to another. Therefore, walkers
can enter from any points. Nonetheless, this starter progress in the direction of con-
ventional coupling and multi-point entry to transition zone needs further examination.
Table 1. Highlighting previous models and approaches' features, techniques and
implications of current simulation models (where MT: Models Type, MTH: Methods, MD:
Models, PNT: Participants, SST: Simulation State, IOB: Investigated Occurrences and
Behaviours)
T
M
F
E
R
H
T
M
D
M
T
N
P
T
S
S
B
O
I
[66]
LGM
Normal
caused to saturated flow rate and transition density
free flow to the choking flow, bottleneck width
c
i
p
o
c
s
o
r
c
i
M
[70]
LGM
[71]
LGM
[67]
[68]
LGM
LGM
[69]
LGM
[72]
[73]
LGM and
SFM
MLGM and
CAM
[74]
E-HLGM
scale
Emer-
gency
Nor-
mal/Em
ergency
Normal
Counterflow of people crawling on all fours, speed,
jamming transition, and pattern formation
Sidle effect, counterflow jamming transition and
pattern formation
Shifting of the audience between two halls, and
Jamming transition
Jamming (queuing), and effect on increasing escape
y
c
n
e
g
r
e
m
e
time
Communication of escape times and the exit
configuration, explain blind people feature proper-
ties
Determine simple features of the social force
model, such as, clogging and arching,
Impact of concept of local population density on
drift D within the evacuation, friction, attraction,
and repulsion
Altitude factor added caused to control evacuation,
choosing evacuation paths, annoying high tempera-
s
u
o
n
e
g
o
m
o
h
s
u
o
e
n
e
g
o
r
e
t
e
h
19
s
n
o
i
t
a
c
i
l
p
p
A
l
e
d
o
M
s
a
G
e
c
i
t
t
a
L
s
l
e
d
o
M
l
a
c
i
s
s
a
l
C
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
[75]
[52]
LGM and
CAM
CAM
and
SFM
[54]
CAM
[49]
[56]
[51]
[53]
[55]
[50]
[57]
CAM
CAM
CAM
CAM
CAM
CAM
CAM
and
LGM
c
i
p
o
c
s
o
r
c
i
M
s
u
o
n
e
g
o
m
o
H
[58]
CAM
emergency
[59]
CAM
normal
s
u
o
e
n
e
g
o
r
e
t
e
h
s
u
o
e
n
e
g
o
r
e
t
e
h
c
i
p
o
c
s
o
r
c
i
M
s
u
o
n
e
g
o
m
o
H
[60]
CAM
[61]
CAM
[89]
[90]
[92]
[91]
[93]
[94]
ABM
ABM
and
SFM
ABM
and
SFM
ABM
and
CAM
ABM
and
SFM
ABM
and
ture field caused to local jamming and clogging
Selfless and selfish for the pedestrians during
evacuation
Impact of kin behavior on enhancing evacuation
efficiency
Effect of exit dynamics on flux, arching
Arching, streaming, disruptive
Effect of obstacles
Clogging, friction effects, arching effects
Bi-direction movement, moving up and down,
self-organization
Clogging and mass behavior, arching, fixed and
moveable obstacles
Herding behavior
Clogging, movement pedestrians (oblique direction
to the grid)
Impact of distribution of the evacuees, location, and
width of the door on time of the evacuation argued
the shape of the crowd, duration of the individuals
at various positions, efficiency of the evacuees
expressed via two time indicators, the association
between width and flow of the exit
Familiarity and aggressive, evacuation time
disable children, evacuation time
y
c
n
e
g
r
e
m
E
-
r
e
m
E
y
c
n
e
g
Normal
e
m
E
n
e
g
r
y
c
Normal
normal
emergency
Emer-
gency
Emer-
gency
Normal/
Emer-
gency
Nor-
mal/Em
ergency
normal
emer-
gency
Rule-based behavior
Behaviours (risk, decision, escape)
Respectful behaviors when desired (Queuing, Decision),
agent interaction (pushing behavior, panic propagation,
impatience, real time reactions to changes in the environ-
ment)
Obstacle avoidance and herding behaviors, pedestrian group
different features led to different escape probabilities
Counter flow conditions, observing the moving path of head
mediators and selecting activities based on that observation
Effect of different features on occurring overcrowding and
evacuation time
20
n
o
i
t
a
c
i
l
p
p
A
l
e
d
o
M
a
t
a
m
o
t
u
A
r
a
l
u
l
l
e
C
s
n
o
i
t
a
c
i
l
p
p
A
l
e
d
o
M
d
e
s
a
B
t
n
e
g
A
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
SFM
[95]
ABM
emer-
gency
Movements of various mediators. Supporting that
mathematical model in evacuation for adapting logistical
issues in the emergency arrangement is fair
Emer-
gency
Normal/
Emer-
gency
Normal
Emer-
gency
Emer-
gency
Emer-
gency
Emer-
gency
Provide insight for panic and jamming, Clogging, faster-is-
slower, mass behavior, pressure, beginning of panics by
counter flows and impatience
Crowd impatience, the existing optimal ratio of impatient
persons to patient persons of pedestrians made the move-
ment be quick and easy
Impact of required space and remote action on the funda-
mental diagram
Faster-is-slower, clogging, the impact of the exit door size
Faster-is-slower, cluster mass distribution
Separating data into a block, mass behavior, crowd's evac-
uation efficiency
Simple features of pedestrian evacuation (arching, clogging),
average evacuation time
communications in the crowd during the evacuation
Effect of Evacuation leaders on the evacuation process
y
c
n
e
g
r
e
m
e
Unfamiliar pedestrian behaviors with the evacuation location
s
n
o
i
t
a
c
i
l
p
p
A
l
e
d
o
M
e
c
r
o
F
l
a
i
c
o
S
[77]
SFM
[78]
SFM
[80]
SFM
[79]
SFM
[82]
[81]
[83]
SFM
SFM
and
ABM
SFM
and
LGM
[84]
SFM
[85]
SFM
[86]
SFM
with
the
infor-
mation
trans-
mis-
sion
mech-
anism
c
i
p
o
c
s
o
r
c
i
M
s
u
o
n
e
g
o
m
o
H
s
u
o
e
n
e
g
o
r
e
t
e
h
s
u
o
n
e
g
o
m
o
H
s
u
o
e
n
e
g
o
r
e
t
e
h
Fluid Dynamic Model Applications
[45]
[46]
[47]
FDM
FDM
FDM
-
o
r
c
i
M
c
i
p
o
c
s
-
g
o
m
o
H
s
u
o
n
e
Normal
Normal
Emer-
gency
Theory Model for game Applications
The motion of large crowds
crowd in motion, ''Thinking fluids'' behavior
Impact of over compression
[96]
Theory
Model for game
c
i
p
o
c
s
o
r
c
i
M
s
u
o
n
e
g
o
m
o
H
Eme
rgen
cy
exit choice, the impact of evacuees' interaction on evacuation
pattern and clearance time of a multi-exit zone
Animal Experimentations Model Applications
21
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
[98]
Mice investiga-
tion
[99]
Ant investigation
c
i
p
o
c
s
o
r
c
i
M
Emer
s
gency
u
o
n
e
g
o
m
o
H
Emer
gency
Self-organized queuing, diffusive flow, scale-free behavior in
escape panic
Panic condition, herding behavior
[105]
[103]
[102]
[104]
[107]
[108]
[106]
[110]
[109]
d
e
s
a
b
-
e
n
o
Z
d
e
s
a
b
-
r
e
y
a
L
d
e
s
a
b
-
l
a
i
t
n
e
u
q
e
S
d
n
a
c
i
p
o
c
s
o
r
c
i
m
c
i
p
o
c
s
o
r
c
a
m
s
u
o
e
n
e
g
o
r
e
t
e
h
s
u
o
e
n
e
g
o
r
e
t
e
h
-
c
a
m
d
n
a
c
i
p
o
c
s
o
r
c
i
m
c
i
p
o
c
s
o
r
c
i
p
o
c
s
o
r
c
a
m
d
n
a
c
i
p
o
c
s
o
r
c
i
m
Zone-based Model Applications
Normal
Leaving strategy in the road network
s
u
o
e
n
e
g
o
r
e
t
e
h
y
c
n
e
g
r
e
m
e
y
c
n
e
g
r
e
m
e
l
a
m
r
o
N
Normal
Leaving process of a high density mass urban area
emergen-
cy
Normal
increase speed of pedestrians' movement
Improve efficiency and enhancing quality
Layer-based Model Applications
navigation behaviors, new behaviours can be included by including separate
layers, handle huge groups continuously
clogging and perform goal-directed navigation
behaviour patterns in an emergency evacuation, environment, familiarity,
and external motivation impacts
Sequential-based Model Applications
group behaviors and complex behaviors
crowd tendency, determine velocity, moving direction
TransiTUM Model Applications
[111]
Transi-
TUM
microscopic
and
mesoscopic
with having
external data
file
s
u
o
e
n
e
g
o
m
o
h
l
a
m
r
o
N
Solving pedestrian transition between models, they can
transit in different point.
s
l
e
d
o
M
e
z
i
d
i
r
b
y
H
l
e
d
o
m
c
i
r
e
n
e
G
4
Discussion and Conclusion
Although the developed models relied on pedestrian evacuation methods have
been used widely and completed, it is yet necessary to create models that precisely
'simulate people evacuation time' and existing manners in the time of emergency
evacuation. It becomes necessary to review the past studies and make a distinction
between dissimilar causes that influenced the manners of participants when emergen-
cy cases happen and similarly on participants' evacuation time.
22
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
This paper is a comprehensive and systematic survey of pedestrian evacuation
which sheds light on 'applications' characteristics, methods, and implications of mod-
els methods. There are different categories for these models' methods and generic
models. Forthcoming studies may benefit from this sorting of models and shedding
light on their dissimilar features in several conditions and as a sort of guide to direct
future studies. Finally, researchers can get benefit from results so as to be able to
make better decisions in the system of evacuation and it will be a great support to
enhance novel simulation models with novel abilities.
Relying on the literature review, the forthcoming studies will use a developed re-
cent smart model. Moreover, the way fire is designed and implemented will be looked
at. Other characteristics like the way fire spread out through the residential places as
related to its location will be part of this, too. Additionally, the influence that the fire
leaves on the agent's conducts will be explicated.
To finalize, the consequence of the fire and smoke will be written in the suggested
model numbers of the demise, wounded or suffocated people.
5
Acknowledgment
The study is fully funded by the University of Sulaimani (UOS). The authors
would like to thank the UOS for providing facilities and equipment for this research
work. The authors would like to thank the editorial office of the journal of Interna-
tional Journal of Recent Contributions from Engineering, Science & IT (iJES) for
processing and reviewing of the manuscript.
References
6
[1] J.E. Almeida, Z. Kokkinogenis, RJ. Rossetti, "NetLogo Implementation of an Evacuation Scenario,"
arXiv preprint arXiv:1303.4695, 2013.
[2] K. Christensen, M. Sharifi, A. Chen, "Considering individuals with disabilities in a building evacua-
tion: An agent-based simulation study," In92nd Annual Meeting of the Transportation Research
Board, Washington, DC, pp.11-13, Jan. 2013.
[3] D. Duives and H. Mahmassani, "Exit choice decisions during pedestrian evacuations of buildings,"
Transportation Research Record, vol. 2316, no. 1, pp.84-94, 2012.
[4] N. Bakar, M. Majid, K. Ismail, "An overview of crowd evacuation simulation," Advanced Science
Letters, vol. 23, no. 11, pp.11428-11431, 2017.
[5] H. Liu, B. Liu, H. Zhang, L. Li, X. Qin, G. Zhang, "Crowd evacuation simulation approach based on
navigation knowledge and two-layer control mechanism," Information Sciences, vol. 436, no. 436-
437, pp.247-267, 2018.
[6] M. Majid, P. Siebers, U. Aickelin, "Modelling reactive and proactive behaviour in simulation: a case
study in a university organization," arXiv preprint arXiv:1307.1073, 2013.
[7] C. Burstedde, K. Klauck, A. Schadschneider, J. Zittartz, "Simulation of pedestrian dynamics using a
two-dimensional cellular automaton," Physica A: Statistical Mechanics and its Applications, vol. 295,
no. 3-4, pp.507-525, 2001.
[8] Y. Tajima, T. Nagatani, "Scaling behavior of crowd flow outside a hall," Physica A: Statistical Me-
chanics and its Applications, vol. 292, no. 1-4, pp. 545-54, 2001.
23
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
[9] A. Kirchner, A. Schadschneider, "Simulation of evacuation processes using a bionics-inspired cellular
automaton model for pedestrian dynamics," Physica A: statistical mechanics and its applications, vol.
312, no. 1-2, pp.260-276, 2002.
[10] H. Klüpfel, M. Meyer-König, J. Wahle, M. Schreckenberg, "Proceedings of the Fourth International
Conference on CA for Research and Industry," 2000.
[11] D. Helbing, I. Farkas, T. Vicsek, "Simulating dynamical features of escape panic," Nature, vol. 407,
no. 6803, pp. 487, 2000.
[12] D. Helbing, I. Farkas, T. Vicsek, "Freezing by heating in a driven mesoscopic system," Physical re-
view letters, vol. 84, no. 6, pp. 1240, 2000.
[13] D. Helbing, M. Isobe, T. Nagatani, K. Takimoto, "Lattice gas simulation of experimentally studied
evacuation dynamics," Physical review E, vol. 67, no. 6, pp. 067101, 2003.
[14] S. Gwynne, ER. Galea, M. Owen, PJ. Lawrence, L. Filippidis, "A review of the methodologies used in
the computer simulation of evacuation from the built environment," Building and environment, vol.
34, no. 6, pp. 741-749, 1999.
[15] G. Santos, BE. Aguirre, "A critical review of emergency evacuation simulation models". In Proceed-
ing of Conference "Building Occupant Movement During Fire Emergencies". Gaithersburg, Mary-
land: National Institute of Standards and Technology, (forthcoming). June 2004.
[16] B. Zhan, DN. Monekosso, P. Remagnino, SA. Velastin, LQ. Xu, "Crowd analysis: a survey," Machine
Vision and Applications, vol. 19, no. 5-6, pp. 345-357, 2008.
[17] X. Zheng, T. Zhong, M. Liu, "Modeling crowd evacuation of a building based on seven methodologi-
cal approaches," Building and Environment, vol. 44, no. 3, pp. 437-45, 2009.
[18] M. Kobes, I. Helsloot, B. De Vries, JG. Post, "Building safety and human behaviour in fire: A litera-
ture review," Fire Safety Journal, vol. 45, no. 1, pp. 1-11, 2010.
[19] S. Zhou, D. Chen, W. Cai, L. Luo, MY. Low, F. Tian, VS. Tay, DW. Ong, BD. Hamilton, "Crowd
modeling and simulation technologies," ACM Transactions on Modeling and Computer Simulation
(TOMACS), vol. 20, no. 4, pp. 20, 2010.
[20] J. Radianti, OC. Granmo, N. Bouhmala, P. Sarshar, A. Yazidi, J. Gonzalez, "Crowd models for emer-
gency evacuation: A review targeting human-centered sensing," 46th Hawaii International Conference
on System Sciences, IEEE, pp. 156-165, 2013.
[21] E. Canetti, Crowds and power, Macmillan, 1984.
[22] GL. Bon, The Crowd: A Study of the Popular Mind, Kitchener, Ont: Batoche, 2001.
[23] D. Helbing, "A mathematical model for the behavior of pedestrians," Behavioral science, vol. 36, no.
4, pp. 298-310, 1991.
[24] Y. Tajima, K. Takimoto, T. Nagatani, "Scaling of pedestrian channel flow with a bottleneck," Physi-
ca A: Statistical Mechanics and its Applications, vol. 294, no. 1-2, pp. 257-268, 2001.
[25] D. Helbing, P. Molnar, "Social force model for pedestrian dynamics," Physical review E, vol. 51, no.
5, pp. 4282, 1995.
[26] D. Helbing, I. Farkas, T. Vicsek, "Simulating dynamical features of escape panic," Nature, vol. 407,
no. 6803, pp. 487, 2000.
[27] D. Helbing, "A fluid dynamic model for the movement of pedestrian," arXiv preprint cond-
mat/9805213, 1998.
[28] D. Helbing, L. Buzna, A. Johansson, T. Werner, "Self-organized pedestrian crowd dynamics: Experi-
ments, simulations, and design solutions," Transportation science, vol. 39, no. 1, pp. 1-24, 2005.
[29] D. Helbing, A. Johansson, HZ. Abideen, "Dynamics of crowd disasters: An empirical study," Physical
review E, vol. 75, no. 4, pp. 046109, 2007.
[30] A. Johansson, D. Helbing, HZ. Al-Abideen, S. Al-Bosta, "From crowd dynamics to crowd safety: a
video-based analysis," Advances in Complex Systems, vol. 11, no. 04, pp. 497-527, 2008.
[31] ] X. Zheng, T. Zhong, M. Liu, "Modeling crowd evacuation of a building based on seven methodolog-
ical approaches," Building and Environment, vol. 44, no. 3, pp. 437-445, 2009.
24
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
[32] D. Helbing, IJ. Farkas, P. Molnar, T. Vicsek, "Simulation of pedestrian crowds in normal and evacua-
tion situations," Pedestrian and evacuation dynamics, vol. 21, no. 2, pp. 21-58, 2002.
[33] A. Schadschneider, W. Klingsch, H. Klüpfel, T. Kretz, C. Rogsch, A. Seyfried, "Evacuation dynam-
ics: Empirical results, modeling and applications," arXiv preprint arXiv:0802.1620, 2008.
[34] DH. Biedermann, PM. Kielar, O. Handel, A. Borrmann, "Towards TransiTUM: A generic framework
for multiscale coupling of pedestrian simulation models based on transition zones," Transportation
Research Procedia, vol. 2, pp. 495-500, 2014.
[35] RM. Tavares, "Evacuation processes versus evacuation models: "Quo Vadimus"?," Fire Technology,
vol. 45, no. 4, pp. 419-430, 2009.
[36] K. Ijaz, S. Sohail, S. Hashish, "A survey of latest approaches for crowd simulation and modeling us-
ing hybrid techniques," In17th UKSIMAMSS International Conference on Modelling and Simulation,
pp. 111-116, 2015.
[37] N. Bellomo, B. Piccoli, A. Tosin, "Modeling crowd dynamics from a complex system viewpoint,"
Mathematical models and methods in applied sciences, vol. 22, no. supp02, pp. 1230004, 2012.
[38] D. Helbing, "A fluid dynamic model for the movement of pedestrians," arXiv preprint cond-
mat/9805213, 1998.
[39] LF. Henderson, "On the fluid mechanics of human crowd motion," Transportation research, vol. 8,
no. 6, pp. 509-515, 1974.
[40] M. Chraibi, A. Tordeux, A. Schadschneider, A. Seyfried, "Modelling of Pedestrian and Evacuation
Dynamics," Encyclopedia of Complexity and Systems Science, pp. 1-22, 2018.
[41] LF. Henderson, "The statistics of crowd fluids," nature, vol. 229, no. 5284, pp. 381, 1971.
[42] GE. Bradley, "A proposed mathematical model for computer prediction of crowd movements and
their associated risks," Engineering for crowd safety, Proceedings of the International Conference on
Engineering for Crowd Safety. Amsterdam: Elsevier, pp. 303-311, 1993.
[43] D. Helbing, IJ. Farkas, P. Molnar, T. Vicsek, "Simulation of pedestrian crowds in normal and evacua-
tion situations," Pedestrian and evacuation dynamics, vol. 21, no. 2, pp. 21-58, 2002.
[44] X. Zheng, T. Zhong, M. Liu, "Modeling crowd evacuation of a building based on seven methodologi-
cal approaches," Building and Environment, vol. 44. no. 3, pp. 437-445.
[45] RL. Hughes, "A continuum theory for the flow of pedestrians," Transportation Research Part B:
Methodological, vol. 36, no 6, pp. 507-535, 2002.
[46] RL. Hughes, "A continuum theory for the flow of pedestrians," Transportation Research Part B:
Methodological, vol. 36, no 6, pp. 507-535, 2003.
[47] RM. Colombo, MD. Rosini, "Pedestrian flows and non‐classical shocks," Mathematical Methods in
the Applied Sciences, vol. 28, no. 13, pp. 1553-1567, 2005.
[48] S. Wolfram, "Cellular automata and complexity: collected papers," CRC Press, 2018.
[49] GJ. Perez, G. Tapang, M. Lim, C. Saloma, "Streaming, disruptive interference and power-law behav-
ior in the exit dynamics of confined pedestrians," Physica A: Statistical Mechanics and its Applica-
tions, vol. 312, no. 3-4, pp. 609-618, 2002.
[50] A. Kirchner, A. Schadschneider, "Simulation of evacuation processes using a bionics-inspired cellular
automaton model for pedestrian dynamics," Physica A: statistical mechanics and its applications,
2002.
[51] A. Kirchner, K. Nishinari, A. Schadschneider, "Friction effects and clogging in a cellular automaton
model for pedestrian dynamics," Physical review E, vol. 67, no. 5, pp. 056122, 2003.
[52] LZ. Yang, DL. Zhao, J. Li, TY. Fang, "Simulation of the kin behavior in building occupant evacuation
based on cellular automaton," Building and Environment, vol. 40, no. 3, pp. 411-415, 2005.
[53] L. Jian, Y. Lizhong, Z. Daoliang, "Simulation of bi-direction pedestrian movement in corridor," Phys-
ica A: Statistical Mechanics and its Applications, vol. 354, pp. 619-28, 2005.
[54] Z. Daoliang, Y. Lizhong, L. Jian, "Exit dynamics of occupant evacuation in an emergency," Physica
A: Statistical Mechanics and its Applications, vol. 363, no. 2, pp. 501-511, 2006.
25
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
[55] LG. Georgoudas, GC. Sirakoulis, IT. Andreadis, "A simulation tool for modelling pedestrian dynam-
ics during evacuation of large areas," In IFIP International Conference on Artificial Intelligence Ap-
plications and Innovations, Springer, Boston, MA, pp. 618-626, 2006.
[56] A. Varas, MD. Cornejo, D. Mainemer, B. Toledo, J. Rogan, V. Munoz, JA. Valdivia, "Cellular au-
tomaton model for evacuation process with obstacles," Physica A: Statistical Mechanics and its Ap-
plications, vol. 382, no. 2, pp. 631-642, 2007.
[57] K. Yamamoto, S. Kokubo, K. Nishinari, "Simulation for pedestrian dynamics by real-coded cellular
automata (RCA)", Physica A: Statistical Mechanics and its Applications, vol. 379, no. 2, pp. 654-660,
2007.
[58] R. Alizadeh, "A dynamic cellular automaton model for evacuation process with obstacles," Safety Sci-
ence, vol. 49, no. 2, pp. 315-323, 2011.
[59] RY. Guo, "New insights into discretization effects in cellular automata models for pedestrian evacua-
tion," Physica A: Statistical Mechanics and its Applications, vol. 400, pp. 1-11, 2014.
[60] D. Li, B. Han, "Behavioral effect on pedestrian evacuation simulation using cellular automata," Safety
science, vol. 80, pp. 41-55.
[61] P. Kontou, IG. Georgoudas, GA. Trunfio, GC. Sirakoulis, "Cellular Automata Modelling of the
Movement of People with Disabilities during Building Evacuation," In 2018 26th Euromicro Interna-
tional Conference on Parallel, Distributed and Network-based Processing (PDP), IEEE, pp. 550-557,
2018.
[62] E. Fredkin, T. Toffoli, "Conservative logic," International Journal of theoretical physics, vol. 21, no.
3-4, pp. 219-253, 1982.
[63] S. Wolfram, "Statistical mechanics of cellular automata," Reviews of modern physics, vol. 55, no. 3,
pp. 601, 1983.
[64] S. Wolfram, "Universality and complexity in cellular automata," Physica D: Nonlinear Phenomena,
vol.10, no. 1-2, pp. 1-35, 1984.
[65] DM. Shi, BH. Wang, "Evacuation of pedestrians from a single room by using snowdrift game theo-
ries," Physical Review E, vol. 87, no. 2, pp. 022802, 2013.
[66] Y. Tajima, K. Takimoto, T. Nagatani, "Scaling of pedestrian channel flow with a bottleneck," Physica
A: Statistical Mechanics and its Applications, vol. 294, no. 1-2, pp. 257-268, 2001.
[67] T. Itoh, T. Nagatani, "Optimal admission time for shifting the audience," Physica A: Statistical Me-
chanics and its Applications, vol. 313, no. 3-4, pp. 695-708, 2002.
[68] D. Helbing, M. Isobe, T. Nagatani, K. Takimoto, "Lattice gas simulation of experimentally studied
evacuation dynamics," Physical review E, vol. 67, no. 6, pp. 067101, 2003.
[69] R. Nagai, T. Nagatani, M. Isobe, T. Adachi, ". Effect of exit configuration on evacuation of a room
without visibility," Physica A: Statistical Mechanics and its Applications, vol. 343, pp. 712-724,
2004.
[70] R. Nagai, M. Fukamachi, T. Nagatani, "Experiment and simulation for counterflow of people going
on all fours," Physica A: Statistical Mechanics and its Applications, vol. 358, no. 2-4, pp. 516-528.
[71] W. Song, X. Xu, BH. Wang, S. Ni, "Simulation of evacuation processes using a multi-grid model for
pedestrian dynamics," Physica A: Statistical Mechanics and its Applications, vol. 363, no. 2, pp. 492-
500, 2006.
[72] M. Fukamachi, T. Nagatani, "Sidle effect on pedestrian counter flow," Physica A: Statistical Mechan-
ics and its Applications, vol. 377, no. 1, pp. 269-278, 2007.
[73] X. Guo, J. Chen, Y. Zheng, J. Wei, "A heterogeneous lattice gas model for simulating pedestrian
evacuation," Physica A: Statistical Mechanics and its Applications, vol.391, no. 3, pp. 582-592, 2012.
[74] X. Guo, J. Chen, S. You, J. Wei, "Modeling of pedestrian evacuation under fire emergency based on
an extended heterogeneous lattice gas model," Physica A: Statistical Mechanics and its Applications,
vol. 392, no. 9, pp. 1994-2006, 2013.
26
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
[75] X. Song, L. Ma, Y. Ma, C. Yang, H. Ji, "Selfishness-and selflessness-based models of pedestrian
room evacuation," Physica A: Statistical Mechanics and its Applications, vol.447, pp. 455-466, 2016.
[76] D. Helbing, P. Molnar, "Social force model for pedestrian dynamics," Physical review E, vol. 51, no.
5, pp. 4282, 1995.
[77] D. Helbing, I. Farkas, T. Vicsek, "Simulating dynamical features of escape panic," Nature, vol. 407,
no. 6803, pp. 487, 2000.
[78] M. Zheng, Y. Kashimori, T. Kambara, "A model describing collective behaviors of pedestrians with
various personalities in danger situations," InProceedings of the 9th International Conference on Neu-
ral Information Processing, IEEE, vol. 4, no. ICONIP'02, pp. 2083-2087, 2002.
[79] DR. Parisi, CO. Dorso, "Microscopic dynamics of pedestrian evacuation," Physica A: Statistical Me-
chanics and its Applications. Vol. 354, pp. 606-618.
[80] A. Seyfried, B. Steffen, T. Lippert, "Basics of modelling the pedestrian flow," Physica A: Statistical
Mechanics and its Applications, vol. 368, no. 1, pp. 232-238, 2006.
[81] Q. Lin, Q. Ji, S. Gong, "A crowd evacuation system in emergency situation based on dynamics mod-
el," InInternational Conference on Virtual Systems and Multimedia, Springer, Berlin, Heidelberg, pp.
269-280, 2006.
[82] DR. Parisi, CO. Dorso, "Morphological and dynamical aspects of the room evacuation process," Phys-
ica A: Statistical Mechanics and its Applications, vol. 385, no.1, pp. 343-355, 2007.
[83] RY. Guo, HJ. Huang, "A mobile lattice gas model for simulating pedestrian evacuation," Physica A:
Statistical Mechanics and its Applications, vol. 387, no 2-3, pp. 580-586.
[84] M. Okaya, T. Takahashi, "BDI agent model based evacuation simulation," InThe 10th International
Conference on Autonomous Agents and Multiagent Systems, International Foundation for Autono-
mous Agents and Multiagent Systems, vol. 3, pp. 1297-1298, 2011.
[85] L. Hou, JG. Liu, X. Pan, BH. Wang, "A social force evacuation model with the leadership effect,"
Physica A: Statistical Mechanics and its Applications, vol. 400, pp. 93-99, 2014.
[86] Y. Han, H. Liu, "Modified social force model based on information transmission toward crowd evac-
uation simulation," Physica A: Statistical Mechanics and its Applications, vol. 469, pp. 499-509,
2017.
[87] RL. Goldstone, MA. Janssen, "Computational models of collective behavior," Trends in cognitive sci-
ences, vol. 9, no. 9, pp.424-430, 2005.
[88] E. Bonabeau, "Agent-based modeling: Methods and techniques for simulating human systems," Pro-
ceedings of the national academy of sciences, vol. 99, no. suppl 3, pp. 7280-7287, 2002.
[89] N. Zarboutis, N. Marmaras, "Searching efficient plans for emergency rescue through simulation: the
case of a metro fire," Cognition, Technology & Work, vol. 6, no. 2, pp. 117-126, 2004.
[90] A. Braun, BE. Bodmann, SR. Musse, "Simulating virtual crowds in emergency situations," InProceed-
ings of the ACM symposium on Virtual reality software and technology, ACM, pp. 244-252, 2005.
[91] MC. Toyama, AL. Bazzan, "Da Silva R. An agent-based simulation of pedestrian dynamics: from lane
formation to auditorium evacuation," InProceedings of the fifth international joint conference on Au-
tonomous agents and multiagent systems, ACM, pp. 108-110, 2006.
[92] N. Pelechano, JM. Allbeck, NI. Badler, "Controlling individual agents in high-density crowd simula-
tion," InProceedings of the 2007 ACM SIGGRAPH/Eurographics symposium on Computer anima-
tion, Eurographics Association, pp. 99-108, 2007.
[93] S. Heliövaara, T. Korhonen, S. Hostikka, H. Ehtamo, "Counterflow model for agent-based simulation
of crowd dynamics," Building and Environment, vol. 48, pp. 89-100, 2012.
[94] V. Ha, G. Lykotrafitis, "Agent-based modeling of a multi-room multi-floor building emergency evac-
uation," Physica A: Statistical Mechanics and its Applications, vol. 391, no. 8, pp. 2740-2751, 2012.
[95] A. Poulos, F. Tocornal, JC. de la Llera, J. Mitrani-Reiser, "Validation of an agent-based building
evacuation model with a school drill," Transportation Research Part C: Emerging Technologies, vol.
97, pp. 82-95, 2018.
27
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
[96] SM. Lo, HC. Huang, P. Wang, KK. Yuen, "A game theory based exit selection model for evacuation,"
Fire Safety Journal, vol. 41, no. 5, pp. 364-369, 2006.
[97] A. Kirchner, H. Klüpfel, K. Nishinari, A. Schadschneider, M. Schreckenberg, "Simulation of competi-
tive egress behavior: comparison with aircraft evacuation data," Physica A: Statistical Mechanics and
its Applications, vol. 324, no. 3-4, pp. 689-697, 2003.
[98] C. Saloma, GJ. Perez, G. Tapang, M. Lim, C. Palmes-Saloma, "Self-organized queuing and scale-free
behavior in real escape panic," Proceedings of the National Academy of Sciences, vol. 100, no. 21, pp.
11947-11952, 2003.
[99] E. Altshuler, O. Ramos, Y. Núñez, J. Fernández, AJ. Batista-Leyva, C. Noda, "Symmetry breaking in
escaping ants," The American Naturalist, vol. 1666, no. 6, pp. 643-649, 2005.
[100] YQ. Jiang, W. Zhang, SG. Zhou, "Comparison study of the reactive and predictive dynamic models
for pedestrian flow," Physica A: Statistical Mechanics and its Applications, vol. 441, pp. 51-61, 2016.
[101] T. Huan-Huan, D. Li-Yun, X. Yu, "Influence of the exits' configuration on evacuation process in a
room without obstacle," Physica A: Statistical Mechanics and its Applications, vol. 420, pp. 164-178,
2015.
[102] NT. Anh, ZJ. Daniel, NH. Du, A. Drogoul, VD. An, "A hybrid macro-micro pedestrians evacuation
model to speed up simulation in road networks," InInternational Conference on Autonomous Agents
and Multiagent Systems, Springer, Berlin, Heidelberg, pp. 371-383, 2011.
[103] X. Wei, M. Xiong, X. Zhang, D. Chen, "A hybrid simulation of large crowd evacuation," In2011
IEEE 17th International Conference on Parallel and Distributed Systems, IEEE, pp. 971-975, 2011.
[104] M. Xiong, M. Lees, W. Cai, S. Zhou, MY. Low, "Hybrid modelling of crowd simulation. Procedia
Computer Science," vol. 1, no. 1, pp. 57-65, 2010.
[105] J. Sewall, D. Wilkie, MC. Lin, "Interactive hybrid simulation of large-scale traffic," ACM Transac-
tions on Graphics (TOG), vol. 30, no. 6, pp. 135, 2011.
[106] PC. Tissera, AM. Printista, E. Luque, "A hybrid simulation model to test behaviour designs in an
emergency evacuation," Procedia Computer Science, vol. 9, pp. 266-275, 2012.
[107] B. Banerjee, A. Abukmail, L. Kraemer, "Advancing the layered approach to agent-based crowd simu-
lation," In2008 22nd Workshop on Principles of Advanced and Distributed Simulation, IEEE, pp.
185-192, 2008.
[108] S. Patil, J. Van Den Berg, S. Curtis, MC. Lin, D. Manocha, "Directing crowd simulations using navi-
gation fields," IEEE transactions on visualization and computer graphics, vol. 17, no. 2, pp. 244-254,
2011.
[109] M. Xiong, S. Tang, D. Zhao, "A hybrid model for simulating crowd evacuation," New Generation
Computing, vol. 31, no. 3, pp. 211-235, 2013.
[110] SI. Park, Y. Cao, F. Quek, "Large Scale Crowd Simulation Using A Hybrid Agent Model," Motion in
Games, 2011.
[111] K. Ijaz, S. Sohail, S. Hashish, "A survey of latest approaches for crowd simulation and modeling us-
ing hybrid techniques," In17th UKSIMAMSS International Conference on Modelling and Simulation,
pp. 111-116, 2015.
[112] DH. Biedermann, PM. Kielar, O. Handel, A. Borrmann, "Towards TransiTUM: A generic framework
for multiscale coupling of pedestrian simulation models based on transition zones," Transportation
Research Procedia, vol. 2, pp. 495-500, 2014.
7
Authors
Danial Abdulkareem Muhammed received the B.Sc. degree in the field of com-
puter science from the University of Sulaimani, Iraq, in 2009, and the master's degree
(Hons.) in the field of software systems and internet technology from the University
28
Paper -- A Comprehensive Study on Pedestrians' Evacuation: A Review
of Sheffield, U.K., in 2012. He is currently pursuing the Ph.D. degree with the Uni-
versity of Sulaimani, working in the field of Artificial Intelligence in the subject of
Building Evacuation under Different Situations. He worked as an Assistant Program-
mer for nearly two years, and then continued his study in the University of Sheffield.
After that, he joined the Department of computer science, University of Sulaimani,
where he is currently affiliated with.
Soran AB. M. Saeed received the PhD degree in Computer Science (AI-CBR)
2006 University, London, UK. In 2001, He was representative of Sulaimani Universi-
ty for Scientific and Cultural affairs, Current position: Vice President for Scientific
Affairs and Higher Education at Sulaimani Polytechnic University (SPU). He is Head
the Board of eCourt System at Sulaimani Court in Iraq Developing by AKTORS
company from Estonia. His research interests are Artificial Intelligence, E-
Commerce, Information Security, Business Technology, Research Methodology, and
Software Engineering.
Tarik Ahmed Rashid received the Ph.D. degree in computer science and infor-
matics from the College of Engineering, Mathematical and Physical Sciences, Uni-
versity College Dublin (UCD), in 2006, where he was a Postdoctoral Fellow of the
Computer Science and Informatics School, from 2006 to 2007. He joined the Univer-
sity of Kurdistan Hewlêr, in 2017. His research interests include three fields. The first
field is the expansion of machine learning and data mining to deal with time series
applications. The second field is the development of DNA computing, optimization,
swarm intelligence, and nature inspired algorithms and their applications. The third
field is networking, telecommunication, and telemedicine applications.
29
|
1805.08629 | 1 | 1805 | 2018-05-20T22:50:30 | Correlation Clustering Based Coalition Formation For Multi-Robot Task Allocation | [
"cs.MA",
"cs.RO"
] | In this paper, we study the multi-robot task allocation problem where a group of robots needs to be allocated to a set of tasks so that the tasks can be finished optimally. One task may need more than one robot to finish it. Therefore the robots need to form coalitions to complete these tasks. Multi-robot coalition formation for task allocation is a well-known NP-hard problem. To solve this problem, we use a linear-programming based graph partitioning approach along with a region growing strategy which allocates (near) optimal robot coalitions to tasks in a negligible amount of time. Our proposed algorithm is fast (only taking 230 secs. for 100 robots and 10 tasks) and it also finds a near-optimal solution (up to 97.66% of the optimal). We have empirically demonstrated that the proposed approach in this paper always finds a solution which is closer (up to 9.1 times) to the optimal solution than a theoretical worst-case bound proved in an earlier work. | cs.MA | cs | Correlation Clustering Based Coalition Formation
For Multi-Robot Task Allocation
Ayan Dutta1, Vladimir Ufimtsev2, Asai Asaithambi1
8
1
0
2
y
a
M
0
2
]
A
M
.
s
c
[
1
v
9
2
6
8
0
.
5
0
8
1
:
v
i
X
r
a
Abstract- In this paper, we study the multi-robot
task
allocation problem where a group of robots needs to be allocated
to a set of tasks so that the tasks can be finished optimally. One
task may need more than one robot to finish it. Therefore the
robots need to form coalitions to complete these tasks. Multi-
robot coalition formation for task allocation is a well-known
NP-hard problem. To solve this problem, we use a linear-
programming based graph partitioning approach along with
a region growing strategy which allocates (near) optimal robot
coalitions to tasks in a negligible amount of time. Our proposed
algorithm is fast (only taking 230 secs. for 100 robots and 10
tasks) and it also finds a near-optimal solution (up to 97.66%
of the optimal). We have empirically demonstrated that the
proposed approach in this paper always finds a solution which is
closer (up to 9.1 times) to the optimal solution than a theoretical
worst-case bound proved in an earlier work.
I. INTRODUCTION
Due to the inherent complexity of real world tasks (e.g.,
search and rescue, fire extinguishing, information collection)
and limited capabilities of the available robots in the market,
it is almost impossible for one robot to finish a complex
task. As a result, cooperation among the robots is one of
the basic requirements for any task completion. One form
of cooperation among robots is coalition formation, where
a subset of available robots forms a team that is assigned
to a specific task. In this paper, we do not study how the
task is subdivided among the members of a robot coalition.
Instead, we study how a set of N robots can be optimally
divided into M coalitions to complete M tasks. Most of the
previous research in coalition formation deals with software
agents [6], [8], [12]. But real-world complexities, such as the
on-board computational power of the robots and constrained
communication, tend to limit the number of robots these al-
gorithms can handle. The approach of this paper successfully
handles as many as 100 robots.
The problem of coalition formation for multi-robot task
allocation can be described as follows: given a set of M
tasks and N robots (N > M), how to partition the robot
group optimally into coalitions where each coalition will be
assigned to a unique task. It has been proven that multi-
robot coalition formation problem for task allocation is NP-
hard to both solve exactly and to approximate within a
factor of O(M 1−),∀ > 0 [13]. Therefore, solving the
coalition formation problem for multi-robot task-allocation
in a reasonable amount of time while retaining the quality
1School of Computing at
{a.dutta, asai.asaithambi}@unf.edu
the University of North Florida, USA.
2Dept. of Mathematics & Computer Science at the East Central Univer-
sity, USA. [email protected]
of the formed coalitions is an extremely challenging problem.
In this paper, we propose an efficient algorithm for coalition
formation by a group of mobile robots for task allocation so
that the algorithm can run on the robots' on-board computers.
We present a novel value function for the tasks which
is used to assign only the required number of robots to
each task. We also present a distance-based cost function
to minimize the travel distances by the robots to the tasks.
Our approach employs a clustering-based coalition formation
methodology [1]. Clustering is a technique of gathering
'common' elements under the same label. We exploit this
idea to allocate nearby robots considered as 'common' to the
same cluster, centered around a specific task, while distant
robots are assigned to different tasks. Results show that our
approach finds a near-optimal solution (up to 97.66% of the
optimal) in a negligible amount of time.
II. RELATED WORK
Autonomous robots need to cooperate with each other
to complete complex tasks at hand. Forming teams (or,
coalitions) for efficient task completion is a computation-
ally hard problem. One of the earliest studies on task
allocation via coalition formation is due to Shehory and
Kraus [14], in which the authors have proposed a greedy
algorithm that
is guaranteed to find a solution within a
factor of (k + 1) of the optimal where k is maximum size
of any coalition formed. Coalition formation by a multi-
agent system has been studied extensively in the following
decade. Optimal [9], [10] and near-optimal [11] solutions
for coalition formation have been proposed. Most of these
proposed algorithms employ a search-based technique to find
the best solution. Although coalition formation algorithms
have been developed frequently in the last decade, very few
of them are targeted for multi-robot/agent task allocation
[13]. Taxonomies of coalition formation algorithms for task
allocation are proposed in [5], [4]. Following the taxonomy
in [4], our work in this paper can be classified as addressing
a single-task robot and multi-robot task problem. In other
words, each robot is capable of completing only one task
at a time and each task requires more than a single robot
to finish. A distributed solution which formulates the coali-
tion formation problem for multi-agent task allocation as
a distributed set partitioning problem is proposed in [15].
In [13], the authors have proposed a modified version of
the algorithm proposed in [14] and the complexity of their
algorithm, (O(N 3
2 M )), is polynomial compared to that of
Shehory and Kraus [14], which is O(N kM ), exponential on
the size of the largest coalition. However, both [13], [14]
report similar sub-optimality guarantees.
Our proposed solution in this paper generates coalitions
using a correlation clustering technique [1], [3]. It
is a
very commonly used technique in machine learning and
pattern recognition. In correlation clustering, highly corre-
lated points, robots in our case, are assigned to the same
clusters whereas the points with low correlation are allocated
to different clusters. One cluster is formed centering on
one specific task and the result of this clustering process
is equivalent to the generation of non-overlapping coalitions
of robots.
III. PROBLEM DEFINITION AND NOTATIONS
available with the robots. We assume that(cid:80)
Let R = {r1, r2, .., rN} denote a set of N robots. Each
robot is characterized by a tuple (cid:104)Pi, θi(cid:105) where Pi and θi
respectively denote the position and the orientation of the
robot ri. We assume that each robot is able to localize
itself in the environment using an on-board GPS. Let T =
{t1, t2, .., tM} denote a set of M tasks (N > M). Any task
tj is characterized by a tuple (cid:104)Pj, Oj(cid:105) where Pj and Oj
respectively denote the task location and optimal number of
robots needed to finish that task. The value of Oj for each
task tj is pre-defined and this information is assumed to be
1≤j≤M Oj = N.
The robots are homogeneous in nature, i.e., any robot can be
exchanged with any other robot. The environment is assumed
to be a rectangle of size length × width is discretized into
a set of square cells (denoted by cell) and one cell can only
be occupied by at most one robot or one task at a time.
A coalition c ⊆ R is a team of robots assigned to one task.
Without loss of generality, we sometimes call a coalition a
cluster. A coalition structure CS, defined as a partition, can
be thought of as a set of non-overlapping clusters which
covers all the robots. Let CS = {c1, c2,··· , cM} denote
a coalition structure with ci assigned to task ti for i =
1, 2,··· , M. Let ζ denote the set of all possible partitions,
and hence CS ∈ ζ.
Value Function As the robots are homogeneous, the effec-
tiveness of any robot coalition depends solely on the size of
the coalition. We define V al : CS → R, a value function
that assigns a virtual reward to a coalition and is defined as
V al(ci) = O2
i − (Oi − ci)2.
(1)
V al ensures that if the coalition ci assigned to a certain task,
ti, has Oi members in it, i.e., ci = Oi, then that coalition
earns the maximum possible value. If the size of the coalition
is greater or less than the associated Oi, then the value of the
coalition is not the highest. On the other hand, if ci > 2Oi,
then the value of the coalition becomes negative. This makes
sure that none of the formed coalitions is too large in size if
it is not required by the pre-defined O value. We define the
value of a coalition structure as the summation of values of
all the coalitions in it, i.e., V al(CS) = (cid:80)∀ci∈CS V al(ci).
(cid:80)
Note that the maximum value of any coalition structure can
be mathematically computed as follows: M AX V AL =
j .
1≤j≤M O2
Cost Function The robots are initially randomly placed in
the environment. When a robot is assigned to a task as part of
a coalition, it needs to move to the task location to complete
the task. Each robot spends a certain amount of energy (in
terms of battery power) to move from one point to another.
This is represented using the proposed cost-distance func-
where
tion, defined as costdist(ri, tj) =
d denotes the Euclidean distance between two locations. We
next define the quantity fval(ri, tj) = 1 − costdist(ri, tj) to
represent the probability of a pair of robots or robot-task pair
being in the same coalition. From here, we can calculate the
'similarity' between a task and a robot [3] as
length2+width2+1
d(Pi,Pj )
√
(cid:18) fval(ri, tj)
1 − fval(ri, tj)
(cid:19)
w(ri, tj) = ln
.
(2)
We use the same function to represent the similarity between
two robots ri, rj. A higher value of w indicates that the
members of the pair of robots or the robot-task pair are
'similar' and they should be in the same coalition, while
a lower value of w would mean that they are 'dissimilar'
and should be in different coalitions. To ensure that no two
tasks are part of the same coalition, we define their similarity
to be highly negative.
Problem Objective The problem objective is to find a
set of coalitions for all the tasks such that the generated
coalition structure has the minimum cost, while its value is
the maximum. For each coalition ci ∈ CS assigned to task
ti, a cohesion function is defined as follows:
Co(ci) =
w(rj, ti) +
w(rj, rl)
(cid:88)
rj∈ci
and the cohesion quality of CS is
CQ(CS) =
Co(ci).
(cid:88)
rj ,rl∈ci,j(cid:54)=l
(cid:88)
∀ci∈CS
Now we can formally define the multi-robot task allocation
problem as follows:
Definition 1: Given a set of N robots and M tasks and
each task ti requiring Oi number of robots to finish it, find
the coalition structure CS∗ containing M coalitions (to be
assigned to M tasks) where:
CS∗ = arg max
CS∈ζ
CQ(CS),
also satisfying
V al(CS∗) = M AX V AL.
IV. COALITION FORMATION ALGORITHM
FOR TASK ALLOCATION
The total number of possible coalition structures (parti-
tions) is exponential in the number of robots. For N robots,
and a fixed size M, 1 ≤ M ≤ N, the total number of coali-
tion structures containing exactly M non-empty coalitions is
given by the Stirling number of the second kind: S(N, M ) =
1
M !
coalition structures grows exponentially in the number of
robots. With the goal of reducing the complexity of finding
the optimal coalition structure, we use the framework of [3]
(cid:1)(M − i)N . Thus the number of possible
i=0(−1)i(cid:0)M
(cid:80)M
i
which models the set of robots and tasks as a weighted
complete graph. The robots and tasks are represented by
vertices of the graph and edge weights correspond to the
'similarity' of a pair of robots or robot-task being in the same
coalition. The cohesion quality of a given coalition structure
(partition of robots into coalitions) is calculated by summing
the edge weights of all edges that are between robots in
the same coalition. If two robots are in different coalitions,
the weight of the edge between them is not included in the
sum. To actually generate a coalition structure, we use a
graph partitioning algorithm to split the vertices (robots) into
groups (coalitions) under the constraint that the generated
coalition structure has close to optimal cohesion quality.
A. Linear Programming Formulation for Graph Partitioning
For our purposes, G = (A, E, w) will be an undirected,
weighted, complete (fully-connected) graph. A is the set of
vertices which corresponds to the set of robots R and set
of tasks T i.e. A = T ∪ R, and E is the edge set which
consists of all possible pairs of robots and tasks from A (thus
(cid:1)). The edge weight function w : E → R is
E =(cid:0)R+T
as defined in Eq. (2).
2
For any given coalition structure CS, the penalty is defined
by
P en(CS) = P enp(CS) + P enm(CS),
(3)
where P enp(CS) corresponds the sum of positive edge
weights across different coalitions and P enm(CS) corre-
sponds to the sum of negative edge weights within the same
coalitions. More specifically:
P enp(CS) =
w(ri, rl) +
w(ri, tj)
(cid:88)
w(ri,tj )>0
ri∈ck1
k1(cid:54)=j
(cid:88)
(4)
w(ri, tj)
P enm(CS) =
w(ri, rl) +
w(ri,rl)<0
ri,rl∈cj
w(ri,tj )<0
ri∈cj
(5)
Note that the subscript of a coalition matches the subscript
of the task it is assigned to i.e. coalition cj corresponds
to task tj. The penalty incorporates both positive weighted
edges between different coalitions and negative weighted
edges that are part of the same coalition. Through the max-
imization of the sum of edge weights within coalitions, the
optimal coalition structure is obtained, considering only the
function CQ(CS), without the V al(CS) function. Through
minimization of the penalty, the cohesion quality function
(CQ(CS)) of the coalition structure is maximized [2].
As specified in [3], for each edge e = (ai, aj) ∈ E, where
ai, aj ∈ A, binary variables xai,aj ∈ {0, 1} for a clustering
(coalition structure) CS are defined as: xai,aj = 0 ↔ ∃cl ∈
CS : ai, aj ∈ cl (i.e., ai, aj are in the same coalition) and
xai,aj = 1 ↔ ∃ck1 , ck2 ∈ CS, k1 (cid:54)= k2 : ai ∈ ck1 , aj ∈ ck2
(i.e., ai, aj are in different coalitions). We will use xai,aj
and xe interchangeably from here on. The P en(CS) is then
(cid:88)
k1(cid:54)=k2
(cid:88)
w(ri,rl)>0
ri∈ck1 ,rl∈ck2 ,
reformulated using the following non-negative constants:
me =
pe =
0
(cid:26) w(e)
(cid:26) w(e)
(cid:88)
0
e∈E
if w(e) < 0
if w(e) ≥ 0
if w(e) > 0
if w(e) ≤ 0
(cid:88)
e∈E
P en(CS) is then given as:
P en(CS) =
pexe +
me(1 − xe)
(6)
As stated previously, finding a coalition structure with
minimal penalty is equivalent to finding the structure with
maximal cohesion quality CQ(CS). This problem is given
as the following 0-1 integer linear program:
min: (cid:80)
pexe + (cid:80)
e∈E
e∈E
me(1 − xe)
constraints:
xai,aj ∈ {0, 1},∀ai, aj ∈ A, i (cid:54)= j
xai,aj + xaj ,ak ≥ xai,ak ,∀ai, aj, ak ∈ A, i (cid:54)= j (cid:54)= k
xai,aj = xaj ,ai∀ai, aj ∈ A, i (cid:54)= j
The second constraint
is the triangle inequality, while
the third is the symmetry constraint. These ensure that a
valid coalition structure is generated from the solution.
Since this problem is NP-complete, it is relaxed to a linear
program with the same objective function and the following
constraints:
[3], [2]:
xai,aj ∈ [0, 1],∀ai, aj ∈ A, i (cid:54)= j
xai,aj + xaj ,ak ≥ xai,ak ,∀ai, aj, ak ∈ A, i (cid:54)= j (cid:54)= k
xai,aj = xaj ,ai∀ai, aj ∈ A, i (cid:54)= j
Algorithm 1 shows the pseudo-code for the coalition
structure formation based only on the cohesion quality. This
process runs in polynomial time (in N) and gives a O(log N )
approximation (see [3]). Although this problem can be solved
in polynomial time, the solution may be non-integer i.e.
fractional. Note that, if 0 < xai,aj < 1, then there is no
definite answer and we can think of xai,aj as the probability
that ai, aj are in different coalitions. In this case, there is
extra work to be done in order to determine whether or
not ai, aj are in the same coalition. This 'rounding off'
procedure is explained in the next section (IV.B Region
Growing). It may also happen that some robots are not
assigned to any coalition where there is a task. They may
be in their own singleton coalition, or may be in a cluster
with other robots but no task. In this case, extra work also
has to be done to assign the robots to the best possible
coalition. In fact, in such a case, there will be coalitions
with tasks that will not have a sufficient amount of robots
to complete the task, since in our formulation it is assumed
that the total number of robots needed to complete all tasks
is exactly N. The region growing technique explained in the
next section can also be used in these scenarios. Another
situation to consider is that even if an integer solution is
obtained, the value of the coalition structure found may not
be the maximum (M AX V AL), meaning some coalitions
will have too many or too few robots. In this case also, we
use the region growing algorithm to optimize the value.
Algorithm 2: Region Growing algorithm for value opti-
mization and assigning unassigned robots to tasks
Input: CS: Current coalition structure (result of the linear
Algorithm 1: Coalition structure formation based on the
CQ function
Input: R: A set of robots;
T : A set of tasks.
Output: CS: A coalition structure;
Rua: A set of unassigned robots.
1 Rua ← ∅
2 for each (ai, aj) ∈ A, (A = T ∪ R) do
3
4 Set the linear program constraints after calculating the penalty
Calculate w(ai, aj).
function (Eq. 6)
5 Obtain a solution that satisfies the above-mentioned
constraints by solving the linear program.
6 if 0-1 integer solution is obtained then
7
Whenever xai,aj = 0, group ai, aj into the same
coalition. This will create a valid coalition structure CS
(due to the symmetric and triangle inequality
constraints).
if V al(CS) (cid:54)= M AX V AL then
Use the Region Growing algorithm (Algorithm 2)
else
return CS.
8
9
10
11
12 else
13
14
Add the robots, for which all the edges including them
yields a fractional solution, to Rua.
Use the Region Growing algorithm (Algorithm 2).
B. Region Growing
The coalition structure found by the Algorithm 1 maxi-
mizes the cohesion quality of CS, but does not take the value
of CS into consideration. For this reason, it might so happen
that one of the coalitions formed in this stage is unnecessarily
large and as a consequence, while other coalitions may be
smaller in size than required. For instance, let us suppose that
in a warehouse, M stacks of boxes need to be moved from
one place to the other. In this case, each stack of boxes needs
four robots to carry it, because otherwise, either the stack will
fall or it is probably too heavy for a fewer number of robots.
On the other hand, if there are too many robots assigned to
one task, then resources will be wasted. In this example, if
the robot-coalition size is less than four, then the coalition
is useless. In order to address such scenarios effectively, our
objective function (Definition 1) requires the value of the
coalition structure to be maximized, after minimizing the
cost of forming it. Therefore, the region growing algorithm
aims to optimize the value of the coalition structure found
by the linear programming approach.
The region growing algorithm is executed under one or
both of the following conditions: first, the solution found in
the previous stage is fractional; or second, for the coalition
structure (CS) found by the linear programming solution,
V al(CS) (cid:54)= M AX V AL. In the region growing process, a
virtual ball (centered around a task) is iteratively grown. This
programming solution);
Rua: unassigned robots.
Output: CS(cid:48): The final coalition structure.
of robots assigned to them.
ci ← current coalition from CS formed for task ti
while ci < Oi do
1 Tsort ← Sort the tasks T in descending order of the number
2 for ti ∈ Tsort do
3
4
5
6
7
8
9
rad ← length(cell)
Grow a virtual ball of radius rad around ti
if rj ∈ Rua AND dist(rj, ti) ≤ rad then
ci ← ci ∪ rj /*CS is updated to CS(cid:48)*/
Rua ← Rua \ rj
10
11
12
13
rad ← rad + length(cell)
if ci > Oi then
Remove the farthest robots rk ∈ ci s.t. ci = Oi
/*CS is updated to CS(cid:48)*/
Rua ← Rua ∪ rk
ball decides which robots are ultimately clustered together
for a particular task and which robots are removed from
a cluster previously formed during the linear programming
phase. This can happen if one coalition size was initially too
large resulting from the previous solution. A ball is grown
for each task. The region growing algorithm terminates when
each robot is allocated to some task (i.e., assigned to a
cluster).
Let Rua ⊆ R denote the set of unassigned robots. One
robot can be unassigned from any task because of one of
the following two reasons: first, a fractional solution has
been found in the previous round for this particular robot; or
second, the cluster previously formed is unnecessarily large
for the task. Before the start of the region growing algorithm,
the set Rua is initialized with all robots unassigned to any
cluster in the previous stage.
In the region growing algorithm (shown as Algorithm 2),
a virtual ball of a certain radius (rad) is grown for each
task (with the task as its center) iteratively. Note that rad is
initialized to one cell length. In other words, the ball will
encompass all the robots which are one cell-away from the
task ti. In the next iteration, the radius is increased to two-
cell length. If ti's virtual ball has already engulfed Oi robots
in it, then we stop growing the ball any further for this task.
If there were more than Oi robots assigned to this task,
then those robots are declared unassigned now and added
to the set Rua. Note that, the virtual ball of any task can
engulf not only the already allocated robots to it in the linear
programming phase, but also the robots which are part of the
set Rua.
Lemma 1: The worst-case time complexity of the region
growing algorithm is O(M N ).
Proof: The worst-case time complexity of the region growing
algorithm is easily seen to be O(M N ) as follows. In step
1, the M tasks are sorted in the descending order of the
number of robots assigned. This will be of complexity
O(M log M ). The time complexity for the rest of the al-
gorithm can be determined by observing that Rua, the
number of unassigned robots must be reduced to zero. Of
course, since Rua ≤ N, if s iterations are required (by
growing the region with increasing radii each time) for each
coalition ci, i = 1, 2,··· , M,
the modification of Rua
and ci together will take at most sM N = O(M N ) time.
Thus, the time complexity of the region growing algorithm
is O(M log M + M N ). Since N > M, we conclude the
complexity is O(M N ).
Lemma 2: Each task ti will get Oi number of robots
M(cid:80)
j=1
assigned to it.
Proof: First, note that,
Oj = N. This also means that,
the total number of extra robots (based on O-value) assigned
to some tasks is equal to the total number of less robots
assigned to the rest of the tasks. Therefore, if any task tj is
assigned more robots than Oj, then there is definitely one
task tk for which ck < Ok. When the tasks are sorted in
descending order, the first task t1 in the list Tsort will have
either exactly O1 or more robots assigned to it. If c1 = O1,
then we move on to t2. If c1 > O1, then we detach the extra
(c1 − O1) robots from it and put them into the set Rua. If
cj < Oj for any task tj ∈ Tsort, j > 1, then robots from
Rua will be assigned to tj. Thus, every task, tj, will have
exactly Oj robots assigned to it, i.e., cj = Oj,∀tj ∈ T .
V. EXPERIMENTS
A. Settings
We have implemented our algorithms using the Java
programming language, and ran tests on a desktop computer
(Intel i7-7700 processor, 16GB RAM). We varied the number
of robots (N) between [10, 100] in steps of 10 and selected
the number of tasks (M) from the set [2, 4, 6, 8, 10]. Remem-
bering that the maximum value of S(N, M ) could grow ex-
ponentially with increasing M, We have kept the number of
tasks at a maximum level of 10 so that the number of possible
partitions to consider does not become prohibitively large.
Additionally, note that if the task count was greater than
50% of the number of robots, that robot-task pair was not
considered. The distinct 2D locations of the robots and the
tasks were randomly generated from U({[1, 100], [1, 100]}).
Also, we considered all possible ways of assigning optimal
numbers of robots for the tasks at hand. Thus, for each pair
(N, M ) we considered for experimentation, we generated all
possible Oi's by partitioning N into exactly M parts using
integer partitioning. For example, with N = 10 and M = 2,
the set of Oi's generated and tested are {{9,1}, {8,2},
{7,3}, {6,4}, {5,5}}. The results presented here represent
the averages of the results obtained over 10 runs with each
of these settings.
B. Results
In this section, we discuss our main findings from the
experiments.
Comparison with the optimal: We have implemented a
(a)
(b)
Fig. 1.
(a) Runtime comparison on log-scale with a brute-force algorithm
[7] (4 tasks); (b) Distance-based cost comparison with the optimal solution
(higher is better – 1 being the best-case). Dotted lines indicate the theoretical
bounds [13] and the solid lines indicate the performances of our proposed
approach.
brute-force algorithm [7] that finds the optimal solution
which can be compared with the solution produced by our
proposed approach. As our proposed strategy always finds
a solution with the maximum value, we found the coalition
structure using the brute-force method which has the max-
imum value (using Eq.1) and the minimum cost among all
the maximum-valued coalition structures. We could test this
algorithm for up to 12 robots and 4 tasks after which it
became prohibitive on our test machine. Two metrics have
been compared: 1) runtime and 2) total distance-cost among
the robots and the tasks they are assigned to. The result
is shown in Figure 1. As expected, this result (Fig. 1.(a))
shows that the brute-force algorithm takes considerably more
time than our proposed approach (up to 1630 times for 12
robots and 4 tasks). On the other hand, using our proposed
approach, the robots need to travel almost similar amount
of distances compared to the optimal solution. For example,
with 6 robots and 2 tasks, the total distance traveled by the
robots using the optimal solution was 296.49m.; using our
approach it was 303.58m.; and this indicates a 97.66% near-
optimal result. Moreover, our proposed approach performs
near-optimally in terms of finding the coalition structure
with the lowest distance-cost measurement while keeping
the value of the coalition structure optimal (Fig. 1.(b)). As
the more distance traveled by the robots would result in
higher battery expenditure, without loss of generality, we
may claim that our proposed approach would eventually be
able to bound the battery expenditure at a near-optimal.
We also compare this distance-cost ratio to the optimal
with a theoretical worst-case bound proved in [14], [13]. The
plot of this theoretical bound (maxi∈[1,m] Oi + 1) is shown
in Fig. 1.(b). This figure shows that our method always finds
a significantly better solution in terms of closeness to the
optimal in each of the test cases. The maximum and the
minimum difference of these two ratios are found to be 9.1
times (for 12 robots and 2 tasks) and 3.61 times (for 8 robots
and 4 tasks).
Performance of our approach: Next, we show how the
performance of our proposed approach scales with a large
set of robots and tasks. First, we test how the runtime of
our proposed algorithm scales for up to 100 robots and 10
78910111213Number of robots100101102103104Run time ratio to brute-force4681012Number of robots00.20.40.60.81Cost ratio to optimalM=2, our appraochM=2, theoretical boundM=4, our appraochM=4, theoretical boundtasks. As can be observed in Fig. 2.(a), the maximum time
taken by our approach is about 230 secs. for 100 robots
being assigned to 10 tasks. Note that, for this setting, the
astronomical number of possible coalition structures is 2.75×
1093.
(a)
(b)
(a) Runtime of our approach; (b) Normalized average distance-cost
Fig. 2.
the robots.
tance ((cid:80)
ri,tj
In Fig. 2.(b), we show how the normalized average dis-
costdist/N) traveled by the robots for moving
from their initial locations to their allocated task locations
changes with different number of robots and tasks. In this
figure, an almost-static trend can be noticed while the max-
imum difference between any two cases being about 0.06.
This shows that the average distance traveled by the robots
does not change significantly with varying N and M. We
are also interested to see how much gain we make in terms
of the value of the a coalition structure by using the region
growing algorithm. Remember that the linear programming
component does not take the O-values into account while
forming the best coalition structure. Therefore, we cannot
guarantee that this coalition structure will have the value
M AX V AL. It is evident from the result (Fig. 3.(a)) that we
always gain a significant amount of coalition structure value
by using the region growing algorithm (up to 3.2 × 105%).
In Fig. 3.(b), we see that the value of the coalition structure
produced as a final output is always the optimal thus showing
the importance of the region growing algorithm.
(a)
(b)
Fig. 3.
(a) Increment in coalition structure value from the linear program-
ming solution by using the region growing algorithm; (b) Comparison with
the optimal value (1 being the best-case).
We have empirically demonstrated that although we min-
imize the cost and maximize the value of the coalition
structures in two successive procedures, our approach could
still form a coalition structure (i.e., a set of coalitions
assigned to the tasks) which not only has the optimal value,
the cost of it is also very close to the optimal. Also, this
near-optimal result is produced in a negligible amount of
time given the notoriously intractable nature of the problem.
VI. CONCLUSION AND FUTURE WORK
We have proposed a multi-robot coalition formation algo-
rithm for task allocation inspired by the idea of correlated
clustering. Our proposed approach first finds a coalition
structure with the minimum cost using a linear programming-
based graph partitioning formulation and next, using a region
growing approach,
it optimizes the value of this found
coalition structure. We have empirically shown that our
proposed approach can yield a near-optimal solution within
an insignificant amount of time. This approach also performs
significantly better compared to a previously proposed theo-
retical bound. In the future, we plan to make this approach
distributed so that we can avoid the single point of failure.
Also, we plan to implement this approach on a group of
robots in a real-world setting.
REFERENCES
[1] N. Bansal, A. Blum, and S. Chawla. Correlation clustering. Machine
Learning, 56(1-3):89–113, 2004.
[2] P. Dasgupta, V. Ufimtsev, C. Nelson, and S. Hossain. Dynamic recon-
figuration in modular robots using graph partitioning-based coalitions.
In Proceedings of the 11th International Conference on Autonomous
Agents and Multiagent Systems-Volume 1, pages 121–128, 2012.
[3] E. D. Demaine and N. Immorlica. Correlation clustering with partial
In Approximation, Randomization, and Combinatorial
information.
Optimization.. Algorithms and Techniques, pages 1–13. Springer, 2003.
[4] B. P. Gerkey and M. J. Matari´c. A formal analysis and taxonomy of
task allocation in multi-robot systems. The International Journal of
Robotics Research, 23(9):939–954, 2004.
[5] H. C. Lau and L. Zhang. Task allocation via multi-agent coalition
In Tools with
formation: Taxonomy, algorithms and complexity.
Artificial Intelligence, 2003. Proceedings. 15th IEEE International
Conference on, pages 346–350. IEEE, 2003.
[6] T. Michalak, J. Sroka, T. Rahwan, M. Wooldridge, P. McBurney, and
N. R. Jennings. A distributed algorithm for anytime coalition structure
In Proceedings of the 9th International Conference on
generation.
Autonomous Agents and Multiagent Systems, pages 1007–1014, 2010.
[7] M. Orlov. Efficient generation of set partitions. Engineering and
Computer Sciences, University of Ulm, Tech. Rep, 2002.
[8] T. Rahwan and N. Jennings. An improved dynamic programming
algorithm for coalition structure generation. In Proceedings of the 7th
international joint conference on Autonomous agents and multiagent
systems, pages 1417–1420, 2008.
[9] T. Rahwan, S. Ramchurn, N. Jennings, and A. Giovannucci. An
anytime algorithm for optimal coalition structure generation. J. Artif.
Intell. Res. (JAIR), 34:521–567, 2009.
[10] T. Rahwan, S. D. Ramchurn, V. D. Dang, A. Giovannucci, and N. R.
In AAAI,
Jennings. Anytime optimal coalition structure generation.
volume 7, pages 1184–1190, 2007.
[11] T. Rahwan, S. D. Ramchurn, V. D. Dang, and N. R. Jennings. Near-
optimal anytime coalition structure generation. In IJCAI, volume 7,
pages 2365–2371, 2007.
[12] S. Ramchurn, M. Polukarov, A. Farinelli, C. Truong, and N. Jennings.
Coalition formation with spatial and temporal constraints. In Proceed-
ings of the 9th International Conference on Autonomous Agents and
Multiagent Systems, pages 1181–1188, 2010.
[13] T. C. Service and J. A. Adams. Coalition formation for task allocation:
Theory and algorithms. Autonomous Agents and Multi-Agent Systems,
22(2):225–248, 2011.
[14] O. Shehory and S. Kraus. Methods for task allocation via agent
coalition formation. Artificial Intelligence, 101(1):165–200, 1998.
[15] P. T. Tosic and G. A. Agha. Maximal clique based distributed coali-
tion formation for task allocation in large-scale multi-agent systems.
MMAS, 4:104–120, 2004.
020406080100Number of robots050100150200250Run time (seconds)M=2M=4M=6M=8M=10020406080100Number of robots0.250.30.350.4Average cost (normalized)M=2M=4M=6M=8M=10020406080100Number of robots00.511.522.533.5Increment in value(%)105M=2M=4M=6M=8M=1046810Number of Tasks102030405060708090100Number of Robots00.511.52Ratio to Optimal Value |
1605.01853 | 1 | 1605 | 2016-05-06T08:07:55 | A computational intuition pump to examine group creativity: building on the ideas of others | [
"cs.MA"
] | This paper presents a computational approach to modelling group creativity. It presents an analysis of two studies of group creativity selected from different research cultures and identifies a common theme ("idea build-up") that is then used in the formalisation of an agent-based model used to support reasoning about the complex dynamics of building on the ideas of others. | cs.MA | cs | Citation: Sosa, R. & Connor, A.M. (2015) A computational intuition pump to examine group
creativity: building on the ideas of others. Proceedings of the 2015 IASDR Conference:
Interplay 2015. Brisbane, 2-5th November 2015.
A computational intuition pump to examine
group creativity: building on the ideas of
others
Ricardo Sosa, Design and Creative Technologies, Auckland University of
Technology, [email protected]
Andy M. Connor, Design and Creative Technologies, Auckland University of
Technology, [email protected]
Abstract
This paper presents a computational approach to modelling group creativity. It presents an
analysis of two studies of group creativity selected from different research cultures and
identifies a common theme ("idea build-up") that is then used in the formalisation of an
agent-based model used to support reasoning about the complex dynamics of building on the
ideas of others.
Agent-based simulation; creative teams; research methods
Understanding and managing the group dynamics that lead to creative collaborations and
creative teamwork is an important part of developing innovation capability (Francis &
Bessant, 2005). Of particular interest are multidisciplinary and multicultural settings
(Fruchter, 2001). Several problems are associated with methodically studying a process such
as creativity, elusive by definition (Cardoso de Sousa, 2007). This paper applies agent-based
simulation (ABS) as a way to model multi-level principles related to creativity and
innovation (Watts & Gilbert, 2014). It illustrates how computational models can be relevant
for mixed-method studies (Creswell, 2009) by modelling qualitative and quantitative aspects
of group creativity, in particular the critical process of building upon the ideas of others.
Introduction
Aiming to develop a deeper and more structured reasoning about principles of group
creativity, this paper adopts agent-based simulation (ABS) as a way to support rigorous
thinking and argumentation. ABS is applied here as an 'intuition pump', defined as a
resource to aid reasoning about complex subjects by harnessing intuition (Dennett, 2014).
Using ASB as an 'intuition pump' allows researchers to setup, run and analyse computational
systems as a way to support intuitive reasoning about difficult problems, to assess and clarify
arguments and to reveal meaningful ideas about group creativity. Rather than seeking
validity, or concrete recommendations for the management of creativity, ABS is used here as
a tool to "pump an intuition" and to help researchers and practitioners say "Aha! Oh, I get
it!" (Dennett, 2014).
The work presented in this paper builds on the tradition of research on creative collaboration
(Diehl & Stroebe, 1987) and creative teams (Osborn, 1963). Its main motivation is to
contribute to the theoretical understanding of what characterises creative teamwork, and to
the practical formulation of evidence-based strategies to form and manage creative groups
(Paulus & Nijstad, 2003).
Qualitative and quantitative research cultures
In creativity research two cultures or traditions exist based on two types of methods broadly
defined as qualitative and quantitative (Mahoney & Goertz, 2006). Table 1 presents the main
underlying differences between these two research cultures, related to how studies are
framed, how participants are selected, and how data is collected and analysed.
Table 1: Differences between Qualitative and Quantitative Research Cultures -adapted from (Mahoney & Goertz, 2006).
Quantitative methods used in creativity research
Qualitative methods used in creativity research
Cross-case analysis
Within-case analysis
Exemplary creative subjects selected
Randomised subjects selected; sampling
Statistical analysis
Descriptive analysis
Effects of independent variables
Causes of observations
Semantic treatment of concepts (definitions)
Numerical treatment of concepts (measurement)
Tends to symmetric explanations
Tends to asymmetric explanations
Deep data, often captures long processes
Wide scope data, often constrained to short processes
Personal experience is critical; tolerance for
implicitness
Seeks thorough explicitness
This paper aims to connect these two research cultures by building computational
simulations to support reasoning about creativity and innovation (Watts & Gilbert, 2014).
Both quantitative and qualitative lenses are used here, focusing specifically on the process of
("idea build-up", inspired by studies that represent the two research cultures and which
coincide in giving high importance to the building of new ideas upon the ideas of others.
Background
In recent decades a rich body of knowledge has been advanced related to the formation,
management and performance of creative groups (Diehl & Stroebe, 1987; Kohn, Paulus, &
Choi, 2011; Paulus & Nijstad, 2003). Valuable evidence exists to guide the practice of group
creativity including the effects of incentives and motivation (Shepperd, 1993), the role of
cognitive and cultural diversity in creative teams (Shin, Kim, Lee, & Bian, 2012; Stahl,
Maznevski, Voigt, & Jonsen, 2010), and the links between creative teams and social capital
(Han, Han, & Brass, 2014), to name a few. Nonetheless, many issues remain open about
group creativity, often with findings that are inconclusive or contradictory, correlations with
no meaningful theoretical explanations, a general lack of multi-level connections for
example between cognitive, group and social processes, virtually no connections across
disciplinary traditions, and a lack of validation of studies in real settings (Sutton &
Hargadon, 1996).
Cellular automata and agent-based simulations have been used in the study of creativity and
innovation from a variety of research agendas, ranging from illustration and pedagogical, to
aids for designing public policy and forecasting future scenarios (Watts & Gilbert, 2014).
Axelrod presented a model of cultural transmission (1997) that has been used subsequently
to model group creativity and innovation (Sosa & Gero, 2005; Watts & Gilbert, 2014). Other
agent models have been proposed for the study of systemic creativity (Kahl & Hansen,
2015), creative cities (Malik, Crooks, Root, & Swartz, 2015), the effects of peer-review in
innovation (Sobkowicz, 2015), creative leadership (Leijnen & Gabora, 2010), the impact of
intellectual property on innovation (Haydari & Smead, 2015), and idea generation in multi-
level neural models (Iyer et al., 2009).
A number of authors working with computational creativity have articulated the need to
include social evaluation in an otherwise solipsistic tradition of modelling individual
creativity (Grace, Maher, Fisher, & Brady, 2014; Jordanous, 2012; Sosa & Gero, 2015) Key
principles across five theoretical domains have been linked to formulate a framework for the
study of systemic creativity that includes social evaluation (Sosa, Gero, & Jennings, 2009),
and a functional framework was proposed to support multi-level modelling (Sosa & Gero,
2015). This paper adopts a multi-dimensional approach to examine idea generation of
groups, focusing on the process by which team members build on the idea of others (Kohn et
al., 2011).
The following section presents an analysis of two prominent studies of creativity from the
quantitative and qualitative research cultures where similarities and differences are
highlighted, and a common issue of interest is extracted to guide the development of a multi-
agent simulation of group creativity.
Building on the ideas of others
Two related studies of group creativity from different research traditions are analysed here.
An experimental study of idea generation in teams (Girotra, Terwiesch, & Ulrich, 2010)
represents the quantitative culture, whilst a four-year case study of creative collaboration
between product designers represents the qualitative culture (Elsbach & Flynn, 2013). Table
2 summarises the main similarities, differences, and identifies a common theme in these
studies. The similarities include research questions aimed at collaborative work by creative
designers in the context of organisational structures, and a particular focus on examining the
sharing and building on ideas. The differences range from the research methods applied, the
selection of participants and the design task conditions, the sources and type of data, and
how the analysis is carried. Whilst these studies are incommensurable and follow very
different criteria of scholarship (Mahoney & Goertz, 2006), both identify a common theme
related to the collaborative behaviour of building on the ideas of others, which we study in
detail in this paper aided by computational simulations described below. This issue is tackled
in different ways between research cultures, in the quantitative camp a rating system is
applied by trained judges to measure build-up scores, whilst in the qualitative tradition, a
theory-based framework is built from the data in an iterative process validated by the own
designers participating in the study.
Table 2. Analysis of two studies of group creativity from different research cultures
Key
similarities
Key
differences
(Girotra et al., 2010)
Research question: "How might individual work
in combination with working together (hybrid
groups) offer advantages over a pure team
structure?"
Motivation: "We build theory that relates
organizational phenomena to four different
variables that govern the underlying statistical
process of idea generation and selection."
Hypothesis: "The quality of the best ideas
generated and selected by a hybrid group is
higher than that of a team."
Results: "We show that idea generation in
teams is more likely to lead to ideas that build
on each other."
Limitations: "Our subjects' limited time,
resources, and prior exposure to the problem-
solving context limit our ability to perfectly
mimic a real situation. Furthermore, our
subjects were not placed in teams that had
developed a deep working relationship."
Research method: "Laboratory experiment
which compares group structures with respect
to each of the four variables individually, and
which measures their collective impact on the
quality of the best idea."
Data collection: "A within-subjects design, each
subject generates ideas under both the
treatments -team and hybrid."
Participants: "44 subjects from an upper-level
(undergraduate) product design elective
course (who) received training in idea
generation techniques. Subjects were
randomly divided in groups of four."
Design problem: "Each team is given 30
minutes to complete an idea generation
challenge. In the hybrid treatment, 10 minutes
to work individually and an additional 20
minutes to share and discuss their ideas and
to develop new ideas. Challenges: "1) A
manufacturer of sports and fitness products is
interested in new product concepts that might
be sold to students in a sporting goods retailer.
2) A manufacturer of dorm and apartment
products is interested in new product concepts
that might be sold to students in a home-
products retailer."
(Elsbach & Flynn, 2013)
Research question: "How do specific
collaboration activities relate to the self-
concepts of creative workers in corporate
contexts?"
Motivation: "We hope to shed light on the
reasons why some creative collaborations in
organizations succeed, while others fail."
Hypothesis: "We propose that affirming self-
concepts may conflict with collaborative
behaviours expected of creative workers."
Results: "Our analysis indicated that idea-
giving behaviours affirmed the personal
identities of most designers. The second
pattern indicated that idea-taking behaviours
threatened personal identities of most
designers."
Limitations: "Further research is needed to
identify the extent to which our findings can
generalize across different organizations and
different organizational cultures."
Research method: "Qualitative methods,
including interviews and non-participant
observation."
Data collection: "Over a four-year period: 40
open-ended interviews and approximately 100
hours of observation."
Participants: "40 designers (35 men, 5 women;
average age = 39.5 years; average time
working at the corporation = 12.7 years).
Participants held the titles of staff designer (7),
project designer (16), or designer (17)."
Design problem: "Designers in this division
were required to come up with approximately
1000 new toy designs a year. These original
designs sometimes involved relatively minor
modifications to existing designs (a new toy
car design), but often involved the creation of
completely new toy concepts."
Evaluation: "These designers viewed
themselves, and were viewed by management,
as creative workers. The director also told us
that collaborative teamwork was the norm on
all design projects, and that designers were
expected to collaborate with everyone on a
project team. All of the designers reported that
they were required to work extensively in
collaborative teams and that they considered
Evaluation: "An accurate measurement of idea
quality is central to our work (…) we use two
approaches: a quality evaluation tool, which
collects about 20 ratings per idea, and a
purchase-intent survey, which captures about
40 consumer opinions about their intent to
purchase a product. A (judging) panel received
formal training in the valuation of new
products. To verify the reliability of these
ratings, we constructed Kappa and AC1
statistics for each of the two idea domains."
Units of analysis: "Average quality of ideas,
number of ideas, variance in the quality of
ideas, and the ability of groups to discern the
quality of ideas. Our metric for effectiveness is
the quality of ideas selected as the best."
Data analysis: "All hypotheses related to idea
quality are tested using both business value
and purchase intent as measures of quality.
We use an analysis of variance (ANOVA) of
the judges' ratings given each idea. We include
controls for the four-person group of
individuals generating the ideas and the rater
who provided the rating. This is because there
are substantial differences in ability across the
groups, and because there are systemic
differences in how the scales were used by
different raters."
Definition: "One person can build on the ideas
of another in a way that increases the quality
of the ideas. As far as we know there has not
been any theoretical or empirical support for
the claim that these ideas are better than ideas
that are generated independently. In our study,
we directly explore the role of buildup. To do
this, we hired three independent judges to
code the substance of ideas on three
dimensions: the type of product, the principal
sporting activity associated with the product,
and the key benefit proposition of the proposed
product To construct our buildup metric, we
compare the classification of two consecutively
generated ideas. For example, if the idea
shares all three dimensions with the preceding
idea, it earns a buildup score of 3. More
generally, the buildup score is the number of
dimensions on which an idea shares a value
with the idea generated immediately
previously. We average this buildup score
across the three independent judges."
Findings: "We show that idea generation in
teams is more likely to lead to ideas that build
on each other (however) we find that ideas that
build on a previous idea are worse, not better,
on average. We found that differences in
performance across individuals are large and
highly significant."
Managerial implications: "If the interactive
buildup is not leading to better ideas, an
themselves to be creative workers due to their
job requirements to produce original toy
designs."
Units of analysis: "Two primary types of
personal identities of designers: (1) 'artistic'
personal identities, that included the self-
categorizations of 'creator', 'controller', and
'idealist'; and (2) 'problem solving' personal
identities, that included the self-categorizations
of 'pragmatist', 'refiner', and 'enabler'."
Data analysis: "Data analysis followed an
iterative approach, moving back and forth
between theory- development, data review,
and literature review. We analysed our data in
four stages. We asked (the designers) if our
placement made sense. All 30 of the designers
confirmed our choice of self-categorization
dimensions and personal identity
categorizations. Further, many of them
confirmed our placements of their colleagues.
Based on this feedback, we felt very confident
in our descriptions of these 30 designers'
personal identity categorizations and that our
coding scheme would produce accurate
results."
Definition: "We used past research as a guide
to label instances randomly selected from the
interview data. We came to agree upon a
framework of six common collaborative
behaviours described by designers: two
related to giving ideas (i.e. offering ideas and
promoting ideas), three related to taking ideas
(i.e. soliciting ideas, considering ideas, and
incorporating ideas), and one involved taking
and giving (co-creating) concurrently."
Findings: "Our findings suggest that the
positive impact of the collaborative behaviour
of incorporating ideas may depend, in part, on
the types of ideas being incorporated."
Managerial implications: "Promoting the
behaviour of idea-taking (not idea-giving) may
be what is critical to improving creative
collaborations. These findings make clear that
a one-size-fits-all approach to designing and
promoting creative collaborations is unlikely to
work. "Our findings suggest that, rather than
rewarding employees for offering 'the most
creative idea', organizations might offer
rewards to employees who are able to
effectively incorporate others' ideas into their
own work. Further, training programmes may
need to be updated to include education on
how to effectively take ideas from others, in
addition to how to give ideas. Effectively
leading creative collaborations may mean
preventing any single group member from
'owning' an idea in the early stages."
Common
theme:
"Building
on the
ideas of
others"
organization might be better off relying on
asynchronous idea generation by individuals."
The importance of "idea build-up" is recognised in both studies, albeit they approach it from
different angles, and recognise the need for further research on this theme. How to reason
about "idea build-up" and how to tackle it in systematic studies? How do 'idea-taking' and
'idea-giving' shape creative collaboration? How may the definition of "idea build-up" help
interpret the outcomes of ideation teams? We propose here a mixed-method approach using
computational modelling where a variety of lenses can be worn to look at idea build-up.
An agent-based simulation of creative collaboration
An influential simulation model of idea transmission is extended here that aims at examining
"just how much of cultural emergence and stability can be explained without resorting to
centralized authority" (Axelrod, 1997). In that model of cultural convergence (i.e.,
imitation), agents share information by exchanging values between neighbours. These
stochastic systems gradually converge either to a single value (system ergodicity), or they
form 'regions' or clusters when agent interaction is conditioned by compatibility
(neighbouring agents that share at least one value at initial time). This simple model has
been widely extended, including in studies of creativity and innovation (Araujo & Mendes,
2009; Kiesling, Günther, Stummer, & Wakolbinger, 2012; Leydesdorff, 2002; Sosa & Gero,
2005; Watts & Gilbert, 2014).
3.1 The Model
Axelrod's description of "the entire dynamics of the system" consists of two steps1: pick a
random agent to be active and one of its neighbours, and with probability equal to their
similarity (shared values), these agents interact by selecting at random a feature on which the
active agent and its neighbour differ (if any), as a result the active agent changes its trait on
this feature to the neighbour's trait on this feature (Axelrod, 1997). The model is usually
analysed consisting of hundreds of agents arranged in a two-dimensional grid initialised with
randomised cultural values, where 'culture' is defined by an array of integer variables (of
size = feature length) and the domain of these variables (traits) typically {0, 1, 2… 9}.
Notice that in the original formulation of this model, all active agents are defined as idea-
taking agents (Elsbach & Flynn, 2013).
The extension to this model presented here consists of incorporating a type of change agency
based on dissent or divergent behaviour. Applying the MDC framework of creativity (Sosa
& Gero, 2015), dissent is modelled at the societal level (MDC-S) as a standard behaviour
where every agent that identifies total group convergence attempts to introduce a new idea
1 "At random, pick a site (cell) to be active, and pick one of its neighbors. With probability equal to their
cultural similarity, these two sites interact. An interaction consists of selecting at random a feature on which the
active site and its neighbour differ (if there is one) and changing the active site's trait on this feature to the
neighbor's trait on this feature" (Axelrod, 1997)
by changing its variables to random values (with a low probability of success of 0.1%).
Inspired by the two ideation studies analysed above, we distinguish between idea-giving and
idea-taking behaviours at the group level (MDC-G) by defining a ratio from each type in the
formation of groups at initial time in the simulation. The specific aim here is to understand
the effects of group composition across different ratios of 'idea takers' and 'idea givers'
interacting.
Previous studies have shown that incorporating dissent or divergent behaviour in the original
Axelrod model triggers cycles of collective convergence -or consensus on a dominant value
followed by sudden episodes of collective change where groups adopt new values (Sosa &
Gero, 2005). This paper investigates the effects of different ratios of idea-taking and idea-
giving agents in a group. To this end, we repeatedly run the model to obtain average values
for groups where all agents are 'idea-takers' (as the original formulation), and gradually
introduce idea-giving agents until groups where all agents are 'idea-givers'. One specific
dependent variable is measured: the number of collective changes of the dominant value,
which we call a revolution (Kuhn, 1996). In this context, a revolution is registered whenever
the entire group of agents adopts a value that was introduced by a dissenting agent. The
model analysed here consists of 9 agents in a 3x3 torus grid. Following Axelrod's lexicon,
ideas are encoded in 6 features, with 9 traits, with 'Von Neumann' neighbourhoods, and
initialised in fully converged mode, i.e., all agents adopting the same ideas at initial state.
Results are obtained by averaging 103 cases running for 104 simulation steps.
Results
Group composition is inspected from "all takers" (9t) to "all givers" (9g) in the group, in
increments of one member each time. The effects of group composition are not linear -as
shown in Figure 1. First, revolutions (change episodes) are highest in groups where all active
agents are idea-takers, or "rev_9t" in Figure 1 (as in Axelrod's original model). Introducing
idea-giving agents in the group affects the indicator of group creativity in this model by first
causing a dip in revolutions when one idea-giver agent is introduced ("rev_8t1g" in Figure
1), then increasing as a majority of agents engage in idea-giving behaviour.
Figure 1. Quantitative analysis of the idea-taking and idea-giving model (averages)
A way to interpret these results is to consider that a "9t" scenario is only a theoretical
construct, as research shows that all members of creative design teams engage in idea-giving
(Elsbach & Flynn, 2013). It is also worth noting that the increase in group creativity also
creates a different type of revolutions: when new ideas gain dominance, it is possible to
analyse whether they are adopted as introduced by the change agent, or whether they are the
product of combinatorial contributions from multiple team members. When only a few idea-
giving agents are present in the team and the level of revolutions is low, change agents tend
to retain 'ownership' of new ideas, whereas in groups with more idea-giving agents where
revolutions take place more often, winning ideas are almost by definition result of 'idea
build-up'. This seems like a fertile ground for co-creation, but it could also lead to negative
effects such as groupthink (Rose, 2011) in the absence of appropriate facilitation strategies.
These quantitative results give a general overview of the effects of idea-taking and idea-
giving when many cases are averaged. However, it is far from clear from looking at these
results what may explain the significant dip in group creativity with the introduction of one
idea-giving team member. Why are (hypothetical) teams of all idea-takers able to trigger
collective change more easily than teams where only one idea-giver agent is inserted? And
why is this result reversed as more idea-givers are introduced in a team?
To examine these questions, we adopt a qualitative lens to look at a specific case across three
conditions: when all team members engage in idea-taking ("rev_9t"), when only one idea-
giver joins the team ("rev_8t1g"), and when three idea-giver agents interact ("rev_6t3g").
Figure 2 shows a specific revolution episode from each of these three conditions that
illustrates the type of revolutions that occur. All episodes start with a new idea being
introduced breaking group convergence: each frame shows a simulation step, nine agents in
a torus 3x3 grid, each agent has 3 features and 9 possible traits per feature. In rev_9t, all
agents have adopted idea [000] when agent #4 introduces [626]. In rev_8t1g, all agents hold
[000] when agent #7 introduces [238], and in rev_6t3g, agent #2 introduces [682]. In rev_9t,
the second feature of the new idea spreads through the group, reaching dominance as [020]
in a few steps. In rev_8t1g, the new idea starts spreading as three composite ideas [200],
[030], and [230], and all agents switch to one of these variants, except for agent #0, which
sticks to [000], i.e., this is the agent fixed on idea-giving behaviour. In rev_6t3g, the new
idea [682] spreads as [600], [002], and [602], ultimately gaining dominance as [002] in the
group.
Figure 2. Qualitative analysis of the idea-taking and idea-giving model (one selected case)
These results are suggestive of the complexities of group creativity: when all agents in a
team engage in idea-taking, the probability that a new value be spread is high because at any
given iteration step, when agents interact with their neighbours, active agents take the new
'dissenting' value from neighbours. However, when an idea-giving agent is introduced, it
controls the process and becomes a 'gatekeeper' by virtue of being the only agent in the
group to give ideas to others. Such monopoly is broken as soon as another team member has
access to idea-giving capabilities, as both of them take ideas from others when they are in a
neighbouring (inactive) position of the other 'idea-giving' (active) agent. In teams of 'all
givers', the 'taking' role is performed by all agents when in the role of neighbours of active
agents.
Thus we can see that, other than the original Axelrod conditions of fully imitative team
members, this model shows that teams with only a single idea-giving member support very
low levels of group creativity. The model also shows that a critical mass of idea-giving
behaviour may be sufficient to reach high levels of group creativity, after which more idea-
giving fails to increase group creativity beyond what appears to be a 'glass ceiling' or natural
group capacity. Moreover, the model shows why this occurs: teams with a single dominant
idea-giving role suffer from a bottleneck enforced by an agent that indirectly adopts a
'change resistance' role. Rather than removing that type of agent from a team, our model
suggests that adding another idea-giving agent helps to balance the interactions and rapidly
increases the creative potential of the group. After a critical mass of about half the team,
adding more idea-giving agents may not have an impact on group creativity, and it may only
be beneficial if an increase in co-creation strategies is preferred.
Although these results cannot be generalised beyond this model, it is a good illustration of
the sensitivity of creative collaboration, and the large effects that even apparently small
changes can have. There are caveats to these results, with fundamental managerial
implications: whilst the dip between "all idea-takers" and "one idea-giver" is significant,
only 58% of cases show a decrease in number of revolutions, whilst 29% remain constant
and 13% in fact show an increase in this indicator of group creativity. This should be
considered a strength rather than a weakness of this simple model, as its stochastic nature is
reminiscent of the variability and unpredictable nature of creativity across cases.
Discussion
We have applied agent-based simulations as 'intuition pumps' to think quantitatively and
qualitatively about group creativity, and in particular 'idea build-up', or the building of new
ideas on the ideas of others. Big claims about the outcomes of this model in relation to real
world teams are explicitly avoided, as their role here is only to guide our intuitions. The
main lessons to think about creative groups are: a) group formation can be critical when
initial conditions define ranges of possible outcomes, and effects can be expected to be non-
linear; b) the balance between idea-giving and idea-taking is a delicate one in creative
collaborations, and a range of consequences should be considered both in research and
practice, such as idea ownership and idea decomposition; c) finally, this work shows that
agent-based models are useful as intuition pumps to reason about complex situations such as
creativity and innovation.
References
Araujo, T., & Mendes, R. V. (2009). Innovation and Self-Organization in a Multi-Agent Model. Advances in Complex
Systems, 12(02), 233–253. http://doi.org/10.1142/S0219525909002180
Axelrod, R. (1997). The Dissemination of Culture: A Model with Local Convergence and Global Polarization. Journal
of Conflict Resolution. http://doi.org/10.1177/0022002797041002001
Cardoso de Sousa, F. (2007). Still the elusive definition of creativity. International Journal of Psychology: A Bio
Psychosocial, 2, 55–82.
Creswell, J. W. (2009). Research design: Qualitative, quantitative, and mixed methods approaches. Research Design
qualitative quantitative and mixed methods approaches (Vol. 3rd). http://doi.org/10.1016/j.math.2010.09.003
Dennett, D. C. (2014). Intuition Pumps And Other Tools for Thinking. W. W. Norton & Company. Retrieved from
https://books.google.com/books?hl=en&lr=&id=9SduAwAAQBAJ&pgis=1
Diehl, M., & Stroebe, W. (1987). Productivity loss in brainstorming groups: Toward the solution of a riddle. Journal of
Personality and Social Psychology. http://doi.org/10.1037/0022-3514.53.3.497
Elsbach, K. D., & Flynn, F. J. (2013). Creative Collaboration and the Self-Concept: A Study of Toy Designers.
Journal of Management Studies, 50(4), 515–544. http://doi.org/10.1111/joms.12024
Francis, D., & Bessant, J. (2005). Targeting innovation and implications for capability development. Technovation,
25(3), 171–183. http://doi.org/10.1016/j.technovation.2004.03.004
Fruchter, R. (2001). Dimensions of teamwork education. International Journal of Engineering Education, 17(4 and 5),
426–430.
Girotra, K., Terwiesch, C., & Ulrich, K. T. (2010). Idea Generation and the Quality of the Best Idea. Management
Science, 56(4), 591–605. http://doi.org/10.1287/mnsc.1090.1144
Grace, K., Maher, M. L., Fisher, D., & Brady, K. (2014). Modeling expectation for evaluating surprise in design
creativity. In Design Computing and Cognition'14 (pp. 189–206). Springer International Publishing.
Han, J., Han, J., & Brass, D. J. (2014). Human capital diversity in the creation of social capital for team creativity.
Journal of Organizational Behavior, 35(1), 54–71. http://doi.org/10.1002/job.1853
Haydari, S., & Smead, R. (2015). Does Longer Copyright Protection Help or Hurt Scientific Knowledge Creation?
Journal of Artificial Societies and Social Simulation2, 18(2), 23.
Iyer, L. R., Doboli, S., Minai, A. A., Brown, V. R., Levine, D. S., & Paulus, P. B. (2009). Neural dynamics of idea
generation and the effects of priming. Neural Networks : The Official Journal of the International Neural
Network Society, 22(5-6), 674–86. http://doi.org/10.1016/j.neunet.2009.06.019
Jordanous, A. (2012). A Standardised Procedure for Evaluating Creative Systems: Computational Creativity
Evaluation Based on What it is to be Creative. Cognitive Computation, 4(3), 246–279.
http://doi.org/10.1007/s12559-012-9156-1
Kahl, C. H., & Hansen, H. (2015). Simulating Creativity from a Systems Perspective: CRESY. Journal of Artificial
Societies and Social Simulation, 18(1), 4. Retrieved from http://jasss.soc.surrey.ac.uk/18/1/4.html
Kiesling, E., Günther, M., Stummer, C., & Wakolbinger, L. M. (2012). Agent-based simulation of innovation
diffusion: A review. Central European Journal of Operations Research. http://doi.org/10.1007/s10100-011-
0210-y
Kohn, N. W., Paulus, P. B., & Choi, Y. (2011). Building on the ideas of others: An examination of the idea
combination process. Journal of Experimental Social Psychology, 47(3), 554–561.
http://doi.org/10.1016/j.jesp.2011.01.004
Kuhn, T. S. (1996). The structure of scientific revolutions. The University of Chicago Press, 3rd Ed. Retrieved from
papers2://publication/uuid/C5D275F2-36F4-44E2-BA6E-BCEF8D99CE3B
Leijnen, S., & Gabora, L. (2010). An agent-based simulation of the effectiveness of creative leadership. In
Proceedings of the Annual Meeting of the Cognitive Science Society. Portland, Oregon.
Leydesdorff, L. (2002). The complex dynamics of technological innovation: a comparison of models using cellular
automata. Systems Research and Behavioral Science, 19(6), 563–575.
Mahoney, J., & Goertz, G. (2006). A tale of two cultures: Contrasting quantitative and qualitative research. Political
Analysis, 14(3), 227–249. http://doi.org/10.1093/pan/mpj017
Malik, A., Crooks, A., Root, H., & Swartz, M. (2015). Exploring Creativity and Urban Development with Agent-
Based Modeling. Journal of Artificial Societies and Social Simulation, 18(2), 12.
Osborn, A. F. (1963). Applied Imagination: Principles and procedures of creative problem solving. Oxford.
Paulus, P. B., & Nijstad, B. A. (2003). Group Creativity: Innovation through Collaboration. Work (Vol. 12).
http://doi.org/citeulike-article-id:975273
http://doi.org/10.1016/S1572-0977(06)12002-6
Rose, J. D. (2011). Diverse Perspectives on the Groupthink Theory – A Literary Review. Emerging Leadership
Journeys, 4, 37–57. Retrieved from
http://www.regent.edu/acad/global/publications/elj/vol4iss1/Rose_V4I1_pp37-57.pdf
Shepperd, J. A. (1993). Productivity loss in performance groups: A motivation analysis. Psychological Bulletin.
http://doi.org/10.1037/0033-2909.113.1.67
Shin, S. J., Kim, T. Y., Lee, J. Y., & Bian, L. (2012). Cognitive team diversity and individual team member creativity:
A cross-level interaction. Academy of Management Journal, 55(1), 197–212.
http://doi.org/10.5465/amj.2010.0270
Sobkowicz, P. (2015). Innovation Suppression and Clique Evolution in Peer-Review-Based, Competitive Research
Funding Systems: An Agent-Based Model. Journal of Artificial Societies and Social Simulation2, 18(2), 13.
Sosa, R., & Gero, J. S. (2005). A Computational Study of Creativity in Design: The Role of Society. Artificial
Intelligence for Engineering Design, Analysis and ManufacturingAI EDAM.
http://doi.org/10.1017/S089006040505016X
Sosa, R., & Gero, J. S. (2015). Multi-dimensional creativity: a computational perspective. International Journal of
Design Creativity and Innovation, 1–25. http://doi.org/10.1080/21650349.2015.1026941
Sosa, R., Gero, J. S., & Jennings, K. (2009). Growing and destroying the worth of ideas. In Proceeding of the seventh
ACM conference on Creativity and cognition - C&C '09 (p. 295). New York, New York, USA: ACM Press.
http://doi.org/10.1145/1640233.1640278
Stahl, G. K., Maznevski, M. L., Voigt, A., & Jonsen, K. (2010). Unraveling the effects of cultural diversity in teams: A
meta-analysis of research on multicultural work groups. Journal of International Business Studies.
http://doi.org/10.1057/jibs.2009.85
Sutton, R., & Hargadon, A. (1996). Brainstorming Groups in Context : Effectiveness in a Product Design Firm.
Administrative Science Quarterly, 41(4), 685–718. http://doi.org/10.2307/2393872
Watts, C., & Gilbert, N. (2014). Simulating Innovation: Computer-based Tools for Rethinking Innovation. Edward
Elgar Publishing.
Author Biographies
Ricardo Sosa
Ricardo combines a creative background as a designer with a passion for the study of
computational systems. He studies creativity and innovation principles through multi-agent
social systems and is involved in the development of facilitation practices for team ideation
and for participatory decision making. Ricardo partners with colleagues across disciplines
including: robotics, social science, cognitive science, architecture, arts, engineering,
business, public health, and computer science: https://colab.aut.ac.nz/staff/ricardo-sosa
Andy Connor
Andy is a mechanical engineer by training but has a breadth of experience in mechatronics,
software engineering, computer science and more recently in creative technologies. Andy
has a broad range of research interests that include automated design, computational
creativity, education, evolutionary computation, machine learning and software engineering:
https://www.aut.ac.nz/profiles/creative-technologies/senior-lecturers/andy-connor
|
1603.07766 | 1 | 1603 | 2016-03-24T21:59:32 | Simulation Platform for Multi Agent Based Manufacturing Control System Based on The Hybrid Agent | [
"cs.MA"
] | Agent based distributed manufacturing control and scheduling systems are subsets of new manufacturing systems. Multi agent systems (MAS) not only drive design and engineering control solutions but also influence flexibility, agility, and re-configurability, which makes MASs a better centralized systems than its traditional counterparts. However, implementation of all MASs in the real factories are timely, also extremely costly. A simulation environment that would allow independent development and testing of the services and business processes of the related manufacturing hardware is needed. This paper presents the design and implementation of a userfriendly simulation platform for multi agent based manufacturing control systems by considering the shop floor level. The proposed simulation platform can simulate the software level of the factory by considering the hardware level of the mentioned factory. An example of the simulation platform is presented for a flexible manufacturing system, which is located in EMU CIM lab. | cs.MA | cs | CIE45 Proceedings, 28-30 October 2015, Metz / France
SIMULATION PLATFORM FOR MULTI AGENT BASED MANUFACTURING CONTROL SYSTEM
BASED ON THE HYBRID AGENT
Ali Vatankhah barenji1, Amir Shaygan2, Reza Vatankhah Barenji2
1Department of Mechanical Engineering Eastern Mediterranean University, Famagusta, North
Cyprus, Turkey
2Department of Industrial Engineering Hacettepe University, Beytepe Campus Ankara, Turkey
[email protected]
ABSTRACT
Agent based distributed manufacturing control and scheduling systems are subsets of new
manufacturing systems. Multi agent systems (MAS) not only drive design and engineering control
solutions but also influence flexibility, agility, and re-configurability, which makes MASs a better
centralized systems than its traditional counterparts. However, implementation of all MASs in the
real factories are timely, also extremely costly. A simulation environment that would allow
independent development and testing of the services and business processes of the related
manufacturing hardware is needed. This paper presents the design and implementation of a user-
friendly simulation platform for multi agent based manufacturing control systems by considering
the shop floor level. The proposed simulation platform can simulate the software level of the
factory by considering the hardware level of the mentioned factory. An example of the simulation
platform is presented for a flexible manufacturing system, which is located in EMU CIM lab.
Keywords: Multi-agent distributed manufacturing control system, Agility, Simulation
1. INTRODUCTION
The era of "agile manufacturing", "lean manufacturing" and "Intelligent manufacturing" in
recent years, has brought worldwide competition among the manufacturing enterprises. This
competition between the stockholders in global market intensively returns to scheduling and
control system performance of the production system. Recent developments in MASs in
manufacturing control field can solve the existing problems. In order for the aforementioned
problems to be solved, more flexibility and agility are required as mentioned by Marik et al. [1].
MASs offers an alternate approach to design and managing of the control systems by providing
modularity, robustness and autonomy. Jennings et al. [2] has indicated that at least 25% of the
manufacturing problems can be solved.
Jennings [2] also mentions that the software required for centralized methods is more complex
than of those needed by the agents based approaches in terms of facilitating development,
debugging and maintenance. However, the main problems of MASs are analyzing, testing, and
validating of the behavior of the agent-based systems. Analyzing the MASs in manufacturing
control not only depends on the software level but also on the hardware level in the shop floor.
The design phase which takes place before the deployment of the resulted design in the real
operation is usually an arduous and time consuming task. Therefore, simulation tools are required
CIE45 Proceedings, 28-30 October 2015, Metz / France
in order to support the correction of misunderstandings and errors before implementation as
mentioned by Luke et al.[3].
Several environments are reported for the simulation of multi agent systems in the literature such
as Vrba [4-6]. Barbosa et al. [7] used an agent based modeling platform for the simulation of multi
agent manufacturing systems .However; these platforms are developed for specific cases and
according to the application particularities. This means that simulating the behavior of agent
based manufacturing systems for newly developed systems needs significant effort. In addition,
there is a lack of standard platform with the ability to analyze multi agent based manufacturing
control system in both hardware and software levels. This paper proposes an architecture for
simulating multi agent based manufacturing control system in the shop floor based on Hybrid
Agent (HA). The HA is in simultaneous communication with MASs and shop floor control system.
The remainder of this paper is structured as follows: Section 2 describes the architecture of
simulation platform. Section 3 explains existing multi agent system. Section 4 explains a case
study and discusses the results. Finally, Section 5 concludes the paper and presents future work.
2. ARCHITECTURE OF THE SIMULATION PLATFORM
Virtual reality is one of the ways to simulate manufacturing control systems by considering shop
floor. However due to the extended development time associated with the virtual resources of
each machine, analyzing this type of system in an actual factory setting is infeasible according to
Lin et al.[8]. Additionally, based on Barenji [9],when comparing alternate scheduling systems, it
is extremely intricate to replicate a similar condition for tentative tests .A prototype simulation
that acts as an actual system can be used to overcome this problem. Moreover, it is indistinctly
linked to the simulation platform or the actual system to control the actual system. In this
research, an integrated simulation system i.e., "Simulation Platform" has been developed,
following the approach of AV Barenji et al. [10] for testing MASs. The architecture of simulation
platform is shown in Fig1.
Figure 1 Architecture of Simulation Platform
CIE45 Proceedings, 28-30 October 2015, Metz / France
The Simulation Platform consist of three main parts:
1. The Hardware Simulation Agent (HSA): HSA is a software which can design the hardware
level of the factory by considering characterized physical actions that take place in the
manufacturing environment. Examples of HSA are Arena, CPN tool, etc.
2. Multi agent based manufacturing control system: This part is based on the "Manufacturing
Execution System" (MES) which is responsible for operation scheduling, production
dispatching, work in process status, data acquisition, etc.
3. Hybrid agent: HAs are computational processes capable of moving throughout a network,
interacting with foreign hosts, gathering information on behalf of the user, and returning
to the user after performing their assignments. Characteristic of the HA are : a) Hybrid
agent is capable of real time communication with other agent, b) HA is able to understand
the decision taken by MASs, c) Hybrid agent is capable of communicating with HSA via XML
(Extensible Markup Language).
The Multi agent based manufacturing control system are used to implement different kinds of
MAS architecture with hybrid agents. Furthermore, the HSA characterizes the physical actions
that take place in the manufacturing environment. This part is supported by many kinds of
software such as Arena, PN tools, Flexisim and etc. The most characteristics of HSA software just
ability to communication with XML. The primary feature of a simulation platform is to support
the examination of any control system when applied to a discrete manufacturing system. Colored
Petri Nets (CPN) which is a mathematical and graphical language for the design, specification,
simulation, and verification of discrete systems can be named as an example of hardware
simulation platform (HSP) software based on Tsinarakis et al. [11]. CPN and their extensions are
widely used in modeling discrete-event dynamic systems, including production systems and
networks. One of these tools that is used broadly is the CPN Tools which is a simulation software
for the altering, simulating and analyzing Colored Petri Nets. This application can communicate
via XML.
3. MULTI-AGENT SYSTEMS
An RFID (Radio Frequency Identification System) based multi-agent scheduling and control
architecture has been developed in authors previous works named RFIDMASs in Barenji et al. [12-
15].It should be mentioned that RFID are systems that transfer data with the aid of
electromagnetic fields in order to automatically trace and identify the tagged entities. The
proposed multi-agent system is designed as a network of software agents that interact with each
other and with the system actors. These agents are categorized as shop management agents,
agent managers, shop monitoring and command agents, station control agents, station monitoring
agents, agent machine interfaces, and manufacturing resource agents. In addition to the agents
forming the architecture, two databases exist in the architecture; a shop database and a station
database. Furthermore, based on Barenji et al.[16], ontology (a capability-based knowledge
model) is required for proper communication between the agents.
CIE45 Proceedings, 28-30 October 2015, Metz / France
To illustrate the functionality of the proposed simulation platform for performance measurement
of RFIDMASs, the Flexible Manufacturing Systems Laboratory (FMS Lab.) located in the Eastern
Mediterranean University (EMU) is used as the case study.
4. CASE STUDY
The FMS laboratory of EMU consists of three stations: Station 1 is a machine tending station, which
consists of a CNC milling machine and a five-axis vertically articulated robot. Station 2 is an
assembly and quality control station, gluing machine, and laser-scan micrometer device. Station
3 is an automatic storage and retrieval system (AS/RS). A conveyer integrates the stations for
performing material handling within the cell. RFIDMAS is selected as manufacturing execution
system and CPN Tools version 4 is chosen as HSA. Fig2 shows the CPN model of the FMS lab.
Figure 2 CPN Model of the FMS Lab
4.1 Hybrid agents
As mentioned in the part 2, hybrid agents are computational processes which are capable of
maneuvering in a network, communicating with alien hosts, collecting data vicariously for the
user, and returning to the user after performing its duty. Furthermore, hybrid agents have the
ability of administrating the information existing in networks. Some of hybrid agents' features
and capabilities are the real time inter-agent communication as well as their capability to
comprehend the decision making process done by RFIDMASs. Additionally they possess the ability
to exchange information with other software using XML. Fig 3 shows the sequence diagram for
starting a new task in the system and illustrates the interaction between agents.
Figure 3 Sequence Diagram for Starting a New Task in the System
New task is sent to the HA via an XML file in order to communicate with shop-level agents. Shop-
level agents consist of three types of agents, namely SMA, SMCA, and AM. A shop-level agent sends
CIE45 Proceedings, 28-30 October 2015, Metz / France
a request to a database agent for obtaining new data, and the database agent responds to this
request. If the answer is positive, shop-level agents send a further request to the station agents
checking for availability and possibility of doing a new job. If the answer to this request is positive
as well, the shop-level agent accepts this job, sends a comment to the database agents, and the
database agents send requirement data to the station agents. The station agent performs its duty
via communication between sub-agents.
The hardware simulation platform (HSP), as mentioned before, defines the tangible actions taking
place in the manufacturing environment. The communication model is set up in CPN Tools
software, which creates the real time communication between the simulation part and multi
agent control part. The XML codes for description of agents, MASs and resources are shown in the
Fig4.
Figure 2 XML Codes for Description of Agents, MASs and Resources
The experiments is carried out by considering two different scenarios: (A) no disturbances and a
well-functioning system and (B) incidents of failures in station one e.g. CNC, with a probability
of 20%. In the experiments, setup time is not considered and it is assumed that negotiation
failure would never occur. A robot and conveyor perform the transportation operations and
orders are queued and executed in the arrival of the order. Each action of transportation takes
8 seconds. The process time for the CNC for each part is 10 seconds. Additionally, the process
time of the assemble machine for the final product is 15 seconds. Each individual book of orders
involves the production of 3 parts: 1 bodies, 1 handle, and 1 cover. The simulation-based
reported test reflects 1000 book orders.
Performance indicators:
Manufacturing lead time: The total time required to manufacture an item, including order
preparation time, queue time, setup time, process time, move time, inspection time, and
put-away time.
Throughput: An indicator of the productivity of a manufacturing system, defined here as
the number of items produced per time unit.
Repeatability: The mean value of the standard deviation of the percentage of utilization
of all resources of the system over several runs.
CIE45 Proceedings, 28-30 October 2015, Metz / France
5. RESULTS AND DISCUSSION
The results from the simulation platform allowed us to draw some conclusions concerning the
operation of the RFIDMASs in the FMS by taking into account the hardware and softer level. The
system was found to function robustly and as specified in both normal operations and in the
presence of disturbances. Furthermore, the re-configurability of the system is demonstrated by
its accurate reactions to the introduction, removal, and modification of manufacturing
components. In particular, it is shown that when a resource control agent broke down or was
removed from the system, other agents continued to find alternative solutions for executing the
production plan. Fig 5 shows the results for the stable scenario, without the occurrence of
unexpected disturbances. In the stable scenario, the RFIDMASs system for the FMS yielded smaller
values for the manufacturing lead-time (198) and higher values for the throughput (68), in
comparison to those obtained using a conventional control system. The better performance of the
proposed system is resulted by the cooperation of autonomous entities, i.e., an agent manger
that elaborates optimized production plans.
Figure 3 Stable Scenario
The results for the second scenario is summarized in Fig6. The first conclusion drawn from these
simulation results is that the values of all performance indicators decreased in the presence of
disturbances. An analysis of the lead times and throughputs confirmed that the RFIDMASs
nonetheless yielded better performance than the conventional control systems.
Disturbances increase the entropy and unpredictability of a manufacturing control system. The
implementation of a multi-agent scheduling approach improves system performance by improving
the system's ability to respond to disturbances, as indicated by the smaller values of the
manufacturing lead-time and higher values of the throughput than those obtained using the
conventional scheduling control approach. The results indicate that the proposed system can
achieve good productivity even when resource interruptions increase and that it can respond to
resource breakdowns effectively. Analysis of the experimental results confirms that the use of
the proposed multi-agent scheduling approach results in better resource utilization than the
conventional approach in both stable and unstable scenarios.
CIE45 Proceedings, 28-30 October 2015, Metz / France
Figure 4 Disturbances Scenario
6. CONCLUSION
This paper proposes simulation platform for MASs based on the hybrid agent communication via
XML coded with other software. A simulation-based performance assessment is performed to
investigate the effectiveness of the multi-agent scheduling approach in comparison to a
conventional scheduling approach. A case study of a flexible assembly system in a medium-sized
factory was conducted. The multi-agent scheduling and production control system was tested
over an integrated experimental test bed developed based on a simulation model of the real
factory, integrated with an external multi-agent-based control system platform. The results of
the simulation platform for the case study show that MASs for FMS create more re-configurability
and agility. Future work will include the development of more user-friendly engineering tools for
modeling and simulation of multi-agent manufacturing control system software tools and Petri
net engineering platforms and achievement of a smooth migration from virtual scenarios to real
systems.
7. REFERENCES
[1] V. Marik and D. McFarlane, "Industrial adoption of agent-based technologies," IEEE Intelligent
Systems, vol. 20, pp. 27-35, 2005.
[2] N. R. Jennings and S. Bussmann, "Agent-based control systems," IEEE control systems, vol.
23, pp. 61-74, 2003.
[3] S. Luke, C. Cioffi-Revilla, L. Panait, K. Sullivan, and G. Balan, "Mason: A multiagent
simulation environment," Simulation, vol. 81, pp. 517-527, 2005.
[4] P. Vrba, "MAST: manufacturing agent simulation tool," in Emerging Technologies and Factory
Automation, 2003. Proceedings. ETFA'03. IEEE Conference, 2003, pp. 282-287.
[5] P. Vrba and V. Marík, "Capabilities of dynamic reconfiguration of multiagent-based industrial
control systems," Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions
on, vol. 40, pp. 213-223, 2010.
[6] Barenji, Ali Vatankhah, and Canberk Değirmenci. "Robot Control System based on Web
Application and RFID Technology." In MATEC Web of Conferences, vol. 28, p. 04001. EDP Sciences,
2015.
CIE45 Proceedings, 28-30 October 2015, Metz / France
[7] J. Barbosa and P. Leitão, "Simulation of multi-agent manufacturing systems using Agent-
Based Modelling platforms," in Industrial Informatics (INDIN), 2011 9th IEEE International
Conference on, 2011, pp. 477-482.
[8] Barenji, Ali Vatankhah, Reza Vatankhah Barenji, and Majid Hashemipour, "Flexible testing
platform for employment of RFID-enabled multi-agent system on flexible assembly line." Advances
in Engineering Software 91 (2016): 1-11.
[9] R. V. Barenji, "Towards a capability-based decision support system for a manufacturing
shop," in Collaborative Systems for Reindustrialization, ed: Springer, 2013, pp. 220-227.
[10] P. Leitão, J. M. Mendes, A. Bepperling, D. Cachapa, A. W. Colombo, and F. Restivo,
"Integration of virtual and real environments for engineering service-oriented manufacturing
systems," Journal of Intelligent Manufacturing, vol. 23, pp. 2551-2563, 2012.
[11] G. J. Tsinarakis, N. Tsourveloudis, and K. P. Valavanis, "Modular Petri net based modeling,
analysis, synthesis and performance evaluation of random topology dedicated production
systems," Journal of Intelligent manufacturing, vol. 16, pp. 67-92, 2005.
[12] A. V. Barenji, "An RFID-based distributed control system for flexible manufacturing system,"
Eastern Mediterranean University (EMU)-Doğu Akdeniz Üniversitesi (DAÜ), 2013.
[13] A. V. Barenji, R. V. Barenji, and M. Hashemipour, "A frameworks for structural modelling
of an RFID-enabled intelligent distributed manufacturing control system," South African Journal
of Industrial Engineering, vol. 25, pp. 48-66, 2014.
[14] R. V. Barenji, A. V. Barenji, and M. Hashemipour, "A multi-agent RFID-enabled distributed
control system for a flexible manufacturing shop," The International Journal of Advanced
Manufacturing Technology, vol. 71, pp. 1773-1791, 2014.
[15] A. Vatankhah Barenji, R. Vatankhah Barenji, and M. Hashemipour, "Structural modeling of
a RFID-enabled reconfigurable architecture for a flexible manufacturing system," in Smart
Objects, Systems and Technologies (SmartSysTech), Proceedings of 2013 European Conference
on, 2013, pp. 1-10.
[16] R. Vatankhah Barenji, M. Hashemipour, and D. A. Guerra-Zubiaga, "A framework for
modelling enterprise competencies: from theory to practice in enterprise architecture,"
International Journal of Computer Integrated Manufacturing, pp. 1-20.
[17] Barenji, Ali Vatankhah, Reza Vatankhah Barenji, and Majid Hashemipour. "Flexible testing
platform for employment of RFID-enabled multi-agent system on flexible assembly line." Advances
in Engineering Software 91 (2016): 1-11.
|
1805.03103 | 1 | 1805 | 2018-05-08T15:24:50 | Ordinal Approximation for Social Choice, Matching, and Facility Location Problems given Candidate Positions | [
"cs.MA",
"cs.GT"
] | In this work we consider general facility location and social choice problems, in which sets of agents $\mathcal{A}$ and facilities $\mathcal{F}$ are located in a metric space, and our goal is to assign agents to facilities (as well as choose which facilities to open) in order to optimize the social cost. We form new algorithms to do this in the presence of only {\em ordinal information}, i.e., when the true costs or distances from the agents to the facilities are {\em unknown}, and only the ordinal preferences of the agents for the facilities are available. The main difference between our work and previous work in this area is that while we assume that only ordinal information about agent preferences in known, we know the exact locations of the possible facilities $\mathcal{F}$. Due to this extra information about the facilities, we are able to form powerful algorithms which have small {\em distortion}, i.e., perform almost as well as omniscient algorithms but use only ordinal information about agent preferences. For example, we present natural social choice mechanisms for choosing a single facility to open with distortion of at most 3 for minimizing both the total and the median social cost; this factor is provably the best possible. We analyze many general problems including matching, $k$-center, and $k$-median, and present black-box reductions from omniscient approximation algorithms with approximation factor $\beta$ to ordinal algorithms with approximation factor $1+2\beta$; doing this gives new ordinal algorithms for many important problems, and establishes a toolkit for analyzing such problems in the future. | cs.MA | cs |
Ordinal Approximation for Social Choice, Matching,
and Facility Location Problems given Candidate Positions
Elliot Anshelevich and Wennan Zhu
May 9, 2018
Abstract
In this work we consider general facility location and social choice problems, in which sets
of agents A and facilities F are located in a metric space, and our goal is to assign agents to
facilities (as well as choose which facilities to open) in order to optimize the social cost. We form
new algorithms to do this in the presence of only ordinal information, i.e., when the true costs or
distances from the agents to the facilities are unknown, and only the ordinal preferences of the
agents for the facilities are available. The main difference between our work and previous work in
this area is that while we assume that only ordinal information about agent preferences in known,
we know the exact locations of the possible facilities F. Due to this extra information about
the facilities, we are able to form powerful algorithms which have small distortion, i.e., perform
almost as well as omniscient algorithms but use only ordinal information about agent preferences.
For example, we present natural social choice mechanisms for choosing a single facility to open
with distortion of at most 3 for minimizing both the total and the median social cost; this factor
is provably the best possible. We analyze many general problems including matching, k-center,
and k-median, and present black-box reductions from omniscient approximation algorithms with
approximation factor β to ordinal algorithms with approximation factor 1 + 2β; doing this gives
new ordinal algorithms for many important problems, and establishes a toolkit for analyzing
such problems in the future.
1
Introduction
Many important problems involve assigning agents to facilities. For example, assigning patients
to hospitals, students to universities, people to houses, etc. The target of assignment problems is
usually to minimize social cost or maximize social welfare. When we consider the social cost of
assignment problems, it is natural to assume the agents prefer facilities that are "closer" to them in
some sense, thus the social cost of an agent is often represented by the distance between the agent
and the facility it is assigned to. Besides the cost of distances, there are many other cost functions
and constraints for different problems; for example, in the capacitated facility assignment problem,
each facility has a maximum number of agents it can accommodate.
In this work we consider general facility location problems, in which sets of agents A and facilities
F are located in a metric space, and our goal is to assign agents to facilities (as well as choose which
facilities to open) so that agents are assigned to facilities which are close to them. For example, F
may be possible locations for opening new stores, and the goal may be that all agents have a store
near them, or that the sum of agent distances to the stores they are assigned to is small, etc. This
setting also captures many social choice problems, in which the facilities correspond to candidates,
and the goal would be to choose a single candidate (and assign all agents to this candidate) so that
the distances from the agents to the chosen candidate are small. Here the distances correspond to
1
spatial preferences, i.e., the metric space represents the ideological space in which a more preferred
candidate would be closer to me; see [3, 18] for discussion of such spatial preferences in social
choice. Our setting also captures matching and many related problems, in which we would open all
facilities, but are only able to assign one agent to each facility, thus forming a matching between
agents and facilities; facilities here could correspond to houses or items, for example.
If the distances between agents and facilities are known, then we can calculate the optimal
solution for these assignment problems. Note that many of the facility location problems are NP-
Complete, but at least it is possible to compute optimum assignments of agents to facilities (or the
optimum candidates to select for social choice settings) given unlimited computational resources.
For many of the settings we mentioned above, however, it is unlikely that we know the exact
distances from the agents to the facilities. For social choice these distances would correspond to
the cardinal preferences of voters for candidates, for example, "My cost for candidate X winning is
exactly 2.35." It is far more common that only ordinal preferences of the agents for the candidates
are known, i.e., "I prefer X to Y". Similarly, when trying to form a matching, or even in general
facility location problems where we survey the agents to find out their preferences, it is much
easier to elicit ordinal preferences ("I prefer to be matched with X over Y") over precise numerical
preferences. These observations have recently led to a large body of work using the utilitarian
approach, in which we assume that some latent numerical costs or utilities exist, but we only
know the ordinal preferences of the agents, not their underlying numerical costs. See for example
[3, 4, 11, 16, 21, 23, 29] for the social choice setting, [1, 5–7] for matching and other graph problems,
and [13] for facility location. These works focus on measuring the distortion of various algorithms:
a measure of how well an algorithm behaves when using only ordinal information, as compared
to the optimum algorithm which has access to the true underlying numerical information. More
formally, the distortion [3, 28] of an assignment is defined as the worst-case ratio of its social cost
to the social cost of the optimal solution.
As in the work mentioned above, we assume that only ordinal information about the distances
between agents and facilities is known. However, although the locations and numerical preferences
of the agents are usually difficult to obtain, the locations of facilities are mostly public information.
The locations of political candidates in ideological space can be reasonably well estimated based
on their voting records and public statements. When forming a survey about new stores to open,
we may not know exactly how much the customers would prefer one store over the other since the
customer locations may be private, but the locations of the possible stores themselves are public
knowledge. The main difference between our work and previous work in this area is that we assume:
While only ordinal information about agent preferences in known, we know the exact locations of
the possible facilities F.
As we discuss below, this extra information about the locations of the facilities relative to each
other allows us to produce much stronger algorithms, and show much nicer bounds on distortion.
In fact, in many cases, we do not even need the full information about the locations of the facilities.
The main message of this paper is that having a small amount of information about the candidates
in social choice settings, or the facilities in facility location, allows us to obtain solutions which are
provably close to optimal for a large class of problems even though the only information we have
about the agent preferences is ordinal, and thus it is impossible (even given unlimited computational
resources) to compute the true optimum solution.
2
1.1 Our Contributions
We begin by looking at the social choice setting, in which we have agents A and candidates F in
a metric space, and we are given an ordinal ranking of each agent for the candidates. This setting
was considered in e.g., [3,4,16,21,23,24,29]. In particular, for the objective of minimizing the total
distance from the agents to the chosen candidate, [3] showed that Copeland and similar voting
mechanisms always have distortion of at most 5, while no deterministic voting mechanism can
achieve a worst-case distortion of less than 3. Finding a deterministic mechanism with distortion
less than 5 has been an open problem for several years [23]. In this paper, we show that if we
know the exact locations of the candidates in addition to the ordinal ranking of the agents, then
there is a simple algorithm which achieves a distortion of 3, and no better bound is possible. In
other words, while we do not know the true distances from agents to candidates, we can compute
an outcome which is a 3-approximation no matter what the true distances are, as long as they are
consistent with the ordinal preferences given to us. Moreover, this approximation is possible even
if for each agent we are only given their favorite (i.e., top-choice) candidate: there is no need for
the agents to submit a full preference ranking over all the alternatives.
We also study other objective functions in addition to minimizing the total distance from agents
to the chosen alternative. We give a natural deterministic voting mechanism which has distortion
at most 3 for objectives such as minimizing the median voter cost, the egalitarian objective of
minimizing maximum voter cost, and many other objectives. This mechanism achieves all these
approximation guarantees simultaneously, and moreover it does not need the exact locations of the
candidates: it suffices to be given an ordinal ranking of the distances from each candidate to each
other candidate. In other words, this mechanism is especially suitable for the case when candidates
are a subset of voters, as our mechanism will obtain the ordinal ranking of each voter for all the
candidates, and this is the only information which would be required. Note that [3] proved that
no deterministic mechanism can achieve a distortion of better than 5 for the median objective; the
reason why we are able to achieve a distortion of 3 here is precisely because we also know how each
candidate ranks all the other candidates, in addition to how each voter ranks all the candidates.
We then proceed to our general facility assignment model. We are given a set of agents and a set
of facilities in a metric space. The distances between facilities are given, but the distances between
agents and facilities are unknown; instead we only know ordinal preferences of agents over facilities
which are consistent with the true underlying distances. There could be arbitrary constraints on
the assignment, such as facility capacities, or constraints enforcing that some agents cannot be (or
must be) assigned to the same facility, etc. A valid assignment is to assign each agent to a facility
without violating the constraints. We consider many different social cost functions to optimize.
For a general class of cost functions (essentially ones which are monotone and subadditive), we
give a black-box reduction which converts an algorithm for the omniscient version of this problem
(i.e., the version where the true distances are known) to an ordinal algorithm with small distortion.
Specifically, if we have an omniscient algorithm which always produces an assignment which is a
β-approximation to the optimum, then using it we can create an ordinal algorithm which only
knows the ordinal preferences of the agents instead of their true distances to the facilities, but has
distortion of at most 1 + 2β.
Many well-known problems fall into our facility assignment model; Table 1 summarizes some
of our results. For example, classic facility location with facility costs, minimum weight bipartite
matching, egalitarian bipartite matching, k-center, and k-median are all special cases. In particular
our results show that if we are given unbounded computational resources, then it is always possible
to form an assignment with distortion of at most 3 for these problems, and no better bound is
possible simply due to the fact that we do not possess all the relevant information to compute the
3
Omniscient: Agents' ordinal prefs Only agents' ordinal
prefs (lower bounds)
full distances
and facility locations
Total (Sum) Social Choice
Median Social Choice
Min Weight Bipartite Matching
Egalitarian Bipartite Matching
Facility Location
k-center
k-median
1
1
1
1
1.488 [27]
2 [25]
2.675 [12]
3
3
3
3
3.976
5
6.35
5(3)
5(5)
n(3)
-(2)
∞ (∞)
- (-)
- (Ω(n))
Table 1: Best known distortion of polynomial-time algorithms in different settings. "Omniscient"
stands for the setting where all the distances between agents and facilities are known, and the
numbers represent the best-known approximation ratios. The second column represent our setting,
in which the ordinal preferences of the agents, and the numerical distances between facilities are
known. The last column represents the pure ordinal setting in which only the agent ordinal prefer-
ences are known, but the distances between facilities are unknown; this setting has been previously
studied, and we include the known lower bounds on the possible distortion in parentheses, including
some which we prove in the Appendix.
true optimum. This is a large improvement over previously known distortion bounds: for minimum
cost ordinal matching the best-known distortion bound is n using random serial dictatorship (RSD)
[13]; by using the knowledge of facility locations we are able to reduce this approximation ratio to
3.
1.2 Discussion and Related Work
Ordinal approximation [2] for the minimum social cost (or maximum social welfare) with underlying
utilities/distances between agents and alternatives has been studied in many settings including
social choice [3, 4, 11, 14, 16, 21, 23, 28, 29], matchings [5–7, 9, 13, 17, 22], secretary problems [26],
participatory budgeting [8], general graph problems [1, 5] and many other models in recent years.
The general assumption of the ordinal setting is that we only have the ordinal preferences of agents
over alternatives, and the goal is to form a solution that has close to optimal social cost. There
are different models: social choice, matching, facility location, etc.; different objectives: minimizing
social cost, maximizing social welfare, total cost objective, median objective, egalitarian objective,
etc.; different assumptions on utility or cost functions: unit-sum, unit-range, metric space, etc. In
this paper, we study general facility assignment problems in a metric space, and assume that the
ordinal preferences of agents over alternatives are given. Unlike previous work on this topic, we also
assume the locations of the alternatives are known; we show that this extra information enables us
to achieve much better approximation ratios than in the pure ordinal setting for many problems.
The distortion of social choice functions was first introduced in [28], to describe the ratio
between the total utility of the optimal candidate and the candidate selected by a mechanism
using only ordinal preferences. [3,23,29] studied the distortion of social choice functions in a metric
space; the assumption that the underlying numerical costs have this metric property allows for
much better results than more general costs.
In particular, for the objective of minimizing the
total distance from the agents to the chosen candidate, the above papers were able to show good
distortion bounds for many well-known mechanisms, in particular a bound of 5 for Copeland [3],
a bound of O(ln m) for Single Transferable Vote (STV) [29], and many others.
In addition, [3]
proved that no deterministic mechanism can have worst-case distortion better than 3, and [29]
4
√
ln m − 1. Goel
showed that all scoring rules for m-candidates have a distortion of at least 1 + 2
et al. [23] showed that Ranked Pairs, and the Schulze rule have a worst-case distortion of at least
5, and the expected worst-case distortion of any (weighted)-tournament rule is at least 3. They
also introduced the notion of "fairness" of social choice rules, and discussed the fairness ratio of
Copeland, Randomized Dictatorship, and a general class of cost functions. Finding a deterministic
mechanism with distortion less than 5 has been an open problem for several years. In this paper,
we show that if we know the exact locations of the candidates in addition to the ordinal ranking of
the agents, then there is a simple algorithm which achieves a distortion of 3, and no better bound
is possible.
While the above work, as well as our paper, only focuses on deterministic algorithms, the
distortion of randomized algorithms in social choice has also been considered, see for example
[4,19,21,24]. In a slightly different flavor of result, [15,16] consider the special case where candidates
are randomly and independently drawn from the set of voters. While we leave the analysis of
randomized algorithms which know the location of the facilities to future work, and consider the
worst-case candidate locations, it is worth pointing out that our deterministic algorithm achieves
a distortion of 3, which is also the best known distortion bound for any randomized mechanism
which only knows the ordinal preferences of the agents. Similarly, another common goal is to form
truthful mechanisms with small distortion for matching and social choice, as in [6, 13, 21]; we focus
on general mechanisms in this paper in order to understand the limitations of knowing only certain
kinds of ordinal information, and leave the goal of forming truthful mechanisms for future work.
For the median objective of social choice problems, [3] showed that Copeland gives a distortion
of at most 5, while no deterministic mechanism can achieve a distortion of better than 5 . [4] also
gave a randomized algorithm that has a distortion of at most 4.
In this paper, we are able to
improve this bound to a tight worst-case distortion of 3 by a deterministic mechanism, because we
also know how each candidate ranks all the other candidates, in addition to how each voter ranks
all the candidates.
The distortion of matching in a metric space has received far less attention than social choice
questions. [5–7] analyzed maximum-weight metric matching; the maximization objective makes this
problem far easier, and even choosing a uniformly random matching yields a distortion of a small
constant. This is very different from our goal of computing a minimum-cost matching, for which no
ordinal approximations better than O(n) are known. [13] studied facility assignment problems in a
metric space; they considered the problem with or without resource augmentation, and the cases
without augmentation are exactly the minimum weight bipartite matching problem. [13] showed
that the approximation ratio of random serial dictatorship (RSD) is at most n, and gave a lower
bound of 2n − 1 for the approximation ratio of serial dictatorship (SD), and a lower bound of n0.26
for RSD. Their results are the best known ordinal approximations for this problem. In this paper,
we are able to give a tight 3-approximation for the minimum weight matching problem, given the
locations of facilities in addition to the agents' ordinal preferences.
2 Model and Notation: Social Choice
For the social choice problems studied in this paper, we let A = {1, 2, . . . , n} be a set of agents,
and let F = {F1, F2, . . . , Fm} be a set of alternatives, which we will also refer to sometimes as
candidates or facilities. We will typically use i and j to refer to agents and W, X, Y, Z to refer
to alternatives. Let S be the set of total orders on the set of alternatives F. Every agent i ∈ A
has a preference ranking σ ∈ S; by X (cid:31)i Y we will mean that X is preferred over Y in ranking
σ. Although we assume that each agent has a total order of preference over the alternatives and
5
that this order is known to us, for many of our results it is only necessary that the top choice of
each agent is known. We say X is i's top choice if i prefers X to every other alternative in F. We
call the vector σ = (σ1, . . . , σn) ∈ S n a preference profile. We say that an alternative X pairwise
defeats Y if {i ∈ A : X (cid:31)i Y } > n
2 . The goal is to choose a single winning alternative.
Cardinal Metric Costs.
In this work we take the utilitarian view, and assume that the ordinal
preferences σ are derived from underlying (latent) cardinal agent costs. Formally, we assume that
there exists an arbitrary metric d : (A ∪ F)2 → R≥0 on the set of agents and alternatives. The
cost incurred by agent i of alternative X being selected is represented by d(i, X), which is the
distance between i and X. Such spatial preferences are relatively common and well-motivated, see
for example [3, 18] and the references therein. The underlying distances d(i, X) are unknown, but
unlike most previous work we do assume the distances between alternatives are given. For example,
when alternatives represent facilities or stores to be opened, it makes sense that their specific
locations would be known, while the distances from the customers to the stores may be private.
Similarly, when the alternatives represent political candidates, it may be easy to estimate their
locations in ideological space (for example based on their voting records and public statements),
but the ideology of the voters is much harder to estimate, with mechanism designers only knowing
which candidates the voters prefer but not how much they prefer them. The distance between two
alternatives X and Y is denoted by l(X, Y ). We say that d is consistent with l if ∀X, Y ∈ F,
d(X, Y ) = l(X, Y ).
The metric costs d naturally give rise to a preference profile. We say that d is consistent with
σ if ∀i ∈ A, ∀X, Y ∈ F, if d(i, X) < d(i, Y ), then X (cid:31)i Y . It means that the cost of X is less
than the cost of Y for agent i, so agent i prefers X over Y . As described above, we know exactly
the distances l and the preferences σ, but do not know the true costs d which give rise to σ. Let
D(σ, l) be the set of metrics that are consistent with σ and l; we know that one of the metrics from
this possibly infinite space captures the true costs, but do not know which one.
(cid:80)
the most common notion of social cost is the sum objective function, defined as SC(cid:80)(X,A) =
Social Cost Distortion We study several objective functions for social cost in this paper. First,
i∈A d(i, X). We also study the median objective function, SCmed(X,A) = medi∈A(d(i, X)), as
well as the egalitarian objective and many others (see Section 3.2). We use the notion of distortion
to quantify the quality of an alternative in the worst case, similar to the notation in [11, 28]. For
any alternative W , we define the distortion of W as the ratio between the social cost of W and the
optimal alternative:
dist(cid:80)(W, σ, l) = sup
d∈D(σ,l)
distmed(W, σ, l) = sup
d∈D(σ,l)
SC(cid:80)(W,A)
minX∈F SC(cid:80)(X,A)
SCmed(W,A)
minX∈F SCmed(X,A)
In other words, saying that the distortion of W is at most 3 means that, no matter what the
true costs d are (as long as they are consistent with the σ and l which we know), it must be that
the social cost of W is within a factor of 3 of the true optimum alternative, which is impossible to
compute without knowing the true costs. Because of this, a small distortion value means that there
is no need to obtain the true agent costs, and the ordinal information σ (together with information
l about the alternatives) is enough to form a good solution.
6
A social choice function f on A and F takes σ and l as input, and returns the winning alter-
native. We say the distortion of f is the same as the distortion of the winning alternative chosen
by f on σ and l. In other words, the distortion of a social choice mechanism f on a profile σ and
facility distances l is the worst-case ratio between the social cost of W = f (σ, l), and the social cost
of the true optimal alternative.
3 Distortion of Social Choice Mechanisms
3.1 Distortion of Total Social Cost
In this section, we study the sum objective and provide a deterministic algorithm that gives a
distortion of at most 3. According to [3], the lower bound on the distortion for deterministic social
choice functions with only ordinal preferences (without knowing l) is 3. This occurs in the simple
example with 2 alternatives which are tied with approximately half preferring each one. No matter
which one is chosen, the true optimum could be the other one, and its social cost can be as much
as 3 times better. Because the example in Theorem 3 from [3] only has two alternatives, knowing
l does not provide any extra information, and thus that example also provides a lower bound of
3 in our setting, although we assume the distances l between facilities are known in this paper.
Therefore, our mechanism achieves the best possible distortion in this setting. Note that if we only
have ordinal preferences of the agents without the distances between facilities, then the best known
approach so far is Copeland, which gives a distortion at most 5. Thus our results establish that
by knowing the distances l between alternatives, it is possible to reduce the distortion from 5 to 3,
and no better deterministic mechanism is possible.
Lemma 3.1. Let W, X be alternatives. If W (cid:31)i X, then d(i, X) ≥ d(X,W )
. [Lemma 5 in [3]]
In the following algorithm, we generate a set of projected agents as follows: Given agents A,
alternatives F, and the preference profile σ, for each agent i denote alternative Xi as i's top choice.
Then we create a new agent i at the location of Xi in the metric space, as shown in Figure 1 (a);
consequently, ∀ Y ∈ F, d(i, Y ) = d(Xi, Y ). Denote the set of the new agents as A = {1, 2, . . . , n}.
For any metric d consistent with l, d(i, Y ) = d(Xi, Y ) = l(Xi, Y ), so the distances between agents
in A and alternatives in F are known to us, unlike the true distances between A and F.
2
Algorithm 1: Algorithm for the minimum total social cost.
Input : Agents A = {1, 2, . . . , n},
Alternatives F = {F1, F2, . . . , Fm},
Each agent i's top choice alternative,
Distances between alternatives, i.e., l(Y, Z), ∀ Y, Z ∈ F
on A by choosing X, i.e., SC(cid:80)(X, A) =(cid:80)
Output: The winning alternative W .
Generate projected agent set A. For each alternative X ∈ F, calculate the total social cost
Final Output: Return the alternative W that has the minimum social cost SC(cid:80)(W, A) .
i∈ A d(i, X) =(cid:80)
i∈ A l(i, X) .
Theorem 3.2. The distortion of Algorithm 1 for minimum total social cost on A is at most 3.
Proof. Let W denote the winning alternative. W has the minimum social cost on the agent set A,
so for any alternative Y , it must be that
7
Figure 1: (a) For each agent, generate a projected agent at the location of its top choice alternative.
(b) A figure demonstrating agent i, i's top choice alternative Y , i's projected agent i located at Y ,
the winner W , and the optimal alternative X for the proof of Theorem 3.2.
SC(cid:80)(W, A)
SC(cid:80)(Y, A)
=
(cid:80)
(cid:80)
(cid:80)
(cid:80)
Let X denote the true optimal alternative for A. We want to get dist(cid:80)(W, σ, l) by upper
i∈ A d(i, W )
i∈ A d(i, Y )
=
i∈A d(i, W )
i∈A d(i, Y )
≤ 1
(1)
(2)
bounding the cost incurred by W compared to X:
SC(cid:80)(W,A)
SC(cid:80)(X,A)
=
≤
=
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
i∈A d(i, W )
i∈A d(i, X)
i∈A(d(i,i) + d(i, W ))
(cid:80)
i∈A d(i, X)
(cid:80)
(cid:80)
i∈A d(i,i)
i∈A d(i, X)
+
i∈A d(i, W )
i∈A d(i, X)
The inequality d(i, W ) ≤ d(i,i) + d(i, W ) is due to the triangle inequality since d is a metric,
as shown in Figure 1 (b). ∀i ∈ A, we know that i is located at i's top choice alternative, so the
(cid:80)
distance between i and i must be less than (or equal to) the distance between i and any alternative;
(cid:80)
i∈A d(i,X) ≤ 1. For any agent i such
thus d(i,i) ≤ d(i, X). Summing up for all i ∈ A, we get that
that X is not i's top choice, suppose alternative Y is i's top choice, then i has the same location as
Y and d(i, X) = d(X, Y ). By Lemma 3.1, d(i, X) ≥ d(X,Y )
, thus d(i, X) ≥ d(i,X)
. For all i that X
holds for all i ∈ A. Together with
is i's top choice, d(i, X) = 0, so the inequality d(i, X) ≥ d(i,X)
inequality 1 and 2,
i∈A d(i,i)
2
2
2
8
SC(cid:80)(W,A)
SC(cid:80)(X,A)
≤ 1 +
(cid:80)
(cid:80)
i∈A d(i, W )
i∈A d(i,X)
2
(cid:80)
(cid:80)
i∈A d(i, W )
i∈A d(i, X)
≤ 3
= 1 + 2
3.2 Distortion of Median Social Cost
In this section, we study the median objective function, and provide a deterministic mechanism
that gives a distortion of at most 3. Recall that we define the median social cost of an alternative
X as SCmed(X,A) = medi∈A(d(i, X)). We will refer to this as med(X) when d and A are fixed.
If n is even, we define median to be the ( n
2 + 1)th smallest value of the distances. Note that no
deterministic mechanism which only knows ordinal preferences can have worst-case distortion better
than 5 (Theorem 14 in [3]). With known distances between facilities, we are able to provide a natural
social choice function with distortion of 3, which is also provably the best possible distortion in our
setting (consider the example in Theorem 3 from [3] again). Moreover, our social choice function
only uses ordinal information about the alternatives, and not the full distances l; in particular as
long as we have ordinal preferences of each alternative for each other alternative (and thus a total
order of the distances from each alternative to the others), then our mechanism will work properly.
Such ordinal information may be easier to obtain than full distances l; for example candidates
can rank all the other candidates. In particular, given agents with ordinal preferences such that
the candidates are a subset of the agents, our mechanism will always form an outcome with small
distortion, even if we do not know the distances l.
Note that using only agents' top choices over alternatives and the distances between alterna-
tives, as Algorithm 1 does for the total social cost objective, is not enough to give a worst-case
distortion of 3 for the median objective. Consider the following example: there are 4 alternatives
W, X, Y, Z, the distances between them are: d(W, Y ) = d(Y, X) = d(X, Z) = d(Z, W ) = 2 and
d(W, X) = d(Y, Z) = 4. Suppose W is agents 1, 2's top choice, X is agent 3, 4's top choice, Y is
agent 5, 6's top choice, and Z is agent 7, 8's top choice. This graph is symmetric, so we choose
an arbitrary alternative as the winner. Suppose we choose W as the winner, and the distances
between agents and facilities are: the distances from agents 1, 2 to W are both 100, the distances
from agents 1, 2 to X, Y, Z are all 102. The distances from agents 5, 6 to Y, X are all 1, and the
distances from agents 5, 6 to W, Z are all 3. The distances from agents 7, 8 to Z, X are all 1, and
the distances from agents 7, 8 to Y, W are all 3. The distances from agents 3, 4 to X are both
1, the distances from 3, 4 to Y, Z are all 3, and the distances from 3, 4 to W are both 5. In this
example, the median is the distance from 5th closest agent to the winning alternative. X is the
optimal alternative with med(W ) = 1, while med(W ) = 5 has a distortion of 5.
We will use the following Lemmas from [3] in the proof of our algorithm:
Lemma 3.3. For any two alternatives W and Y , we have med(W ) ≤ med(Y ) + d(Y, W ). [Lemma
11 in [3]]
Lemma 3.4. For any two alternatives Y and P , if P pairwise defeats (or pairwise ties) Y , then
med(Y ) ≥ d(Y,P )
Lemma 3.5. Let W, Y be an alternatives ∈ F, if W pairwise defeats (or pairwise ties) Y , then
med(W ) ≤ 3med(Y ). [Proved in Theorem 8 in [3]]
. [Proved in Theorem 16 in [3]]
2
The main easy insight which we use in the formation of our algorithm comes from the following
lemma.
9
Lemma 3.6. For any three alternatives W , Y , and P , if P pairwise defeats (or pairwise ties) Y ,
and d(Y, W ) ≤ d(Y, P ), then med(W ) ≤ 3med(Y ).
Proof. By Lemma 3.3, med(W ) ≤ med(Y ) + d(Y, W ). By Lemma 3.4, med(Y ) ≥ d(Y,P )
know that d(Y, P ) ≥ d(Y, W ), thus
. And we
2
med(W ) ≤ med(Y ) + d(Y, W )
≤ med(Y ) + d(Y, P )
≤ med(Y ) + 2med(Y )
≤ 3med(Y )
We use a natural Condorcet-consistent algorithm to approximate the minimum median social
cost with the agents' preference rankings σ and the ordinal preferences of every alternative over
other alternatives. First, create the majority graph G = (F, E), i.e., a graph with alternatives as
vertices and an edge (Y, Z) ∈ E if Y pairwise defeats or pairwise ties Z. If a Condorcet winner (i.e.
an alternative which pairwise defeats all others) exists, then we return it immediately.
Otherwise, we consider each pair of alternatives. By Lemma 3.5, if the edge (W, Y ) ∈ E, then
med(W ) ≤ 3med(Y ). When considering an alternative pair W, Y , if (W, Y ) (cid:54)∈ E and we know that
there exists another alternative P which meets the conditions of Lemma 3.6, then we add an edge
(W, Y ) to G. It is not difficult to see that whenever the edge (W, Y ) is in our graph, this means
that med(W ) ≤ 3med(Y ). As we prove below, at the end of this process there always exists at
least one alternative which has edges to all the other alternatives, and thus the distortion obtained
from selecting it is at most 3, no matter which alternative is the true optimal one.
Note that from the ordinal preferences of alternatives over each other, we can get a partial order
of distances between the alternatives. Denote this partial order as (cid:22), i.e., we say that d(W, Y ) (cid:22)
d(W, Z) if we know that W prefers Y to Z (we do not have information about strict preference).
This is the information we have on hand: we only know the partial order of distances between pairs
of alternatives which share an alternative in common. Note, however, that if there exists a cycle
in this partial order, i.e., d(Y1, Y2) (cid:22) d(Y2, Y3) (cid:22) d(Y3, Y4) (cid:22) ··· (cid:22) d(Yk, Y1) (cid:22) d(Y1, Y2), then this
implies that all the distances in the cycle are actually equal, and thus we can also add the relations
d(Y1, Y2) (cid:23) d(Y2, Y3) (cid:23) d(Y3, Y4) (cid:23) ··· (cid:23) d(Yk, Y1) (cid:23) d(Y1, Y2). Such cycles are easy to detect (e.g.,
by forming a graph with a node for every alternative pair and then searching for cycles), and thus
we can assume that whenever a cycle exists in our partial order, then for every pair of distances
d(W, Y ) and d(W, Z) in the cycle, we have both d(W, Y ) (cid:22) d(W, Z) and d(W, Y ) (cid:23) d(W, Z).
Lemma 3.7. Consider the modified majority graph G = (F, E) at any point during Algorithm 2.
For any edge (W, Y ) ∈ E, we have that med(W ) ≤ 3med(Y ).
Proof. By Lemma 3.5, for any edge (W, Y ) in the original majority graph, med(W ) ≤ 3med(Y ).
Now consider an edge (W, Y ) added to E when processing the alternative pair W, Y . It must
be the case that there exists an alternative P , such that d(Y, W ) ≤ d(Y, P ) and P pairwise defeats
(or ties) Y . By Lemma 3.6, med(W ) ≤ 3med(Y ).
Lemma 3.8. At the end of Algorithm 2, there must exist an alternative W such that ∀Y ∈ F−{W},
(W, Y ) ∈ E.
10
Algorithm 2: Algorithm for the minimum median social cost.
Input : Agents A = {1, 2, . . . , n},
Alternatives F = {F1, F2, . . . , Fm},
The majority graph G = (F, E),
Ordinal preferences of each alternative over other alternatives,
Partial order of distances between alternatives.
Output: The winning alternative W .
If there is a Condorcet winner W , return W as the winner.
forall alternative pairs W, Y do
if (W, Y ) (cid:54)∈ E or (Y, W ) (cid:54)∈ E then
WLOG, suppose (Y, W ) exists, but (W, Y ) does not exist.
if there exists an alternative P , such that we have d(Y, W ) (cid:22) d(Y, P ) in our partial
order information, and P pairwise defeats (or ties) Y then
Add edge (W, Y ) to E;
continue;
end
end
end
There must exists an alternative W such that ∀Y ∈ F − {W}, (W, Y ) ∈ E. Return W as the
winner.
Proof. We prove this lemma by contradiction. Suppose no such alternative W exists. Then for each
alternative Y , there is at least one alternative Z, such that only (Z, Y ) ∈ E and (Y, Z) (cid:54)∈ E. This is
because we start with the majority graph, so at least one edge always exists between every pair. We
create another directed graph G(cid:48) = (F, E(cid:48)), with E(cid:48) being all the edges (Z, Y ) such that Y, Z (cid:54)∈ E.
Thus any pair of alternatives in G(cid:48) have at most one direction of edge between them. And by our
assumption, each alternative Y has at least one incoming edge in G(cid:48). Since the in-degree of each
node is at least 1 in G(cid:48), there must be at least one cycle in G(cid:48). To see this, one can for example
take the edge (Y2, Y1) coming into Y1, then the edge (Y3, Y2) coming into Y2, and proceed in this
way until a cycle is formed. Note that every edge in G(cid:48) must be in the original majority graph,
because if we add an edge when processing a pair of alternatives in our algorithm, that pair must
have edges in both directions.
Consider a cycle formed by edges (Y1, Y2), (Y2, Y3), . . . , (Yk−1, Yk), (Yk, Y1). When processing
the alternative pair Y2, Y3 in Algorithm 2, we did not add edge (Y3, Y2) to E, so it must be the
case that no alternative P exists such that d(Y2, Y3) (cid:22) d(Y2, P ) and P pairwise defeats (or ties) Y2.
But we know that Y1 pairwise defeats (or ties) Y2, because edge (Y1, Y2) is in the original majority
graph. Then the only possibility is we don't know if d(Y2, Y3) ≤ d(Y1, Y2), i.e., either d(Y2, Y3) and
d(Y1, Y2) are incomparable in our partial order, or we only know that d(Y2, Y3) (cid:23) d(Y1, Y2). They
cannot be incomparable, since we have the ordinal preferences of Y2 for Y1 and Y3, thus our partial
order must state that d(Y2, Y3) (cid:23) d(Y1, Y2), i.e., Y2 prefers Y1 to Y3. By the same reasoning, we
also get that Y3 prefers Y2 to Y4, and more generally that Yi prefers Yi−1 to Yi+1 for all i, where
Y0 = Yk and Yk+1 = Y1 since it is a cycle. This means that in our partial order, we have that
d(Y1, Y2) (cid:22) d(Y2, Y3) (cid:22) ··· (cid:22) d(Yk−1, Yk) (cid:22) d(Yk, Y1) (cid:22) d(Y1, Y2). Recall, however, that this means
we know d(Y1, Y2) = d(Y2, Y3) = ··· = d(Yk−1, Yk) = d(Yk, Y1), and before running Algorithm 2, we
detect cycles in the partial order of alternative distances, and add the equality information to the
partial order. This means that whenever d(Y1, Y2) (cid:22) d(Y2, Y3) (cid:22) ··· (cid:22) d(Yk−1, Yk) (cid:22) d(Yk, Y1) (cid:22)
11
d(Y1, Y2) exists in our partial order, we also have d(Y1, Y2) (cid:23) d(Y2, Y3) (cid:23) ··· (cid:23) d(Yk−1, Yk) (cid:23)
d(Yk, Y1) (cid:23) d(Y1, Y2) in the partial order as well. But this gives us a contradiction, since having
d(Y2, Y3) (cid:22) d(Y1, Y2) in the partial order, combined with the fact that Y1 pairwise defeats Y2, would
cause us to add the edge (Y3, Y2) in our algorithm, which contradicts the statement that only the
edge (Y2, Y3) is in the final graph produced by the algorithm, but not (Y3, Y2). Thus there must
exist at least one alternative with edges from it to all the others.
Theorem 3.9. The distortion of Algorithm 2 for minimum median social cost is at most 3.
Proof. If there is a Condorcet winner, by Lemma 3.5, the distortion is at most 3.
Otherwise, by Lemma 3.8, the algorithm always returns a winner. Suppose it returns alternative
W as the winner, by Lemma 3.7, W has a distortion at most 3 with any alternative X as the optimal
solution.
3.2.1 Generalizing Median: Percentile Distortion
Instead of just considering the median objective, we also consider a more general objective: the α-
percentile social cost. Let α-PC(Y ) denote the value from the set {d(i, Y ) : i ∈ A}, that α fraction
of the values lie below α-PC(Y ). Thus median is a special case when α = 1
2 , med(Y ) = 1
2 -PC(Y ).
It was shown in [3] Theorem 17 that the worst-case distortion when α ∈ [0, 1
2 ] in that setting (only
have agent's ordinal preferences over alternatives) is unbounded, and the same example shows
α ∈ [0, 1
2 ] in our setting is also unbounded. However, we are able to give a distortion of 3 for
α ∈ [ 1
3 ] is
5. The reason is that the ordinal preferences between alternatives are also available in our setting.
We will show that Algorithm 2 gives a distortion of at most 3 not only for the median objective, but
also for the general α-percentile objective, because all the lemmas we used to prove the conclusion
for the median objective could be generalized to α-percentile.
2 , 1] in this paper, while for the setting in [3], the lower bound for distortion when α ∈ [ 1
2 , 2
We use the following lemma from [3] in the proof of our algorithm:
Lemma 3.10. For any two alternatives W and Y , we have α-PC(W ) ≤ α-PC(Y ) + d(Y, W ).
[Lemma 18 in [3]]
We can generalize Lemma 3.6 to the following lemma, and the proof is by using Lemma 3.10
instead of Lemma 3.3 in the proof of Lemma 3.6,
Lemma 3.11. For any three alternatives W , Y , and P , if P pairwise defeats (or pairwise ties) Y ,
and d(Y, W ) ≤ d(Y, P ), then α-PC(W ) ≤ 3α-PC(Y ).
Theorem 3.12. The distortion of Algorithm 2 for the α-PC objective social cost with 1
is at most 3.
2 ≤ α ≤ 1
2 ≤ α ≤ 1, for any alternative Y , we know α-PC(Y ) ≥ med(Y ). Then Lemma 3.7
Proof. Note that Lemma 3.10 is actually a generalization of Lemma 3.3, and Lemma 3.11 is a
generalization of Lemma 3.6. Lemma 3.4 and Lemma 3.5 also generalize to the α-PC objective,
because when 1
also generalizes to the α-PC objective, because it only uses Lemma 3.5 and Lemma 3.6 in the
proof. And Lemma 3.8 still holds for the same algorithm. Thus all the lemmas and properties of
the median objective used in the proof of Theorem 3.9 could be generalized into the α-PC objective,
so the conclusion still holds for the α-PC objective when 1
2 ≤ α ≤ 1.
12
3.2.2 Algorithm 2 and the Total Social Cost
Although Algorithm 2 is designed for the median objective, it also performs quite well for the sum
objective. Interestingly, the distortion of this algorithm for the minimum total social cost is at
most 5, which is the same as Copeland (the best known deterministic algorithm with no knowledge
of candidate preferences). Thus this algorithm gives a distortion of 3 for median (and in fact for
all α-percentile objectives) and distortion of 5 for sum simultaneously. In settings where we are
not sure which objectives to optimize, or ones where we care both about the total social good, and
about fairness, this social choice mechanism provides the best of both worlds. The lemmas and
proofs for this result are similar to Theorem 3.9, as follows.
Lemma 3.13. Let W, Y be alternatives ∈ F. If W pairwise defeats (or pairwise ties) Y , then
SC(cid:80)(W,A) ≤ 3SC(cid:80)(Y,A). [Proved in Theorem 7 in [3]]
and d(Y, W ) ≤ d(Y, P ), then SC(cid:80)(W,A) ≤ 5SC(cid:80)(Y,A).
Proof. For all i ∈ A, we know d(i, W ) ≤ d(i, Y ) + d(Y, W ) by the triangle inequality. Summing up
for all i ∈ A, we get SC(cid:80)(W,A) ≤ SC(cid:80)(Y,A) + n · d(Y, W ).
we get SC(cid:80)(Y,A) ≥ n
P pairwise defeats (or pairwise ties) Y , so at least half of the agents prefer P to Y ; thus the
total social cost of Y is at least the sum of the social cost of these half of agents. By Lemma 3.1,
Lemma 3.14. For any three alternatives W , Y , and P , if P pairwise defeats (or pairwise ties) Y ,
d(Y,P )
2
4 d(Y, P ). Thus,
2 = n
SC(cid:80)(W,A) ≤ SC(cid:80)(Y,A) + n · d(Y, W )
≤ SC(cid:80)(Y,A) + n · d(Y, P )
≤ SC(cid:80)(Y,A) + 4SC(cid:80)(Y,A)
≤ 5SC(cid:80)(Y,A)
Lemma 3.15. Consider the modified majority graph G = (F, E) at any point during Algorithm 2.
For any edge (W, Y ) ∈ E, we have that SC(cid:80)(W,A) ≤ 5SC(cid:80)(Y,A).
Proof. By Lemma 3.13, for any edge (W, Y ) in the original majority graph, SC(cid:80)(W,A) ≤ 3SC(cid:80)(W,A).
Now consider an edge (W, Y ) added to E when processing the alternative pair W, Y . It must
be the case that there exists an alternative P , such that d(Y, W ) ≤ d(Y, P ) and P pairwise defeats
(or ties) Y . By Lemma 3.14, SC(cid:80)(W,A) ≤ 5SC(cid:80)(Y,A).
Theorem 3.16. The distortion of Algorithm 2 for minimum total social cost is at most 5, and this
bound is tight.
Proof. If there is a Condorcet winner, by Lemma 3.13, the distortion is at most 3. Otherwise,
suppose the algorithm returns alternative W as the winner; by Lemma 3.15 W has a distortion at
most 5 with any alternative X as the optimal solution.
To see that this bound is tight, consider the following example. There are three facilities W , Y ,
and P . There are q agents who prefer Y to W to P , q agents who prefer P to Y to W , and 1 agent
who prefers W to P to Y . We denote these three sets of agents as AY , AP and AW separately.
By the preferences of agents, we know that Y pairwise defeats W , W pairwise defeats P , and
P pairwise defeats Y . The distances between facilities are: d(Y, W ) = 2 − 2, d(W, P ) = 2 − ,
13
d(P, Y ) = 2, where is a very small positive number. AY is located at the same location as Y ,
so d(AY , Y ) = 0, d(AY , P ) = 2, and d(AY , W ) = 2 − 2. The distances between AP and the
alternatives are: d(AP , Y ) = d(AP , P ) = 1, d(AP , W ) = 3 − 2. AW has a distance of 1 to all
alternatives. Run Algorithm 2 on this example, and consider the alternative pair W , Y . Because
P pairwise defeats Y and d(Y, W ) (cid:22) d(Y, P ), we add edge (W, Y ) to the graph and make W the
winner. The total social cost of W is q ∗ (2 − 2) + q ∗ (3 − 2) + 1 = q(5 − 4) + 1. While the
optimal solution is to choose Y as the winner, and get a total social cost of q + 1. When q is very
large and is very small, the distortion in this example approaches 5.
4 Model and Notation: Facility Assignment Problems
The mechanism we used for approximation of total social cost in Theorem 3.2 can be applied to
far more general problems. In this section, we describe a set of facility assignment problems that
fit in this framework. As before, let A = {1, 2, . . . , n} be a set of agents, and F = {F1, F2, . . . , Fm}
be a set of facilities, with each agent i having a preference ranking σi over the facilities, and
σ = (σ1, . . . , σn).
As in the social choice model, we assume that there exists an arbitrary unknown metric d :
(A ∪ F)2 → R≥0 on the set of agents and facilities. The distances d(i, Fj) between agents and
facilities are unknown, but the ordinal preferences σ and the distances l between facilities are
given. Let D(σ, l) be the set of metrics consistent with σ and l, as defined previously in Section 2.
Unlike for social choice, our goal is now to choose which facilities to open, and which agents
should be assigned to which facilities. Formally, we must choose an assignment x : A → F, where
x(i) is the facility that i is assigned to. Every i ∈ A must be assigned to one (and only one)
facility in F; other than that, there could be arbitrary constraints on the assignment. Here are
some examples of constraints which fall into our framework: each facility Fi has a capacity ci,
which is the maximum number of agents that can be assigned to Fi; at least (or at most) p facilities
should have agents assigned to them; agents i and j must be (or must not be) assigned to the same
facility, etc. The social choice model is a special case of this one with the constraint that exactly
one facility must be opened, and all agents must be assigned to it. Note that the constraints are
only on the assignment, and independent of the metric space d. An assignment x is valid if it
satisfies all constraints. Let X be the set of all valid assignments.
The cost function of assignments. The cost of an assignment x consists of two parts. The first
part is the distance cost between agents and facilities. ∀i ∈ A, let si denote the distance between
i and the facility it is assigned to, i.e., si = d(i, x(i)). For a given metric d and assignment x, let
s(x, d) denote the vector of distances between each i ∈ A and x(i), i.e., s(x, d) = (s1, s2, . . . , sn).
Let cd : Rn≥0 → R≥0 be a cost function that takes a vector of distances as input. For example, this
could simply sum up all the distances, take the maximum distance for an egalitarian objective, etc.
To be as general as possible, instead of fixing a specific function cd we consider the set of distance
cost functions that are monotone nondecreasing and subadditive. Formally, cd is monotonically
nondecreasing means that for any vectors s and s(cid:48) such that s ≤ s(cid:48) componentwise, we have that
cd(s) ≤ cd(s(cid:48)). Any reasonable cost function should satisfy this property if agents desire to be
assigned to closer facilities. cd being subadditive means that for any vectors s and s(cid:48), we have that
cd(s + s(cid:48)) ≤ cd(s) + cd(s(cid:48)). While not all functions are subadditive, many important ones are, as
they represent the concept of "economies of scale", a common property of realistic costs.
The second part of the assignment cost is the facility cost. Let cf (x) denote the facility cost
for assignment x. cf can be an arbitrary function over the assignments, for example, the opening
14
cost of facilities, the penalty (or reward) for assigning certain agents to the same facility, etc. Our
framework includes all such functions, and thus is quite general, as we discuss below. The main
components needed for our framework to work is that the function cf does not depend on the
distances, only on x, and that the function cd is subadditive.
The total cost c(x, d) of an assignment x is the sum of the distance cost and the facility cost,
i.e. c(x, d) = cd(s(x, d)) + cf (x). We study algorithms to approximate the minimum cost assign-
ment given only agents' ordinal preferences over facilities, and the distances between facilities, as
described above.
Social Cost Distortion As for social choice, we use the notion of distortion to measure the
quality of an assignment in the worst case, similar to the notation in [11,28]. For any assignment x,
we define the distortion of x as the ratio between the social cost of x and the optimal assignment:
dist(x, σ, l) = sup
d∈D(σ,l)
c(x, d)
minx(cid:48)∈X c(x(cid:48), d)
A social choice function f on A and F takes σ and l as input, and returns a valid assignment
on A and F. We say the distortion of f on σ and l is the same as the distortion of the assignment
returned by f . In other words, the distortion of an assignment function f on a profile σ and facility
distances l is the worst-case ratio between the social cost of x = f (σ, l), and the social cost of the
true optimal assignment, to obtain which we would need the true distances d.
Approximation ratio of omniscient algorithms Consider omniscient algorithms which know
the true numerical distances between agents and facilities for the facility assignment problems, in
other words, the metric d. In some sense, the goal of our work is to determine when algorithms
with only limited information can compete with such omniscient algorithms. With the full dis-
tances information, we can of course obtain the optimal assignment using brute force, while for
our algorithms with limited knowledge this is impossible even given unlimited computational re-
sources. Nevertheless, we are also interested in what is possible to achieve if we restrict ourselves to
polynomial time. To differentiate traditional approximation algorithms from algorithms with small
distortion, suppose that an omniscient approximation algorithm f returns assignment x. Then we
denote the approximation ratio of a valid assignment x as:
ratio(x) =
c(x, d)
minx(cid:48)∈X c(x(cid:48), d)
Thus we say the approximation ratio of an omniscient algorithm f is β if for any input of the
problem, the assignment x returned by f has ratio(x) ≤ β.
4.1 Examples of Facility Assignment Problems
In this section we illustrate that our framework is quite general by giving various important ex-
amples which fit into our framework. In the section which follows, we prove a general black-box
reduction theorem for our framework, and thus immediately obtain mechanisms with small distor-
tion for all these examples simultaneously.
The total social cost problem we discussed in Section 3.1 is a special case of the facility assign-
ment problem such that the constraint is only one facility (alternative) is chosen, and all agents
are assigned to it. For any assignment x, the facility cost function cf (x) = 0, and the distance cost
function cd(s(x, d)) is the sum of distances from the winning alternative to all agents in the metric
15
d. cd is monotone and additive (thus subadditive). Here are some other examples that fit in our
framework:
Minimum weight metric bipartite matching. Given a set of agents A and a set of facilities
F such that A = F = n. G = (A,F, E) is an undirected complete bipartite graph. The facilities
and agents lie in a metric space d. The weight of each edge (i, F ) ∈ E is the distance between i
and F , w(i, F ) = d(i, F ). The goal is to find a minimum weight perfect matching of the bipartite
graph given only ordinal information. This setting has been studied before, and the best distortion
bound known is n [13] given by RSD for the case when only the ordinal preferences σ are known.
Our results show that if we also know the distances l between facilities, then even without knowing
the distances d between agents and facilities, it is possible to create simple mechanisms with dis-
tortion at most 3 (we can show that no better bound is possible for this setting). Thus having a bit
more information about the facilities immediately improves the distortion bound by a very large
amount. We show this result by using our facility assignment framework above: the constraint
here is that each facility has a capacity of 1, thus a valid assignment is a perfect matching of the
bipartite graph. For any assignment x, the facility cost function is cf (x) = 0, and the distance cost
function cd(s(x, d)) is the total edge weight in the assignment. cd is monotone and additive (thus
subadditive).
Egalitarian bipartite matching. With the same bipartite graph as in minimum weight
matching problems, the only difference is that the goal of egalitarian bipartite matching is to find
a perfect matching such that maximum edge weight (instead of the total weight) in the matching
is minimized [10].
The egalitarian bipartite matching problem is the same as minimum weight bipartite matching
except the distance cost function cd(s(x, d)) is the maximum edge weight in the assignment. This
function is also monotone and subadditive.
Metric Facility Location.
In this problem, one is given a set of agents A and a set of
facilities F such that A = n, F = m. The facilities and agents lie in a metric space d. Each
facility Fj ∈ F has an opening cost fj. Each agent is assigned to a facility; in different versions
there may be capacities on the number of agents assigned to a facility, lower bounds on the number
of agents assigned to a facility, or various other constraints [20]. The goal is to find a subset of
facilities F ⊆ F to open, so that the sum of opening costs for facilities in F and total distance of
the assignment is minimized.
Our framework allows arbitrary constraints on what constitutes a valid assignment, which cap-
tures facilities with capacities or lower bounds if needed. For any assignment x, the facility cost
function cf (x) is the sum of the opening costs fj for those facilities Fj that have at least one agent
assigned to it. The distance cost function cd(s(x, d)) is the total distances in the assignment, which
is monotone increasing and additive (thus subadditive).
k-center problem. The goal in this classic problem is to open a set of k facilities, with
each agent assigned to the closest one. The optimal solution is the subset of F which minimizes
maxi∈A d(i, x(i)). To express this in our framework, the constraint is that no more than k facilities
have agents assigned to them. For any assignment x, the facility cost function cf (x) = 0, and the
distance cost function cd(s(x, d)) is the maximum distance between any agent and facility in the
assignment.
k-median problem. This classic problem is the same as k-center, except the goal is to minimize
16
the sum of distances of agents to the facilities instead of the maximum distance.
5 Distortion of Facility Assignment Problems
In this section, we study general facility assignment problems, as described in Section 4, and form
mechanisms with small distortion. First, we construct a projected problem such that the distances
between agents and facilities are known, so it could be solved by an omniscient algorithm. Then
we map the result of the projected problem to the original problem and bound the distortion of
the original problem.
Given agents A = {1, 2, . . . , n} and facilities F = {F1, F2, . . . , Fm}, suppose facility F (cid:48) is i's
top choice in F. We create a new agent i at the location of F (cid:48) in the metric space. Consequently,
∀F ∈ F, d(i, F ) = d(F (cid:48), F ). Denote the set of the new agents as A = {1, 2, . . . , n}.
The original assignment problem is on agents A and facilities F, and only ordinal preferences
of agents in A over facilities are given. The projected problem is on agents A and facilities F, and
we know the actual distances between agents in A and facilities F, since we know the distances l
between facilities. The constraints and costs cd and cf remain the same for both the original and
the projected problem; the only difference is in the distances d. Our main result is that if we have
a β-approximation assignment to the minimum assignment cost on the projected problem, then
we can get an assignment that has a distortion of 2β +1 for the original problem in polynomial time.
Theorem 5.1. Given a valid assignment x for the projected problem on A and F, with ratio(x) ≤
β, the assignment x(i) = x(i) has distortion of at most (1 + 2β) for original assignment problem
on A and F.
Proof. First, x is a valid assignment for the projected problem on A and F, so x must also be a
valid assignment for the original problem on A and F. This is because the constraints are only on
the assignment, and are independent of the metric space d. For the same reason, the facility cost
of x equals the facility cost of x, cf (x) = cf (x).
Now consider the distance cost of x. Let x∗ denote the optimal assignment for the original
problem. ∀i ∈ A, let si = d(i, x(i)), ti = d(i,i), bi = d(i, x(i)). Similarly, let s∗
i = d(i, x∗(i)),
b∗
i = d(i, x∗(i)).
For any agent i and facility x(i), by triangle inequality,
si = d(i, x(i)) ≤ d(i,i) + d(i, x(i)) = ti + bi
Because cd is monotonically nondecreasing and subadditive,
cd(s1, s2, . . . , sn) ≤ cd(t1 + b1, t2 + b2, . . . , tn + bn)
≤ cd(t1, t2, . . . , tn) + cd(b1, b2, . . . , bn)
Therefore, the cost of our assignment x is bounded as follows:
cf (x) + cd(s(x, d)) = cf (x) + cd(s1, s2, . . . , sn)
= cf (x) + cd(s1, s2, . . . , sn)
≤ cf (x) + cd(t1, t2, . . . , tn) + cd(b1, b2, . . . , bn)
17
Because i is located at i's top choice facility, and x∗(i) is a facility, we thus know that ti ≤ s∗
i ,
and by monotonicity cd(t1, t2, . . . , tn) ≤ cd(s∗
1, s∗
2, . . . , s∗
n). Thus,
cf (x) + cd(s(x, d)) ≤ cf (x) + cd(t1, t2, . . . , tn) + cd(b1, b2, . . . , bn)
n) + cd(b1, b2, . . . , bn)
≤ cf (x) + cd(s∗
2, . . . , s∗
1, s∗
We know that x is a β-approximation to the optimum assignment for the projected problem.
Its total cost is exactly cf (x) + cd(b1, b2, . . . , bn), since the distance from i to x(i) = x(i) is exactly
bi. Now consider another assignment for the projected problem, in which i is assigned to x∗(i). The
cost of this assignment is cf (x∗)+cd(b∗
i . Since x is a β-approximation,
we therefore know that
n), by definition of b∗
2, . . . , b∗
1, b∗
cf (x) + cd(b1, b2, . . . , bn) ≤ βcf (x∗) + βcd(b∗
1, b∗
2, . . . , b∗
n),
and thus
cf (x) + cd(s(x, d)) ≤ cf (x) + cd(s∗
1, s∗
2, . . . , s∗
2, . . . , s∗
n) + βcf (x∗) + βcd(b∗
n) + cd(b1, b2, . . . , bn)
1, b∗
2, . . . , b∗
n)
≤ cd(s∗
1, s∗
For any agent i and facility x∗(i) in x∗, by triangle inequality,
i = d(i, x∗(i)) ≤ d(i, x∗(i)) + d(i,i) ≤ 2d(i, x∗(i)) = 2s∗
b∗
i
d(i,i) ≤ d(i, x∗(i)) above since i is located at the closest facility to i. Because cd is monotone and
subadditive, we also have that
cd(b∗
1, b∗
2, . . . , b∗
n) ≤ cd(2s∗
1, 2s∗
2, . . . , 2s∗
n) ≤ 2cd(s∗
1, s∗
2, . . . , s∗
n)
Putting everything together,
cf (x) + cd(s(x, d)) ≤ cd(s∗
1, s∗
2, . . . , b∗
1, b∗
n) + βcf (x∗) + βcd(b∗
2, . . . , s∗
n)
≤ βcf (x∗) + cd(s∗
n) + 2βcd(s∗
2, . . . , s∗
1, s∗
1, s∗
2, . . . , s∗
n)
1, s∗
= βcf (x∗) + (1 + 2β)cd(s∗
2, . . . , s∗
n)
≤ (1 + 2β)(cf (x∗) + cd(s(x∗, d)))
Note that the above theorem immediately implies that if we are only concerned with what is
possible to achieve given limited ordinal information in addition to distances between facilities, and
are not worried about our algorithms running in polynomial time, then we can always form an
assignment with distortion of at most 3 from knowing only σ and l. This is because we can solve
the projected problem with brute force, and then we have β = 1. This bound of 3 is tight for many
facility assignment problems: consider for example an instance of min-cost metric matching with
two agents and two facilities, with both preferring F1 to F2. One of the agents has distance to F1
18
of 0, and one is located halfway between F1 and F2, but since we only have ordinal information
we do not know which agent is which. If we assign the wrong agent to F1, then we end up with
distortion of 3, and it is impossible to do better for any deterministic mechanism.
If on the other hand we want to form poly-time algorithms with small distortion, the above
theorem gives a black-box reduction: if we have a β-approximation algorithm for the omniscient
case, then we can form a 1 + 2β-distortion algorithm for the ordinal case. Actually, we get a
1 + 2β-distortion for the distance cost, and a β-distortion for the facility cost, which is shown in
the second-to-last line of the proof for Theorem 5.1. This leads to the following corollaries:
Corollary 5.1.1. We can achieve the following distortion in polynomial time:
1. At most 3 for the minimum weight bipartite matching problem.
2. At most 3 for Egalitarian bipartite matching.
3. At most 3.976 for the facility location problem (1.488-approximation for the facility cost, and
3.976-approximation for the distance cost).
4. At most 5 for the k-center problem.
5. At most 6.35 for the k-median problem.
Proof. Min-cost matching and egalitarian matching are poly-time solvable, so β = 1. For the
latter, one can fix the threshold weight t such that every edge chosen should be at most t, and then
determine if such a matching exists. Performing a binary search on t gives an efficient algorithm.
For facility location, one can use the omniscient algorithm which is a 1.488-approximation in [27].
For the k-center problem, a greedy algorithm [25] gives a 2-approximation for the setting that agents
are a subset of facilities, which is the case in our projected problem. [12] gives a 2.675-approximation
omniscient algorithm for the k-median problem when agents are a subset of facilities, thus it also
gives a 2.675-approximation for our projected problem.
Note that the median function, unlike sum and maximum, is not subadditive, and thus does
not fit into our framework. In fact, while both min-cost and egalitarian matching problems have
algorithms with small distortion in our setting, the same is not possible for forming a matching
where the objective function is the cost of the median edge: see the Appendix for a lower bound.
6 Conclusion
In this paper, we provided two mechanisms to solve different social cost problems. The first one
makes use of the distances between facilities and an omniscient algorithm to get a low distortion for
general facility assignment problems. The second mechanism is a new voting rule for social choice
which simultaneously achieves a distortion of 3 for many objectives, including the cost of the median
voter, and a distortion of 5 for the total social cost at the same time. The first mechanism requires
the full distances l, but only needs the top choice from each agent. Thus, it puts only a small
load on the agents which submit their preferences, but requires the mechanism designer to collect
more information about the facilities and their distances to each other. The second mechanism, on
the other hand, only requires ordinal preference information from the facilities, but needs the full
preference ranking from the agents instead of just the top choice. It is especially appropriate for
settings in which the candidates or alternatives are agents themselves.
Many open questions remain for our setting. How well can facility location problems be ap-
proximated given information about facilities? While we established upper bounds on distortion,
19
we have no lower bounds besides the trivial bound of 3. What about randomized mechanisms, or
what if the mechanisms must be truthful? And more generally, exactly what information is enough
to guarantee mechanisms with small distortion? While our results show that knowing information
about facility locations is enough to result in small distortion, it may be possible that obtaining
even a bit of targeted information would result in powerful approximation algorithms. We look
forward to future work on this topic.
References
[1] Ben Abramowitz and Elliot Anshelevich. Utilitarians without utilities: Maximizing social
welfare for graph problems using only ordinal preferences. In AAAI 2018.
[2] Elliot Anshelevich. Ordinal approximation in matching and social choice. ACM SIGecom
Exchanges, 15(1):60–64, 2016.
[3] Elliot Anshelevich, Onkar Bhardwaj, and John Postl. Approximating optimal social choice
under metric preferences. In AAAI 2015.
[4] Elliot Anshelevich and John Postl. Randomized social choice functions under metric prefer-
ences. In IJCAI 2016.
[5] Elliot Anshelevich and Shreyas Sekar. Blind, greedy, and random: Algorithms for matching
and clustering using only ordinal information. In AAAI 2016.
[6] Elliot Anshelevich and Shreyas Sekar. Truthful mechanisms for matching and clustering in an
ordinal world. In WINE 2016.
[7] Elliot Anshelevich and Wennan Zhu. Tradeoffs between information and ordinal approximation
for bipartite matching. In SAGT 2017.
[8] Gerdus Benade, Swaprava Nath, Ariel D Procaccia, and Nisarg Shah. Preference elicitation
for participatory budgeting. In AAAI 2017.
[9] Anand Bhalgat, Deeparnab Chakrabarty, and Sanjeev Khanna. Social welfare in one-sided
matching markets without money. In APPROX 2011.
[10] Anna Bogomolnaia and Herv´e Moulin. Random matching under dichotomous preferences.
Econometrica, 72(1):257–279, 2004.
[11] Craig Boutilier, Ioannis Caragiannis, Simi Haber, Tyler Lu, Ariel D Procaccia, and Or Sheffet.
Optimal social choice functions: A utilitarian view. Artificial Intelligence, 227:190–213, 2015.
[12] Jaros(cid:32)law Byrka, Thomas Pensyl, Bartosz Rybicki, Aravind Srinivasan, and Khoa Trinh. An
improved approximation for k-median, and positive correlation in budgeted optimization. In
SODA 2014.
[13] Ioannis Caragiannis, Aris Filos-Ratsikas, Søren Kristoffer Stiil Frederiksen, Kristoffer Arnsfelt
Hansen, and Zihan Tan. Truthful facility assignment with resource augmentation: An exact
analysis of serial dictatorship. In WINE 2016.
[14] Ioannis Caragiannis, Swaprava Nath, Ariel D Procaccia, and Nisarg Shah. Subset selection
via implicit utilitarian voting. Journal of Artificial Intelligence Research, 58:123–152, 2017.
20
[15] Yu Cheng, Shaddin Dughmi, and David Kempe. Of the people: voting is more effective with
representative candidates. In EC 2017.
[16] Yu Cheng, Shaddin Dughmi, and David Kempe. On the distortion of voting with multiple
representative candidates. In AAAI 2018.
[17] George Christodoulou, Aris Filos-Ratsikas, Søren Kristoffer Stiil Frederiksen, Paul W Gold-
berg, Jie Zhang, and Jinshan Zhang. Social welfare in one-sided matching mechanisms. In
AAMAS 2016.
[18] James M. Enelow and Melvin J. Hinich. The Spatial Theory of Voting: An Introduction.
Cambridge University Press, New York, NY, 1984.
[19] Brandon Fain, Ashish Goel, Kamesh Munagala, and Sukolsak Sakshuwong. Sequential delib-
eration for social choice. In WINE 2017.
[20] Reza Zanjirani Farahani and Masoud Hekmatfar. Facility location: concepts, models, algo-
rithms and case studies. Springer, 2009.
[21] Michal Feldman, Amos Fiat, and Iddan Golomb. On voting and facility location. In EC 2016.
[22] Aris Filos-Ratsikas, Søren Kristoffer Stiil Frederiksen, and Jie Zhang. Social welfare in one-
sided matchings: Random priority and beyond. In SAGT 2014.
[23] Ashish Goel, Anilesh Kollagunta Krishnaswamy, and Kamesh Munagala. Metric distortion of
social choice rules: Lower bounds and fairness properties. In EC 2017.
[24] Stephen Gross, Elliot Anshelevich, and Lirong Xia. Vote until two of you agree: Mechanisms
with small distortion and sample complexity. In AAAI 2017.
[25] Dorit S Hochbaum and David B Shmoys. A best possible heuristic for the k-center problem.
Mathematics of operations research, 10(2):180–184, 1985.
[26] Martin Hoefer and Bojana Kodric. Combinatorial secretary problems with ordinal information.
In ICALP 2017.
[27] Shi Li. A 1.488 approximation algorithm for the uncapacitated facility location problem. In
ICALP 2011.
[28] Ariel D Procaccia and Jeffrey S Rosenschein. The distortion of cardinal preferences in voting.
In CIA 2006.
[29] Piotr Krzysztof Skowron and Edith Elkind. Social choice under metric preferences: Scoring
rules and stv. In AAAI 2017.
21
A Bad Examples and Lower Bounds
Note that our Algorithm 2 is only for social choice problems, and does not fit in the definition of
our general facility assignment problems. This is because the median cost function, unlike sum and
maximum, is not subadditive. In fact, while both min-cost and egalitarian matching problems have
algorithms with small distortion in our setting, the same is not possible for forming a matching
where the objective function is the cost of the median edge.
Theorem A.1. The worst-case distortion of the median-cost bipartite matching problem in a metric
space (given both agent preference profiles and distances between facilities) is unbounded.
Proof. Consider the following example: there are three agents a, b, c, and three facilities X, Y ,
Z. The preferences of agents are: a, b ∈ XY Z, while c ∈ ZXY . The distances between facilities
are: l(X, Y ) = 2, l(X, Z) = l(Y, Z) = 1000. The distances between the agents and facilities are,
of course, unknown. Consider the instance d(c, Z) = , d(a, X) = 2, and d(b, X) = d(b, Y ) = 1.
is a very small positive real number, and other distances not given obey triangle inequality. In
this instance, the optimal solution is x∗ = {(a, X), (b, Y ), (c, Z)}, which gives a median value of
2. But because a and b have the same preference profile, the instance could also be d(c, Z) = ,
d(b, X) = 2, and d(a, X) = d(a, Y ) = 1. If we still return the assignment x∗ for this instance, the
median would be 1. The distortion is arbitrarily bad when approaches 0.
The following Theorems show some of the lower bounds mentioned in Table 1.
Theorem A.2. The worst-case distortion for the facility location problem in a metric space (given
only agents' preference profiles) is unbounded.
Proof. Consider the following example: there are two agents 1, 2, and two facilities X, Y . Agent
1 prefers X to Y , while agent 2 prefers Y to X. The opening costs are: cf (X) = 1, cf (Y ) = 100.
We can choose to open one facility or both of them.
Case 1. Suppose we only open X. Consider the following distances between the agents and
facilities: d(1, X) = d(2, Y ) = 1, d(1, Y ) = d(2, X) = L, for some very large L. If we only open X,
then the total cost is > L. While the optimal solution is to open both X and Y , which has a total
cost of 103. The distortion is unbounded.
Case 2. Suppose we only open Y . Consider the same distances as in Case 1, then the total
cost is also L. And the optimal solution still has a total cost of 103. The distortion is unbounded.
Case 3. Suppose we open both facilities. Consider the following distances between the agents
and facilities: d(1, X) = d(1, Y ) = d(2, X) = d(2, Y ) = , where is a very small positive real
number. If we open both facilities, the total cost is 101 + 2. While the optimal solution is to
only open X , which has a total cost of 1 + 2. If we increase cf (Y ), the approximation ratio is
unbounded.
Theorem A.3. The worst-case distortion for the k-median problem in a metric space (given only
agents' preference profiles) is at least Ω(n).
Proof. Consider the following example: There are three facilities X, Y , and Z. There are q agents
who prefer X to Y to Z, q agents who prefer Y to X to Z, and 1 agent who prefers Z to X to Y .
We denote these three sets of agents as AX , AY and AZ separately. Suppose k = 2, then we have
three choices of the winners:
Case 1. Choose X, Y as the winners. Consider the following distances between agents and
facilities: d(X, Y ) = 1, d(Y, Z) = d(X, Z) = L for some very large L. AX is located at the same
location as X, AY is at the same location as Y , and AZ is at the same location as Z. The cost of
22
choosing X, Y as the winners is L because we need to assign the agent in AZ to X or Y . While
the optimal solution is to choose Y, Z as the winners, and get a total cost of q. So the distortion in
this case is unbounded.
Case 2. Choose X, Z as the winners. Consider the following distances between agents and
facilities: d(X, Y ) = d(Y, Z) = d(X, Z) = 1, and AX locate on top of X, AY locate on top of Y ,
and AZ locate on top of Z. The cost of choosing X, Z as the winner is q, while the optimal solution
is to choose X, Y as the winners, and get a total cost of 1. The distortion is q in this case.
Case 3. Choose Y, Z as the winners. Consider the same distances as in Case 2. If we choose
Y, Z as the winners, the total cost is still q, and the distortion of this case is also q.
The total number of agents is n = 2q + 1, so we can conclude that the distortions in all these
three cases are at least Ω(n).
Theorem A.4. The worst-case distortion of the egalitarian bipartite matching problem in a metric
space (given only agents' preference profiles) is at least 2.
Proof. Consider the following example: there are two agents 1, 2, and two facilities X, Y . Both
agents prefer X to Y . W.L.O.G., assume we match agent 1 to X, and agent 2 to Y . Suppose the
distances between agents and facilities are: d(1, X) = d(1, Y ) = 1, d(2, X) = , d(2, Y ) = 2, where
is a very small positive real number. The egalitarian cost of our matching is 2, while the optimal
solution is to match agent 1 to Y , and agent 2 to X, which has a cost of 1.
23
|
1308.1049 | 1 | 1308 | 2013-08-05T17:43:58 | Coevolutionary networks of reinforcement-learning agents | [
"cs.MA",
"cs.LG",
"nlin.AO"
] | This paper presents a model of network formation in repeated games where the players adapt their strategies and network ties simultaneously using a simple reinforcement-learning scheme. It is demonstrated that the coevolutionary dynamics of such systems can be described via coupled replicator equations. We provide a comprehensive analysis for three-player two-action games, which is the minimum system size with nontrivial structural dynamics. In particular, we characterize the Nash equilibria (NE) in such games and examine the local stability of the rest points corresponding to those equilibria. We also study general n-player networks via both simulations and analytical methods and find that in the absence of exploration, the stable equilibria consist of star motifs as the main building blocks of the network. Furthermore, in all stable equilibria the agents play pure strategies, even when the game allows mixed NE. Finally, we study the impact of exploration on learning outcomes, and observe that there is a critical exploration rate above which the symmetric and uniformly connected network topology becomes stable. | cs.MA | cs |
Coevolutionary networks of reinforcement-learning agents
Information Sciences Institute, University of Southern California, Marina del Rey, CA 90292, USA
Ardeshir Kianercy and Aram Galstyan
This paper presents a model of network formation in repeated games where the players adapt
their strategies and network ties simultaneously using a simple reinforcement learning scheme. It
is demonstrated that the co-evolutionary dynamics of such systems can be described via coupled
replicator equations. We provide a comprehensive analysis for three-player two-action games, which
is the minimum system size with nontrivial structural dynamics. In particular, we characterize the
Nash equilibria (NE) in such games and examine the local stability of the rest points corresponding
to those equilibria. We also study general n-player networks via both simulations and analytical
methods and find that in the absence of exploration, the stable equilibria consist of star motifs as
the main building blocks of the network. Furthermore, in all stable equilibria the agents play pure
strategies, even when the game allows mixed NE. Finally, we study the impact of exploration on
learning outcomes, and observe that there is a critical exploration rate above which the symmetric
and uniformly connected network topology becomes stable.
PACS numbers: 89.75.Fb,05.45.-a,02.50.Le,87.23.Ge
I.
INTRODUCTION
Networks depict complex systems where nodes corre-
spond to entities and links encode interdependencies be-
tween them. Generally, dynamics in networks is intro-
duced via two different approaches. In the first approach,
the links are assumed to be static, while the nodes are en-
dowed with internal dynamics (epidemic spreading, opin-
ion formation, signaling, synchronizing and so on). And
in the second approach, nodes are treated as passive ele-
ments, and the main focus is on the evolution of network
topology.
More recently, it has been suggested that separating
individual and network dynamics fails to capture real-
istic behavior of networks.
Indeed, in most real -- world
networks both the attributes of individuals (nodes) and
the topology of the network (links) evolve in tandem.
Models of such adaptive co-evolving networks have at-
tracted significant interest in recent years both in statis-
tical physics [1 -- 5] and game theory and behavioral eco-
nomics communities [6 -- 11].
To describe coupled dynamics of individual attributes
and network topology, here we suggest a simple model of
a coevolving network that is based on the notion of inter-
acting adaptive agents. Specifically, we propose network --
augmented multiagent systems where the agents play re-
peated games with their neighbors, and adapt both their
behaviors and the network ties depending on the out-
come of their interactions. To adapt, the agents use a
simple learning mechanism to reinforce (penalize) be-
haviors and network links that produce favorable (un-
favorable) outcomes. Furthermore, the agents use an
action selection mechanism that allows one to control
exploration/exploitation tradeoff via a temperature-like
parameter.
We have previously demonstrated [12] that the collec-
tive evolution of such a system can be described by ap-
propriately defined replicator dynamics equations. Orig-
inally suggested in the context of evolutionary game the-
ory (e.g., see Refs. [13, 14]), replicator equations have
been used to model collective learning in systems of in-
teracting self -- interested agents [15]. Refrence [12] pro-
vides a generalization to the scenario where the agents
adapt not only their strategies (probability of selecting a
certain action) but also their network structure (the set
of other agents that play against). This generalization
results in a system of coupled non-linear equations that
describe the simultaneous evolution of agent strategies
and network topology.
Here we use the framework suggested in Ref. [12] to
examine the learning outcomes in networked games. We
provide a comprehensive analysis of three-player two-
action games, which are the simplest systems that ex-
hibit non-trivial structural dynamics. We analytically
characterize the rest-points and their stability properties
in the absence of exploration. Our results indicate that
in the absence of exploration, the agents always play pure
strategies even when the game allows mixed NE. For the
general n-player case, we find that the stable outcomes
correspond to star-like motifs, and demonstrate analyti-
cally the stability of a star motif. We also demonstrate
the instability of the symmetric network configuration
where all the pairs are connected to each other with uni-
form weights.
We also study the the impact of exploration on the co-
evolutionary dynamics. In particular, our results indicate
that there is a critical exploration rate above which the
uniformly connected network is a globally stable outcome
of the learning dynamics.
The rest of the paper is organized as follows: we next
derive the replicator equations characterizing the coevo-
lution of the network structure and the strategies of the
agents. In Sec. III we focus on learning without explo-
ration, describe the NE of the game, and characterize the
restpoints of learning dynamics according to their stabil-
ity properties. We consider the the impact of exploration
on learning in Sec. IV and provide some concluding re-
marks in Sec. V.
II. CO-EVOLVING NETWORKS VIA
REINFORCEMENT LEARNING
Let us consider a set of agents that play repeated
games with each other. We differentiate agents by in-
dices x, y, z, . . .. At each round of the game, an agent
has to choose another agent to play with, and an action
from the pool of available actions. Thus, time -- dependent
mixed strategies of agents are characterized by a joint
probability distribution over the choice of the neighbors
and the actions.
We assume that the agents adapt to their environment
through a simple reinforcement mechanism. Among dif-
ferent reinforcement schemes, here we focus on (stateless)
Q-learning [16]. Within this scheme, the strategies of
the agents are parameterized through, so-called Q func-
tions that characterize the relative utility of a particular
strategy. After each round of game, the Q functions are
updated according to the following rule,
Qi
xy(t + 1) = Qi
xy(t) + α[Ri
x,y(t) − Qi
xy(t)]
(1)
x,y(Qi
where Ri
x,y) is the expected reward (Q value) of
agent x for playing action i with agent y, and α is a
parameter that determines the learning rate (which can
be set to α = 1 without a loss of generality).
Next, we have to specify how agents choose a neighbor
and an action based on their Q function. Here we use the
Boltzmann exploration mechanism where the probability
of a particular choice is given as [17]
pi
xy =
xy(cid:80)
eβQi
y,j eβQj
x y
(2)
where pi
xy is the probability that agent x will play with
agent y and choose action i. Here the inverse temperature
β ≡ 1/T > 0 controls the tradeoff between exploration
and exploitation; for T → 0 the agents always choose the
action corresponding to the maximum Q value, while for
T → ∞ the agents' choices are completely random.
x,y = (cid:80)
We now assume that the agents interact with each
other many times between two consecutive updates of
their strategies. In this case, the reward of the i th agent
in Eq. ( 1) should be understood in terms of the average
reward, where the average is taken over the strategies of
other agents, Ri
xy is the re-
ward (payoff) of agent x playing strategy i against agent
y who plays strategy j. Note that, generally speaking,
the payoff might be asymmetric.
We are interested in the continuous approximation to
the learning dynamics. Thus, we replace t + 1 → t + δt,
α → αδt, and take the limit δt → 0 in Eq. (1) to obtain
yx, where Aij
j Aij
xypj
Qi
xy = α[Ri
x,y − Qi
xy(t)]
(3)
Differentiating Eq. (2), using Eqs. (2) and (3), and scal-
ing the time t → αβt, we obtain the following replicator
2
(cid:88)
equation [15]:
(cid:88)
yx −(cid:88)
j
y,j
=
i,j,y
Aij
Aij
xypj
xypi
xypj
yx + T
pj
xy ln
pi
xy
pi
xy
pj
xy
pi
xy
(4)
Equations 4 describe the collective adaptation of the Q --
learning agents through repeated game -- dynamical inter-
actions. The first two terms indicate that the probabil-
ity of playing a particular pure strategy increases with a
rate proportional to the overall goodness of that strat-
egy, which mimics fitness-based selection mechanisms in
population biology [13]. The second term, which has an
entropic meaning, does not have a direct analog in pop-
ulation biology [15]. This term is due to the Boltzmann
selection mechanism that describes the agents' tendency
to randomize over their strategies. Note that for T = 0
this term disappears, so the equations reduce to the con-
ventional replicator system [13].
So far, we have discussed learning dynamics over a
general strategy space. We now make the assumption
that the agents' strategies factorize as follows,
(cid:88)
(cid:88)
pi
xy = cxypi
x ,
cxy = 1,
y
pi
x = 1.
i
(5)
Here cxy is the probability that the agent x will initiate
a game with the agent y, whereas pi
x is the probability
that he will choose action i. Thus, the assumption behind
this factorization is that the probability that the agent
will perform action i is independent of whom the game
is played against. Substituting Eq. (5) in Eq. (4) yields
(cid:20)(cid:88)
x −(cid:88)
j
y −(cid:88)
cxy ln cxy −(cid:88)
i,y,j
y
j
(cid:20)
−T
ln cxy + ln pi
cxypi
x + cxy pi
x = cxypi
x
aij
xycyxpj
aij
x,ycxycyxpi
xpj
y
(cid:21)(cid:21)
pj
x ln pj
x
(6)
Next, we sum both sides in Eq. (6), once over y and then
over i, and make use of the normalization conditions in
Eq. (5) to obtain the following coevolutionary dynamics
of action and connection probabilities:
(7)
(8)
+ T
cxy ln(cxy/cxy)
y
Equations (7) and
(8) are the replicator equations
that describe the collective evolution of both the agents'
strategies and the network structure.
The following remark is due: Generally, the replicator
dynamics in matrix games are invariant with respect to
xycxycyxpj
Aij
xycxycyxpi
xpj
y
+ T
pj
x ln(pj
x/pi
x)
= cyx
Aij
xypi
xpj
Aij
xycxycyxpi
xpj
y
y −(cid:88)
y −(cid:88)
i,j,y
i,j,y
pi
x
pi
x
=
cxy
cxy
y,j
Aij
(cid:88)
(cid:88)
(cid:88)
(cid:88)
i,j
j
adding any column vector to the payoff matrix. However,
this invariance does not hold in the present networked
game. The reason for this is the following:
if an agent
does not have any incoming links (i.e., no other agent
plays with him or her), then he always gets a zero re-
ward. Thus, the zero reward of an isolated agent serves
as a reference point. This poses a certain problem. For
instance, consider a trivial game with a constant reward
matrix aij = P . If P > 0, then the agents will tend to
play with each other, whereas for P < 0 they will try to
avoid the game by isolating themselves (i.e., linking to
agents that do not reciprocate).
To address this issue, we introduce an isolation payoff
CI that an isolated agent receives at each round of the
game.
It can be shown that the introduction of t his
payoff merely subtracts CI from the reward matrix in
the replicator learning dynamics. Thus, we paramet rize
the game matrix as follows:
aij = bij + CI
(9)
3
FIG. 1: (Color online) Categorization of two-action games
based on the reward matrix structure in the (a, b) plane.
where matrix B defines a specific game.
where
Although it is beyond the scope of the present paper,
an interesting question is what the reasonable values for
the parameter CI are. In fact, what is important is the
value of CI relative to the reward at the corresponding
Nash equilibria, i.e., whether not playing at all is better
than playing and receiving a potentially negative reward.
Different values of CI describe different situations.
In
particular, one can argue that certain social interactions
are apparently characterized by large CI , where not par-
ticipating in a game is seen as a worse outcome than par-
ticipating and getting negative rewards. In the following,
we treat CI as an additional parameter that changes in
a certain range, and examine its impact on the learning
dynamics.
A. Two-action games
We focus on symmetric games where the reward matrix
is the same for all pairs (x, y), Axy = A:
(cid:19)
(cid:18) a11 a12
a21 a22
A =
(10)
Let pα, α ∈ {x, y, . . . ,}, denote the probability for agent
α to play action 1 and cxy is the probability that agent
x will initiate a game with the agent y. For two action
games, the learning dynamics Eqs. (7) , and (8) becomes:
px
px(1 − px)
cxy
cxy
=
(apy + b)cxycyx + T log
y
= rxy − Rx + T
(cid:88)
y
1 − px
px
(11)
(cid:88)
(cid:88)
rxy = cyx(apxpy + bpx + dpy + a22)
Rx =
(apxpy + bpx + dpy + a22)cxycyx
y
Here we have defined the following parameters:
a = a11 − a21 − a12 + a22
b = a12 − a22
d = a21 − a22
(13)
(14)
(15)
(16)
(17)
The parameters a and b allow a categorization of two
action games as follows (Fig. 1):
• dominant action games: − b
a < 0
• coordination game: a > 0, b < 0 and 1 ≥ − b
• anti-coordination (Chicken) game: a < 0, b >
a > 1 or − b
a
0 and 1 ≥ − b
a
Before proceeding further, we elaborate on the con-
nection between the rest points of the replicator system
for T = 0 and the game-theoretic notion of NE (NE) 1.
For T = 0 (no exploration) in the conventional replicator
equations, all NE are necessarily the rest points of the
learning dynamic. The inverse is not true - not all rest
points correspond to NE - and only the stable ones do.
Note that in the present model the first statement does
not necessarily hold. This is because we have assumed
the strategy Eq.( 5), due to which equilibria where the
cxy ln
cxy
cxy
(12)
1 Recall that a joint strategy profile is called NE if no agent can
increase his expected reward by unilaterally deviating from the
equilibrium.
baDominant action Dominant action Coordination game Chicken game b = -a 4
FIG. 3: (Color online) Three-player network NE for prisoner's
dilemma and the coordination game; see the text for more
details.
operation and Defection, and the payoff matrix elements
satisfy b21 > b11 > b22 > b12; (see Fig. 2).
In a two-
player PD game, defection is a dominant strategy -- it al-
ways yields a better reward regardless of the other player
choice -- thus, the only NE is a mutual defection. And in
coordination game, the players have an incentive to se-
lect the same action. This game has two pure NE, where
the agents choose the same action, as well as a mixed
NE. In a general coordination game the reward elements
have the relationship b11 > b21, b22 > b12 (see Fig. 2).
In the three-agent scenario, a simple analysis yields
four possible network topologies corresponding to NE de-
picted in Fig. 3. In all of those configurations, the agents
that are not isolated select strategies that correspond
to two-agent NE. Thus, in the case of PD, non-isolated
agents always defect, whereas for the coordination game,
they can select one of three possible NE. We now examine
those configurations in more details.
Configuration I In this configuration, the agents x
and y play only with each other, whereas agent is z s
isolated: cxy = cyx = 1. Note that for this to be a NE,
agents x and y should not be "tempted" to switch and
play with the agent z. For instance, in the case of PD,
this yields pzb21 < b22, otherwise players x and y will be
better of linking with the isolated agent z and exploiting
his cooperative behavior. 3
Configuration II In the second configuration, there
is a central agent (z) who plays with the other two:
cxz = cyz = 1, czx + czy = 1. Note that this configuration
is continuously degenerate as the central agent can
FIG. 2: Examples of reward matrices for typical two-action
games.
agents adopt different strategies with different players are
not allowed. Thus, any NE that do not have the factor-
ized form simply cannot be described in this framework.
The second statement, however, remains true, and stable
rest points do correspond to NE.
III.
LEARNING WITHOUT EXPLORATION
For T = 0, the learning dynamics Equations (11), (12)
attain the following form:
(cid:88)
px
px(1 − px)
cxy
cxy
=
(apy + b)cxycyx
(18)
y
= rxy − Rx
(19)
Consider the dynamics of the strategies given by
Eq. 18. Clearly, the vertices of the simplex, px = {0, 1}
are the rest points of the dynamics. Furthermore, in
case the game allows a mixed NE, then the configuration
where all the agents play the mixed NE px = −b/a is
also a rest point of the dynamics. As is shown below,
however, this configuration is not stable, and for T = 0,
the only stable configurations correspond to the agents
playing pure strategies.
A. Three-player games
We now consider the case of three players in two-action
games. This scenario is simple enough for studying it
comprehensively, yet it still has non-trivial structural dy-
namics, as we demonstrate below.
1. Nash equilibria
We start by examining the NE for two classes of two-
action games, prisoner dilemma (PD) and a coordination
game. 2 In PD, the players have to choose between Co-
2 The behavior of the coordination and anti-coordination games
are qualitatively similar in the context of the present work, so
here we do not consider the latter.
3 Note that the dynamics will eventually lead to a different rest
point where z is now plays defect with both x and y.
XZ Y
XZ Y
XZ Y
XZ Y
Mixed strategy p∈{1,0,−ba} Nash strategy 1≥p≥0 d b c a distribute his link weight arbitrarily among the two
players. Additionally, the isolation payoff should be
smaller then than the reward at the equilibrium (e.g.,
if the latter condition is
b22 > CI for PD). Indeed,
reversed, then one of the agents, say x,
is better off
linking with y instead of z, thus "avoiding" the game
altogether.
Configuration III: The third configuration corre-
sponds to a uniformly connected networks where all
the links have the same weight cxy = cyz = ccx = 1
2 .
It is easy to see that when all three agents play NE
strategies, there is no incentive to deviate from the
uniform network structure.
in the last configuration
Configuration IV: Finally,
none of the links are reciprocated so that the players do
not play with each other: cxycyx = cxzczx = cyzczy = 0.
This cyclic network is a NE when the isolation payoff CI
is greater than the expected reward of playing NE in the
respective game.
2. Stable rest points of learning dynamics
The factorized NE discussed in the previous section
are the rest points of the replicator dynamics. However,
not all of those rest points are stable, so that not all the
equilibria can be achieved via learning. We now discuss
the stability property of the rest points.
One of the main outcomes of our stability analysis is
that at T = 0 the symmetric network configuration is not
stable. This is in fact a more general results that applies
to n-agent networks, as is shown in the next section. As
we will demonstrate later, the symmetric network can be
stabilized when one allows exploration.
The second important observation is that even when
the game allows mixed NE, such as in the coordination
game, any network configuration where the agents play
mixed strategy is unstable for T = 0 (see Appendix A).
Thus, the only outcome of the learning is a configuration
where the agents play pure strategies.
The surviving (stable) configurations are listed in
Fig. 4. Their stability can be established by analyzing
the eigenvalues of the corresponding Jacobian. Consider,
for instance, the configuration with one isolated player.
The corresponding eigenvalues are
λ1 = rxz − rxy , λ2 = ryz − ryx , λ3 = 0
λ4 = (1 − 2px)(r1
λ5 = (1 − 2py)(r1
x) < 0 ,
y) < 0 , λ6 = 0
x − r2
y − r2
For PD this configuration is marginally stable when
agents x and y play defect and rxy > 0 and ryx > 0.
It happens only when b22 ≥ −CI which means that
the isolation payoff should be less than the expected re-
ward for defection. Furthermore, one should also have
rxz < rxy , ryz < ryx, which indicates that the neither
5
FIG. 4:
(Color online) Stable rest points of the learning
dynamics for PD (upper panel) and the coordination game
(lower panel).
x nor y would get a better expected reward by switching
and playing with z (e.g., condition for NE). And for the
coordination game , assuming that b11 > b22 this config-
uration is stable when b11 ≥ −CI > b22 and b22 ≥ −CI .
Similar reasoning can be used for the other configu-
rations shown in Fig. 4. Note, finally, that there is a
coexistence of multiple equlibria for range of parameter,
except when the isolation payoff is sufficiently large, for
which the cyclic (non-reciprocated) network is the only
stable configuration.
B.
n-player games
In addition to the three agent scenario, we also ex-
amined the co-evolutionary dynamics of general n-agent
systems, using both simulations and analytical methods.
We observed in our simulations that the stable outcomes
of the learning dynamic consist of star motifs Sn (Fig. 5),
where a central node of degree n − 1 connects to n − 1
nodes of degree 1. 4 Furthermore, we observed that the
basin of attraction of motifs shrinks as motif size grows,
so that smaller motifs are more frequent.
4 This is true when the isolation payoff is smaller compared to
the NE payoff. In the opposite case the dynamics settles into a
configuration without reciprocated links.
b22≥−CIb22<−CI Mixed strategy Action 1 Action 2
−CI>b11b11≥−CI>b22−CI≤b226
IV. LEARNING WITH EXPLORATION
In this section we consider the replicator dynamics for
non-vanishing exploration rate T > 0. For two agent
games, the effect of the exploration has been previously
examined in Ref. [18], where it was established that for a
class of games with multiple Nash equilibria the asymp-
totic behavior of learning dynamics undergoes a drastic
changes at critical exploration rates and only one of those
equilibria survives. Below, we study the impact of the ex-
ploration in the current networked version of the learning
dynamics.
For 3-player, 2- action games we have six independent
variables px, py, pz, cxy, cyz, andczx. The strategy vari-
ables evolve according to the following equations:
FIG. 5: Observed stable configurations of co-evolutionary dy-
namics for T = 0.
px
py
pz
cyz
czx
We now demonstrate the stability of the star motif
Sn in n player two action games. Let player x be the
central player, so that all other players are only con-
nected to x, cαx = 1. Recall that the Jacobian of the
system is a block diagonal matrix with blocks J11 with
elements ∂ cij
( see
∂cmn
Appendix A). When all players play a pure strategy
pi = 0, 1 in a star shape motif, it can be shown that
J22 is diagonal matrix with diagonal elements of form
y(apy + b)cxycyx, whereas J11 is an upper tri-
angular matrix, and its diagonal elements are either zero
or have the form −(apxpy + bpx + dpy + a22)cxy where x
is the central player.
and J22 with has elements as ∂ pm
∂pn
(1− 2px)(cid:80)
For the Prisoner's Dilemma, the Nash Equilibrium cor-
responds to choosing the second action (defection) , i.e.
pα = 0. Then the diagonal elements of J22, and thus
its eigenvalues, equal bcxy. J11, on the other hand, has
n2− 2n eigenvalues , (n− 1) of them are zero and the rest
have the form of λ = −a22cxy. Since for the Prisoner's
Dilemma one has b < 0 then the start structure is stable
as long as b22 > CI .
A similar reasoning can be used for the Coordination
game, for which one has b < 0 and a + b > 0. In this
case, the star structure is stable when either b11 > −CI or
b22 > −CI , depending on whether the agents coordinate
on the first or second actions, respectively.
We conclude this section by elaborating on the
(in)stability of the n-agent symmetric network configu-
ration, where each agent is connected to all the other
agents with the same connectivity 1
n−1 . As shown in Ap-
pendix B, this configuration can be a rest point of the
learning dynamics Eq. (18) only when all agents play the
same strategy, which is either 0, 1 or −b/a. Consider
now the first block of the Jacobian in Eq. A1, i.e. J11.
It can be shown that the diagonal elements of J11 are
identically zero, so that T r(J11) = 0. Thus, either all
the eigenvalues of J11 are zero (in which case the con-
figuration is marginally stable), or there is at least one
eigenvalue that is positive, thus making the symmetric
network configuration unstable at T = 0.
1 − px
px
1 − py
py
1 − pz
pz
cxy
= (apy + b)wxy + (apz + b)wxz + T log
= (apz + b)wyz + (apx + b)wxy + T log
(1 − px)px
(1 − py)py
(1 − pz)pz
cxy(1 − cxy)
cyz(1 − cyz)
czx(1 − czx)
Here we have defined wxy = cxy(1 − cyz), wxz = (1 −
cxy)czx, and wyz = cyz(1−czx), and a, b, andd are defined
in Eqs. 15, 16 and 17.
= (apx + b)wxz + (apy + b)wyz + T log
= rxy − rxz + T log
= ryz − ryx + T log
= rzx − rzy + T log
1 − cxy
cxy
1 − cyz
cyz
1 − czx
czx
Figure 6(a) shows three possible network configura-
tions that correspond to the fixed points of the above
dynamics. The first two configurations are perturbed ver-
sion of a star motif ( stable solution for T = 0), whereas
the third one corresponds to a symmetric network where
all players connect to the other players with equal link
weights.
Furthermore, in Fig. 6(b) we show the behavior of the
learning outcomes for a PD game, as one varies the tem-
perature. For sufficiently small T , the only stable config-
urations are the perturbed star motifs, and the symmet-
ric network is unstable. However, there is a critical value
Tc above which the symmetric network becomes globally
stable.
Next, we consider the stability of the symmetric net-
works. As shown in Appendix B, the only possible solu-
tion in this configuration is when all the agents play the
same strategy, which can be found from the following
equation:
(ap + b) = 2T log
p
1 − p
(20)
The behavior of this equation (without the factor 2 in the
right-hand side) was analyzed in details in Ref. [18]. In
S2SnS4S3...7
FIG. 7: (Color online) Impact of the exploration on the sta-
ble outcomes of a coordination game in Fig. (2). The top
panel shows the bifurcation of strategy p versus T , whereas
the bottom panel shows the stability region of the symmetric
network configuration in the CI − T plane. Here the critical
temperature is Tc = 0.36.
reward (Fig. 7).
V. DISCUSSION
We have
studied the
co-evolutionary dynamics
of
strategies and link structure in a network of
reinforcement-learning agents. By assuming that the
agents' strategies allow appropriate factorization, we de-
rived a system of a coupled replicator equations that de-
scribe the mutual evolution of agent behavior and net-
work topology. We used these equations to fully charac-
terize the stable learning outcomes in the case of three
agents and two action games. We also established some
analytical results for the more general case of n-player
two-action games.
We demonstrated that in the absence of any strat-
(a)
(b)
FIG. 6: a) (Color online) Possible network configurations for
three-player PD (Fig. 2)., (b) Bifurcation diagram for varying
temperature. Two blue solid lines correspond to the config-
urations with one isolated agent and one central agent. The
symmetric network configuration is unstable at low temper-
ature (red line), and becomes globally stable above a critical
temperature.
particular, for games with a single NE, this equation al-
lows a single solution that corresponds to the perturbed
NE. For games with multiple equilibria, on the other
hand, there is a critical exploration rate Tc: For T < Tc
there are two stable solutions and one unstable solution,
whereas for T ≥ Tc there is a single globally stable solu-
tion.
We use these insights to examine the stability of the
symmetric network configuration for the coordination
game, depending on the parameters T and CI ; see Ap-
pendix C. In this example a = 5 , b = −2 and d = 1
for all three agents. Figure 7 shows the bifurcation dia-
gram of p (probability of choosing the first action) plot-
ted versus T . Below the critical temperature, there are
three three solutions, two of which (that correspond to
the perturbed pure NE) are stable. And Fig. (7) shows
the domain of T and CI for stable homogenous equilib-
rium. When T → 0, the domain of CI shrinks until it
becomes a point at T = 0 where −CI is equal to the NE
Perturbed pure NE 0<p<1 Strong connection Weak connection Uniform connection CxyT0.0Tc−b22−b11egy exploration (zero temperature limit) learning leads
to a network composed of star-like motifs. Furthermore,
the agents on those networks play only pure NE, even
when the game allows a mixed NE. Also, even though
the learning dynamics allows rest points with a uniform
network (e.g., an agent plays with all the other agents
with the same probability) , those equilibria are not sta-
ble at T = 0. The situation changes when the agents
explore their strategy space. In this case, the stable net-
work structures undergo bifurcation as one changes the
exploration rate. In particular, there is a critical explo-
ration rate above which the uniform network becomes a
globally stable outcome of the learning dynamics.
We note that the main premise behind the strategy fac-
torization use here is that the agents use the same strat-
egy profile irrespective of whom they play against. While
this assumption is perhaps valid under certain circum-
stances, it certainly has its limitations that need to be
studied further through analytical results and empirical
data. Furthermore, the other extreme where the agent
employs unique strategy profiles for each of his partners
does not seem very realistic either, as it would impose
considerable cognitive load on the agent. A more realis-
tic assumption is that the agent has a few strategy profile
that roughly corresponds to the type of agent he is in-
teracting with. The approach presented here can be, in
principle, generalized to the latter scenario.
VI. ACKNOWLEDGMENTS
We thank Armen Allahverdyan for his comments and
contributions during the initial phase of this work. This
research was supported in part by the National Sci-
ence Foundation under Grant No. 0916534 and the U.S.
AFOSR MURI under Grant No. FA9550-10-1-0569.
Appendix A: Local Stability Analysis of the Rest
Points
To study the local stability properties of the rest points
in the system given by Eqs.18 and 19 , we need to analyze
the eigenvalues of the corresponding Jacobian matrix.
For n-player two-action game, we have n action variables
and l = n(n − 2) link variables, so that the total number
of independent dynamical variables is n + l = n(n − 1).
We can represent the Jacobian as follows,
Here the diagonal blocks J11 and J22 are l × l and n × n
square matrices, respectively. Similarly, J12 and J21 are
l × n and n × l matrices, respectively.
In the most general case, the full analysis of the Jaco-
bian is intractable. However, the problem can be simpli-
fied for T = 0. Indeed, consider the lower off-diagonal
∂ cij
∂cmn
∂ pm
∂cij
∂ cij
∂pm
∂ pm
∂pn
=
(cid:18)J11 J12
(cid:19)
J21 J22
J =
(A1)
8
block of the Jacobian, J21, the elements of which have
the form
= pi(1 − pi)cji(api + b)
∂ pi
∂cij
(A2)
Consulting the rest point condition given by Eqs. 18, one
can see that J21 is identically zero. By using the block
matrix determinant identity, the characteristic polyno-
mial of the Jacobian assumes the following factorized
form
p(λ) = det(J11 − λI)det(J22 − λI) = 0
(A3)
The above factorization facilitates the stability analysis
for certain cases that we now focus on:
a.
(In)Stability of mixed strategies for T = 0
Let us
show that the configurations where the agents mix either
on their actions or links cannot be stable at T = 0. Here
we just need to consider the submatrix J22. We now
show that this matrix always has at least one positive
eigenvalues when players adopt the mixed NE p = −b/a.
Indeed, it can be shown that J22 is a non-zero matrix
with zero diagonal elements. Recall that for any square
matrix A the T r(A) =(cid:80) λi then T r(J11) = 0 means at
least one of its eigenvalues is always positive, so that the
mixed Nash configuration is unstable. The same line of
reasoning can be applied to the configuration where the
agents mix over the links.
Appendix B: Agent Strategies in Symmetric
Networks
Let us consider a two-action n-players game. Each
player i chooses action one with probability pi. Here we
prove that player n and player n−1 in a homogenous net-
work have the same strategy, i.e., pn = pn−1. Consider
Eq. (11) for players n, n − 1 and n − 2,
p1 + p2 + ··· + pn−2 + pn−1 = k log
− c (B1)
pn
1 − pn
p1 + p2 + ··· + pn−2 + pn = k log
pn−1
1 − pn−1
− c (B2)
where
K = − T (n − 1)2
a
, c =
b(n − 1)
a
Also, let us define a function g as
g(pn) = xn + k log
pn
(1 − pn)
(B3)
(B4)
Now , by subtracting the two Eqs.(B1) and (B2), we
have g(pn) = g(pn−1). Since 0 < pi < 1 , then function
g is a monotonic function, so g(pn) = g(pn−1) ↔ pn =
pn−1. By repeating the same reasoning for the remaining
pi one can prove that p1 = p2 = ··· = pn.
Appendix C: Stability of Symmetric three-player
network
For three-player two-action games, the Jacobian cor-
responding to the symmetric network configuration con-
sists of the following blocks:
−v −T −v
−v −v −T
,
−T −v −v
0 m −m
,
0 −g
,
,
−T
−m 0 m
m −m 0
g
0 −g
0
g
k
k
k −T
k
k −T
k
g
−g
J11 =
J12 =
J21 =
J22 =
9
and p is the probability of selecting the first action, which
is the same for all the agents in the symmetric network
configuration. The six eigenvalues that determine the
stability of the configuration can be calculated analyti-
cally and are as follows:
(C1)
(C2)
(C3)
λ1 = 2k − T,
λ2 = −T − 2v,
λ3,4 =
(−k − 2T + v −(cid:112)12gm + (k + v)2),
(−k − 2T + v +(cid:112)12gm + (k + v)2).
1
2
1
2
(C4)
λ5,6 =
where we have defined
v =
m =
g =
k =
ap2 + bp + dp + b22 + CI
4
,
,
8
ap + d
p(1 − p)(ap + b)
2
ap(1 − p)
,
,
4
(C5)
(C6)
(C7)
(C8)
[1] Jorge M Pacheco, Arne Traulsen, and Martin A Nowak.
Coevolution of strategy and structure in complex net-
works with dynamical linking. Physical Review Letters,
97(25):258103, 2006.
[2] T. Gross and B. Blasius. Adaptive coevolutionary net-
works: a review. Journal of the Royal Society Interface,
5(20):259, 2008.
[3] S.; Castellano, C.;Fortunato and V. Loreto. Statistical
physics of social dynamics. Reviews of Modern Physics,
81(2):591, 2009.
[4] M. Perc and A. Szolnoki. Coevolutionary games -- a mini
review. BioSystems, 99(2):109 -- 125, 2010.
[5] Gerd Zschaler. Adaptive-network models of collective dy-
namics. The European Physical Journal-Special Topics,
211(1):1 -- 101, 2012.
[6] David Lazer. The co-evolution of individual and network.
Journal of Mathematical Sociology, 25(1):69 -- 108, 2001.
[7] M.O. Jackson and A. Watts. On the formation of interac-
tion networks in social coordination games. Games and
Economic Behavior, 41(2):265 -- 291, 2002.
These expressions can be used to (numerically) identify
the stability region of the configuration in the parameter
space (T, CI ), as shown in Fig. 7.
[10] S. Goyal. Connections: an introduction to the economics
of networks. Princeton University Press, 2009.
[11] Mathias Staudigl.
bayesian interaction games.
Game Theory, 42(1):179 -- 210, 2013.
Co-evolutionary dynamics and
International Journal of
[12] Ardeshir Kianercy, Aram Galstyan, and Armen Al-
lahverdyan. Adaptive agents on evolving networks. In
Proceedings of the 11th International Conference on Au-
tonomous Agents and Multiagent Systems, 2012.
[13] J. Hofbauer and K. Sigmund. Evolutionary games and
Population dynamics. Cambridge University Press, 1998.
[14] J. Hofbauer and K. Sigmund. Evolutionary game dy-
namics. Bulletin of the American Mathematical Society,
40(4):479, 2003.
[15] Y. Sato and J.P. Crutchfield. Coupled replicator equa-
tions for the dynamics of learning in multiagent systems.
Physical Review E, 67(1), 2003.
[16] C.J.C.H. Watkins and P. Dayan. Technical note: Q-
learning. Machine learning, 8(3):279 -- 292, 1992.
[17] R.S. Sutton and A.G. Barto. Reinforcement learning: An
[8] G. Demange. Group formation in economics: networks,
introduction. The MIT press, 2000.
clubs and coalitions. Cambridge Univ. Press, 2005.
[9] Sanjeev Goyal and Fernando Vega-Redondo. Network
formation and social coordination. Games and Economic
Behavior, 50(2):178 -- 207, 2005.
[18] A. Kianercy and A. Galstyan. Dynamics of boltzmann q
learning in two-player two-action games. Physical Review
E, 85(4):041145, 2012.
|
1502.02076 | 1 | 1502 | 2015-02-06T23:50:28 | Can Other People Make You Less Creative? | [
"cs.MA"
] | This paper explains in layperson's terms how an agent-based model was used to investigate the hypothesis that culture evolves more effectively when novelty-generating creative processes are tempered by imitation processes that preserve proven successful ideas. Using EVOC, an agent-based model of cultural evolution we found that (1) the optimal ratio of inventing to imitating ranged from 1:1 to 2:1 depending on the fitness function, (2) there was a trade-off between the proportion of creators to conformers and how creative the creators were, and (3) when agents in increased or decreased their creativity depending on the success of their latest creative efforts, they segregated into creators and conformers, and the mean fitness of ideas across the society was higher. It is tentatively suggested that through the unconscious use of social cues, members of a society self-organizes to achieve a balanced mix of creators and conformers. | cs.MA | cs |
Gabora, L. (2015). Can Other People Make You Less Creative?
Psychology Today (online). https://www.psychologytoday.com/blog/mindbloggling/201502/can-
other-people-make-you-less-creative
Can Other People Make You Less Creative?
Liane Gabora
Abstract
Okanagan Campus, Arts Building, 333 University Way, Kelowna BC, V1V 1V7, CANADA
Department of Psychology, University of British Columbia
This paper explains in layperson’s terms how an agent-based model was
used to investigate the hypothesis that culture evolves more effectively when
novelty-generating creative processes are tempered by imitation processes
that preserve proven successful ideas. Using EVOC, an agent-based model
of cultural evolution we found that (1) the optimal ratio of inventing to
imitating ranged from 1:1 to 2:1 depending on the fitness function, (2) there
was a trade-off between the proportion of creators to conformers and how
creative the creators were, and (3) when agents in increased or decreased
their creativity depending on the success of their latest creative efforts, they
segregated into creators and conformers, and the mean fitness of ideas
across the society was higher. It is tentatively suggested that through the
unconscious use of social cues, members of a society self-organizes to
achieve a balanced mix of creators and conformers.
Do you feel more creative in some social environments than others, or even when you
are completely alone? Although it is widely believed that stimulating environments
enhance creativity there is evidence that this is not always the case; indeed it turns out
that creativity can be enhanced by spending time in an isolation tank blocked off from
sensory stimulation entirely (Forgays & Forgays, 1992; Norlander, Bergman, & Archer,
1998; Vartanian, & Suedfeld, 2011). This suggests that social stimulation may not
always enhance creativity, and may even decrease it.
The idea that social environments could interfere with creativity came from thinking
about creativity in the context of culture as an evolutionary process. Evolutionary
processes require a balance between exploratory processes that generate new variants
and conservative processes that perpetuate ‘tried and true’ variants. This is the case in
biological evolution, and it seemed reasonable that it would also be the case for cultural
evolution. In other words: people may send out social signals to each other that ensure
that creativity---the process that fuels cultural novelty---is properly balanced by
conformity,i.e., imitation of ideas that have already proven to be successful.
The notion that society might aim to temper novelty-generating creativity with novelty-
perpetuating imitation flies in the face of the widespread assumption that more creativity
is necessarily better. It goes without saying that creativity is a good thing, and that
everyone should be creative. Or does it? Sure, our capacity for self-expression, for
2
finding practical solutions to problems of survival, and coming up with aesthetically
pleasing objects that delight the senses, all stem from the creative power of the human
mind. But there are drawbacks to creativity.
First, creative people tend to be more emotionally unstable and prone to affective
disorders such as depression and bipolar disorder. They have a higher incidence of
‘schizotypal’ leanings than other segments of the population. They are also more prone
to abuse drugs and alcohol, and to commit suicide. So there is a ‘dark side’ to creativity
(Cropley, Cropley, Kaufman, & Runco, 2010).
Second, a creative solution to one problem often generates other problems, or
unexpected negative side effects that may only become apparent after much has been
invested in the creative solution. There is a cultural version of what in biology is referred
to as epistasis, where what is optimal with respect to one part depends on what is done
with respect to another part. Once both parts of a problem have been solved in a
mutually beneficial way, too much creativity can cause these ‘co-adapted’ partial
solutions to break down.
Third, in a group of interacting individuals, only a fraction of them need be creative for
the benefits of creativity to be felt throughout the group. Uncreative people can reap the
benefits of the ideas of ‘creative types’ without having to withstand the ‘dark side’ of
creativity by simply imitating, or admiring them. Few of us know how to build a computer,
or write a symphony, or a novel, but they are nonetheless ours to use and enjoy when
we please. An excess of creative types all completely absorbed in their own creative
process might effectively insulate themselves and block the rapid diffusion of the best
ideas.
This opens up some interesting questions. Would it be good for the society as a whole if
everyone were highly creative? In order for a culture to evolve optimally, what is the
ideal ratio of creators to imitators, and how creative should the ’creative types’ be? And
perhaps most interesting of all: do people upgrade or downgrade how creative they are
in response to social cues they receive from other people about the perceived value of
their creative outputs?
My colleagues and I are investigating these questions using a computer model of
cultural evolution. I'll begin by telling you a bit about the computer model itself. Then I’ll
explain the experiments that led up to the experiments that explored the hypothesis that
people socially regulate each others’ creativity. Finally, I’ll explain the social regulation
experiments themselves.
THE COMPUTER MODEL
The current model's predecessor was called Meme and Variations or MAV (Gabora,
1995). Its name is a pun on the musical form, ‘theme and variations'. MAV was the
earliest computer program to model culture as an evolutionary process in its own right.
MAV was inspired by the genetic algorithm (GA), a search technique that finds solutions
to complex problems by generating a 'population' of candidate solutions (through
processes akin to mutation and recombination), selecting the best, and repeating until a
satisfactory solution is found.
The computer model is composed of an artificial society of agents in a two-dimensional
grid-cell world. Agents consist of (1) a neural network, which encodes ideas for actions
2
3
and detects trends in what constitutes an effective action, and (2) a body, which
implements their ideas as actions. The agents can do two things: (1) invent ideas for
new actions, and (2) imitate their neighbors' actions. The computer model enables us to
investigate what happens to the diversity and effectiveness of actions in the artificial
society over successive rounds (called ‘iterations') of invention and imitation. Since the
ideas in the model are ideas for actions, diversity is measured by counting how many
different actions are being implemented by the agents. Evolution in the biological sense
is not taking place; the agents neither die nor have offspring. But evolution in the cultural
sense is taking place through the generating and sharing of ideas for actions amongst
agents, which over time leads to more effective actions.
In MAV, all agents were equally capable of both inventing and imitating. In the latest
version of the computer model called EVOC (for EVOlution of Culture), it is possible to
vary how likely an agent is to invent versus imitate.
A TYPICAL RUN
Each iteration, every agent has the opportunity to (1) acquire an idea for a new action,
either by imitation, copying a neighbor, or by invention, creating one anew, (2) update
their knowledge about what constitutes an effective action, and (3) implement a new
action. Effectiveness of actions starts out low because initially all agents are just
standing still doing nothing. Soon some agent invents an action that has a higher
effectiveness than doing nothing, and this action gets imitated, so effectiveness
increases. Effectiveness increases further as other ideas get invented, assessed,
implemented as actions, and spread through imitation. The diversity of actions initially
increases due to the proliferation of new ideas, and then decreases as agents hone in
on the fittest actions. Thus MAV successfully models how 'descent with modification' can
occur in a cultural context.
FIRST SET OF EXPERIMENTS:
WHAT IS THE OPTIMAL RATIO OF EFFORT INVESTED IN CREATIVITY TO EFFORT
INVESTED IN IMITATION?
In the earliest version of this computer model (MAV), all agents were equally capable of
both inventing and imitating (Gabora, 1995). It was possible to vary the probability that,
in a given iteration, they would invent versus imitate. The agents are too rudimentary to
suffer from depression or commit suicide, so it is just the other detrimental aspects of
creativity listed above that we thought might play a role in these experiments.
What the results showed was that if they all imitated each other all the time, nothing
happened at all: everyone watched everyone else and no one did anything. If they all
invented all the time, the progress of ideas was slow because they weren’t taking
advantage of each other’s hard work. The optimal ratio of inventing to imitating was
about 2:1. Of course, these results hold for just this little idealized world, and they may or
may not be generalizable to the world at large. But they do ring true for many people,
who say they spend about 2/3 of their time alone in their studio or office immersed in
their work, and about 1/3 of their time talking or reading about or studying things related
to their creative project. (Subsequent experiments showed that this ratio can be as low
as 1:1 depending on the ‘fitness function’, i.e., the kind of task the agents had to solve.)
SECOND SET OF EXPERIMENTS:
3
4
WHAT PROPORTION OF SOCIETY SHOULD BE CREATIVE, AND HOW CREATIVE
SHOULD THEY BE?
The finding that very high levels of creativity can be detrimental for society led to the
hypothesis that there is an adaptive value to society's ambivalent attitude toward
creativity; society as a whole may benefit from a distinction between the conventional
workforce and what has been called a “creative class” (Florida, 2002). Using the new
version of the computer model, EVOC we investigated how patterns of cultural evolution
are affected by how numerous and creative the creators are. We conducted experiment
that varied, not just the ratio of creators to imitators, but also the creativeness of the
creators (Leijnen & Gabora, 2009). Each agent could be a pure imitator, a pure creator,
or something in between. The pure imitators never invented; they simply copied the
successful innovations of the creative agents. The creators were able to invent as well
as well as imitate. The percentage of iterations in which they invented varied up to 100%.
The results were provocative. We found that cultural diversity – that is, the number of
different actions in the artificial society -- was positively correlated with both the
percentage of creators, and their level of creativity. However, for cultural fitness or
effectiveness, the situation was more complex. So long as the creative types weren’t
THAT creative, the more of them there are, the better. But when the creative types were
HIGHLY creative, the mean fitness of ideas across the society was higher if there were
fewer of them. The results seemed to show that the more creative the creators are, the
less numerous they should be.
We then conducted more extensive investigations of these questions employing more
detailed and sophisticated analytical methods. The amount of time it takes for the
effectiveness of ideas across the artificial society to reach a threshold level of
performance is affected by the creator to imitator ratio (C), and the creator innovation
probability (p).
The same general trends emerged. Cultural diversity was once again positively
correlated with both the percentage of creators, and their level of creativity (Gabora &
Leijnen, 2013). But when we looked at, not the variety of ideas, but how fit or effective
they were, the pattern of results was more complicated. What we found was that if C is
low the p should be high, but if C is high then p should be intermediate (Gabora &
Firouzi, 2012). In other words, once again there was a tradeoff between how creative the
creators were, and how many of them there should be.
These results supported the hypothesis that too much creativity causes ‘co-adapted’
partial solutions to problems to break down (the ‘don’t fix it if it ain’t broke’ phenomenon).
They also supported the hypothesis that creative types, while they are a necessary
source of novelty, constitute pinholes in the fabric of culture that block the spread of
ideas. An iteration spent inventing is an iteration not spent imitating, and imitation is
extremely valuable. It’s not just a form of free-riding, nor just ‘the greatest compliment’,
but an indispensable social mechanism that serves everyone. By simply copying the
successful innovations of the creative types, imitators serve as a ’memory’ for preserving
the fittest configurations. So, contrary to popular belief, it might not be best for the
society as a whole if everyone were creative.
THIRD SET OF EXPERIMENTS:
HOW IS SOCIETY AFFECTED IF PEOPLE CAN UPGRADE/DOWNGRADE THEIR
4
5
CREATIVITY IN RESPONSE TO SOCIAL SIGNALS?
We then hypothesized that society as a whole might perform even better with the ability
to adjust creativity in accordance with their perceived creative success, through
mechanisms such as selective ostracization of deviant behaviour unless accompanied
by the generation of valuable cultural novelty, and encouraging of successful creators. A
first step in investigating this hypothesis was to determine whether it is algorithmically
possible to increase the mean fitness of ideas in a society by enabling them to self-
regulate how creative they are. To test the hypothesis that the mean fitness of cultural
outputs across society increases faster with social regulation (SR) than without it, we
increased the relative frequency of invention for agents that generated superior ideas,
and decreased it for agents that generated inferior ideas (Gabora & Tseng, 2014a).
Each iteration, for each agent, the fitness of its current action relative to the mean fitness
of actions for all agents at the previous iteration was assessed. If its action was fitter
than the mean it created more, and if its action was less fit than the mean it imitated
more.
The typical pattern was observed with respect to the diversity, or number of different
ideas: an increase as the space of possibilities is explored followed by a decrease as
agents converge on fit actions. However, this pattern occurred earlier, and was more
pronounced, in societies with SR than societies without it. Interestingly, the mean fitness
of the cultural outputs in societies with SR was higher than that in societies without SR.
Even more interestingly, the societies with SR ended up separating into two distinct
groups: one that primarily invented, and one that primarily imitated. Thus the observed
increase in fitness could indeed be attributed to increasingly pronounced individual
differences in their degree of creative expression over the course of a run. Agents that
generated superior cultural outputs had more opportunity to do so, while agents that
generated inferior cultural outputs became more likely to propagate proven effective
ideas rather than reinvent the wheel.
We conducted another set of experiments in which agents were able to generate not just
simple single-step actions but complex multi-step actions that were more like real-world
actions such as dancing or tool-making (Gabora & Tseng, 2014b). The same general
patterns emerged: the agents segregated into creators and conformers, and the mean
fitness of actions across the society as a whole increased.
These results don't show that this kind of segregation into creators and
conformers actually takes place in real societies. What they suggest is that if this
did happen it could have an adaptive benefit for society as a whole.
CONCLUSIONS
The computer model differs substantially from the real world, so any attempt to
extrapolate these results should be taken with a grain of salt. The agents’ neural
networks are so small that creative novelty is generated does not involve noticing and
refining new kinds of connections the way it happens in real minds (Gabora, 2000).
Moreover, in these simulations, unlike the real world, agents had only one task to
accomplish. However, the results of these computer simulations are provocative, and
inspire new ways of thinking about creativity. They show that societies may benefit as a
5
6
whole by self-organizing into a balanced mix of novelty generating creators and
continuity perpetuating imitators, and lead to the speculation that this happens
spontaneously in real societies.
There are many speculative but fascinating implications of this research. It leads to the
suggestion that the reason creative individuals often isolate themselves is not just to
decrease disturbances so they can more fully concentrate on their art, but because
isolation safeguards you from social signals to downgrade your creativity, which can
negatively impact creative performance. It suggests that as societies become
increasingly denser it may become increasingly difficult to isolate oneself from the cues
by which people unconsciously socially regulate each other’s level of creativity.
Another possibility, suggested by my colleague Kiley Hamlin, is that girls are more
responsive to social cues to downgrade creativity than boys, which might prematurely
streamline them into an “imitator” track. The more you imitate, the more you rely on
imitation as a source of ideas and ways of doing things, so it becomes a vicious circle of
sorts, and vice versa: the more you create, the more you keep the creative juices flowing
and rely on your own creative processes as a source of not just new ideas, but pleasure.
ACKNOWLEDGMENTS
The author is grateful for funding from the Natural Sciences and Engineering Research
Council of Canada.
REFERENCES
Cropley, A., Cropley, D., Kaufman, J. & Runco, M. Eds. (2010). The Dark Side of
Creativity (pp. 277-296). Cambridge UK: Cambridge University Press.
Florida, R. (2002). The rise of the creative class. London: Basic Books.
Gabora, L. (2000). Toward a theory of creative inklings. In (R. Ascott, Ed.) Art,
Technology, and Consciousness (pp. 159-164). Intellect Press, Bristol, UK.
Gabora, L. (1995). Meme and variations: A computer model of cultural evolution. In (L.
Nadel & D. Stein, Eds.) 1993 Lectures in Complex Systems, Addison-Wesley, 471-486.
Gabora, L., & Firouzi, H. (2012). Society functions best with an intermediate level of
creativity.Proceedings of the 34th Annual Meeting of the Cognitive Science Society (pp.
1578-1583). Austin TX: Cognitive Science Society. [http://arxiv.org/abs/1310.4753]
Gabora, L., & Leijnen, S. (2013). The relationship between creativity, imitation, and
cultural diversity. International Journal of Softward and Informatics, 7(4), 615-627.
Gabora, L. & Tseng, S. (2014a). Computational evidence that self-regulation of creativity
is good for society. Proceedings of the 36th Annual Meeting of the Cognitive Science
Society (pp. 2240-2245). Austin TX: Cognitive Science Society.
[http://arxiv.org/abs/1408.2512]
Gabora, L. & Tseng, S. (2014b). The social impact of self-regulation on the evolution of
6
7
simple and complex creative ideas. Proceedings of the 5th International Conference on
Computational Creativity. Palo Alto: Association for the Advancement of Artificial
Intelligence.
Leijnen, S. & Gabora, L. (2009). How creative should creators be to optimize the
evolution of ideas? A computational model. Electronic Proceedings in Theoretical
Computer Science, 9, 108-119.
Forgays, D. G., & Forgays, D. K. (1992). Creativity enhancement through flotation
isolation. Journal of Environmental Psychology, 12, 329-335.
Norlander, T., Bergman, H., & Archer, T. (1998). Effects of flotation rest on creative
problem solving and originality. Journal of Environmental Psychology, 18, 399-408.
Vartanian, O., & Suedfeld, P. (2011). The effect of the flotation version of Restricted
Environmental Stimulation Technique (REST) on jazz improvisation. Music and Medicine,
3, 234-238.
7
|
1206.3793 | 1 | 1206 | 2012-06-17T21:19:45 | A distributed classification/estimation algorithm for sensor networks | [
"cs.MA",
"eess.SY",
"math.OC"
] | In this paper, we address the problem of simultaneous classification and estimation of hidden parameters in a sensor network with communications constraints. In particular, we consider a network of noisy sensors which measure a common scalar unknown parameter. We assume that a fraction of the nodes represent faulty sensors, whose measurements are poorly reliable. The goal for each node is to simultaneously identify its class (faulty or non-faulty) and estimate the common parameter.
We propose a novel cooperative iterative algorithm which copes with the communication constraints imposed by the network and shows remarkable performance. Our main result is a rigorous proof of the convergence of the algorithm and a characterization of the limit behavior. We also show that, in the limit when the number of sensors goes to infinity, the common unknown parameter is estimated with arbitrary small error, while the classification error converges to that of the optimal centralized maximum likelihood estimator. We also show numerical results that validate the theoretical analysis and support their possible generalization. We compare our strategy with the Expectation-Maximization algorithm and we discuss trade-offs in terms of robustness, speed of convergence and implementation simplicity. | cs.MA | cs |
A DISTRIBUTED CLASSIFICATION/ESTIMATION ALGORITHM
FOR SENSOR NETWORKS∗
FABIO FAGNANI†, SOPHIE M. FOSSON‡, AND CHIARA RAVAZZI§
Abstract. In this paper, we address the problem of simultaneous classification and estimation of
hidden parameters in a sensor network with communications constraints. In particular, we consider
a network of noisy sensors which measure a common scalar unknown parameter. We assume that
a fraction of the nodes represent faulty sensors, whose measurements are poorly reliable. The goal
for each node is to simultaneously identify its class (faulty or non-faulty) and estimate the common
parameter.
We propose a novel cooperative iterative algorithm which copes with the communication con-
straints imposed by the network and shows remarkable performance. Our main result is a rigorous
proof of the convergence of the algorithm and a characterization of the limit behavior. We also
show that, in the limit when the number of sensors goes to infinity, the common unknown param-
eter is estimated with arbitrary small error, while the classification error converges to that of the
optimal centralized maximum likelihood estimator. We also show numerical results that validate
the theoretical analysis and support their possible generalization. We compare our strategy with
the Expectation-Maximization algorithm and we discuss trade-offs in terms of robustness, speed of
convergence and implementation simplicity.
Key words. Classification, Consensus, Gaussian mixture models, Maximum-likelihood estima-
tion, Sensor networks, Switching systems.
1. Introduction. Sensor networks are one of the most important technologies
introduced in our century. Promoted by the advances in wireless communications
and by the pervasive diffusion of smart sensors, wireless sensor networks are largely
used nowadays for a variety of purposes, e.g., environmental and habitat surveillance,
health and security monitoring, localization, targeting, event detection.
A sensor network basically consists in the deployment of a large numbers of small
devices, called sensors, that have the ability to perform measurements and simple
computations, to store few amounts of data, and to communicate with other devices.
In this paper, we focus on ad hoc networks, in which communication is local: each
sensor is connected only with a restricted number of other sensors. This kind of
cooperation allows to perform elaborate operations in a self-organized way, with no
centralized supervision or data fusion center, with a substantial energy and economic
saving on processors and communication links. This allows to construct large sensor
networks at contained cost.
A problem that can be addressed through ad hoc sensor networking is the dis-
tributed estimation: given an unknown physical parameter (e.g., the temperature in
a room, the position of an object), one aims at estimating it using the sensing ca-
pabilities of a network. Each sensor performs a (not exact) measurement and shares
it with the sensors with which it can establish a communication; in turn, it receives
information and consequently updates its own estimate. If the network is connected,
∗A preliminary version of some of the results has appeared in the proceedings of the 50st IEEE
Conference on Decision and Control and European Control Conference, Orlando, Florida, 12-15
December 2011.
†DISMA (Dipartimento di Scienze Matematiche), Politecnico di Torino, Corso Duca degli Abruzzi,
24, I-10129 TO, (e-mail: [email protected])
‡DET (Dipartimento di Elettronica e Telecomunicazioni), Politecnico di Torino, Corso Duca degli
Abruzzi, 24, I-10129 TO (e-mail: [email protected])
§DET (Dipartimento di Elettronica e Telecomunicazioni), Politecnico di Torino, Corso Duca degli
Abruzzi, 24, I-10129 TO (e-mail: [email protected])
1
by iterating the sharing procedure, the information propagates and a consensus can
be reached. Neither centralized coordinator nor data fusion center is present. The
mathematical model of this problem must envisage the presence of noise in measure-
ments, which are naturally corrupted by inaccuracies, and possible constraints on the
network in terms of communication, energy or bandwidth limitations, and of necessity
of quantization or data compression.
Distributed estimation in ad hoc sensor networks has been widely studied in the
literature. For the problem of estimating an unknown common parameter, typical
approach is to consider distributed versions of classical maximum likelihood (ML)
or maximum-a-posteriori (MAP) estimators. Decentralization can be obtained, for
instance, through consensus type protocols (see [1], [2], [3]) adapted to the communi-
cation graph of the network, or by belief propagation methods [4] and [5].
A second important issue is sensors' classification, which we define as follows [6].
Let us imagine that sensors can be divided into different classes according to peculiar
properties, e.g., measurements' or processing capabilities, and that no sensor knows
to which class it belongs: by classification, we then intend the labeling procedure
that each sensor undertakes to determine its affiliation. This task is addressed to a
variety of clustering purposes, for example, to rebalance the computation load in a
network where sensors can be distinguished according to their processing power. On
most occasions, sensors' classification is faced through some distributed estimation,
the underlying idea being the following: each sensor performs its measurement of a
parameter, then iteratively modifies it on the basis of information it receives; during
this iterative procedure the sensor learns something about itself which makes it able
to estimate its own configuration.
i ηi, where θ⋆ ∈ R is the unknown global parameter, ω⋆
In this paper, we consider the following model: each sensor i performs a measure-
ment yi = θ⋆ + ω⋆
i > 0 is the
unknown status of the sensor, and ηi is a Gaussian random noise. The more ω⋆
is
i
large, the more the sensor i is malfunctioning, that is, the quality if its measurement
is low. The ω⋆
i parameter is supposed to belong to a discrete set, in particular in this
paper we consider the binary case.
The goal of each unit i is to estimate the parameter θ⋆ and the specific configu-
i . The presence of the common unknown parameter θ⋆ imposes a coupling
ration ω⋆
between the different nodes and makes the problem interesting.
An additive version of the aforementioned model has been studied in [7], where
measurement is given by yi = θ⋆ + ω⋆
i + ηi. Another related problem is the so-called
calibration problem [8,9]: sensor i performs a noisy linear measurement yi = Aiθ + ηi
where the unknown θ and Ai are a vector and a matrix, respectively, while ηi is a
noise; the goal consists in the estimation of θ and of Ai, the latter being known as
calibration problem.
All these are particular cases of the problem of the estimation of Gaussian mix-
tures' parameters [10, 11]. This perspective has been studied for sensor networks
in [12], [13], [14], and [15] where distributed versions of the Expectation-Maximization
(EM) algorithm have been proposed. A network is given where each node inde-
pendently performs the E-step through local observations.
In particular, in [14] a
consensus filter is used to propagate the local information. The tricky point of such
techniques is the choice of the number of averaging iterations between two consecutive
M-steps, which must be sufficient to reach consensus.
The aim of this paper is the development of a distributed, iterative procedure
which copes with the communication constraints imposed by the network and com-
2
putes an estimation (bθ,bω) approximating the maximum likelihood optimal solution
of the proposed problem. The core of our methodology is an Input Driven Consensus
Algorithm (IA for short), introduced in [16], which takes care of the estimation of
the parameter θ∗. IA is coupled with a classification step where nodes update the
estimation of their own type ω∗i by a simple threshold estimator based on the current
estimation of θ∗. The fact of using a consensus protocol working on inputs instead,
as more common, on initial conditions, is a key strategic fact: it serves the purpose of
using the innovation coming from the units who are modifying the estimation of their
status, as time passes by. Our main theoretical contribution is a complete analysis of
the algorithm in terms of convergence and of behaviour with respect to the size of the
network. With respect to other approaches like distributed EM for which convergence
results are missing, this makes an important difference. We also present a number of
numerical simulations showing the remarkable performance of the algorithm which,
in many situations, outperform classical choices like EM.
The outline of the paper is the following. In Section 2 we shortly present some
graph nomenclature needed in the paper. Section 3 is devoted to a formal description
of the problem and to a discussion of the classical centralized maximum likelihood
solution. In Section 4, we present the details and the analysis of our IA. Our main
results are Theorems 4.1 and 4.2: Theorem 4.1 ensures that, under suitable assump-
tions on the graph, the algorithm converges to a local maximum of the log-likelihood
function; Theorem 4.2 is a concentration result establishing that when the number
of nodes N → +∞, the estimate bθ converges to the true value θ∗ (a sort of asymp-
totic consistency). Finally, we also study the behavior of the discrete estimate bω
by analyzing the performance index the relative classification error over the network
when N → +∞ (see Corollary 4.4). Section 5 contains a set of numerical simulations
carried on different graph architectures: complete, circulant, grids, and random geo-
metric graphs. Comparisons are proposed with respect to the optimal centralized ML
solution and also with respect to the EM solution. Finally, a long Appendix contains
all the proofs.
2. General notation and graph theoretical preliminaries. Throughout
this paper, we use the following notational convention. We denote vectors with small
letters, and matrices with capital letters. Given a matrix M , M T denotes its trans-
pose. Given a vector v, v denotes its Euclidean norm. 1A is the indicator function
of set A. Given a finite set V, RV denotes the space of real vectors with components
labelled by elements of V. Given two vectors x, z ∈ RV , dH(x, z) = {i ∈ V : xi 6= zi}.
We use the convention that a summation over an empty set of indices is equal to zero,
while a product over an empty set gives one.
A symmetric graph is a pair G = (V,E) where V is a set, called the set of vertices,
and E ⊆ V × V is the set of edges with the property that (i, i) 6∈ E for all i ∈ V and
(i, j) ∈ E implies (j, i) ∈ E. G is strongly connected if, for all i, j ∈ V, there exist
vertices i1, . . . is such that (i, i1), (i1, i2), . . . , (is, j) ∈ E. To any symmetric matrix
P ∈ RV×V with non-negative elements, we can associate a graph GP = (V,EP ) by
putting (i, j) ∈ EP if and only if Pij > 0. P is said to be adapted to a graph
G if GP ⊆ G. A matrix with non-negative elements P is said to be stochastic if
Pij = 1 for every i ∈ V. Equivalently, denoting by 1 the vector of all 1 in RV ,
P is stochastic if P 1 = 1. P is said to be primitive if there exists n0 ∈ N such that
P n0
ij > 0 for every i, j ∈ V. A sufficient condition ensuring primitivity is that GP is
strongly connected and Pii > 0 for some i ∈ V.
Pj∈V
3. Bayesian modeling for estimation and classification.
3
3.1. The model. In our model, we consider a network, represented by a sym-
metric graph G = (V,E). G represents the system communication architecture. We
denote the number of nodes by N = V. We assume that each node i ∈ V measures
the observable
yi = θ⋆ + ω⋆
i ηi
(3.1)
where θ⋆ ∈ R is an unknown parameter, ηi's Gaussian noises N(0, 1), ω⋆
random variables taking values in {α, β} (with P(ω⋆
random variables ηi's and ω⋆
is a Gaussian mixture distributed according to the probability density function
i 's Bernoulli
i = β) = p). We assume all the
i 's to be mutually independent. Notice that each yi ∈ R
f (yi) = (1 − p)f (yiθ⋆, α) + pf (yiθ⋆, β)
f (yiθ⋆, x) =
x ∈ {α, β}.
e− (yi −θ⋆ )2
x√2π
2x2
1
(3.2)
(3.3)
The binary model of ω⋆ is motivated by different scenarios: as an example, if 0 < α <<
β, the nodes of type β may represent a subset of faulty sensors, whose measurements
are poorly reliable; the aim may be the detection of faulty sensors in order to switch
them off or neglect their measurements, or for other clustering purposes. It is also
realistic to assume that some a-priori information about the quantity of faulty sensors
is extracted, e.g., from experimental data on the network, and it is conceivable to
represent such information as an a-priori distribution. This is why we assume a
Bernoulli distribution on each ω⋆
i ; on the other hand, we suppose that no a-priori
information is available on the unknown parameter θ⋆. However, the addition of an a
priori probability distribution on θ∗ does not significantly alter our analysis and our
results.
3.2. The maximum likelihood solution. The goal is to estimate the param-
eter θ⋆ and the specific configuration ω⋆
i of each unit. Disregarding the network
constraints, a natural solution to our problem would be to consider a joint ML in θ⋆
and MAP in the ω⋆
i 's (see [17, 18]). Let f (y, ωθ) be the joint distribution of y and ω
(density in y and probability in ω) given the parameter θ, and consider the rescaled
log-likelihood function
LN (θ, ω) :=
1
N
log f (y, ωθ).
(3.4)
The hybrid ML/MAP solution, which for simplicity for now on we will refer to as the
ML solution, prescribes to choose θ and ω which maximize LN (θ, ω)
θ∈R, ω∈{α,β}V
(bθML,bωML) := argmax
2β2 + 1{ωj=α}(cid:18) (yj − θ)2
2
1
N Xj∈V(cid:18) (yj − θ)2
Standard calculations lead us to
LN (θ, ω) = −
LN (θ, ω).
(3.5)
(cid:18) 1
α2 −
1
β2(cid:19) + log
1 − p
p
β
α(cid:19)(cid:19)+c
(3.6)
where c is a constant. It can be noted that partial maximizations of LN (θ, ω) with
respect to just one of the two variables have simple representation. Let
bθ(ω) := argmax
θ
LN (θ, ω)
bω(θ) := argmax
ω
4
LN (θ, ω).
(3.7)
β otherwise
bω(θ)i =(α if yi − θ < δ
ln(cid:16) 1−p
α(cid:17)
α2 − 1
β2
β
p
.
j
j
bθ(ω) = Pj yj/ω2
Pj 1/ω2
δ =vuut2
bθML = argmax
L(θ,bω(θ)) ,
1
θ
bωML =bω(bθML).
(3.8)
(3.9)
The ML solution can then be obtained, for instance, by considering
Then
where
this can be done in a decentralized way. Moreover, further difficulties are caused by
It should be noted how the computation of the (bωML)i's becomes totally decentralized
oncebθML has been computed. For the computation ofbθML instead one needs to gather
information from all units to compute LN (θ,bω(θ)) and it is not at all evident how
the fact that LN (θ,bω(θ)) may contain many local maxima, as shown in Figure 3.1.
It should be noted that LN (θ,bω(θ)) is differentiable except at a finite number of
yi! .
LN (θ,bω(θ)) =(cid:18) 1
points, and between two successive non-differentiable points the function is concave.
Therefore, the local maxima of the function coincide with its critical points. On the
other hand, the derivative, where it exists, is given by
(θ − yi)1{yi−θ<δ} −
β2 θ −
α2(cid:19) 1
N Xi∈V
N Xi∈V
β2 −
(3.10)
d
dθ
1
1
1
Stationary points can therefore be represented by the relation
θ =
1
β2Pi yi +(cid:16) 1
β2 +Pi
N 1
β2(cid:17)Pi yi1{yi−θ<δ}
α2 − 1
1{yi−θ<δ}(cid:16) 1
β2(cid:17)
α2 − 1
.
(3.11)
A moment of thought shows us that (3.11) is equivalent to the relation θ =bθ(bω(θ)).
This representation will play a key role in the sequel of this paper.
3.3. Iterative centralized algorithms. The computational complexity of the
optimization problem (3.5) is practically unfeasible in most situations. However,
relations (3.8) suggest a simple way to construct an iterative approximation of the
ML solution (which we will denote IML). The formal pattern is the following: fixed
bω(0) = α1, for t = 0, 1, . . . , we consider the dynamical system
j i−2
j=1 yjhbω(t)
bθ(t+1) = PN
j i−2
j=1hbω(t)
PN
=(α if yi − θ < δ
β otherwise
5
i
bω(θ)(t+1)
for any i = 1, . . . , N.
0.6
0.4
0.2
0
−0.2
−0.4
−0.6
)
)
θ
(
bω
,
θ
(
N
L
N = 50
N = 100
N = 400
0.6
0.4
0.2
0
−0.2
−0.4
−0.6
)
)
θ
(
bω
,
θ
(
N
L
N = 500
N = 1000
N = 5000
−0.8
−10
−8
−6
−4
−2
0
θ
2
4
6
8
10
−0.8
−10
−8
−6
−4
−2
2
4
6
8
10
0
θ
Figure 3.1. α = 0.3, β = 10, p = 0.25: Plot of function LN (θ, bω(θ)) as a function of θ and
size N ∈ {50, 100, 400, 500, 1000, 5000}.
A more refined iterative solution is given by the so-called Expectation-Maximization
The algorithm stops whenever bθ(t+1) −bθ(t) < ε, for some fixed tolerance ε > 0.
(EM) algorithm [19]. The main idea is to introduce a hidden (say, unknown and un-
observed) random variable in the likelihood; then, at each step, one computes the
mean of the likelihood function with respect to the hidden variable and finds its max-
imum. Such a method seeks to find the maximum likelihood solution, which in many
cases cannot be formulated in a closed form. EM is widely and successfully used in
many frameworks and in principle it could also be applied to our problem. In our
context, making the variable ω to play the part of the hidden variable, equations for
EM become (see the tutorial [20] for their derivation)
q(t)
1. E-step: for all node i ∈ V,
Given bθ(0) ∈ R, for t = 0, 1, . . . ,
i = αy,bθ(t)(cid:17) =
i = P(cid:16)bω(t)
(1 − p)f(cid:16)ybω(t)
yj(cid:16)q(t)
bθ(t+1) = Pj∈V
j α−2 + (1 − q(t)
Pj∈V
j α−2 + (1 − q(t)
q(t)
(1 − p)f(cid:16)ybω(t)
i = α,bθ(t)(cid:17)
i = α,bθ(t)(cid:17) + pf(cid:16)ybω(t)
j )β−2(cid:17)
2. M-step:
j )β−2
i = β,bθ(t)(cid:17) .
.
{bω(t)
i =α}
computed in the E-step actually is the expectation of the
is worth to notice that q(t)
i
binary random variable 1
is the maximum of such expectation.
The algorithm stops whenever bθ(t+1) −bθ(t) < ε, for some fixed tolerance ε > 0. It
. On the other hand bθ(t+1) computed in the M-step
sequence {bθ(t)}∈N to a local maximum of the expected value of the log-likelihood with
respect to the unknown data ω, a result which is instead not directly available for IML.
Both algorithms however share the drawback of requiring centralization. Distributed
versions of the EM have been proposed (see, e.g., [12], [14]) but convergence is not
In Section 5 we will compare both these algorithms against
guaranteed for them.
An important feature of EM is that it is possible to prove the convergence of the
6
the distributed IA we are going to present in the next section. While it is true that
EM always outperforms IML, algorithm IA outperforms both of them for small size
algorithms, while shows comparable performance to EM for large networks.
4. Input driven consensus algorithm.
4.1. Description of the algorithm. In this section we propose a distributed
iterative algorithm approximating the centralized ML estimator. The algorithm is
suggested by the expressions in (3.8) and consists of the iteration of two steps: an
averaging step where all units aim at computing bθ through a sort of Input Driven
Consensus Algorithm (IA) followed by an update of the classification estimation per-
formed autonomously by all units.
Formally, IA is parametrized by a symmetric stochastic matrix P , adapted to the
communication graph G (Pij > 0 if and only if, (i, j) ∈ E), and by a real sequence
γ(t) → 0. Every node i has three messages stored in its memory at time t, denoted
with µ(t)
i = 0 and the initial
i
. Given the initial conditions µ(0)
i = 0, ν(0)
, ν(t)
i
i = α, the dynamics consists of the following steps.
i
, and bω(t)
1. Average step:
estimate bω(0)
(4.1a)
(4.1b)
(4.1c)
< δ
(4.2)
µ(t+1)
i
ν(t+1)
i
= (1 − γ(t))Xj
= (1 − γ(t))Xj
Pijµ(t)
Pijν(t)
i (cid:17)−2
j + γ(t)yi(cid:16)bω(t)
i (cid:17)−2
j + γ(t)(cid:16)bω(t)
i
i
i
.
/ν(t+1)
= µ(t+1)
bθ(t+1)
=bωi(bθ(t+1)) =(cid:26) α if yi −bθ(t+1)
bω(t+1)
i
β otherwise.
i
2. Classification step:
It should be noted that the algorithm provides a distributed protocol: each node only
needs to be aware of its neighbours and no further information about the network
topology is required.
4.2. Convergence. The following theorem ensures the convergence of IA. The
proof is rather technical and therefore deferred to Appendix A.
Theorem 4.1. Let
(a) γ(t) → 0, γ(t) ≥ 1/t, and γ(t) = γ(t+1) + o(γ(t+1)) for t → +∞;
(b) P ∈ RV×V+
eigenvalues.
be a stochastic, symmetric, and primitive matrix with positive
1.
Then, there exist bωIA ∈ {α, β}V and bθIA ∈ R such that
t→+∞bθ(t)
t→+∞bω(t) a.s.= bωIA ,
lim
lim
i
for all i ∈ V;
2. they satisfy the relations
a.s.= bθIA
A number of remarks are in order.
bθIA =bθ(bωIA) , bωIA =bω(bθIA).
7
• The assumption on the eigenvalues of P is essentially a technical one:
in
simulations it does not seem to have a crucial role, but we need it in our proof
of convergence. On the other hand, given any symmetric stochastic primitive
P , we cam consider a 'lazy' version of it Pτ = (1 − τ )I + τ P and notice that
for τ ∈ (0, 1) sufficiently small, indeed Pτ will satisfy the assumption on the
eigenvalues.
• The requirement γ(t) ≥ 1/t is not new in decentralized algorithms (see for
instance the Robbins-Monro algorithm, introduced in [21]) and serves the
need of maintaining 'active' the system input for sufficiently long time. Less
classical is the assumption γ(t) ∼ γ(t+1) which is essentially a request of
regularity in the decay of γ(t) to 0. Possible choices of γ(t) satisfying the
above conditions are γ(t) = t−ζ for ζ ∈ (0, 1), or γ(t) = t−1(ln t)α for any
α > 0.
• The proof (see Appendix A) will also give an estimation on the speed of
• Relations in item 2.
4.3. Limit behavior. In this section we present results on the behavior of our
algorithm for N → +∞. All quantities derived so far are indeed function of network
size N . In order to emphasize the role of N , we will add an index N when dealing
N ). Instead we will not add anything to expressions
convergence: indeed it will be shown that bθ(t) −bθIA = O(γ(t)) for t → ∞.
implies that bθIA is a local maximum of the function
LN (θ,bω(θ)) (see (3.11)).
with quantities like θ⋆ (e.g. bθML
Figure 3.1 shows a sort of concentration of the local maxima of LN (θ,bω(θ)) to
a global maximum for large N . Considering that IA converges to a local maximum,
this observation would lead to the conclusion that, for large N , the IA resembles the
optimal ML solution. This section provides some results which make rigorous these
considerations.
where there are vectors ω involved since their dimension is itself N .
Notice first that, applying the uniform law of large numbers [22] to the expression
(3.6), we obtain that, for any compact K ⊆ R, almost surely
lim
N→+∞
where
max
θ∈K(cid:12)(cid:12)(cid:12)(cid:12)LN (θ,bω(θ)) −ZR J (s, θ)f (s)ds(cid:12)(cid:12)(cid:12)(cid:12) = 0
β2(cid:19) + log
(cid:18) 1
α2 −
2
(4.3)
1
β
1 − p
p
2β2 + 1{ωj =α}(cid:18) (s − θ)2
out to be differentiable for every value of θ and to have a unique stationary point for
θ = θ∗ which turns out to be the global minimum. Unfortunately, this fact by itself
does not guarantee that global and local minima will indeed converge to θ∗. In our
J (s, θ) = −(cid:18) (s − θ)2
α(cid:19)(cid:19) + c (4.4)
where c is the same constant as in (3.6). The limit function RR J (s, θ)f (s)ds turns
derivations the properties of the function RR J (s, θ)f (s)ds will not play any direct
Theorem 4.2. Denote by SN the set of local maxima of L(θ,bω(θ)). Then,
role and therefore they will not be proven here. The main technical result which will
be proven in Appendix B is the following:
(4.5)
lim
max
ξ∈SN ξ − θ∗ = 0
N→+∞
almost surely and in mean square sense.
8
This has an immediate consequence,
Corollary 4.3.
almost surely and in mean square sense.
N = lim
N = θ⋆
lim
N→+∞bθIA
N→+∞bθML
Regarding the classification error, we have instead the following result:
Proposition 4.4.
lim
N→+∞
1
N
where
EdH (bωIA, ω⋆) = lim
N→+∞
1
N
= q(p, α, β)
EdH (bωML, ω⋆)
β√2(cid:19)(cid:21)
α√2(cid:19) + p(cid:20)1 − erfc(cid:18) δ
q(p, α, β) = (1 − p)erfc(cid:18) δ
(4.6)
(4.7)
and erfc(x) := 2√πR +∞
x
e−t2
dt is the complementary error function.
These results ensure that the IA performs, in the limit of large number of units
N , as the centralized optimal ML estimator. Moreover, they also show, consistency in
the estimation of the parameter θ⋆. As expected, for N → +∞ the classification error
does not go to 0 since the increase of measurements is exactly matched by the same
increase of variables to be estimated. Consistency however is obtained when p goes to
zero since we have that limp→0 q(p, α, β) = 0. Moreover, notice that the dependence
of function q on the parameters α and β is exclusively through their ratio β/α. In
particular, we have
lim
β/α→+∞
q(p, α, β) = 0
lim
β/α→1
q(p, α, β) = 1.
5. Simulations. In this section, we propose some numerical simulations. We
test our algorithm for different graph architectures and dimensions, and we compare
it with the IML and EM algorithms. Our goal is to give evidence of the theoretical
results' validity and also to evaluate cases that are not included in our analysis: the
good numerical outcomes we obtain suggest that convergence should hold in broader
frameworks. The numerical setting for our simulations is now presented.
Model: the sensors perform measurements according to the model (3.1) with
θ⋆ = 0, α = 0.3, β = 10; the prior probability P(ω⋆
i = β) is equal to p = 0.25.
Communication architectures: given a strongly connected symmetric graph
G = (V,E), we use the so-called Metropolis random walk construction for P (see [23])
which amounts to the following: if i 6= j
Pij =(cid:26) 0
(max{deg(i) + 1, deg(j) + 1})−1
if (i, j) 6∈ E
if (i, j) ∈ E
where deg(i) denotes the degree (the number of neighbors) of unit i in the graph G.
P constructed in this way is automatically irreducible and aperiodic.
We consider the following topologies:
9
1. Complete graph: Pij = 1
the centralized case.
N for every i, j = 1, . . . , N ; it actually corresponds to
2. Ring: N agents are disposed on a circle, and each agent communicates with
its first neighbor on each side (left and right). The corresponding circulant
symmetric matrix P is given by Pij = 1
3 for every i = 2, . . . , N − 1 and
3 ; PN 1 = PN N−1 = PN N = 1
j ∈ {i − 1, i, i + 1}; P11 = P12 = P1N = 1
3 ;
Pij = 0 elesewhere.
3. Torus-grid graph: sensors are deployed on a two dimensional grid and are
each connected with their four neighbors; the last node of each row of the
grid is connected with the first node of the same row, and analogously on
columns, so that a torus is obtained. The so-obtained graph is regular.
4. Random Geometric Graph with radius r = 0.3: sensors are deployed in the
square [0, 1]× [0, 1], their positions being randomly generated with a uniform
distribution; links are switched on between two sensors whenever the distance
is less than r. We only envisage connected realizations.
From Theorem 4.1, P is required to possess positive eigenvalues: our intuition
is that these hypotheses, that are useful to prove the convergence of the IA, are not
really necessary. We test this conjecture on the ring graph, whose eigenvalues are
known [24] to be λm = 1
necessarily positive.
N (cid:1)(cid:1) , m = 0, . . . , N − 1 and which are not
3(cid:0)1 + 2 cos(cid:0) 2πm
Algorithms: We implement and compare the following algorithms: IA with
γ(t) = 1/tζ for different choices of ζ ∈ {0.5, 0.7, 0.9}, and the two centralized iterative
algorithms IML, and EM described in Section 3.3.
Outcomes: we show the performance of the aforementioned algorithms in terms
of classification error and of mean square error on the global parameter, in function
of the number of sensors N . All the outcomes are obtained averaging over 400 Monte
Carlo runs.
We observe that the classification error (Figure 5.1) converges for N → ∞ for
all the considered algorithms. On the other hand, when N is small, IA performs
better than IML and EM, no matter which graph topology has been chosen: this
suggests that decentralization is then not a drawback for IA. Moreover, for smaller
γ(t) (i.e., slowing down the procedure), we obtain better IA performance in terms
of classification. Nevertheless, this is not universally true:
in other simulations, in
fact, we have noticed that if γ(t) is too small, the performance are worse. This is
not surprising, since γ(t) determines the weights assigned to the consensus and input
driven parts, whose contributions must be somehow balanced in order to obtain the
best solution. An important point that we will study in future is the optimization
of γ(t), whose choice may in turn depend on the graph topology and on the weights
assigned in the matrix P .
Analogous considerations can be done for the mean square error on θ: when N
increases, the mean square error decays to zero.
We remark that convergence is numerically shown also for the ring topology, which
is not envisaged by our theoretical analysis. Hence, our guess is that convergence
should be proved even under weaker hypotheses on matrix P .
For the interested reader, a graphical user interface of our algorithm is available
and downloadable on http://calvino.polito.it/∼fosson/software.html.
10
0.35
0.3
0.25
0.2
0.15
0.1
0.05
)
⋆
T
,
bT
(
H
d
E
1 N
IML
EM
IA ζ =0.5
IA ζ =0.7
IA ζ =0.9
0.35
0.3
0.25
0.2
0.15
0.1
0.05
)
⋆
T
,
bT
(
H
d
E
1 N
IML
EM
IA ζ =0.5
IA ζ =0.7
IA ζ =0.9
0
10
20
30
40
50
60
70
80
90
100
0
10
20
30
40
50
60
70
80
90
100
N
(a) Complete graph.
N
(b) Ring.
0.35
0.3
0.25
0.2
0.15
0.1
0.05
)
⋆
T
,
bT
(
H
d
E
1 N
IML
EM
IA ζ =0.5
IA ζ =0.7
IA ζ =0.9
0.35
0.3
0.25
0.2
0.15
0.1
0.05
)
⋆
T
,
bT
(
H
d
E
1 N
IML
EM
IA ζ =0.5
IA ζ =0.7
IA ζ =0.9
0
10
20
30
40
50
60
70
80
90
100
0
10
20
30
40
50
60
70
80
90
100
N
(c) Grid.
N
(d) Random geometric graph.
Figure 5.1. Relative classification error
6. Concluding remarks. In this paper, we have presented a fully distributed
algorithm for the simultaneous estimation and classification in a sensor network, given
from noisy measurements. The algorithm only requires the local cooperation among
units in the network. Numerical simulations show remarkable performance. The
main contribution includes the convergence of the algorithm to a local maximum of
the centralized ML estimator. The performance of the algorithm has been also studied
when the network size is large, proving that the solution of the proposed algorithm
concentrates around the classical ML solution.
Different variants are possible, for example the generalization to multiple classes
with unknown prior probabilities should be inferred. The choice of sequence {γ(t)}t∈N
is critical, since it influences both convergence time and final accuracy; the determi-
nation of a protocol for the adaptive search of sequence {γ(t)}t∈N is left for a future
work.
7. Acknowledgment. The authors wish to thank Sandro Zampieri for bringing
the problem to our attention and Luca Schenato for useful discussions. F. Fagnani
and C. Ravazzi further acknowledge the financial support provided by MIUR under
the PRIN project no. 20087W5P2K.
REFERENCES
[1] M. Huang and J. H. Manton, "Coordination and consensus of networked agents with noisy
11
measurements: Stochastic algorithms and asymptotic behavior," SIAM J. Control and
Optimization, vol. 48, no. 1, pp. 134 -- 161, 2009.
[2] R. Olfati-Saber, "Distributed kalman filter with embedded consensus filters," in Proceedings of
44th IEEE Conference on Decision and Control, pp. 8179 -- 8184, 2005.
[3] R. Olfati-Saber, "Kalman-consensus filter : Optimality, stability, and performance," in Proceed-
ings of 48th IEEE Conference on Decision and Control, pp. 7036 -- 7042, 2009.
[4] C. Moallemi and B. V. Roy, "Consensus propagation," IEEE Transactions on Information
Theory, vol. 52, no. 11, pp. 4753 -- 4766, 2006.
[5] V. Saligrama, M. Alanyali, and O. Savas, "Distributed detection in sensor networks with packet
losses and finite capacity links," IEEE Transactions on Signal Processing, vol. 54, no. 11,
pp. 4118 -- 4132, 2006.
[6] R. Duda, P. Hart, and D. Stork, Pattern Classification. Wiley, 2001.
[7] A. Chiuso, F. Fagnani, L. Schenato, and S. Zampieri, "Gossip algorithms for simultaneous
distributed estimation and classification in sensor networks," IEEE Journal of Selected
Topics in Signal Processing, pp. 691 -- 706, 2011.
[8] A. Dogandzic and B. Zhang, "Distributed estimation and detection for sensor networks using
hidden markov random field models," IEEE Transactions on Signal Processing, vol. 54,
no. 8, pp. 3200 -- 3215, 2006.
[9] N. Ramakrishnan, E. Ertin, and R. Moses, "Gossip-based algorithm for joint signature estima-
tion and node calibration in sensor networks," Selected Topics in Signal Processing, IEEE
Journal of, vol. 5, no. 4, pp. 665 -- 673, 2011.
[10] D. M. Titterington, A. F. M. Smith, and U. E. Makov, Statistical Analysis of Finite Mixture
Distributions. New York: John Wiley, 1985.
[11] R. A. Redner and H. F. Walker, "Mixture densities, maximum likelihood and the em algorithm,"
SIAM Review, pp. 195 -- 239, 1984.
[12] R. Nowak, "Distributed EM algorithms for density estimation and clustering in sensor net-
works," IEEE Transactions on Signal Processing, vol. 51, no. 8, pp. 2245 -- 2253, 2003.
[13] M. Rabbat and R. Nowak, "Distributed optimization in sensor networks," in ISPN '04: Pro-
ceedings of the 3rd international symposium on Information processing in sensor networks,
2004.
[14] D. Gu, "Distributed EM algorithms for gaussian mixtures in sensor networks," IEEE Transac-
tions on Neural Networks, vol. 19, no. 7, pp. 1154 -- 1166, 2008.
[15] A. Das and M. Mesbahi, "Distributed linear parameter estimation over wireless sensor net-
works," IEEE Transactions on Aerospace and Electronic Systems, vol. 45, no. 4, pp. 1293
-- 1306, 2009.
[16] F. Fagnani, S. M. Fosson, and C. Ravazzi, "Input driven consensus algorithm for distributed
estimation and classification in sensor networks," in Proceedings of 50th IEEE Conference
on Decision and Control, no. 20087, pp. 6654 -- 6659, 2011.
[17] A. Yeredor, "The joint MAP-ML criterion and its relation to ML and to extended least-squares,"
IEEE Transactions on Signal Processing, vol. 48, no. 12, pp. 3484 -- 3492, 2000.
[18] H. V. Trees and K. Bell, eds., Bayesian Bounds for parameter estimation and nonlinear filter-
ing/tracking. Wiley & Sons, 2007.
[19] A. P. Dempster, N. M. Laird, and D. B. Rubin, "Maximum likelihood from incomplete data via
the EM algorithm," J. Roy. Statist. Soc. Ser. B, vol. 39, no. 1, pp. 1 -- 38, 1977.
[20] J. Bilmes, "A gentle tutorial of the EM algorithm and its application to parameter estimation
for Gaussian mixture and hidden Markov models," Tech. Rep. TR-97-021, ICSI, 1997.
[21] H. Robbins and S. Monro, "A stochastic approximation method," Annals of Mathematical
Statistics, vol. 22, no. 3, pp. 400 -- 407, 1951.
[22] D. Andrews, "Generic uniform convergence," Econometric Theory, pp. 241 -- 257, 1992.
[23] L. Xiao, S. Boyd, and S. Lall, "Distributed average consensus with time-varying metropolis
weights," available on www.stanford.edu/∼boyd/papers/avg_metropolis.html, 2006.
[24] P. J. Davis, Circulant matrices. A Wiley-Interscience Publication, Pure and Applied Mathe-
maticsJohn Wiley & Sons, New York-Chichester-Brisbane, 1979.
[25] F. R. Gantmacher, The theory of matrices. New York: Chelsea publ., 1959.
[26] V. Borkar, Probability Theory. New York: Springer-Verlag, 1995.
Appendix A. Proof of Theorem 4.1. Consider the discrete-time dynamical
system defined by the update equations (4.1) and (4.2): the proof of its convergence
is obtained through intermediate steps.
1. First, we show that, for sufficiently large t, vectors µ(t), ν(t), and bθ(t) are
close to consensus vectors and we prove their convergence, assumingbω(t) has
12
already stabilized.
2. Second, we prove the stabilization of bω(t) in finite time, by modelling the
system in (4.1) and (4.2) as a switching dynamical system.
3. Finally, combining these facts together we conclude the proof.
A.1. Towards consensus. We start with some notation: let Ω := I − N−1
Given a bounded sequence u(t) ∈ RN , consider the dynamics
t ∈ N
x(t+1) =(cid:16)1 − γ(t)(cid:17) P x(t) + γ(t)u(t)
Tx so that x = x1 + Ωx.
(A.1)
T;
11
given x ∈ RV, let x := N−1
1
where x(0) is any fixed vector, and where, we recall the standing assumptions,
(a) γ(t) ∈ (0, 1), γ(t) ≥ 1/t, γ(t) ց 0 and γ(t) = γ(t+1) + o(γ(t+1)) for t → +∞;
(b) P ∈ RV×V+
is a stochastic, symmetric, primitive matrix with positive eigen-
A useful fact consequence of the assumptions on γ(t), is the following:
values.
(1 − γ(s)) ≤ e
t−1P
s=t0
−
1/s
t0
t ≤ t0γ(t)
≤
t−1Ys=t0
(A.2)
for any choice of t ≥ t0 > 0.
On the other hand, as a consequence of the assumptions of P (see [25]) we have
that P t → N−1
T , or equivalently that P tΩ → 0 for t → +∞. More precisely, we
can order the eigenvalues of P as 1 = µ1 > µ2 ≥ ··· ≥ µN ≥ 0, and we have that
P tΩ ≤ µt
2.
11
Lemma A.1. It holds
Ωx(t) = O(γ(t)) ,
for t → +∞.
Proof. From (A.1) and the fact that ΩP = P Ω we get, for any fixed t0 and t ≥ t0,
Ωx(t+1) =
tYs=t0(cid:16)1 − γ(s)(cid:17) P tΩx(t0) +
tXs=t0
tYk=s+1(cid:16)1 − γ(k)(cid:17) γ(s)P t−sΩu(s).
(A.3)
This yields
Ωx(t+1)2 ≤
≤
tYs=t0(cid:16)1 − γ(s)(cid:17) Ωx(t0)2 +
tYk=s+1(cid:16)1 − γ(k)(cid:17) γ(s)µ2t−su(s)2
tXs=t0
tYk=s+1(cid:16)1 − γ(k)(cid:17) γ(s)µ2t−s
tYs=t0(cid:16)1 − γ(s)(cid:17) Ωx(t0)2 + K
tXs=t0
(A.4)
with K := maxs u(s)2.
Fix now 0 < ε < 1 − µ2 and let t0 ∈ N be such that γ(t+1)
all t ≥ t0. Hence, for t ≥ s ≥ t0, we have that γ(s) < γ(t)
estimation (A.4) with this choice of t0. We get
γ(t) ∈ (1 − ε, 1) for
(1−ε)t−s . Consider now the
13
Ωx(t+1)2 ≤
≤
tYs=t0(cid:16)1 − γ(s)(cid:17) Ωx(t0)2 + Kγ(t)
tYs=t0(cid:16)1 − γ(s)(cid:17) Ωx(t0)2 +
Kγ(t)
1 − µ21−ε
.
tXs=t0(cid:18) µ2
1 − ε(cid:19)t−s
Using now (A.2) the proof is completed.
Proposition A.2. If ∃ t0 ∈ N s.t. u(t) = u ∀t ≥ t0 then
x(t) = u1.
lim
t→+∞
Proof. Write x(t) = x(t)
to prove that limt→+∞ x(t)
1 + Ωx(t) and notice that from Lemma A.1 it is sufficient
T , we obtain
1 = u1. From (A.1) and the fact that 1
T P = 1
x(t) − u =
t−1Ys=t0
(1 − γ(s))(x(s) − u)
which goes to zero from the non-summability of γ(t).
result.
We now apply these results to the analysis ofbθ(t). We start with a representation
Lemma A.3. It holds, for t → +∞,
¯µ(t)
¯ν(t) 1 +
1
¯ν(t) Ω(cid:18)µ(t) −
¯µ(t)
¯ν(t) ν(t)(cid:19) + o(cid:16)γ(t)(cid:17) .
(A.5)
bθ(t) =
Proof. For any i ∈ V,
µ(t)
i
ν(t)
i
¯µ(t)
¯ν(t) =
−
=
=
¯µ(t)
¯ν(t) +
−
µ(t)
i
ν(t)
i
µ(t)
i − ¯µ(t)
¯ν(t)
+ µ(t)
1
¯ν(t)(cid:16)Ωµ(t)(cid:17)i −
µ(t)
i
¯ν(t) −
µ(t)
i
¯ν(t)
1
−
i 1
¯ν(t)!
i ¯ν(t)(cid:16)Ων(t)(cid:17)i
ν(t)
i
µ(t)
i
ν(t)
.
It follows from Lemma A.1 that µ(t) = ¯µ(t)
1 + O(γ(t)) for
t → +∞. This and the fact that ¯ν(t) is bounded away from 0 (indeed ¯ν(t) ≥ α−2 for
all t > 0), yields
1 + O(γ(t)) and ν(t) = ¯ν(t)
µ(t)
i
ν(t)
i ¯ν(t)(cid:16)Ων(t)(cid:17)i
=
¯µ(t)
¯ν(t)"(cid:0)Ων(t)(cid:1)i
¯ν(t)
#(cid:16)1 + O(cid:16)γ(t)(cid:17)(cid:17)
from which thesis follows.
We can now present our first convergence result.
Corollary A.4. It holds, for t → +∞,
=
(t)
¯bθ
¯µ(t)
¯ν(t) + o(γ(t)) , Ωbθ(t) = O(γ(t)).
14
i
lim
]−2
Proof. Both relations are obtained from (A.5). The first one is immediate. The
second one follows from Lemma A.1 and the fact that ¯ν(t) stays bounded away from
0.
finite time as explained in the next result.
Corollary A.4 says that the estimate bθ(t) is close to a consensus for sufficiently
large t. Something more precise can be stated if we know that if bω(t) stabilizes at
Corollary A.5. If ∃ t0 ∈ N s.t. bω(t) =bωIA ∀t ≥ t0 then
i (cid:3)−2
yi(cid:2)bωIA
i (cid:3)−2 1.
Pi∈V(cid:2)bωIA
t→+∞bθ(t) =bθ(bωIA) = Pi∈V
Proof. Proposition A.2 guarantees that µ(t) and ν(t) converge to 1
and 1
[bωIA
1, respectively. This yields the thesis.
stabilizes in finite time: this, by virtue of previous considerations will complete our
proof. To prove this fact will take lots of effort and will be achieved through several
intermediate steps.
yi[bωIA
NPi∈V
A.2. Stabilization ofbω(t). We are going to prove that vectorbω(t) almost surely
We start observing that, sincebω(t) can only assume values in a finite set, equations
in (4.1) and (4.2) can be conveniently modeled by a switching system as shown below.
For reasons which will be clear below, in this subsection we will replace the
configuration space {α, β}V with the augmented state space {α, β+, β−}V. If ω ∈
{α, β+, β−}V, define
Θω = {x ∈ RV :xi − yi < δ, if ωi = α, xi ≥ yi + δ, if ωi = β+, xi ≤ yi − δ, if ωi = β−}.
We clearly have RV =Sω∈{α,β+,β−}V Θω.
RV and gω : R × RV → RV by
On each Θω the dynamical system is linear. Indeed, define the maps fω : R×RV →
NPi∈V
]−2
i
1
ω2
i
[fω(t, x)]i = (1 − γ(t))[P x(t)]i + γ(t) yi
[gω(t, x)]i = (1 − γ(t))[P x(t)]i + γ(t) 1
i = β2 if ωi = β+, β−. Then, ifbθ(t) ∈ Θω, (4.1a), (4.1b), and
ω2
i
µ(t+1) = fω(t, µ(t))
ν(t+1) = gω(t, ν(t))
where, conventionally, ω2
(4.1c) can be written as
= µ(t+1)
i
/ν(t+1)
i
.
i
bθ(t+1)
Notice that this is a closed-loop switching system, since the switching policy is deter-
mined by bθ(t). It is clear that the stabilization of bω(t) is equivalent to the fact that
there exist an ω ∈ {α, β+, β−}N and a timeet such that bθ(t) ∈ Θω for all t ≥et.
From Corollary A.5 candidate limit points for bθ(t) are
ω ∈ {α, β+, β−}N .
bθ(ω)1 = Pi∈V
Pi∈V
yiω−2
i
ω−2
i
1
15
Also, from Proposition A.4, the dynamics can be conveniently analysed by study-
We now make an assumption which holds almost everywhere with respect to the
ing it in a neighborhood of the line Λ = {λ1λ ∈ R}.
choice of yi's and, consequently, does not entail any loss of generality in our proof.
ASSUMPTION:
• yi − yj 6∈ {0,±δ,±2δ} for all i 6= j;
This assumption has a number of consequences which will be used later on:
• bθ(ω) − yi 6∈ {±δ} for all ω ∈ {α, β+, β−}V and for all i.
(C1) bθ(ω)1, yi1 ∈ Sω∈{α,β+,β−}V int(Θω) for all ω ∈ {α, β+, β−}V and for all
i ∈ V;
(C2) Λ ∩ ¯Θω ∩ ¯Θω′ ∩ ¯Θω′′ = ∅ for any triple of distinguished ω, ω′, ω′′. In other
terms, Λ always crosses boundaries among regions Θω at internal point of
faces.
We now introduce some further notation, which will be useful in the rest of the
paper.
Θǫ := {x ∈ RV : Ωx2 < ǫ}, Θǫ
ω := Θǫ ∩ Θω
Γ := {ω ∈ {α, β+, β−}V : Θω ∩ Λ 6= ∅}.
For any ω ∈ Γ consider
Πω = {π = ¯Θω ∩ ¯Θω′ : dH(ω, ω′) = 1, π ∩ Λ = ∅}
and define σω := minπ∈Πω d(Θω ∩ Λ, π) > 01.
X < Y means that x < y for all x ∈ X and y ∈ Y .
follower of ω (or also that ω is the past-follower of ω′) if the following happens:
In the sequel, we will use the natural ordering on Λ: given the sets X, Y ⊆ Λ,
Definition A.6. Given two elements ω, ω′ ∈ Γ, we say that ω′ is the future-
(A) There exists i0 such that ωi = ω′i for all i 6= i0 and ωi0 6= ω′i0;
(B) Θω ∩ Λ < Θω′ ∩ Λ.
Notice that, in order for ω and ω′ to satisfy definition above, it must necessarily
happen that either ωi0 = α and ω′i0 = β+, or ωi0 = β− and ω′i0 = α. Given ω ∈ Γ,
its future-follower (if it exists) will be denoted by ω+. It is clear that (because of
property (C2) described above) that we can order elements in Γ as ω1, ω2, . . . , ωM in
such a way that ωr+1 = (ωr)+ for every r = 1, . . . , M − 1.
Given ω ∈ Γ, consider the following subsets of RN (see Fig. A.1):
ω := {x ∈ Θǫ
Mǫ
Lǫ
ω,ω+ := {x ∈ Θǫ : Mǫ
ω : x1 + Ωz ∈ Θǫ
ω, ∀z : z2 < ǫ}
ω ∩ Λ < ¯x < Mǫ
ω+ ∩ Λ} .
(with the implicit assumption that Lǫ
ω,ω+ = ∅ if ω+ does not exist.) We clearly have
Θǫ =Sω∈Γ Mǫ
such that
ω ∪ Lǫ
ω,ω+ .
Notice that, because of property (C1), we can always choose ǫ0 ∈ (0, minω∈Γ σω)
bθ(ω)1, yi1 ∈ [ω′∈Γ
Mǫ0
ω′
∀ω ∈ Γ,∀i ∈ V.
1 d(Θω ∩ Λ, π) denotes the distance between the two sets Θω ∩ Λ and the set π
16
Θω
Mǫ
ω
Θ
+
ω
Lǫ
ω,ω
+
Λ
ǫ
Figure A.1. Given the couple (ω, ω′) the sets Lǫ
ω,ω′ and Mǫ
ω are visualized.
This implies that there exists c > 0 such that
d [ω′∈Γ
∂Λ (Mǫ
ω′ ∩ Λ) ,{bθ(ω), yi}! ≥ c,
∀ǫ ≤ ǫ0
(A.6)
where ∂Λ(·) denotes the boundary of a set in the relative topology of Λ.
ω then Mǫ
Corollary A.4). From now on we consider times t ≥ tǫ. Our aim is to prove through
intermediate steps the following facts
Fix now ǫ ≤ ǫ0 and choose tǫ such that bθ(t) ∈ Θǫ for all t ≥ tǫ (it exists by
F1) if bθ(ω) ∈ Mǫ
ω is an asymptotically invariant set for bθ(t), namely,
when t is sufficiently large, if bθ(t) ∈ Mǫ
F2) if bθ(ω) /∈ Mǫ
F3) bθ(t) /∈Sω∈{α,β+,β−}V Lǫ
Lemma A.7. Ifbθ(t) ∈ Θω then there exists c(t) ∈ [α2/β2, β2/α2] and r(t) = o(γ(t))
ω then bθ(t+1) ∈ Mǫ
ω when bθ(ω)1 ∈ Mǫ
(t)(cid:19) + r(t)
F1) Asymptotic invariance of Mǫ
ω then bθ(t) /∈ Mǫ
for t → +∞ such that
ω,ω+ for t sufficiently large.
ω for t sufficiently large;
(A.7)
(t+1)
ω.
ω;
bθ
=bθ
Proof. If bθ(t) ∈ Θω then
µ(t+1)
ν(t+1) −
µ(t)
ν(t) =
(t)
+ c(t)γ(t)(cid:18)bθ(ω) −bθ
(1 − γ(t))µ(t) + γ(t)N−1PN
(1 − γ(t))µ(t) + γ(t)N−1PN
i − µ(t)γ(t)N−1PN
ν(t)γ(t)N−1PN
bθ(ω) −
= γ(t) N−1PN
i=1 yiω−2
i=1 ω−2
ν(t)!
i=1 yiω−2
ν (t+1)ν(t)
i=1 ω−2
ν(t+1)
µ(t)
ν(t)
µ(t)
−
=
i
i
i
17
i=1 ω−2
i
Choosing c(t) = N −1 PN
i=1 ω−2
i
ν(t+1)
easily follows.
∈ [α2/β2, β2/α2] and using Corollary A.4 thesis
then
Proposition A.8 (Proof of F1)). There exists t′ ≥ tǫ such that, if bθ(ω)1 ∈ Θω,
ω and if t is large enough so that
ω ∀t ≥ t′ .
c(t)γ(t) < 1 , we have, by convexity, that
bθ(t) ∈ Mǫ
ω ⇒ bθ(t+1) ∈ Mǫ
Proof. Consider the relation (A.7). If bθ(t) ∈ Mǫ
+ c(t)γ(t)(cid:18)bθ(ω) −bθ
(t)
(t)(cid:19) ∈ Mǫ
ω.
z := bθ
Moreover, because of (A.6) and the fact that c(t) is bounded away from 0, there exists
c′ > 0 such that d(z, ∂(Mǫ
ω∩ Λ)) ≥ c′γ(t). Proof is then completed by selecting t′ ≥ tǫ
such that c(t)γ(t) < 1 and r(t) < c′γ(t)/2 for all t ≥ t′.
F2) Transitivity of Mǫ
if bθ(ω)1 /∈ Mǫ
technical lemma based on convexity arguments is required.
ω, then, at a certain time t, bθ(t) will definitively be outside Mǫ
Lemma A.9. Let ω ∈ Γ be such that there exists its future-follower ω+. Then,
ω. Our next goal is to prove that
ω. A
ω when bθ(ω)1 /∈ Mǫ
bθ(ω)1 > Θω ∩ Λ
⇒ bθ(ω+)1 > Θω ∩ Λ
bθ(ω+)1 < Θω+ ∩ Λ ⇒ bθ(ω)1 < Θω+ ∩ Λ.
Proof. Suppose ωi = ω+
i0 = α (the other case can
be treated in an analogous way). Pick x′ ∈ Θω ∩ Λ and x′′ ∈ Θω+ ∩ Λ. From
x′′ − yi0 < δ, and x′ − yi0 > δ it immediately follows that x′′ > yi0 − δ, x′ < yi0 − δ
and, in particular, the fact
i ,∀i 6= i0 and ωi0 = β−, ω+
Notice now that
yi0 1 > Θω ∩ Λ .
(A.8)
bθ(ω+) =
=
=
2 + yi0
β2
2
1
ω+
i
yi0(cid:16) 1
β2(cid:17)
α2 − 1
Pi∈V
β2(cid:17)
yi0(cid:16) 1
α2 − 1
Pi∈V
yi0(cid:16) 1
β2(cid:17)
α2 − 1
Pi∈V
1
ω+
i
1
ω+
i
2
2
1
ω+
i
1
ωi
2
2
yi
ω+
i
+ Pi∈V\i0
Pi∈V
+ bθ(ω)Pi∈V
Pi∈V
+ bθ(ω)(cid:20)Pi∈V
1
ω+
i
2
α2 − 1
β2(cid:17)(cid:21)
.
1
ω+
i
2 −(cid:16) 1
Pi∈V
1
ω+
i
2
A convexity argument and the use of (A.8) now allow to conclude.
In Figures A.2 and A.3 a picture of the various points is depicted whenbθ(ω) > Θω∩Λ.
Proposition A.10 (Proof of F2)). If bθ(ω)1 /∈ Θω, then there exists t′′ such that
bθ(t) /∈ Θǫ
ω ∀t > t′′.
18
Θω
Θω+
Θω
Θω+
Λ
yi0 1 bθ(ω+)1 bθ(ω)1
(a) yi0 < yω+ < yω.
¯yi0 1
Λ
bθ(ω)1 bθ(ω+)1
(b) yi0 < bθ(ω+) < bθ(ω).
Figure A.2. ωi0 = β, bθ(ω)1 > Θω ∩ Λ
Θω
Θω+
Λ
¯yi0 1
bθ(ω)1 bθ(ω+)1
Figure A.3. bθ(ω)1 > Θω ∩ Λ
Proof. Supposebθ(ω)1 > Θω ∩ Λ (the case when is < can be treated analogously).
Lemma A.9 implies that bθ(ω+)1 > Θω ∩ Λ. Let c be the constant given in (A.6) and
put
Consider the relation (A.7) and choose t1 in such a way that
A := {x ∈ Θǫ
(t+1)
(t)
ω ∪ Θǫ
ω+ x ≤ α := min{bθ(ω),bθ(ω+)} − c/2}.
≤ c2(max{yi} − min{yi})γ(t) + r(t) < c/2
(t+1)
(t)
−
¯bθ
≥bθ
+ α2c γ(t)/4β2.
(A.9)
and r(t) < α2cγ(t)/4β2 for all t ≥ t1. It also follows from (A.7) that, if for some
¯bθ
t ≥ t1 bθ(t) ∈ A, then,
Owing to the non-summability of γ(t) it follows that if bθ(t) enters in Θǫ
t ≥ t1, then, in finite time it will enter into A \ Θǫ
A. In particular there must exist t2 ≥ t1 such that bθ
bθ
that bθ
< α − c. Because of (A.9), it must be that bθ
contradicts the fact that on A, bθ
F3) Transitivity ofSω,ω+∈{α,β+β−}N Lω,ω+. We start with the following tech-
exists a strictly increasing sequence of switching times {τk}+∞k=0 such that
> α. We now prove that
1 > Θω for every t ≥ t2. If not there must exist a first time index t3 > t2 such
< α − c/2 but this
ω for some
ω and then it will finally exit
(t2)
Lemma A.11. Let x(t) be the sequence defined in (A.1) and suppose that there
nical result concerning the general system (A.1).
is increasing (A.10).
(t2)
(t3)
(A.10)
bθ
(t)
(t3−1)
u(s+1)
i
= u(s)
i
∀i 6= i0
and ∀s ∈ [τ0, +∞[
i0 =(v′
u(s)
∀s ∈ I′ :=S+∞k=0[τ2k, τ2k+1)
v′′ ∀s ∈ I′′ :=S+∞k=0[τ2k+1, τ2k+2).
19
b
b
b
b
b
b
b
b
b
Then, for every δ > 0, there exists ¯tδ and two sequences a(t)
such that
δ ≥ 0 and b(t)
δ ≤ δγ(t),
(cid:16)Ω(cid:16)x(t+1) − x(t)(cid:17)(cid:17)i0
= A(t)
δ γ(t) (v′ − v′′) + b(t)
δ
for t ∈ I′ with t ≥ ¯tδ.
eigenvalues 1 = λ1 > λ2 ≥ ··· ≥ λN ≥ 0. Also assume we have chosen φ1 = N−1/2
Proof. Let φj ∈ RV be an orthonormal basis of eigenvectors for P relative to the
1.
We put
F (t) := Qt
k=0(cid:0)1 − γ(k)(cid:1)
γ(t)
and we notice that
F (s+1)
F (s) = (1 − γ(s+1))
γ(s)
γ(s+1) → 1 , for s → +∞.
Fix ǫ in such a way that λ2(1 + ǫ) < 1 and choose s0 such that
F (s+1)
F (s) ≤ 1 + ǫ , ∀s ≥ s0.
Let t0 ≥ s0 to be fixed later. From (A.3) we can write
Ω(x(t+1) − x(t)) =
=
t−1Ys=t0(cid:16)1 − γ(s)(cid:17)h(cid:16)1 − γ(t)(cid:17) P − Ii P t−t0Ωx(t0)
tYk=s+1(cid:16)1 − γ(k)(cid:17) γ(s)P t−sΩu(s) −
tXs=t0
t−1Xs=t0
t−1Ys=t0(cid:16)1 − γ(s)(cid:17)h(cid:16)1 − γ(t)(cid:17) P − Ii P t−t0Ωx(t0)
t−1Xs=t0
t−1Xs=t0−1
t−1Ys=t0(cid:16)1 − γ(s)(cid:17)h(cid:16)1 − γ(t)(cid:17) P − Ii P tΩx(t0)
F (s+1) Ωu(s+1) − γ(t−1)
P t−s−1 F (t)
+
=
=
+ γ(t)
+ (γ(t) − γ(t−1))
F (t0) Ωu(t0)
t−1Xs=t0
F (t−1)
P t−s−1 F (t−1)
F (s) Ωu(s) + γ(t)P t−t0 F (t−1)
F (s) (cid:19) Ωu(s+1)
F (s) Ω(cid:16)u(s+1) − u(s)(cid:17) .
F (s+1) −
P t−s−1(cid:18) F (t)
P t−s−1 F (t−1)
+ γ(t)
+ γ(t)
t−1Xs=t0
t−1Xs=t0
20
t−1Yk=s+1(cid:16)1 − γ(k)(cid:17) γ(s)P t−s−1Ωu(s)v
P t−s−1 F (t−1)
F (s) Ωu(s)
(A.11)
(A.12)
(A.13)
(A.14)
It follows from the assumptions on P , the assumptions on γ(t) and relation (A.2)
that the terms (A.11) and (A.12) are both o(γ(t)) for t → +∞. We now estimate
(A.13):
≤
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)2
(A.15)
(A.16)
(A.17)
where
F (t−1)
F (s+1) −
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
P t−s−1(cid:18) F (t)
t−1Xs=t0
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
F (s) (cid:18) F (t)
t−1Xs=t0
[λ2(1 + ǫ)]t−s−1(cid:12)(cid:12)(cid:12)(cid:12)(cid:18) F (s)
t−1Xs=t0
F (t−1)
F (s)
K
βt0
1 − λ2(1 + ǫ)
=
F (t−1)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)2
F (s) (cid:19) Ωu(s+1)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
F (s+1) − 1(cid:19) P t−s−1Ωu(s+1)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
F (s+1) − 1(cid:19)(cid:12)(cid:12)(cid:12)(cid:12) K ≤
t≥s≥t0(cid:12)(cid:12)(cid:12)(cid:12)(cid:18) F (t)
F (s) Ω(cid:16)u(s+1) − u(s)(cid:17)#i0
βt0 := sup
F (t−1)
=
K = maxu(s)2 ,
F (s)
F (s+1) − 1(cid:19)(cid:12)(cid:12)(cid:12)(cid:12) .
λt−τh
j
F (t − 1)
F (τh − 1)
(−1)h(v′ − v′′).
(φj )2
P t−s−1 F (t−1)
" t−1Xs=t0
Xj≥2
i0 Xh:t0≤τh≤t−1
i0 Xk:t0≤τ2k≤t−1(cid:20)λt−τ2k
j
(φj)2
Xj≥2
If t ∈ I′, the above expression can be rewritten as
We now concentrate on the component i0 of the term (A.14). Using the spectral
decomposition of P and the assumptions on u(t), we can write,
Notice that
λt−τ2k
j
F (t − 1)
F (τ2k − 1)−λt−τ2k−1
j
F (t − 1)
F (τ2k−1 − 1)
= λt−τ2k
j
F (t − 1)
F (τ2k − 1) − λt−τ2k−1
j
F (t − 1)
F (τ2k−1 − 1)(cid:21) (v′ − v′′).
F (τ2k − 1)(cid:18)1 − λτ2k−τ2k−1
F (t − 1)
j
F (τ2k − 1)
F (τ2k−1 − 1)(cid:19) > 0
(we have used the fact that 0 ≤ λj (1 + ǫ) < 1 for all j ≥ 2). To complete the proof
now proceed as follows. For a fixed δ > 0, choose t0 ≥ s0 in such a way that (A.15) is
below δ/2. Then, fix ¯tδ ≥ t0 in such a way that the summation of (A.11) and (A.12)
is below δγ(t)/2 for t ≥ ¯tδ. It is now sufficient to define
a(t)
δ
:=Xj
(φj )2
i0 Xk:t0≤τ2k≤t−1(cid:20)λt−τ2k−1
j
F (t − 1)
F (τ2k − 1) − λt−τ2k−1
j
F (t − 1)
F (τ2k−1 − 1)(cid:21)
and b(t)
δ
equal to the sum of the terms (A.11), (A.12), and (A.13),
Proposition A.12 (Proof of F3)). There exists t′′′ ∈ N such that
bθ(t) 6∈ [ω,ω′∈{α,β}N Lω,ω+
21
(A.18)
for all t > t′′′.
Proof.
In view of the results in Propositions A.8 and A.10, and the fact that
From Lemma A.3 and Corollary A.4 we can write
bθ(t+1) −bθ(t) goes to 0 for t → +∞, if (A.18) negation of (A.18) yields that there
exists ω ∈ Γ such that bθ(t) ∈ Lω,ω+ for t large enough. Now, if bθ(t) ∈ Lω,ω+ ∩ Θω (or
if bθ(t) ∈ Lω,ω+ ∩ Θω+ ) for t sufficiently large, a straightforward application of (A.7)
would imply that bθ(t) would necessarily exit Lω,ω+ in finite time. Therefore, it must
hold that bθ(t) keeps switching, for large t, between Lω,ω+ ∩ Θω and Lω,ω+ ∩ Θω+ .
bθ(t+1) −bθ(t) =
¯ν(t) 1 +
¯ν(t) Ω(cid:16)ν(t+1) − ν(t)(cid:17)(cid:21) + o(γ(t))
¯bθ
¯bθ
I′ := {tbθ(t) ∈ Θω} ,
¯ν(t)(cid:20)Ω(cid:16)µ(t+1) − µ(t)(cid:17) −
I′′ := {tbθ(t) ∈ Θω+}
i0 . From Lemma A.7, and applying Lemma A.11
and put v′ = 1/ω2
to µ(t) and ν(t), we get that for t ∈ I′ sufficiently large, it holds
i0 and v′′ = 1/ω+2
¯ν(t+1) −
Define now
¯µ(t)
(t+1)
(t)
1
(t)
(t)
1
¯ν(t) γ(t)a(t)
δ
(t)
) +
) + a(t)
δ + r(t). (A.19)
(v′ − v′′) (yi0 −bθ
i0 = c(t)γ(t)(¯yω −bθ
i0 −bθ(t)
bθ(t+1)
If bθ(ω) > Θω ∩ Λ, then also, by Lemma A.9, ¯yω+ > Θω ∩ Λ. This, using (A.7), would
imply that bθ(t) would necessarily exit Lω,ω+ in finite time. Therefore, we must have
bθ(ω) < Θω ∩ Λ. Hence, ¯yω −bθ
(v′ − v′′) (yi0 −bθ
notice that, since bθ(t) ∈ Lω,ω+,
Choose now δ such that δ < α2c/16β2 and ¯t ≥ ¯tδ such that r(t) < δγ(t). It then
follows from (A.19) that for t ∈ I′ and t ≥ ¯t, it holds
) < 0. Recall now the definition of the constant c in (A.6) and
c(t)γ(t)(¯yω −bθ
< 0. Moreover, it is easy to check that in any case
) ≤ −α2c/4β2γ(t).
(t)
(t)
i0
bθ(t+1)
−bθ(t)
i0 ≤ −α2c/8β2γ(t) < 0.
thus implies the thesis.
A.3. Proof of Theorem 4.1. Propositions A.8, A.10, and A.12 imply that
This says that as long as bθ(t) ∈ Θω, its i0-th component decreases. But this entails
thatbθ(t) can never leave Θω, which contradicts the infinite switching assumption and
there exists bωIA ∈ {α, β}V such that bθ(t) ∈ ΘbωIA for t sufficiently large. This im-
mediately implies that bω(t) = bωIA for t sufficiently large. Corollary A.5 implies
that bθIA = limt→+∞bθ(t) = θ(bωIA) Finally, since θ(bωIA) ∈ ΘbωIA, we also have that
bωIA = ω(bθIA).
Appendix B. Proof of concentration results.
22
B.1. Preliminaries. For a more efficient parametrization of the stationary points,
we introduce the notation:
ω ∈ {α, β}V Θω := {x ∈ Rx − yi < δ ⇔ ωi = α}
(B.1)
It is then straightforward to check from (3.11) that the set of local maxima SN can
be represented as
Since,
SN := {θ =bθ(ω) ω ∈ {α, β}V , bθ(ω) ∈ Θω}.
Θω 6= ∅ ⇔ ω =bω(x) for some x ∈ R
(B.2)
(B.3)
1 )
1 )
E(y1bω(x)−2
E(bω(x)−2
for analysing the set SN we can restrict to consider ω of type ω =bω(x). Consider the
sequence of random functions γN (x) :=bθ(bω(x)).
From (3.8), applying the strong law of large numbers, we immediately get that
lim
N→+∞
γN (x) a.s.= γ∞(x) :=
.
(B.4)
Something stronger can indeed be said by a standard use of Chernoff bound [26]:
Lemma B.1. For every ǫ > 0, there exists q < 1 such that, for any x ∈ R,
P (γN (x) − γ∞(x) > ǫ) ≤ 2qN .
Proof. Let ai = yiωN (x)−2
i
and bi = ωN (x)−2
b denote the corresponding expected values.
i with i ∈ {1, . . . , N} and let a and
By Chernoff's bound and by Hoeffding's inequality we have, respectively, that
1
N
NXi=1
P (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
ai − a(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ≥ ǫ1! ≤ qN
1
1
N
NXi=1
P (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
bi − b(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ≥ ǫ2! ≤ 2qN
2
with
q1 = e−
α2ǫ2
1
4
q2 = e−2ǫ2
2(α−2−β−2)−2
.
(B.5)
Fix ǫ1 < ǫ
2bβ4 and ǫ2 < ǫ
2aβ4 , then
P(cid:0)(cid:12)(cid:12)¯yωN (x) − y∞(x)(cid:12)(cid:12) > ǫ(cid:1) ≤ P
≤ qN
= qN
1 + qN
1 + qN
2
(cid:12)(cid:12)(cid:12) 1
i=1 bi(cid:12)(cid:12)(cid:12)
i=1 ai − a(cid:12)(cid:12)(cid:12) b + a(cid:12)(cid:12)(cid:12)b − 1
NPN
NPN
i=1 bi
2 + 1{β4(ǫ1b+aǫ2)>ǫ}
NPN
b 1
> ǫ
where the last step follows by the way ǫ1 and ǫ2 have been chosen.
There is still a point to be understood: in our derivation q1 and q2 depend on the
choice of x through a and b. However, it is immediate to check that a and b are both
bounded in x. This allows to conclude.
23
has an important property which will be useful later on.
From (B.4) is immediate to see that γ∞ is a bounded function of class C1 and it
Lemma B.2. There exists a constant C > 0 such that
x − γ∞(x) ≥ C(x − θ∗)
γ∞(x) − x ≥ C(θ∗ − x)
γ∞(θ∗) = θ∗
if x ∈ (θ⋆, +∞)
if x ∈ (−∞, θ⋆)
Proof.
If x ∈ (θ⋆, +∞) and f is the density of each yi (a mixture of two Gaussians) then
x − y∞(x) =
β2RR\(x−δ,x+δ) (x − t)f (t)dt
β2RR\(x−δ,x+δ) f (t)dt
1
1
α2R x+δ
x−δ (x − t)f (t)dt + 1
α2R x+δ
x−δ f (t)dt + 1
β2RR (x − t)f (t)dt
α2R x+δ
x−δ f (t)dt + 1
1
1
≥
β2RR\(x−δ,x+δ) f (t)dt
where the last inequality follows from the fact that R x+δ
conclude that
x−δ (x − t)f (t)dt ≥ 0. We
x − y∞(x) ≥
1
β2 (x − θ⋆)
1
α2R x+δ
x−δ f (t)dt + 1
β2RR\(x−δ,x+δ) f (t)dt
> 0.
Second statement if x ∈ (−∞, θ⋆) can be verified in a completely analogous way. The
third statement then simply follows by continuity.
We now come to a key result.
Lemma B.3. For any fixed ǫ > 0, there exist q ∈ (0, 1) and χ > 0 such that
P(cid:0)γN (x) ∈ Θbω(x)(cid:1) ≤ χqN
(B.6)
(B.7)
for all x such that x − θ⋆ > ǫ.
Proof. We assume x > θ⋆ + ǫ (the other case x < θ⋆ − ǫ being completely
equivalent). Fix ǫ′ ∈ (0, Cǫ) where C was defined in Lemma B.2 and estimate as
follows
P(cid:0)γN (x) ∈ Θbω(x)(cid:1) ≤ P(cid:0)γN (x) ∈ Θbω(x) , γN (x) − γ∞(x) ≤ ǫ′(cid:1)
+ P (γN (x) − γ∞(x) > ǫ′) .
Using Lemma B.2 we get
Thus
{γN (x) − γ∞(x) ≤ ǫ′} ⊆ {γN (x) ≤ x − (Cǫ − ǫ′)} .
(cid:8)γN (x) ∈ Θbω(x),γN (x) − γ∞(x) ≤ ǫ′(cid:9)
⊆ {∄i : yi ∈ (γN (x) − δ, γN (x) − δ + min{Cǫ − ǫ′, δ})}
and, consequently, the first term in (B.7) can be estimated as
P(cid:0)γN (x) ∈ ΘbωN (x) , γN (x) − γ∞(x) ≤ ǫ′(cid:1) ≤ 1 −Z γN (x)−δ+min{Cǫ−ǫ′,δ}
γN (x)−δ
f (y)dy!N
(B.8)
24
where f (y) is the density of each yi. Considering now that f (y) is bounded away from
0 on any bounded interval, that γN (x) − γ∞(x) ≤ ǫ′ and that γ∞(x) is a bounded
function, we deduce that the right hand side of (B.8) can be uniformly bounded as
qN for some q ∈ (0, 1). Substituting in (B.7), and using Lemma B.1 we finally obtain
the thesis.
B.2. Proof of Theorem 4.2. Define
for any ǫ > 0 and
AN (ǫ) :=n∃ω ∈ {α, β}V :bθ(ω) ∈ Θω,bθ(ω) − θ⋆ > ǫo
B1 := {∃i ∈ V : yi − θ⋆ > N}
B2 :=(cid:8)∃(i, j) ∈ V × V : yi − yj < N−4(cid:9)
B3 := {∃(i, j) ∈ V × V : yi − yj ∈(cid:0)2δ, 2δ + N−4(cid:9)
2 ∩ Bc
1 ∩ Bc
and estimate P (AN (ǫ)) ≤ P (AN (ǫ),Bc
3) + P(B1) + P(B2) + P(B3). Standard
considerations allow to upper bound the probability of each event Bi by a common
term K/N 2. We now focus on the estimation of the first term. The crucial point is
that, the condition Bc
3 allow us to reinforce condition (B.3) in the sense
cardinality is polynomial in N . Specifically, define
that all ω for which Θω 6= ∅ can be obtained as ω =bω(x) as x varies in a set whose
2 ∩ Bc
1 ∩ Bc
Z = {ζj = θ⋆ − N − δ + jN−4 : j ∈ N, j ≤ jmax}
where jmax := ⌈N 4(2N + 2δ)⌉ and notice that, assuming that the yi's satisfy Bc
we have that bω(ζj ) and bω(ζj+1) differ in at most one component and that bω(x) ∈
{bω(ζj ),bω(ζj+1)} for every x ∈ [ζj , ζj+1]. Moreover, because of Bc
1 we have thatbω(x)i =
bω(ζ0)i = β for all x ≤ θ⋆
N − δ and for all i. Similarly, bω(x)i = bω(ζjmax )i = β for all
1 ∩ Bc
x ≥ θ⋆ + N + δ and for sll i. In other terms, under the assumption that the yi's satisfy
1 ∩ Bc
Bc
3, it holds {ω ∈ {α, β}V Θω 6= ∅} = {bω(x) x ∈ Z}. Hence,
P (AN (ǫ),Bc
2 ∩Bc
3,
2 ∩ Bc
2 ∩ Bc
3) ≤
≤ P[ζ∈Z(cid:8)γN (ζ) ∈ Θbω(ζ),γN (ζ) − θ⋆ > ǫ(cid:9)
≤ P[ζ∈Z(cid:8)γN (ζ) ∈ Θbω(ζ),γ∞(ζ) − θ⋆ > ǫ/2(cid:9) +
+ P (γN (ζ) − γ∞(ζ) ≤ ǫ/2) .
Notice that, because of the continuity of γ∞, there exists ǫ > 0 such that γ∞(ζ)−θ⋆ >
ǫ/2 ⇒ ζ − θ > ǫ. We can then use Lemma B.3,
P[ζ∈Z(cid:8)γN (ζ) ∈ Θbω(ζ),γ∞(ζ) − θ⋆ > ǫ/2(cid:9)
≤ ZP(cid:0)γN (ζ) ∈ Θbω(ζ),γN (ζ) − θ⋆ > ǫ(cid:1) ≤ cN 5 qN
where c and q are those coming from Lemma B.3 relatively to ǫ. Putting together all
the estimations we have obtained and using Lemma B.1, we finally obtain that there
25
(notice that f does not depend on i). We can compute
i = σ)
2σ2 ds
if σ = β
2σ2 ds
if σ = α
θ−δ e− (s−θ⋆ )2
θ−δ e− (s−θ⋆ )2
=
EdH (bωIA, ω⋆) =
f (θ, σ) = P(bω(θ)i 6= σ ω⋆
1√2πσ2R θ+δ
1 − 1√2πσ2R θ+δ
N Xi
= pEf (bθIA, α) + (1 − p)Ef (bθIA, β).
i
P(bωIA
6= ω⋆
i )
1
N
1
exists χ > 0 such that P (AN (ǫ)) ≤ χ/N 2. Using Borel-Cantelli Lemma and standard
arguments, it follows now that the relation (4.5) hold in an almost surely sense.
It remains to be shown convergence in mean square sense. For this we need to go
the second additive term in the right hand side of (3.10) can be bounded uniformly
back to the form (3.10) of the derivative of L(θ,bω(θ)). The key observation is that
in modulus by some constant C. If we denote ¯γN = N−1Pi yi, this implies that the
function is increasing for θ > ¯γN + β2C and decreasing for θ < ¯γN − β2C. Hence,
necessarily,
ξ − ¯γN ≤ β2C ∀ξ ∈ SN .
(B.9)
0. This, together with (B.9), yields E max
ergodic theorem also E¯γN − θ⋆2 → 0 for N → +∞, the proof is complete.
On the other hand, by the law of large numbers, ¯γN almost surely converges to θ⋆
ξ∈SN ξ − ¯γN converges to
and this implies, by the previous part of the theorem that max
ξ∈SN ξ − ¯γN2 → 0 for N → +∞. Since by the
B.3. Proof of Proposition 4.4. We prove it for bωIA, the other verification
being completely equivalent). If σ ∈ {α, β}, we define
Since f (θ, σ) is a C1 function of θ, we immediately obtain that
and, by Corollary 4.3, this last expression converges to 0, for N → +∞. Hence,
Ef (bθIA, σ) − Ef (θ⋆, σ) ≤ CEbθIA − θ⋆
EdH (bωIA, ω⋆) = pEf (θ⋆, α) + (1 − p)Ef (θ⋆, β).
1
N
Straightforward computation now proves the thesis.
26
|
1710.11460 | 1 | 1710 | 2017-10-31T13:32:29 | Investigating the effect of social groups in uni-directional pedestrian flow | [
"cs.MA",
"physics.soc-ph"
] | The influence of cohesion among members of dyads is investigated in scenarios characterized by uni-directional flow by means of a discrete model: a corridor and the egress from a room with a bottleneck of varying width are simulated. The model manages the dynamics of simulated group members with an adaptive mechanism, balancing the probability of movement according to the dispersion of the group; the cohesion mechanism is calibrated through the parameters $\kappa_c$ and $\delta$. All scenarios are simulated with two procedures: (Proc. 1) population composed of individual pedestrians, in order to validate the simulation model and to provide baseline data; (Proc. 2) population including dyads (50% of the simulated pedestrians), in order to verify their impact. In the corridor scenario, the presence of dyads causes a reduction of the velocities and specific flow at medium-high densities. Egress from a square room with a unique central exit produces results in line with recent studies in the literature, but also shows that the dyads negatively affect the dynamics, leading generally to a slower walking speed and a lower pedestrian flow. Ignoring the presence of dyads would lead to an overestimation of egress flows. | cs.MA | cs |
Investigating the effect of social groups in
uni-directional pedestrian flow
Luca Crociani, Yiping Zeng, Andrea Gorrini, Giuseppe Vizzari, Weiguo Song
Abstract The influence of cohesion among members of dyads is investigated in sce-
narios characterized by uni-directional flow by means of a discrete model: a corridor
and the egress from a room with a bottleneck of varying width are simulated. The
model manages the dynamics of simulated group members with an adaptive mech-
anism, balancing the probability of movement according to the dispersion of the
group; the cohesion mechanism is calibrated through the parameters κc and δ . All
scenarios are simulated with two procedures: (Proc. 1) population composed of indi-
vidual pedestrians, in order to validate the simulation model and to provide baseline
data; (Proc. 2) population including dyads (50% of the simulated pedestrians), in
order to verify their impact. In the corridor scenario, the presence of dyads causes a
reduction of the velocities and specific flow at medium-high densities. Egress from
a square room with a unique central exit produces results in line with recent studies
in the literature, but also shows that the dyads negatively affect the dynamics, lead-
ing generally to a slower walking speed and a lower pedestrian flow. Ignoring the
presence of dyads would lead to an overestimation of egress flows.
1 Introduction
Recently, the topic of social groups has gathered a growing interest from re-
searchers studying the dynamics of pedestrians. One one side, field observations
Luca Crociani · Andrea Gorrini · Giuseppe Vizzari
CSAI research center, University of Milano - Bicocca, Milano, Italy
e-mail: {name.surname}@disco.unimib.it
Yiping Zeng ( ) · Weiguo Song
Sate Key Laboratory of Fire Science, University of Science and Technology of China, Hefei, China
e-mail: [email protected]
Weiguo Song
e-mail: [email protected]
1
2
Crociani, L., Zeng, Y., Gorrini, A., Vizzari, G., Song, W.
(e.g. [4]) have highlighted that a crowd of pedestrians is mostly composed of groups
of up to 4 members (dyads are typically the most frequent) and that people walking
in a group are generally slower than individuals. Controlled experiments involving
groups have been designed to investigate their aggregated effect, and a relevant im-
pact is observed in a corridor setting with bi-directional flow (see, e.g. [3, 2]) and a
bottleneck scenario(see, e.g. [5]). On the modelling side, many works are being pro-
posed for the simulation of group behaviour: for example, the work in [9] proposes
a continuous model for the behavior of groups of 2 or 3 members based on field ob-
servations, while [7] design leader-follower structure of dyads using dynamic floor
fields. In this paper, we present a discrete model considering groups, based on the
work in [1], which is extended and calibrated to fit the data from a controlled ex-
periment [3]. The calibrated model is then used to investigated the aggregated effect
of dyads in uni-directional pedestrian flows at high densities (Sec. 4) and passing
through a bottleneck (Sec. 5).
2 A Model for Group Cohesion
The simulation model here presented is designed to achieve a more realistic
simulation of pedestrian and group dynamics, with particular attention to the shape
of the group. The model is discrete in space and time, and at each time-step of
the simulation agents evaluate cells c of the Moore neighbourhood with the utility
function U(c). This aggregates the components associated to the reproduction of a
particular behaviour by means of a weighted sum:
U(c) =
κgG(c) + κobOb(c) + κsS(c) + κcC(c) + κdD(c) + κovOv(c)
d
(1)
Individual functions model respectively: (i) goal attraction; (ii) obstacle repul-
sion; (iii) keeping distance from other pedestrians; (iv) cohesion with other group
members; (v) direction inertia; (vi) overlapping to avoid gridlock in counter-flow
situations. The first three elements are modelled with the usage of the well-known
floor-field approach to model the base behaviour of pedestrians: movement towards
a target, obstacle avoidance, proxemics with other pedestrians in a repulsive sense.
The function C(c) is introduced to manage the cohesion among group members
and its strength is mainly adjustable by the parameter κc. The function calculates the
level of attractiveness of each neighbour cell, according to the position and velocity
of the other agents of the group. These information are used to estimate their next
positions and then evaluate the attractiveness of each cell according to the cohesion,
as the following:
(cid:34)(cid:32)
η · ∑
a∈G\{a}
C(c) =
(cid:33)
(cid:35)
(cid:107)xa − x•
a(cid:107)−(cid:107)xc − x•
a(cid:107)
G− 1
· 2
− 1
(2)
Investigating the effect of social groups in uni-directional pedestrian flow
3
(a)
(b)
Fig. 1 (a) Example of calculation of C(c) for a 2-members group. Cells ahead both pedestrians
will be the most desirable according to the function. (b) Example of values of the function Balance
for the different calibration weights, configuring different values of δ .
Where η is a normalization factor that, along with numerical values, allows
to translate the cohesion value into the range [−1,1]. G defines the size of the
group and (cid:107)x(cid:107) denotes the 2-norm of a vector x. x•
a describes a prediction of the
next position of the agent a and it represents a small advancement to the model that
allowed to improve the plausibility of the simulated behaviour. The estimation is
calculated using the velocity vector v a: x•
a = x a +v a. The functioning of the function
is exemplified in Fig. 1(a).
By acting on the parameters of U(c) during the simulation it is possible to
describe different states of the same pedestrian in different moments of a single
simulated scenario. This strategy is applied to allow group members to adapt their
behaviour in dense situations or in presence of obstacles. According to this method,
weights κg,κc,κi are varied and possibly inhibited according to an index that de-
scribes the instantaneous dispersion of the group, as shown in Fig. 1(b). This adap-
tation of the behaviour of group members can be calibrated according to the param-
eter δ that, together with κc, will be investigated for the calibration of the model in
the next Section.
After the utility evaluation for all the cells of the neighbourhood, the choice of
action is decided by the probability to move in each cell c as (N is the normalization
factor): P(c) = N · eU(c).
3 Calibration of the Group Behaviour
In order to calibrate the model and reproduce plausible movement of pedes-
trians and groups, data from the first procedure of a controlled experiment study-
ing the movement of dyads [3] have been used. In the experimental procedure,
4
Crociani, L., Zeng, Y., Gorrini, A., Vizzari, G., Song, W.
(a)
(b)
Fig. 2 Example configuration of the first procedure of the controlled experiment in [3] (a) and its
realization with the simulation model (b).
Individual Dyads Population
Experiment
Simulations
1.32
1.308
1.30
1.305
1.31
1.3067
Table 1 Comparison of average speeds [m/s] of pedestrians in the experiment and in the simula-
tions.
a uni-directional pedestrian flow composed of 30 individuals and 24 dyad mem-
bers1 crossed a corridor-like setting of 3m width. Trajectories were automatically
extracted in a measurement area of 10m length located at the center of the corridor,
after a buffer zone of 2m that allowed participants to reach a stable speed.
As shown in Fig. 2, a corridor-like setting similar to the experiment has been
designed with the simulation model, with an analogous initial configuration of the
pedestrian flow: starting positions are given by 9 start areas which generates 6 pedes-
trians each. Members of dyads are generated close to each other to avoid bias given
by the initial configuration. Moreover, only information about pedestrians inside the
measurement area are analysed. Given that all participants were young male student,
we configured a desired speed of simulated pedestrians of 1.6 m/s.
The aim of the simulation campaign was to calibrate parameters δ and κc,
managing the group behaviour, to fit the results about average speeds of all par-
ticipants and the distribution of relative positions of dyads, which describes their
spatial behaviour during the experimental iteration. To gather stable results, a set of
100 simulation iterations is configured for each configuration of the two parameters
that, as pure assumption, is explored in the range [0 : 30] with an increase rate of 1.
The calibration phase led to the optimal configuration of parameters (δ ,κc) =
(7,12), which generates average speeds of singles, dyads and of the overall popu-
lation as shown in Tab. 1. Results are in line with the observation. By looking at
the distribution of relative positions (Fig. 3(a) and 3(b)), the difference is a bit more
marked than with the speed, but overall the results are close and they highlights that
also in the simulations the most frequent pattern was the line-abreast one.
1 Dyads were artificially and randomly formed at the beginning of the iteration by asking partici-
pants to try to walk close to their companion as they were friends.
Investigating the effect of social groups in uni-directional pedestrian flow
5
(a)
(b)
Fig. 3 Distribution of relative positions of dyads (direction of movement towards right) of the
experiment (a) and simulation (b). The same color-scale is applied in both pictures.
4 Validation at basic movement
In this section, we will study the effects of the presence of dyads on the spe-
cific flow in a corridor environment with uni-directional movement. A graphic de-
scription of the setting is shown in Fig. 4. Two case-studies have been configured: a
baseline with only singles and one with 50% presence of dyads. To compute the fun-
damental diagram, simulation campaigns of 10 iterations of 5000 steps each have
been run per each investigated average density of pedestrians in the whole environ-
ment. The environment was configured as toroidal, so that the number of pedestrians
is constant during each iteration. To gain precision with the analysis, data are gen-
erated within a measurement area of 8 m length, where entrance/exit events are
recorded for each agent. This allowed to compute the number and the average speed
of pedestrian inside the measurement area for a given time window and to achieve
larger datasets with every simulation. Finally, at each run we considered only data
generated from step 2000, where a steady state was generally reached.
Results in the form density–speed and density–flow are shown in Fig. 5. Both
datasets are in agreement with empirical guidelines and datasets from the literature.
At the same time, the specific flow of dyads is smaller than that of individuals for
densities higher than 1.5 p/m2. On one hand, dyads walk slower than individuals in
low density situations, but the difference is quite limited with a similar configura-
tion of their desired speed. The increase of density, on the other hand, has a stronger
effects on the average speed of the population with the presence of dyads, empha-
sizing that dyads had a negative effect on the observed dynamics. This is due to the
cohesion mechanism configured for the walking behaviour of dyads, which makes
them to keep short distances to each other and to slow down while congested sit-
uations leads to a fragmentation of the group. While this behaviour is assumed for
this model and it could be considered rather strong compared to the reality, a similar
6
Crociani, L., Zeng, Y., Gorrini, A., Vizzari, G., Song, W.
Fig. 4 The corridor environment used for the test of the fundamental diagram.
Fig. 5 Results of the fundamental diagram in the form density–speed (left) and density–flow
(right).
difference among fundamental diagrams observed with only individuals and with
about 40% of dyads was observed in an experiment also presented in this book [2].
5 Analysis of group influence on a bottleneck scenario
Up to now, the model is calibrated to reproduce a plausible behaviour of dyads
and it is validated for the simulation of uni-directional flow in a corridor. In this
section the model will be used to study the effect of two-members groups in a pe-
riodical scenario representing a room with a bottleneck, as in Fig. 6(a). Again, we
configure two simulation campaigns to study the phenomena: (a) a scenario with
only individuals and (b) one with 50% presence of dyads. 400 simulated pedestri-
ans are generated in the scenario for each configuration of the bottleneck width and
5 iterations of 5000 steps are run to get a sufficient dataset. Again, output data are
gathered only in a steady state of the system (time-step from 2000 to 5000). Fig. 7
exemplifies two density maps for one iteration with bottleneck width of 4.0 m and
Investigating the effect of social groups in uni-directional pedestrian flow
7
(a)
(b)
Fig. 6 (a) Simulated scenario to test the outflow from the bottleneck. (b) Total flow achieved in the
two case studies and two empirical datasets from the literature [6, 8] for comparison.
highlights a slightly higher congestion in the scenario with dyads. This provides an
explanation of the results describing the outflow of pedestrians from the bottleneck,
which is calculated as J = N
t . The corresponding results are shown in Fig. 6(b).
While the baseline scenario generates a specific flow at the bottleneck of about 2.1
ped/m*s, the scenario with dyads provides a sensibly lower result following the
trend of about 1.8 ped/m*s observed in the dataset from Rupprecht et Al. [8].
6 Conclusions
The influence of cohesion among members of dyads and its aggregated effect in
scenarios characterized by uni-directional flow has been investigated by applying a
discrete model to two benchmark scenarios: a one way corridor and the egress from
a room with a central bottleneck. The simulation model represents the dynamics of
simulated group members with an adaptive mechanism, balancing the probability
of movement according to the dispersion of the group; the cohesion mechanism is
calibrated through two parameters κc and δ , acting on the utility of a movement,
and according to data coming from a controlled experiments involving dyads.
The investigated scenarios are simulated with two procedures, configuring a
population composed of only individual pedestrians and one half composed of dyad
members. In accordance with recent studies in the literature, simulated results show
that the dyads negatively affects the dynamics, leading generally to a lower velocity
and a lower pedestrian flow. The difference in the fundamental diagram observed
in the scenario of the corridor is sensible and for the range of densities lower than
1.5 ped/m2 is similar with the empirical data from the experiment used for the cali-
bration (see [2] in this book). Results coming from the simulation of the bottleneck
show again a negative effect of the presence of dyads, which in this case is even
more apparent. The achieved trend and the difference between the two simulation
8
Crociani, L., Zeng, Y., Gorrini, A., Vizzari, G., Song, W.
(a)
(b)
Fig. 7 Cumulative mean density at a steady state for the scenario with only individuals (a) and the
one with 50% presence of dyads (b).
scenarios are in line with other studies from the literature and, overall, suggests fur-
ther research to investigate the microscopic behaviour of pedestrian groups and its
aggregated effects on pedestrian dynamics.
Acknowledgements This research has been supported by the Key Research and Development
Program (2016YFC0802508), the Program of Shanghai Science and Technology Committee
(16DZ1200106), the Specialized Research Fund for the Doctoral Program of Higher Education
of China (20133402110009) the China Scholarship Council (CSC) and Fundamental Research
Funds for the Central Universities (WK2320000035).
References
1. Bandini, S., Crociani, L., Vizzari, G.: An approach for managing heterogeneous speed profiles
in cellular automata pedestrian models. J. Cellular Automata 12(5), 401–421 (2017)
2. Crociani, L., Gorrini, A., Feliciani, C., Vizzari, G., Nishinari, K., Bandini, S.: Micro and macro
pedestrian dynamics in counterflow: the impact of social groups. In: this volume (2018)
3. Gorrini, A., Crociani, L., Feliciani, C., Zhao, P., Nishinari, K., Bandini, S.: Social groups and
pedestrian crowds: Experiment on dyads in a counter flow scenario. In: Proceedings of the 8th
International Conference on Pedestrian and Evacuation Dynamics - PED2016, Hefei, China,
October 17-21, 2016, pp. 179–184 (2016)
4. Gorrini, A., Vizzari, G., Bandini, S.: Age and group-driven pedestrian behaviour: from obser-
vations to simulations. Collective Dynamics 1, 1–16 (2016)
5. von Kruchten, C., Schadschneider, A.: Empirical study on social groups in pedestrian evacua-
tion dynamics. Physica A: Statistical Mechanics and its Applications 475, 129–141 (2017)
6. Liao, W., Seyfried, A., Zhang, J., Boltes, M., Zheng, X., Zhao, Y.: Experimental study on pedes-
trian flow through wide bottleneck. Transportation Research Procedia 2(Supplement C), 26–33
(2014). The Conference on Pedestrian and Evacuation Dynamics 2014 (PED 2014)
7. Muller, F., Schadschneider, A.: Evacuation dynamics of asymmetrically coupled pedestrian
pairs. In: Traffic and Granular Flow'15, pp. 265–272. Springer (2016)
8. Rupprecht, T., Klingsch, W., Seyfried, A.: Influence of Geometry Parameters on Pedestrian
Flow through Bottleneck, pp. 71–80. Springer US (2011)
9. Zanlungo, F., Ikeda, T., Kanda, T.: Potential for the dynamics of pedestrians in a socially inter-
acting group. Phys. Rev. E 89, 012,811 (2014)
|
1907.09597 | 1 | 1907 | 2019-07-22T21:54:44 | Agent Modeling as Auxiliary Task for Deep Reinforcement Learning | [
"cs.MA",
"cs.LG"
] | In this paper we explore how actor-critic methods in deep reinforcement learning, in particular Asynchronous Advantage Actor-Critic (A3C), can be extended with agent modeling. Inspired by recent works on representation learning and multiagent deep reinforcement learning, we propose two architectures to perform agent modeling: the first one based on parameter sharing, and the second one based on agent policy features. Both architectures aim to learn other agents' policies as auxiliary tasks, besides the standard actor (policy) and critic (values). We performed experiments in both cooperative and competitive domains. The former is a problem of coordinated multiagent object transportation and the latter is a two-player mini version of the Pommerman game. Our results show that the proposed architectures stabilize learning and outperform the standard A3C architecture when learning a best response in terms of expected rewards. | cs.MA | cs | Agent Modeling as Auxiliary Task for Deep Reinforcement Learning
Pablo Hernandez-Leal,∗ Bilal Kartal∗ and Matthew E. Taylor
{pablo.hernandez, bilal.kartal, matthew.taylor}@borealisai.com
Borealis AI
Edmonoton, Canada
9
1
0
2
l
u
J
2
2
]
A
M
.
s
c
[
1
v
7
9
5
9
0
.
7
0
9
1
:
v
i
X
r
a
Abstract
In this paper we explore how actor-critic methods in deep
reinforcement learning, in particular Asynchronous Advan-
tage Actor-Critic (A3C), can be extended with agent model-
ing. Inspired by recent works on representation learning and
multiagent deep reinforcement learning, we propose two ar-
chitectures to perform agent modeling: the first one based on
parameter sharing, and the second one based on agent policy
features. Both architectures aim to learn other agents' poli-
cies as auxiliary tasks, besides the standard actor (policy) and
critic (values). We performed experiments in both coopera-
tive and competitive domains. The former is a problem of
coordinated multiagent object transportation and the latter is
a two-player mini version of the Pommerman game. Our re-
sults show that the proposed architectures stabilize learning
and outperform the standard A3C architecture when learning
a best response in terms of expected rewards.
Introduction
An important ability for agents to have is to reason about the
behaviors of other agents by constructing models that make
predictions about the modeled agents (Albrecht and Stone
2018). This agent modeling (Schadd, Bakkes, and Spronck
2007)1 area usually takes concepts and algorithms from mul-
tiagent systems (since the environment includes at least two
agents), game theory (which studies the strategic interac-
tions among agents), and reinforcement learning (since the
model may be based on information observed from interac-
tions).
Agent modeling usually serves two purposes in multia-
gent settings: it improves the coordination efficiency in co-
operative scenarios (Chalkiadakis and Boutilier 2003) and,
in competitive scenarios, it helps the agent to better optimize
(best respond) its actions against the predicted opponent pol-
icy (Carmel and Markovitch 1995), e.g., by exploiting oppo-
nent mistakes.
Early algorithms for agent modeling came from game the-
ory literature, e.g., fictitious play (Brown 1951). Later, many
works adapted reinforcement learning algorithms for this
∗Equal contribution
1Sometimes referred as opponent modelling since "opponent"
is used to refer to another agent in the environment.
task (Banerjee and Peng 2005). Recently, agent modeling
has been also considered in the context of deep reinforce-
ment learning (DRL).
DRL has shown outstanding results in Atari games, Go,
Poker and recently in strategy video games (Mnih et al.
2013; Torrado et al. 2018). Due to these successes, it is
natural that DRL is now being tested in multiagent envi-
ronments (Hernandez-Leal, Kartal, and Taylor 2018). Some
works have explored using DRL to evaluate emergent behav-
iors in multiagent environments (Tampuu et al. 2017), and
others have proposed algorithms for multiagent DRL (Fo-
erster et al. 2017). In contrast, our goal is to estimate other
agents' (opponent or teammate) policies by means of an aux-
iliary task at the same time that the agent is learning its re-
spective (best response) policy. In general, (self-supervised)
auxiliary tasks are not used for anything other than shaping
the features of the agent, i.e., facilitating the representation
learning process (Bellemare et al. 2019), improving learn-
ing stability (Jaderberg et al. 2017), and have broadened the
horizons of RL to learn from all experience, whether re-
warded or not. Self-supervision defines losses via surrogate
annotations that are synthesized from unlabeled inputs. Ex-
amples are reward prediction which can be cast into a regres-
sion task (Jaderberg et al. 2017) and dynamics prediction
that captures state, action, and successor relationships. Since
the purpose is representation learning and not full modeling
of the dynamics and reward, the losses need not form a tran-
sition model and proxies can suffice to help tune the repre-
sentation, i.e., these losses are expected to give gradients not
necessarily a generative model (Shelhamer et al. 2017).
In this work we take advantage of auxiliary tasks when
learning a best response and the opponent/teammate model.
Since these two elements are linked to each other, we pro-
pose two architectures that take advantage of this realization.
Recently, asynchronous actor-critic methods have become
widely used in DRL; Asynchronous Advantage Actor-Critic
(A3C) (Mnih et al. 2016) is a major representative of this
category, which does not use an experience buffer and learns
completely on-policy. Thus, we take A3C as baseline and set
off to evaluate and better understand the use of agent mod-
eling as auxiliary task with on-policy actor-critic methods in
DRL with the following contributions:
• Agent modeling in DRL is still an open research area with
opportunities in video games (Zhao and Szafron 2009;
Torrado et al. 2018; Borovikov et al. 2019). Our exper-
iments are performed in two recent multiagent environ-
ments, one cooperative and one competitive domain (mini
version of the Pommerman game).
• We propose two new architectures that take inspiration
from multiagent DRL and representation learning to do
agent modeling. The first architecture, Agent Modeling
by parameter Sharing (AMS-A3C), takes inspiration from
the concept of parameter sharing to learn the oppo-
nent/teammate policy as an auxiliary task as well as the
standard actor and critic.
• The second architecture, Agent Modeling by policy Fea-
tures (AMF-A3C), leverages the concept of policy fea-
tures to learn latent space features that are used as input
when computing the actor and critic of the learning agent.
Our results show that modeling the opponent/teammate
increases the expected rewards and improves the stability of
the learning process. In particular, in this work we show the
benefits of using opponent/teammate policy prediction as an
auxiliary task with respect to non-learning stochastic agents
in both cooperative and competitive scenarios.
Related Work
In this section, we describe related work on agent modeling
in DRL, multiagent DRL and auxiliary tasks.
Deep Reinforcement Opponent Network (DRON) (He
et al. 2016) was the first DRL work that performed op-
ponent modeling. DRON's idea is to have two networks:
one learns Q values (similar to DQN (Mnih et al. 2013))
and a second learns a representation of the opponent's pol-
icy. DRON used hand-crafted features to define the oppo-
nent network. In contrast, Deep Policy Inference Q-Network
(DPIQN) and Deep Policy Inference Recurrent Q-Network
(DPIRQN) (Hong et al. 2018) learned opponent policy fea-
tures directly from raw observations of the other agents. The
way to learn these policy features is by means of auxiliary
tasks (Jaderberg et al. 2017) that provide additional learn-
ing goals; in this case, the auxiliary task is to learn the op-
ponent's policy. Then, the Q value function of the learning
agent is conditioned on the policy features, which aim to
reduce the non-stationarity of the multiagent environment.
In contrast, our proposals do not need an experience replay
buffer, learn completely on-policy and we make use of full
parameter sharing (Foerster et al. 2017).
Deep Cognitive Hierarchies (Lanctot et al. 2017) is an al-
gorithm that aims to avoid overfitting in two-player games. It
uses deep reinforcement learning to compute best responses
to a distribution over policies and empirical game-theoretic
analysis to compute new meta-strategy distributions. The-
ory of Mind Network (Rabinowitz et al. 2018) tackles the
problem of meta-learning, i.e., the proposed network should
acquire a strong prior model for agents' behaviour to boot-
strap to richer predictions. DeepBPR+ studies the problem
of efficient policy detection and reuse when playing against
non-stationary agents in Markov games (Zheng et al. 2018).
In contrast, our goal is to estimate the opponent/teammate's
policy at the same time that the agent is learning its re-
spective (best response) policy; since these two elements are
linked to each other our proposals improve the stability of
the learning process as well as increase the obtained rewards.
Self Other Modeling (SOM) (Raileanu et al. 2018) is a
recently proposed algorithm that uses the agent's own pol-
icy as a means to predict the opponent's goal (and actions).
SOM is based on the assumption that the agents are identi-
cal, which is more suitable when agents share a fixed set of
goals and have similar abilities.
Auxiliary tasks were originally presented as hints that im-
proved the network performance and learning time. Sud-
darth and Kergosien (1990) presented a minimal example
of a small neural network where it was shown that adding an
auxiliary task effectively removed local minima. Recently,
some works have used them in single-agent RL problems,
for example, Mirowski et al. (2017) studied self-supervised
tasks (like depth prediction) in a navigation problem. Their
results show that augmenting an RL agent with auxiliary
tasks supports representation learning, which provides richer
training signals that enhance data efficiency. Another inter-
esting result is that using the auxiliary task as a loss was
better than using the value as input. Another example was
presented by Lample and Chaplot (2017) who added an aux-
iliary task (to predict game feature information such as the
presence of enemies or items) to a DQN network to improve
learning in First-Person-Shooting games. These ideas also
relate to Multi-Task Learning where by learning tasks in par-
allel using a shared representation, what is learned for each
task can help the learning of the others (Caruana 1997).
Preliminaries
We start with the standard reinforcement learning setting of
an agent interacting in an environment over a discrete num-
ber of steps. At time t the agent in state st takes an action
at and receives a reward rt. The state-value function is the
expected return (sum of discounted rewards) from state s
following a policy π(as):
V π(s) = E[Rt:∞st = s, π],
and the action-value function is the expected return follow-
ing policy π after taking action a from state s:
Qπ(s, a) = E[Rt:∞st = s, at = a, π].
Algorithms, such as Q-learning, or its (deep) neural net-
work variant, DQN, approximate the action-value function
Q(s, a; θ) using parameters θ, and then update parameters
to minimize the mean-squared error, using the loss function:
i ) − Q(s, a; θi))2]
LQ(θi) = E[(r + γmaxa(cid:48)Q(s(cid:48), a(cid:48); θ−
where θ− represents the parameters of the target network
that is held constant, but synchronized to the behaviour net-
work θ− = θ, at certain periods to stabilize learning.
A3C (Asynchronous Advantage Actor-Critic) is an al-
gorithm that employs a parallelized asynchronous train-
ing scheme (e.g., using multiple CPUs) for efficiency; it
is an on-policy RL method that does not need an ex-
perience replay buffer. A3C allows multiple workers to
n−1(cid:88)
simultaneously interact with the environment and com-
pute gradients locally. All the workers pass their com-
puted local gradients to a global network that performs
the optimization and synchronizes the updated actor-critic
NN parameters with the workers asynchronously. A3C
maintains a parameterized policy (actor) π(as; θ) and
value function (critic) V (s; θv), which are updated as fol-
lows: (cid:52)θ = ∇θ log π(atst; θ)A(st, at; θv) and (cid:52)θv =
A(st, at; θv)∇θv V (st) where
A(st, at; θv) =
γkrt+k + γnV (st+n) − V (st),
k=0
with A(s, a) = Q(s, a) − V (s) representing the advantage
function, commonly used to reduce variance.
The policy and the value function are updated after ev-
ery tmax actions or when a terminal state is reached. It
is common to use one softmax output for the policy head
π(atst; θ) and one linear output for the value function head
V (st; θv), with all non-output layers shared, see Figure 1 (a).
The loss function for A3C is composed of two terms:
policy loss (actor), Lπ, and value loss (critic), Lv. An en-
tropy loss for the policy, H(π), is also commonly added to
help to improve exploration by discouraging premature con-
vergence to suboptimal deterministic policies (Mnih et al.
2016). Thus, the loss function is given by:
LA3C = λvLv + λπLπ − λHEs∼π[H(π(s,·, θ)]
with λv = 0.5, λπ = 1.0, and λH = 0.01, being standard
weighting terms on the individual loss components.
The UNsupervised REinforcement and Auxiliary Learn-
ing (UNREAL) framework (Jaderberg et al. 2017) is built
on top of A3C. UNREAL proposes unsupervised auxiliary
tasks to speed up the learning process that requires no ad-
ditional feedback from the environment. The idea of ad-
ditional auxiliary predictions is to help with the represen-
tational learning problem (Bengio, Courville, and Vincent
2013) and had also been useful to improve the robustness
and stability of the learning process (Jaderberg et al. 2017).
UNREAL proposes two auxiliary tasks: auxiliary control
and auxiliary prediction that share the previous layers that
the base agent uses to act. By using this jointly learned repre-
sentation, the base agent learns to optimize extrinsic reward
much faster and, in many cases, achieves better policies at
the end of training. The UNREAL algorithm optimizes a
single combined loss function with respect to the joint pa-
rameters of the agent that combines the A3C loss, LA3C, to-
gether with an auxiliary control loss LP C, an auxiliary re-
ward prediction loss LRP and a replayed value loss LV R. In
contrast to A3C, UNREAL uses an experience replay buffer
that is sampled with more priority given to interactions with
positive rewards to improve the critic network.
Agent Modeling with A3C
In this section we first describe the challenges of opponent
modeling in the context of reinforcement learning and mul-
tiagent systems, then we present our two main contributions:
the AMS-A3C and AMF-A3C architectures.
Opponent modeling and multiagent systems
In a multiagent environment, agents interact at the same time
with the environment and potentially with each other (Tuyls
and Weiss 2012). These environments are commonly for-
malized as a Markov game (cid:104)S,N , A, T, R(cid:105), which can be
seen as an extension of an MDP to multiple agents (Littman
1994). One key distinction is that the transition, T , and re-
ward function, R, depend on the actions of all, N , agents.
Given a learning agent i and using the common shorthand
notation −i = N \ {i} for the set of opponents, the value
function now depends on the joint action a = (ai, a−i), and
the joint policy π(s, a) =(cid:81)
j πj(s, aj):
(cid:88)
a∈A
V π
i (s) =
(cid:88)
T (s, ai, a−i, s(cid:48))
π(s, a)
[R(s, ai, a−i, s(cid:48)) + γVi(s(cid:48))].
s(cid:48)∈S
(1)
The optimal policy is dependant on the other agents' poli-
cies:
π∗
i (s, ai, π−i) = arg max
πi
V (πi,π−i)
i
(s).
However, if the other agents' policies are stationary (can
still be stochastic) then the problem can be reduced to a stan-
dard MDP where RL algorithms can be used to effectively
learn a best response to those other agents, irrespective if the
domain is cooperative or competitive. Our goal therefore is
to accurately estimate the opponent/teammate policy at the
same time that the agent is learning its respective (best re-
sponse) policy. Since these two elements are linked to each
other, below we propose two architectures that take advan-
tage of this realization. In this work we show advantage of
agent policy prediction with respect to non-learning agents.
We leave as future work how to deal with learning agents.
AMS-A3C: Agent Modeling by parameter Sharing
This architecture builds on the concepts of parameter shar-
ing and auxiliary tasks. Parameter sharing has been pro-
posed in multiagent DRL as a way to reduce the number
of parameters to learn and improve the performance. The
idea is to perform centralized learning where agents share
the same network (i.e., parameters) but the outputs represent
different agent actions (Foerster et al. 2017).
Building on the same principle, in our architecture we
want to also predict the opponent/teammate policies as well
as the standard actor and critic, with the key characteris-
tic that the previous layers will share all their parameters,
see Figure 1 (b). The change in the architecture is accompa-
nied by a modification in the loss function. In this case, we
treat the learning of the other agents' policies as auxiliary
tasks (Jaderberg et al. 2017) by refining the loss function as:
LAMS-A3C = LA3C +
1
N
λAMiLAMi
where and λAMi is weight term and LAMi is an auxiliary
loss for opponent/teammate i:
LAMi = − 1
M
i log(aj
aj
i )
M(cid:88)
j
N(cid:88)
i
Figure 1: CNN represents convolutional layers, FC represents fully connected layers, and ⊗ represents an element-wise vector
multiplication. (a) A3C outputs values and the agent's policy. (b) AMS-A3C is similar to A3C but adds a head that predicts the
other agents' policies. (c) AMF-A3C aims to learn other agents' policy features in the latent space, hoppi, which are then used
to compute the value and policy of the learning agent. Both approaches can be generalized to N opponents/teammates.
which is the supervised cross entropy loss between the ob-
served one-hot encoded opponent/teammate action (ground
truth), aj
i , for a trajectory of length
M.
i , and the prediction, aj
AMF-A3C: Agent Modeling by policy Features
The second architecture uses the concepts of policy features
and auxiliary tasks. Hong et al. (2018) proposed a modified
DQN architecture that conditions Q-values of the learning
agent on features in the latent space2 that also predict the
opponent/teammate policy, i.e., policy features.
We take a similar approach but in the context of on-policy
actor-critic methods, which means that policy features con-
dition on both actor and critic. In this case, after the convo-
lutional layers, the fully connected layers are divided in two
sections, one specialized in the opponent/teammate policy
and the other in the actor and critic (of the learning agent).
Then, we directly use opponent/teammate policy features,
hoppi vector, to be conditioned (via an element-wise mul-
tiplication) when computing the actor and critic, see Fig-
ure 1 (c). The loss function is similarly refined as follows:
LAMF-A3C = LA3C + 1N
Note that we described AMS-A3C and AMF-A3C in the
general case with N agents in the environment. In the ex-
periments we evaluated scenarios with one opponent or one
teammate.
(cid:80)N
i λAMiLAMi
Implementation details
For A3C, AMS-A3C, and AMF-A3C we used 3 or 4 con-
volutional layers (depending on the domain), with 32 fil-
ters, 3 × 3 kernels, stride and padding of 1. For A3C and
AMS-A3C the convolutional layers are followed with 2 fully
connected layers with 128 hidden units each, followed by
2-heads: the critic has a single output for state-value esti-
mate for the observation, and the actor has A outputs for
the policy probabilities for the given observation. For AMF-
A3C, the fully connected layers have 64 units (to keep the
same number of weights as AMS-A3C). For AMS-A3C and
AMF-A3C, the opponent/teammate policy head has Aopp
outputs corresponding to the opponent/teammate policy. We
used ELU activation functions. The parameters of all archi-
tectures have entropy weight of 0.01, a value loss weight of
2Not to be confused with latent variables.
(a)
(b)
Figure 2: (a) The coordinated multiagent object transport
moving problem (Palmer et al. 2018). Two agents need to
coordinate to pick up an object and delivery it to the goal
zone. Our experiments use a stochastic teammate that moves
with higher probability towards the object and then to the
goal. (b) An example of the mini Pommerman with board
size 8×8. The board is randomly generated varying the num-
ber of wood (light brown cell), walls (dark brown cell) and
power-ups (yellow circle). Initial positions of the agents are
randomized close to any of the 4 corners of the board.
0.5, a policy loss weight of 1, and a discount factor of 0.99.
The parameters of the learning agent's policy are optimized
using Adam with lr = 0.0001, β1 = 0.9, β2 = 0.999, =
1× 10−8, and weight decay 1× 10−5. In the next section we
compare different settings for λAM .
Experiments
This section describes the two experimental domains: a co-
operative multiagent transport moving problem and a com-
petitive mini version of Pommerman. We then present the
experimental results in terms of sensitivity of the loss weight
parameter λAM for AMS-A3C and AMF-A3C in the coor-
dination domain, and then we compare with A3C in terms
of rewards for the two domains.
Domains and setup
Coordination This domain is
nated Multi-Agent Object Transportation
(CMOTPs) (Palmer et al. 2018),
inspired by Coordi-
Problems
in which two agents
are tasked with delivering one object to a goal within a
grid-world. The agents must locate and pick up the object
by standing in the grid cells on the left and right hand
side. The task is fully cooperative, i.e., objects can only
be transported upon both agents grasping the item (this
happens automatically when situated next to the object) and
choosing to move in the same direction. Agents only receive
a positive reward after placing the object in the goal, see
Figure 2(a). Agents have 1900 time steps to complete this
task, otherwise the object is reset to the starting position.
The actions available to each agent are to either stay in
place or move left, right, up, or down. We tested two
teammates: one hesitant agent which moves randomly but
with higher probability towards the object and once it has
grasped it then moves with higher probability towards the
goal; and a stubborn agent which prefers to follow a certain
path after grasping the object (i.e., some actions are fully
deterministic). Agents receive one observation per time step
from the environment as a 16 × 16 pixel representation. We
used 12 CPU workers in these experiments.
Competition The Pommerman environment (Resnick et
al. 2018) is based on the classic console game Bomber-
man. Our experiments use the simulator in a mode with two
agents, see Figure 2(b). Each agent can execute one of 6
actions at every time step: move in any of four directions,
stay put, or place a bomb. Each cell on the board can be a
passage, a rigid wall, or wood. The maps are generated ran-
domly, albeit there is always a guaranteed path between any
two agents. The winner of the game is the last agent stand-
ing and receives a reward of 1. Whenever an agent places a
bomb it explodes after 10 time steps, producing flames that
have a lifetime of 2 time steps. Flames destroy wood and kill
any agents within their blast radius. When wood is destroyed
either a passage or a power-up is revealed. Power-ups can be
of three types: increase the blast radius of bombs, increase
the number of bombs the agent can place, or give the ability
to kick bombs. A single game of two-player Pommerman is
finished when an agent dies or when reaching 800 timesteps.
We considered the rule-based opponent baseline that
comes within the simulator (a.k.a. SimpleAgent). Its be-
haviour is stochastic since it collects power-ups and places
bombs when it is near an opponent. It is skilled in avoid-
ing blasts from bombs. It uses Dijkstra's algorithm on each
time-step, resulting in longer training times.
We evaluated our two proposed architectures and the stan-
dard A3C against the opponents mentioned above. In all
cases we provided learning agents with dense rewards and
we did not tune those reward terms. In our setting the entire
board is visible and agents receive one observation per time
step from the environment as a 18× 8× 8 matrix which con-
tains the current time step board description of the board for
the current time step, similar to Resnick et al. (2019).
Results
Sensitivity of λAM In the first set of experiments
we used the coordination domain to evaluate different
weights for the opponent modeling loss value: annealing
(a)
(c)
(b)
(d)
Figure 3: Comparison for the weight for the opponent mod-
eling loss value, λAM , annealing 1.0 → 0.0 with varying
discount rates (exponentially) or fixing the value. Learning
curves in the coordination domain with the hesitant team-
mate for (a) AMS-A3C and (b) AMF-A3C: no significant
variation; with the stubborn teammate for (c) AMS-A3C and
(d) AMF-A3C: best results were obtained with λAM = 0.1
λAM = 1.0 → 0.0 varying discount rates exponentially
{0.999, 0.9999, 0.99999} or keeping the value fixed with
λAM = {0.1, 0.5}. With the hesitant teammate both AMS-
A3C and AMF-A3C show similar behavior for all the eval-
uated parameters (better than A3C), see Figures 3(a)-(b).
When testing with the stubborn teammate we observed more
variation among parameters, for both AMS-A3C and AMS-
A3C using a fixed λAM = 0.1 or quickly annealing with
0.999 gave the best results, see Figures 3(c)-(d). Our hypoth-
esis is that this teammate is easier to learn and the network
does not need too much weight on their modeling; instead it
can focus on policy learning.
Coordination Using the best parameters for AMS-A3C
and AMF-A3C we compare to A3C. Figure 4 depicts learn-
ing curves3 (average with standard deviations of 10 runs)
where it can be seen that in the first part of the learning
(30k episodes), all learning agents behave similarly, how-
ever, in the long run AMS-A3C and AMF-A3C obtained
higher rewards than A3C (AMS-A3C was statistically sig-
nificantly better than A3C from episode 60k, α = 0.05).
We noted that against the hesitant teammate A3C decreases
its rewards, likely because of its on-policy nature, see Fig-
ure 4(a). In contrast, AMS-A3C and AMF-A3C show stabil-
ity and start increasing their rewards. When facing the stub-
born teammate, AMS-A3C and AMF-A3C show less vari-
3Because of the stochasticity of the opponent actions an upper
bound of the expected reward is ≈ 0.7 (experimentally computed)
with the selected parameters.
(a)
(b)
(a)
(b)
Figure 4: Coordination domain: Learning curves with two
different teammates (a) hesitant and (b) stubborn in the co-
ordination problem. Vanilla A3C shows instability and even
reduces its rewards after some episodes, in contrast, AMS-
A3C and AMF-A3C are more stable, with lower variance
and higher rewards.
Figure 6: T-SNE analysis from trained (a) A3C and (b)
AMS-A3C agents from 100 episodes (colors are obtained
from the value head). AMS-A3C t-SNE shows many more
clusters, in particular, the cluster highlighted on the left cor-
responds to states when AMS-A3C is about to win the game
(value close to 1).
the opponent commit suicide by blocking its moves (in Pom-
merman, if two agents simultaneously want to move to the
same cell, they both stay in their current locations) and make
it stand on the path of the flames, in contrast to A3C which
was unable to learn this strategy and obtained lower rewards.
Lastly, we performed a visual analysis similar to Zahavy,
Ben-Zrihem and Mannor (2016). We took trained agents of
A3C and AMS-A3C and for 100 episodes we recorded both
the activations of the last layer and the value output. We ap-
plied t-SNE (Maaten and Hinton 2008) on the activations
data (as input) and the value outputs (as labels). Figure 6
depicts the t-SNEs where it can be seen that AMS-A3C
has more well-defined clusters than A3C's, in particular the
highlighted cluster on the left represents states when AMS-
A3C is about to win the game because it can accurately pre-
dict the opponent's moves, which implies values close to 1.
Conclusions
Deep reinforcement learning has shown outstanding results
in recent years. However, there are still many open ques-
tions regarding different recent learning algorithms. We take
as base a major representative of actor-critic methods, i.e.,
A3C, and propose two architectures that are designed to do
agent modelling as an auxiliary task. This means that at the
same time the network improves the representation learn-
ing, it will also aim to learn other agents policies. Even
though auxiliary tasks are not new, their use in deep RL
and opponent modeling is still not well studied. Our work
serves as an important stepping stone in this direction by
proposing two architectures that improve learning when do-
ing opponent/teammate modeling in deep RL. Our archi-
tectures AMS-A3C and AMF-A3C are inspired by multi-
agent DRL concepts: parameter sharing and opponent pol-
icy features. We experimented in both cooperative and com-
petitive domains. In the former, our proposals were able to
learn coordination faster and more robustly compared to the
vanilla A3C. In the latter, our agents were able to predict
opponent moves in complex simultaneous move, Pommer-
man, and successfully obtain a best response that resulted in
higher scores in terms of rewards. As future work, we are
Figure 5: Competition domain: Moving average over 10k
games of the rewards (shaded lines are standard deviation
over 5 runs) obtained by the two proposed architectures and
A3C against the rule-based opponent: AMS-A3C and AMF-
A3C obtained significantly higher scores than A3C.
ance than A3C due to their accurate agent modeling (AMS-
A3C is statistically significant over A3C from episode 90k
with α = 0.05), see Figure 4(b). Examining the trained
agents, AMS-A3C and AMF-A3C show better coordination
skills once the object is grasped compared to vanilla A3C,
i.e., agents reached the goal faster once grabbing the object.
Competition One clear distinction from the previous do-
main is that it is more elaborate and stochastic (board is
randomized and changes depending on the agents' actions).
In this experiments we set λAM = 0.01 and we evaluate
against the rule-based opponent. In this case, we let the
learning agents train for 6 million episodes to guarantee con-
vergence (≈ 3 days of training with 50 workers). Results are
depicted in Figure 5 (with standard deviations over 5 runs),
where it can be seen that AMS-A3C and AMF-A3C both
clearly outperform A3C in terms of rewards (AMS-A3C is
statistically significant over A3C from episode 3.5M and
AMF-A3C from 5.5M, α = 0.05). When observing the poli-
cies generated we noted that during game play the agents
trained with AMS-A3C and AMF-A3C were able to make
interested in exploring self-play, learning agents, and mixed
(coordination-competition) environments.
References
2013.
[Albrecht and Stone 2018] Albrecht, S. V., and Stone, P.
2018. Autonomous agents modelling other agents: A com-
prehensive survey and open problems. Artificial Intelligence
258:66 -- 95.
[Banerjee and Peng 2005] Banerjee, B., and Peng, J. 2005.
In AAMAS,
Efficient learning of multi-step best response.
60 -- 66.
[Bellemare et al. 2019] Bellemare, M. G.; Dabney, W.;
Dadashi, R.; Taiga, A. A.; Castro, P. S.; Roux, N. L.; Schu-
urmans, D.; Lattimore, T.; and Lyle, C. 2019. A geomet-
ric perspective on optimal representations for reinforcement
learning. arXiv preprint arXiv:1901.11530.
Y.;
[Bengio, Courville, and Vincent 2013] Bengio,
Representation
Courville, A.; and Vincent, P.
IEEE trans-
learning: A review and new perspectives.
actions on pattern analysis and machine intelligence
35(8):1798 -- 1828.
[Borovikov et al. 2019] Borovikov, I.; Zhao, Y.; Beirami, A.;
Harder, J.; Kolen, J.; Pestrak, J.; Pinto, J.; Pourabolghasem,
R.; Chaput, H.; Sardari, M.; et al. 2019. Winning isn't ev-
erything: Training agents to playtest modern games. In AAAI
Workshop on Reinforcement Learning in Games.
[Brown 1951] Brown, G. W. 1951.
Iterative solution of
games by fictitious play. Activity analysis of production and
allocation 13(1):374 -- 376.
[Carmel and Markovitch 1995] Carmel, D., and Markovitch,
S. 1995. Opponent Modeling in Multi-Agent Systems. In
IJCAI. Springer-Verlag.
[Caruana 1997] Caruana, R. 1997. Multitask learning. Ma-
chine learning 28(1):41 -- 75.
[Chalkiadakis and Boutilier 2003] Chalkiadakis, G.,
and
Boutilier, C. 2003. Coordination in Multiagent Reinforce-
ment Learning: A Bayesian Approach. In AAMAS.
[Foerster et al. 2017] Foerster, J. N.; Nardelli, N.; Farquhar,
G.; Afouras, T.; Torr, P. H. S.; Kohli, P.; and Whiteson, S.
2017. Stabilising Experience Replay for Deep Multi-Agent
Reinforcement Learning. In ICML.
[He et al. 2016] He, H.; Boyd-Graber, J.; Kwok, K.; and
Daume, H. 2016. Opponent modeling in deep reinforce-
ment learning. In ICML, 2675 -- 2684.
[Hernandez-Leal, Kartal, and Taylor 2018] Hernandez-Leal,
P.; Kartal, B.; and Taylor, M. E. 2018. Is multiagent deep
reinforcement learning the answer or the question? A brief
survey. arXiv preprint arXiv:1810.05587.
[Hong et al. 2018] Hong, Z.-W.; Su, S.-Y.; Shann, T.-Y.;
Chang, Y.-H.; and Lee, C.-Y. 2018. A Deep Policy Infer-
ence Q-Network for Multi-Agent Systems. In AAMAS.
[Jaderberg et al. 2017] Jaderberg, M.; Mnih, V.; Czarnecki,
W. M.; Schaul, T.; Leibo, J. Z.; Silver, D.; and Kavukcuoglu,
K. 2017. Reinforcement Learning with Unsupervised Aux-
iliary Tasks. In ICLR.
[Lample and Chaplot 2017] Lample, G., and Chaplot, D. S.
2017. Playing FPS Games with Deep Reinforcement Learn-
ing. In AAAI, 2140 -- 2146.
[Lanctot et al. 2017] Lanctot, M.; Zambaldi, V. F.; Gruslys,
A.; Lazaridou, A.; Tuyls, K.; P´erolat, J.; Silver, D.; and
Graepel, T. 2017. A Unified Game-Theoretic Approach to
Multiagent Reinforcement Learning. In NIPS.
[Littman 1994] Littman, M. L. 1994. Markov games as a
framework for multi-agent reinforcement learning. In ICML,
157 -- 163.
[Maaten and Hinton 2008] Maaten, L. v. d., and Hinton, G.
2008. Visualizing data using t-SNE. Journal of Machine
Learning Research 9(Nov).
[Mirowski et al. 2017] Mirowski, P.; Pascanu, R.; Viola, F.;
Soyer, H.; Ballard, A. J.; Banino, A.; Denil, M.; Goroshin,
R.; Sifre, L.; Kavukcuoglu, K.; et al. 2017. Learning to
navigate in complex environments. ICLR.
[Mnih et al. 2013] Mnih, V.; Kavukcuoglu, K.; Silver, D.;
Graves, A.; Antonoglou, I.; Wierstra, D.; and Riedmiller,
M. 2013. Playing Atari with Deep Reinforcement Learn-
ing. arXiv preprint arXiv:1312.5602v1.
[Mnih et al. 2016] Mnih, V.; Badia, A. P.; Mirza, M.; Graves,
A.; Lillicrap, T.; Harley, T.; Silver, D.; and Kavukcuoglu,
K. 2016. Asynchronous methods for deep reinforcement
learning. In ICML, 1928 -- 1937.
[Palmer et al. 2018] Palmer, G.; Tuyls, K.; Bloembergen, D.;
and Savani, R. 2018. Lenient Multi-Agent Deep Reinforce-
ment Learning. In AAMAS.
[Rabinowitz et al. 2018] Rabinowitz, N. C.; Perbet, F.; Song,
H. F.; Zhang, C.; Eslami, S. M. A.; and Botvinick, M. 2018.
Machine Theory of Mind. In ICML.
[Raileanu et al. 2018] Raileanu, R.; Denton, E.; Szlam, A.;
and Fergus, R. 2018. Modeling Others using Oneself in
Multi-Agent Reinforcement Learning. In ICML.
[Resnick et al. 2018] Resnick, C.; Eldridge, W.; Ha, D.;
Britz, D.; Foerster, J.; Togelius, J.; Cho, K.; and Bruna,
J. 2018. Pommerman: A multi-agent playground. AIIDE
Multi-Agent Workshop.
[Resnick et al. 2019] Resnick, C.; Raileanu, R.; Kapoor, S.;
Peysakhovich, A.; Cho, K.; and Bruna, J. 2019. Backplay:"
man muss immer umkehren". AAAI-19 Workshop on Rein-
forcement Learning in Games.
[Schadd, Bakkes, and Spronck 2007] Schadd, F.; Bakkes, S.;
and Spronck, P. 2007. Opponent modeling in real-time strat-
egy games. In GAMEON, 61 -- 70.
[Shelhamer et al. 2017] Shelhamer, E.; Mahmoudieh, P.; Ar-
gus, M.; and Darrell, T. 2017. Loss is its own reward: Self-
supervision for reinforcement learning. ICLR workshops.
[Suddarth and Kergosien 1990] Suddarth, S. C., and Ker-
gosien, Y. 1990. Rule-injection hints as a means of im-
proving network performance and learning time. In Neural
Networks. Springer. 120 -- 129.
[Tampuu et al. 2017] Tampuu, A.; Matiisen, T.; Kodelja, D.;
Kuzovkin, I.; Korjus, K.; Aru, J.; Aru, J.; and Vicente, R.
2017. Multiagent cooperation and competition with deep
reinforcement learning. PLOS ONE 12(4):e0172395.
[Torrado et al. 2018] Torrado, R. R.; Bontrager, P.; Togelius,
J.; Liu, J.; and Perez-Liebana, D. 2018. Deep Reinforce-
ment Learning for General Video Game AI. arXiv preprint
arXiv:1806.02448.
[Tuyls and Weiss 2012] Tuyls, K., and Weiss, G. 2012. Mul-
tiagent learning: Basics, challenges, and prospects. AI Mag-
azine 33(3):41 -- 52.
[Zahavy, Ben-Zrihem, and Mannor 2016] Zahavy, T.; Ben-
Zrihem, N.; and Mannor, S. 2016. Graying the black box:
Understanding DQNs. In ICML.
[Zhao and Szafron 2009] Zhao, R., and Szafron, D. 2009.
Learning character behaviors using agent modeling in
games. In AIIDE.
[Zheng et al. 2018] Zheng, Y.; Meng, Z.; Hao, J.; Zhang, Z.;
Yang, T.; and Fan, C. 2018. A deep bayesian policy reuse
approach against non-stationary agents. In NeurIPS. 962 --
972.
|
1804.04202 | 2 | 1804 | 2018-06-18T13:52:12 | Controlling Swarms: A Programming Paradigm with Minimalistic Communication | [
"cs.MA"
] | Inspired by natural swarms, numerous control schemes enabling robotic swarms, mobile sensor networks and other multi-agent systems to exhibit various self-organized behaviors have been suggested. In this work, we present a Wave Oriented Swarm Programming Paradigm (WOSPP) enabling the control of swarms with minimalistic communication bandwidth in a simple manner, yet allowing the emergence of diverse complex behaviors and autonomy of the swarm. Communi cation in the proposed paradigm is based on "ping"-signals inspired by strategies for communication and self organization of slime mold (dictyostelium discoideum) and fireflies (lampyridae). Signals propagate as information-waves throughout the swarm. We show that even with 1-bit bandwidth communication between agents suffices for the design of a substantial set of behaviors in the domain of essential behaviors of a collective. Ultimately, the reader will be enabled to develop and design a control scheme for individual swarms. | cs.MA | cs |
Controlling Swarms: A Programming Paradigm with
Minimalistic Communication
Joshua Cherian Varughese* · Hannes
Hornischer* · Payam Zahadat · Ronald
Thenius · Franz Wotawa · Thomas
Schmickl
Abstract Inspired by natural swarms, numerous control schemes enabling robotic
swarms, mobile sensor networks and other multi-agent systems to exhibit various
self-organized behaviors have been suggested. In this work, we present a Wave Ori-
ented Swarm Programming Paradigm (WOSPP) enabling the control of swarms
with minimalistic communication bandwidth in a simple manner, yet allowing the
emergence of diverse complex behaviors and autonomy of the swarm. Communi-
cation in the proposed paradigm is based on "ping"-signals inspired by strategies
for communication and self organization of slime mold (dictyostelium discoideum)
and fireflies (lampyridae). Signals propagate as information-waves throughout the
swarm. We show that even with 1-bit bandwidth communication between agents
suffices for the design of a substantial set of behaviors in the domain of essential
behaviors of a collective. Ultimately, the reader will be enabled to develop and
design a control scheme for individual swarms.
Keywords Swarm control · Programming paradigm · Bio-inspired · Self-
organization · Agent based modeling · Mobile sensor network
1 Introduction
Nature teems with various kinds of life forms with varying individual capabilities.
Many of these lifeforms have been found to depend not only on individual capa-
bilities but especially on emergent group dynamics. Moving around as a swarm
of individuals permits hunting together, foraging more efficiently, sharing food or
* these authors contributed equally to this work; order of their listed names was chosen ran-
domly
Joshua Cherian Varughese, Hannes Hornischer, Ronald Thenius and Thomas Schmickl
Institut fur Biologie
Karl Franzens Universitat Graz
E-mail: [email protected]
Joshua Cherian Varughese and Franz Wowtawa
Institut fur Softwaretechnologie
Technische Universitat Graz
E-mail: [email protected]
2
Varughese, Hornischer, Zahadat, Thenius, Wotawa, Schmickl
collaborative defense against predators to increase their collective probability of
survival and reproduction [14]. Fish increases their individual probability of sur-
vival by moving in schools and collectively performing escape maneuvers when a
predator is detected by one of the fish [5, 16]. The foraging efficiency of a hive
increases dramatically when bees perform waggle dances [43, 35] to inform other
bees about food sources in the vicinity. The synchronized blinking of fireflies [6, 7]
and the aggregation of slime mold cells to form a slug [13, 36] are other examples
of lifeforms relying on collective abilities for foraging and reproduction.
Various kinds of lifeforms with varying physical and cognitive complexity evolved
to perform decentralized behaviors in order to ensure greater probability of sur-
vival. The part each individual has to play in such emergent behaviors is often
simple, yet the result that emerges on a group level is resilient to failures of indi-
viduals or other disruptive events [23]. Numerous natural swarms following simple
behaviors of its individuals are scalable and can therefore consist of hundreds,
thousands or even millions of individual entities [20, 37].
The simplicity and decentralized nature of the individual's behaviors produc-
ing resilient collective phenomena have attracted interest from engineers seeking
to inherit properties of simplicity, resilience, scalability in engineered systems. Sev-
eral optimization algorithms relying on emergent behaviors have been proposed
and successfully implemented[34, 19, 44]. "Particle swarm optimization" [19] is an
optimization algorithm, inspired by flocks of birds, which is being used for multi
objective optimization. BEECLUST [34] is an optima finding algorithm, inspired
by a swarm of newly hatched bees, that can be used to find global optima. Nu-
merous algorithms [32, 21, 17, 45] enabling simple agents to accomplish complex
tasks such as source localization [17], task allocation [21, 45], collective mapping
et cetera have been developed. In [32, 12], swarm intelligent algorithms are pro-
posed that enable robots with very limited individual abilities to transport large
objects in a collective manner. In [17], a distributed algorithm for localizing the
source of an odor in an environment is proposed and tested on a swarm of robots.
Apart from enabling a group of simple robots to perform complex tasks, vari-
ous algorithms and methods have been suggested to control a swarm of robots
of varying sizes to perform specific actions and tasks in a coordinated manner
such as arranging themselves in a particular shape or responding collectively to
external cues or stimuli [9, 22, 33]. In this paper a paradigm for controlling a
group of agents is introduced and presented, using communication based on waves
of single bit signals, or "pings" propagating through the swarm. The single bit
pings propagating through the swarm is analogous to scroll waves of cAMP sig-
nals propagating through a swarm of dictyostelium discoideum while the periodic
initiation of ping signals is inspired by lampyridae. WOSPP enables a swarm of
agents with directional communication and locomotive capabilities to synchronize,
elect a leader, estimate the number of members in the swarm, localize the center
of the swarm, aggregate etc. In addition, a meta control scheme that enables a
user to combine individual behaviors to produce more complex swarm behaviors
is presented. In order to put this work into context of the current state of the art,
related algorithms and approaches will be discussed briefly in Section 2.
Generally, in contrast to existing approaches for swarm control, the paradigm
presented in this work allows a swarm to inherit rich self organized collective
behaviors. Instead of complex messages or encoded signals solely one-bit commu-
nication suffices for the presented behaviors and ultimately allows the design of
Controlling Swarms: A Programming Paradigm with Minimalistic Communication
3
both top-down control interfaces and autonomous swarms. The basic communica-
tion behavior of the paradigm presented in this paper has already been used for
producing gradient taxis[42]. Its basic concept as well as several behaviors have
been explored in [39].
In this paper, a substantial set of behaviors in the domain of essential behaviors
of a collective is presented and an extensive literature review is conducted in order
to place the presented paradigm into perspective of existing work. For all presented
behaviors the detailed structure and its design is described giving the reader an
intuitive understanding of how to develop and design basic behavioral building
blocks, which will be referred to as "primitives".
Since each individual application of swarm control requires a specific set of be-
havioral abilities, depending on the swarm members' abilities, their environmental
conditions and their tasks the primitives have to be constructed or adjusted in
a fitting manner. Primitives serve as a basis for a meta control scheme and can
be combined in various ways in order to produce complex collective behaviors as
shown in Figure 1. Ultimately, the reader will be enabled to design primitives and
thus construct a meta control scheme for a swarm.
In Section 2, a literature review of relevant research is presented. Subsequently,
in Section 3 the bioinspiration for the communication mechanism from slime
mold and fireflies is presented. In Section 4, the communication mechanism of
the paradigm presented in this paper is introduced as well as the fundamental
concept of the paradigm. In Section 5 a set of primitives is introduced, classified
into three categories: internal organization, swarm awareness and locomotion. In
Section 6 possible methods for combining primitives and resulting complex behav-
iors are presented1.
Fig. 1 Schematic illustration of a meta control scheme. Every agent in WOSPP follows a fixed
basic operational structure. Behavioral changes are only introduced through minor changes in
two designated "codeBlocks", as presented later. This structure allows the coherent design of
fundamental behaviors or "primitives" and thus the development of a meta control interface
for controlling the swarm.
1 All primitives presented in this paper have been simulated using Python 3.6.3
4
Varughese, Hornischer, Zahadat, Thenius, Wotawa, Schmickl
2 Related Research
In the field of controlling groups of entities, there is already a variety of approaches
and previous work with diverse foci.
In [22], a classical approach to controlling a swarm is employed where users can
interact with and control a swarm of certain robots, referred to as "zooids", using
gestures. The authors achieved a responsive swarm using an external projector for
tracking the robots position, assigning a goal position for each individual robot
and then utilizing classical motion control strategies like Proportional-Integral-
Derivative (PID) control to move the agents precisely from the start position to
the goal position. Where as the programmer has control of the precise movements
of the swarms members, the presence of a higher organizational entity is inherently
necessary and thus depicts a classical example of top down control. There is a sub-
stantial amount of work related to controlling groups of entities. In the pioneering
work of Craig Reynolds, he introduced self propelled particles known as boids [30]
which exhibit self organized flocking and collision avoidance. Reynold's boids are
able to mimic a flock of birds whose individuals follow simple behavioral rules.
Due to its simplicity and decentralized structure it is applicable to large swarms.
Its focus is on the generation of realistic behaviors as found in natural flocks and
hence limited in its versatility.
In [26] a concept of self propelled particles with internal oscillators, or "swar-
mallators" is introduced. Attractive and repulsive forces are then used in relation
to the relative phase shift of the oscillators for generating a range of collective
behaviors. The internal processes and states of the swarms' entities substantially
influence and determine the interplay between individuals producing a small set
of collective phenomena.
In [24], the authors introduce an algorithm for self assembly of identical agents
on a surface into a predetermined global shape. Multiple gradients are developed
by propagating messages starting from the agents at the edges in order to develop a
relative positioning system among the agents. Subsequently, various shapes can be
generated by manipulating the behavior of agents with particular gradient values.
More complex shapes are achieved by repeating the process of generating gradients
and folding along the specific areas of interest. A variation of the aforementioned
idea was used to assemble various shapes in a self organized manner in a thousand
robot swarm [33]. In [1], programmable self assembly and other similar research
done by various researchers were unified as amorphous computing.
Among existing work, the paradigm presented in this paper exhibits most par-
allel characteristics with the approaches presented under amorphous computing,
however significantly differs in several points. Instead of multi-bit signals encoding
information, as used for communication in amorphous computing, the presented
paradigm already produces rich behavioral diversity with single bit communica-
tion. Another key difference between is that the presented paradigm refrains from
using "seed" agents[25] or global knowledge regarding edges and vertices in case of
programmable self assembly for origami generation. Instead agents initiate com-
munication with the rest of the swarm decentralized and randomly. In amorphous
computing, languages such as Origami Shape Language (OSL) [24], Growing Point
Language (GPL) [10] are utilized in order to enable a user to program a swarm.
In this paper, the proposed paradigm will be used to program a swarm to perform
Controlling Swarms: A Programming Paradigm with Minimalistic Communication
5
collective behaviors and additionally, a meta control scheme can be designed for
the swarm to perform these behaviors autonomously.
3 Bioinspiration
The programming paradigm presented in this paper takes inspiration from the
communication mechanisms used by slime mold and fireflies. In the following the
relevant aspects of these lifeforms are briefly discussed.
3.1 Slime mold
Slime mold (dictyostelium discoideum), is a free living diploid life form which takes
advantage of swarming behavior to survive challenging environments. Slime mold
has a widely varying cooperation with other cells during its life cycle depending
on the environment. When there are ample food sources, cells grow and divide
individually without cooperation. In case of scarcity of food or other threats, sig-
nificant cooperation between the cells begin. During its cooperative phases, the
individual cells aggregate to form a multicellular organism. And the collective be-
gins to act similar to a single organism. The paradigm presented in this paper
will chiefly consider the signaling behavior of slime mold during the aggregation
of slime mold cells. For aggregating, some cells (centers) release Cyclic Adeno-
sine Monophosphate (cAMP) into the environment to recruit surrounding cells to
join the aggregate. This signal induces a short-lived chemical concentration spike
around the recruiting cells [36]. Other slime mold cells that perceive the chemical
signal will produce the emit the chemical themselves to relay the signal. Since
all slime mold cells relay the chemical signals they receive, the the original signal
produced by the recruiting center rapidly travels through the swarm. Additionally,
each cell needs around 12-15 seconds [2] in between two cAMP signals. During this
insensitive period, individual cells are insensitive to any cAMP pulses. This inter-
mediate insensitive time acts as a "refractory" period that prevents any echoing
between two amoeba cells. The signal relaying mechanism described above forms
the basis for spatio-temporal patterns known as scroll waves. Since the origin of
the waves are at the recruiting cells, the amoeba can move towards the incoming
signal to reach the recruiting center [36].
3.2 Fireflies
Fireflies (lampyridae) are a family of insects that are capable of producing bio-
luminescence to attract a mate or a prey [6]. Bio-luminescence of various families of
fireflies has been a subject of elaborate study in the past [6]. Apart from being able
to blink, fireflies are known to behave in cooperation with other fireflies in order to
attract mates or prey [6]. Such synchronicity is a result of a simple mechanism by
which initially the individual fireflies blink periodically. When a firefly perceives a
blink in its surrounding, it blinks again and then resets its own blinking frequency
to match the received blink [8]. This is analogous to a phase coupled oscillator
which adjusts its phase to match it to that of the faster one in the vicinity. This
6
Varughese, Hornischer, Zahadat, Thenius, Wotawa, Schmickl
trait emerges into a quasi synchronized blinking pattern while the frequency of
blinking will be influenced by the fastest blinking insect.
4 WOSPP - Wave Oriented Swarm Programming Paradigm
The wave oriented swarm programming paradigm WOSPP is strongly inspired by
the two aforementioned organisms slime mold and fireflies.
In particular, communication within the paradigm is based on waves propagat-
ing through a swarm. Every agent within a swarm has the ability of sending and
receiving information signals, which we will refer to as "pings", to nearby agents.
Connected to this, all agents can enter three different states, parallel to the be-
havior of slime mold: An inactive state in which agents are receptive to incoming
signals (responsive to cAMP or "pings"), an active state where they send or relay
a signal (release cAMP or send "ping") and optionally perform an action, which is
followed by a refractory state where agents are temporarily insensitive to incoming
signals. This is schematically shown in Figure 2(a).
(a)
(b)
Fig. 2 (a): Three states of agents in WOSPP: From inactive state, through external trigger
(e.g. incoming ping) or internal trigger (timer) the agent transitions into the active state where
it sends a ping and optionally performs an action. Afterwards, it enters the refractory state,
being insensitive to incoming signal until transitioning into the inactive state again. (b):The
conceptual operating structure of an individual agent. If an agent in the inactive state receives
a ping, it relays the signal by entering the active state and sending a ping itself. Specific to
the primitive a certain code will be executed and the refractory state is entered. If an agent's
internal time is up it will initiate a ping following the same structure, however executing a
different code (specific to the primitive) in the active state.
This operational structure results in a wave like propagation of signals through-
out the swarm. Agents in the inactive state get triggered to relay a signal, while the
refractory state prevents the system from continuously signaling and thus flooding
the system. In Figure 4 the propagation of waves is shown for a swarm of agents,
Controlling Swarms: A Programming Paradigm with Minimalistic Communication
7
each agent represented by a dot with the color denoting their state. The inactive
state is denoted in black, the active state in red and the refractory state in green.
(a)
(b)
(c)
(d)
(e)
(f)
Fig. 3 Illustration of wave based communication. In (a) almost all agents are in the inactive
state, shown in black, except one agent which broadcasts a ping, i.e. enters the active state,
shown in red. It afterwards transitions into the refractory state, shown in green. Neighboring
agents receive the signal and themselves transition into the active state as shown in (b) and
(c). The ping signal spreads in a wave like manner. In (d) the initiating agent transitions from
the refractory state into the inactive state again. Due to a fixed duration of the refractory
state, the transition to the inactive state as well spreads in a wave like manner, shown in (e)
and (f). Times [s]: (a) 0, (b) 2, (c) 4, (d) 11, (e) 16, (f) 19. Parameters (as defined in more
detail at the end of Section 4): number of agents N = 80, physical size of the swarm in units
perception range Rs = 5 r, refractory time in units timesteps tref = 5 s.
The ability of fireflies to adjust and reset their individual frequency of "blink-
ing" is ground to a concept used in this paradigm: internal timers. Every agent
has an internal timer which, when running out, will trigger the agent to enter the
"active" state where it broadcasts a ping, thus initiating a ping wave through the
swarm. For most primitives, this timer is reset right after running out, causing an
agent to repeatedly count down and, subsequently, ping.
This communication structure and the internal timers constitute the basic and
fixed structure of an agent in WOSPP and is shown as pseudo code in Algorithm 1.
This basic structure suffices for the behavior shown in Figure 4 and is fixed for
all agents. However, as will be presented later in this work, complex behavior can
be induced by adding simple command in the codeBlocks. When agents perform
simple actions when relaying or initiating pings, complex behavior can emerge.
This structure is conceptually shown in a flowchart in Figure 2(b). The three
8
Varughese, Hornischer, Zahadat, Thenius, Wotawa, Schmickl
states are marked, as well as two separate operational chains, one for relaying, one
for initiating pings. Both incorporate an optional field for executing the respective
codeBlocks.
For the behaviors, or primitives, presented in this work, agents are not only
able to send and receive pings, but also optionally have a heading and sense of
directionality. Agents are enabled to determine the direction from which they
receive a ping. Furthermore, for some tasks agents have the ability to move in
direction of their heading. Primitives in which the agents move requires agents to
move sufficiently slow in order to avoid single agents being left behind or splitting
the swarm up into smaller groups. The agents are considered as point particles
and thus collision detection is ignored within this work since it is highly specific
for each individual swarm and its environmental conditions. Aside from primitives
shown in this paper a large variety of behaviors can be developed, incorporating
abilities and environmental sensors of agents not discussed here. This work gives
a fundamental introduction into the concept for enabling a modular design and
development of primitives for swarm control tailored to specific conditions and
tasks of a swarm.
Regarding communication bandwidth, for the individual primitives presented
in this work exclusively single-bit communication is considered in order to show
that even for the minimum communication case remarkable behaviors can be pro-
duced. The use of multi-bit communication instead of pings would further increase
the possibilities for swarm control. Multi-bit communication is discussed in Sec-
tion 6 and in the discussion.
For the simulations presented in this work only swarms with agents spatially
distributed in two dimensions in an approximately circular shape were used. This
is chosen as a general shape without loss of generality, it does not limit or affect
functionality of WOSPP regarding shape or spatial dimension of swarms.
In the following parameters and quantities used in this work are introduced
and defined.
– In the numerical simulations presented here, time is measured in timesteps s.
An agent receiving a ping will be activated and itself send a ping one timestep
tactivate = 1 s later.
p
– Every agent has an internal timer tp which usually periodically resets to a
. However, for some primitives however the timer can be reset
maximum tmax
to a random number between tp ∈ (0, tmax
– The number of agents constituting a swarm is defined as N . The minimum N
necessary for the presented primitives to function is N = 2. The maximum can
theoretically be arbitrarily large, as further elaborated in the discussion.
p
].
– The refractory time tref denotes the time an agent remains in the refractory
state, i.e. insensitive to incoming pings. For the presented simulations tref is
set to be larger than the time a signal would take to propagate at the edge
of the swarm in a circular manner. This is for preventing a ping wave from
continuously propagating through the swarm.
– For distances the basic unit is perception range of agents r, the distance up to
which an agent will perceive the pinging of a nearby agent.
– For primitives including locomotion, agents take discrete spatial steps within
a timestep, where the length of their step d is set to one-sixth of a perception
range d = r/6.
Controlling Swarms: A Programming Paradigm with Minimalistic Communication
9
– The physical size of the swarm is defined as Rs and will be given in units
perception range r.
Data: Paradigm parameters
Result: -
state ← inactive;
timer(tp) ← random integer ∈ (0, tmax
while primitive do
p
];
decrement timer(tp);
if agent in refractory state then
wait for refractory time;
if refractory time is over then
state ← inactive
end
end
if agent in active state then
broadcast ping;
state ← refractory
end
if agent in inactive state then
listen for incoming pings;
if ping received then
state ← active;
execute Relay-CodeBlock;
end
end
if timer(tp) ≤ 0 then
state ← active;
execute Initiate-CodeBlock;
end
end
Function Initiate-CodeBlock
-
Function Relay-CodeBlock
-
Algorithm 1: Basic pseudo code for every individual agent within WOSPP.
This structure is fixed, behavioral changes are only introduced through adding
commands to the initiate- and relay-codeBlocks, here highlighted. The timer tp
is initially set to a random value with upper limit tmax
.
p
5 Primitives
In this section a set of primitives is presented where small changes in the code-
Blocks produce large scale complex behavior. For every primitive plots of results
for intuitively visualizing the behavior are presented, as well as the code-block.
The presented primitives are divided into three categories:
10
Varughese, Hornischer, Zahadat, Thenius, Wotawa, Schmickl
1. Internal organization is about self organization of the swarm on an internal
level of each agent, including the primitives "leader election", "synchroniza-
tion" and "localize object".
2. Swarm awareness includes the individuals awareness about properties of the
swarm or properties of itself within the swarm. Presented are the primitives
"localize swarm center", "estimating number of swarm members" and "esti-
mate individual position within swarm".
3. The category locomotion is about physically self organizing or restructuring
the swarm, including the primitives "aggregation", "moving collectively" and
"gas expansion".
In the following, if not stated otherwise, every swarm is initially randomly
distributed within a circular area of radius Rs such that every agent is connected
to at least one neighbor.
5.1 Internal organization: Leader election
For various tasks it can be beneficial or even necessary for a swarm to have a cer-
tain agent "leading" a swarm. Having a certain agent assigned as a special entity
brings the risk of having this agent removed from a swarm and thus disabling the
entire swarm. Instead the swarm can collectively elect a leader thus eliminating
such risks. For deciding for a leader, initially all agents consider themselves po-
tential leaders, shown in Figure 4(a) in black. An agent pinging is illustrated in
red and an agent not considering itself a leader anymore is green. Every agent
sets its timer to a random number within tp ∈ (0, tmax
]. As soon as an agent
receives a ping before its own internal timer ended it will not consider itself a
candidate anymore and also deactivate its internal timer, i.e. not initiate ping-
ing. After an agent initiated a ping it will again randomly choose a time tp for
initiating pinging another time. This is shown as pseudo code in Algorithm 2.
p
Data: Paradigm parameters
Result: Leader election
unction Initiate-CodeBlock
. . F
Function Relay-CodeBlock
candidate ← true;
timer(tp) ← random integer ∈ (0, tmax
deactivate internal timer;
candidate ← false;
p
];
Algorithm 2: Code block for primitive "Leader election"
Figure 4(b) and (c) show agents initiating ping waves and immediately out-
rivaling their surrounding agents. The refractory mode prevents two initiating
agents from outrivaling each other, however more than one can be left as potential
leaders, as shown in Figure 4(d). Since every remaining candidate again chooses
a random time to ping, after few "negotiation cycles" a single candidate, which
then can be considered the leader, will remain, as shown in Figure 4 (e) and (f).
Alternative approaches for leader election in groups e.g. based on voting [18] as
well as decentralized probabilistic methods [4] can be found in the literature.
Controlling Swarms: A Programming Paradigm with Minimalistic Communication
11
(a)
(b)
(c)
(d)
(e)
(f)
Fig. 4 Leader election in a swarm. Candidates are shown in black, pinging agents in red and
agents not considering themselves candidates in green. Initially all agents consider themselves
candidates or potential leaders (a). After receiving and relaying a ping an agent will not
consider itself a candidate anymore. Agents initiating pinging thus outrival agents around
them. In (b)-(d) it is illustrated how several agents initiate pinging and not outrival each other
(due to refractory time). Since only candidates will initiate pinging, the remaining candidates
then repeat the process, indicated in (e) until only a single candidate remains, as shown in (f).
Times [s]: (a) 0, (b) 5, (c) 8, (d) 30, (e) 41, (f) 189. Parameters: N = 200, Rs = 6 r, tref = 10 s,
tmax
p
= 100 s.
5.2 Internal organization: Synchronization
For a swarm being able to perform coordinated actions it often is essential to syn-
chronize regarding their respective tasks. This primitive allows the swarm mem-
bers to synchronize regarding e.g. the sending of pings, allowing to perform actions
quasi-simultaneously.
p
Every agent sets its internal counter to a random value between tp ∈ (0, tmax
].
If an agent receives a ping, it resets its internal counter to tmax
. This is shown as
pseudo code in Algorithm 3. As a result, the first agent sending a ping (which is
then being relayed and propagates through the system wave-like) resets the timers
of all relaying agents to the maximum tmax
. Hence, the entire swarm will ping
quasi-simultaneously within a time period smaller or equal to the duration of a
ping propagating from one end of the swarm to the other. In Figure 5(a) the syn-
chronization process for a swarm of N = 15 agents is shown via an order parameter
∆φmax which decreases with increasing synchronicity within the swarm. ∆φmax
is calculated by determining the smallest phase interval containing the timers of
all agents and then taking the maximum phase difference of all timer pairs. At
p
p
12
Varughese, Hornischer, Zahadat, Thenius, Wotawa, Schmickl
t = 30 s the onset of synchronization is indicated with a gray vertical line. In
Figure 5(b) the corresponding internal timers of all agents are shown, incremen-
tally decreasing with time. Every line of points represents the internal timer of
one agent. At t = 30 s an agent initiates pinging and thus resets the timers of all
other agents such that at t = 35 s all agents reset and thus synchronized. Alter-
native approaches to synchronization in swarms employs pulse coupled oscillators
inspired by fireflies [27, 28].
Data: Paradigm parameters
Result: Synchronized Swarm
unction Initiate-CodeBlock
timer(tp)← tmax
timer(tp)← tmax
Function Relay-CodeBlock
p
p
Algorithm 3: Code block for primitive "Synchronization". The entire pseudo
code for each agent is shown. The highlighted part is the pseudo code which
differs for every primitive. For all other primitives presented here only the latter
part will be shown.
;
;
. . F
(a)
(b)
Fig. 5 (a): Onset of synchronized internal timers at t ≈ 30 of a swarm of N = 15 agents,
indicated with a gray vertical line. The order parameter ∆φmax is plotted against simulation
time t. ∆φmax is calculated by determining the smallest phase interval containing the timers
of all agents and then taking the maximum phase difference between two timers. After fully
synchronizing at t ≈ 36 s the maximum phase difference decreased from ∆φmax ≈ 4.4 rad
to ∆φmax ≈ 0.25 rad which corresponds to a time interval of ∆t ≈ 4 s. This interval can be
identified in (b), where the internal timers of the agents versus simulation time is shown. Every
line of data points corresponds to the internal timer of a single agent, which incrementally
counts down. All timers gradually decrease until at t = 30 s an agent's timer reaches tp = 0
and thus initiates pinging. This marks the onset of the synchronization process and is marked
with a gray vertical line. All agents relaying the ping then reset their timers. The reset signal
propagates through the swarm and at t = 35 s all agents reset and collectively count down in
a quasi-synchronous manner, that is, within a time interval of ∆t = 4 s. Parameters: N = 15,
Rs = 1.67 r, tref = 20 s, tmax
= 100 s.
p
Controlling Swarms: A Programming Paradigm with Minimalistic Communication
13
5.3 Internal organization: Localize object
For distributing information about spatial structure of the surrounding, a swarm
needs to be able to communicate the location of nearby objects or events among
its members. This primitive enables a swarm to collectively localize the direction
of a direct path towards an object which one or few members of the swarm detect.
Each agent refrains from initiating pinging unless it itself detects an object. Every
agent receiving a ping, records the direction of the incoming ping. An estimate of
the direction towards the object is then obtained by taking a running average of
the directions of incoming pings. The pseudo code is shown in Algorithm 4.
Figure 6 shows the agents estimate of the rough location of the object as arrow,
placed at the position of the agent within the swarm. The red square represents an
object which can only be detected by agents in its vicinity. Figure 6 (a) shows the
initial (random) orientation of the agents. With increasing number of perceived
pings, the estimate of direction towards the object increases in accuracy until
agents accurately point towards the position of the object as shown in Figure 6
(b).
Data: Paradigm parameters
Result: Agent knows rough direction of an object
state ← inactive;
end
Function Relay-CodeBlock
record ping direction;
current estimate ← average ping directions
Algorithm 4: Code block for primitive "Localize object"
(a)
(b)
];
unction Initiate-CodeBlock
timer(tp) ← random integer ∈ (0, tmax
if no object detected then
p
. . F
Fig. 6 The arrows representing the agents estimation of the location of the object, the begin-
ning of the arrow denotes the position af an agent. (a): The estimate is initialized to random
direction at the start of the simulation. (b): The converged estimation of the location of
the object after one tmax
. All agents now point towards the object. Parameters: N = 100,
Rs = 3.34 r, tref = 5 s, tmax
= 2500 s.
p
p
14
Varughese, Hornischer, Zahadat, Thenius, Wotawa, Schmickl
5.4 Swarm awareness: Localize swarm center
For a swarm being able to execute spatially coordinated actions the knowledge
of the individual about the location of the center of the swarm can be of great
advantage. This primitive enables each swarm member to identify the direction
from where most signals originate from, which will be referred to as Average Origin
of Pings, or AOP. For a swarm of the presented type (circular, approximately
homogeneously distributed, agents have several communication neighbors) this
direction coincides with the direction towards the physical center of the swarm.
Each agent sets its internal counter tp to a random value between tp ∈ (0, tmax
],
as soon as a counter reaches tp = 0 an agent will send a ping. When an agent
receives a ping it stores the direction of the incoming ping and averages over all
stored directions. This is shown as pseudo code in Algorithm 5.
p
Data: Paradigm parameters
Result: Agent knows rough direction of swarm center
unction Initiate-CodeBlock
. . F
Function Relay-CodeBlock
center estimate ← mean of previous estimates;
timer(tp) ← random integer ∈ (0, tmax
record ping direction;
current estimate ← average ping directions
Algorithm 5: Code block for primitive "Localize swarm center"
];
p
After one cycle every agent once initiated a ping wave, unless a ping was
initiated while all surrounding agents were in refractory state and thus the ping
not relayed. Figure 7 shows a swarm in its initial state and after it equilibrated
where every agent's orientation is denoted by an arrow at the position of the agent
in the swarm. Initially the heading is random. After equilibrating, the agents on
the outside accurately point towards the center of the swarm.
(a)
(b)
Fig. 7 Agents estimation of the direction towards the center of the swarm. The beginning of
an arrow denotes the position of an agent. (a) shows the initial estimates of each agent as arrow
at its position in the swarm. (b) shows the converged estimates after t = 4 tmax
. Parameters:
N = 100, Rs = 3.34 r, tref = 5 s, tmax
= 2500 s
p
p
Controlling Swarms: A Programming Paradigm with Minimalistic Communication
15
5.5 Swarm awareness: Estimating number of swarm members
For some tasks a swarm may needs to be constituted of a certain number of agents
in order to effectively operate. Or a swarm may needs check if the number of its
members substantially changed, due to loss of members or merging with another
swarm. This problem can be solved without an external observer as the swarm can
estimate its number of swarm members autonomously. Each agent sets its internal
counter tp to a random value between tp ∈ (0, tmax
]. Whenever an internal timer
is up, an agent will initiate pinging and randomly reset its timer to tp ∈ (0, tmax
].
Each time an agent receives a ping it relays the signal and increments a counter
Ncount.
p
p
Furthermore, every time an agent initiates pinging, i.e. one internal cycle has
passed, it will store its counter Ncount as its estimate of the number of swarm
members for the past cycle. The average over those estimates will be the agent's
opinion of the number of members in the swarm Nest. This is shown as pseudo
code in Algorithm 6.
Data: Paradigm parameters
Result: Agent knows approximate number of members in the swarm
unction Initiate-CodeBlock
. . F
estimate(Nest) ← mean of previous swarm size counters;
counter(Ncount) ← 0;
timer(tp) ← random integer ∈ (0, tmax
increment counter Ncount;
Function Relay-CodeBlock
];
p
Algorithm 6: Code block for primitive "Estimating number of swarm members"
In Figure 8 the estimate Nest averaged over all members of a swarm versus
simulation time is shown. The estimate quickly increases before slowly converging
to Nest ≈ 34. The error bars represent the standard deviation thus indicating
that the estimates of all agents are closely distributed around the mean. For the
data in Figure 8, a swarm of 50 agents was building estimates over a time of
20 · tmax
= 20 · 1000 s, so 2 · 104 timesteps. The estimate converges to a value
significantly lower than the actual number of swarm members however, for the
same swarm the estimate consistently converges to the same (lower) estimate.
p
16
Varughese, Hornischer, Zahadat, Thenius, Wotawa, Schmickl
Fig. 8 Estimated number of swarm members averaged over all agents in the swarm versus
time. The error bars represent the standard deviation. The estimate steeply increases from
Nest = 0 to Nest = 30 at t = 3 tmax
before it gradually converges to its final estimate of
Nest ≈ 34. Parameters: N = 50, Rs = 3.34 r, tref = 5 s, tmax
= 1000 s.
p
p
Figure 9 shows the percentage deviation Nerr from the actual number of swarm
. For every
, sufficiently long for the estimate to
members N depending on the maximum possible cycle length tmax
data point the simulation was run for 25tmax
converge.
p
p
Fig. 9 Percentage deviation of estimated number of agents in the swarm versus maximum
cycle length and the actual number of agents in the swarm. Agents consistently underestimate
the number of members of the swarm. The deviation decreases for decreasing N and increasing
tmax
∈ 100, 200, .., 1500 s.
p
. Parameters used: N ∈ {10, 20, .., 100}, Rs = 1 r, tref = 5 s, tmax
p
With increasing tmax
the deviation from the actual number of members of the
swarm decreases. Knowing the order of magnitude of N of a swarm, the tmax
can
be chosen sufficiently large such that the deviation sufficiently small. For instance,
p
p
Controlling Swarms: A Programming Paradigm with Minimalistic Communication
17
considering a swarm of a maximum of 30 agents of the presented kind, a maximum
cycle length of tmax
> 1500 would ensure a deviation of around Ndev = 10 %.
p
However, a general corrective function for determining the approximate sys-
tematic deviation from the actual number of agents in the swarm can be developed,
though this will not be further discussed in this work.
5.6 Swarm awareness: Estimate individual position within swarm
Some actions require the agents in a swarm to determine their relative position
within the swarm. Considering for example a swarm protecting itself from environ-
mental hazards, requiring only the agents at the edge or outer shell of the swarm
to take measures, it is necessary for each individual agent to learn about their
approximate relative position. For this, each agent sets its internal timer tp to a
random value between tp ∈ (0, tmax
]. As previously explained, this will result in
agents randomly pinging at random time slots and each agent relays the received
pings to nearby agents. The agents then bin each of the pings received into four
directions of α = 90◦ each. If there is at least one empty bin with no pings re-
ceived, then the agents perceives itself as being on the periphery of the swarm.
Pseudo code is shown in Algorithm 7.
p
Data: Paradigm parameters
Result: Agent knows if it is at the periphery
if Is at least one bin empty? then
unction Initiate-CodeBlock
. . F
else
periphery ← true;
periphery ← false;
Function Relay-CodeBlock
end
timer(tp) ← random integer ∈ (0, tmax
record ping direction;
bin incoming ping directions into bins of 90◦;
p
];
Algorithm 7: Code block for primitive "Localize object"
Figure 10 shows the perception of agents regarding their position in the swarm.
Initially, no agents perceive if they are at the periphery of the swarm, denoted
through the black color of agents in Figure 10(a). As agents receive more pings
from the surrounding agents, they are able to have more accurate estimate of its
own position within the swarm as shown in Figure 10(b) where red colored agents
perceive that they are at the periphery of the swarm.
18
Varughese, Hornischer, Zahadat, Thenius, Wotawa, Schmickl
(a)
(b)
Fig. 10 Figures show the agents perception of their location within the swarm. Red colored
agents perceive that they are on the periphery and the black colored agents perceive them not
being on the periphery. (a), shows the initialization at the start of the simulation with all agents
perceiving themselves as "not being at the periphery". (b) shows the converged perception of
the agents after 10 tmax
. Parameters: N = 100, Rs = 4 r, tref = 5 s, tmax
p
p
= 2500 s
Another approach, enabling agents to estimate their distance from the average
origin of pings is to let agents collect the number of incoming pings per direc-
tional bin and then merge the four bins into two in a way, such that two bins of
α = 180◦ arise, one with the minimum count of received pings, the other half with
the maximum. With increasing number of members in a swarm the accuracy of this
approach increases. A large variety of approaches for localization within a swarm
can be found in the literature. Some of the established methods use Kalman Filter-
ing [31], Monte Carlo Localization [15] or localization based on local information
[11].
5.7 Locomotion: Aggregation
Considering a swarm of agents with the ability to move and spatially arrange itself,
for regrouping it needs to be able to gather or aggregate. For that every agent
randomly sets its internal counter tp to a random value between tp ∈ (0, tmax
].
An agent receiving a ping will, after relaying it, move a small distance towards the
incoming ping. This way, gradually all agents move towards each other. Pseudo
code is shown in Algorithm 8.
p
Figure 11 shows a swarm aggregating in such manner. From its initial state the
swarm steadily moves towards its average origin of pings, causing it to aggregate
at the center of the swarm. Figure 11(d) shows the aggregated state of the agents
as well as each agents trajectory as blue line. This illustrates how agents tend
to follow the paths of their fellow members of the swarm, producing a root-like
trajectory structure.
For illustrating the aggregation process, Figure 12 shows in blue the average
root mean square distance of all agents to the center, i.e. the average position of
all agents at that time. In red the same quantity averaged over 20 independent
simulations is shown.
Controlling Swarms: A Programming Paradigm with Minimalistic Communication
19
Data: Paradigm parameters
Result: Aggregated swarm
Algorithm 8: Code block for primitive "Aggregation"
(a)
(b)
(c)
(d)
Fig. 11 Aggregation of the swarm. Initial state of the swarm is shown in (a), in (b) and (c)
it steadily aggregates. The final state and trajectories of each agent for the entire simulation
as blue lines are shown in (d). Times [tmax
]: (a) 0, (b) 0.7, (c) 1.4, (d) 2. Parameters: N = 80,
Rs = 2 r, tref = 10 s, tmax
= 500 s.
p
p
Fig. 12 Average root mean square distance of all agents from the center of the swarm plot-
ted against time. The blue graph shows the Rrms of the swarm in the simulation shown in
Figure 11. The Rrms linearly decreases until tmax
≈ 1 when the swarm almost fully aggre-
gated. If looked at in close, the linear decrease occurs in quasi-discrete steps, corresponding to
ping waves causing all agents to move towards each other quasi-simultaneously. Parameters:
N = 80, Rs = 2 r, tref = 10 s, tmax
= 500 s.
p
p
timer(tp) ← random integer ∈ (0, tmax
timer(tp) ← tmax
record ping direction;
Calculate average of incoming pings;
move towards incoming ping;
p
p
];
. . F
unction Initiate-CodeBlock
Function Relay-CodeBlock
;
20
Varughese, Hornischer, Zahadat, Thenius, Wotawa, Schmickl
Considering, a swarm needs to aggregate at a specific location, e.g. for measur-
ing or exploring a certain area or object, the primitive can be changed such that
only certain agents, which for example perceive stimuli such as the presence of an
object, are able to initiate pinging. This is shown in Figure 13. The stimulus can
also be an event or can be connected with a gradient. Considering agents with the
ability to perceive e.g. light intensity, the agents will be able to aggregate at the
brightest spot if every agent sets its internal counter to a value proportional to its
perceived brightness. The agents at the brightest spots will statistically ping first.
Furthermore, every agent receiving a ping will reset its counter thus allowing the
agents at the brightest spot to hijack the swarm. This process executed repeatedly
will result in a gradient taxis behavior as presented in [42]. It is worth noting that
various approaches for aggregation in swarms have been developed and presented
based on differing mechanisms and varying levels of complexity [40, 3, 34].
(a)
(b)
(c)
(d)
Fig. 13 A swarm aggregating at an object, marked as red square on right hand side of the
shown system. Initial state of the swarm is shown in (a). The swarm gradually aggregates at
the object in (b) and (c) until every agent directly perceives the object in (d). Also shown
are the trajectories for the entire simulation as blue lines. Times [tmax
]: (a) 0, (b) 10, (c) 20,
(d) 64. make the object square and bigger to make it more different from agents.
Parameters: N = 80, Rs = 3.34 r, tref = 15 s, tmax
= 50 s.
p
p
Controlling Swarms: A Programming Paradigm with Minimalistic Communication
21
5.8 Locomotion: Moving collectively
For the mobility of a swarm the ability to collectively move to a specific location
can be crucial. For letting the entire swarm move towards a certain direction, a
single agent serves as leader. Exclusively this leader initiates pings and gradually
moves along a trajectory leading to the target location. All agents receiving pings
will move towards the direction of it and thus follow the leader. The pseudo code
is shown in Algorithm 9.
Data: Paradigm parameters
Result: Swarm follows a leader
unction Initiate-CodeBlock
. . F
Function Relay-CodeBlock
p
leader ← true;
timer(tp) ← random integer ∈ (0, tmax
deactivate timer;
leader ← false;
record ping direction;
calculate average of incoming pings;
move towards incoming ping;
];
Algorithm 9: Code block for primitive "Moving collectively"
Figure 14 shows a swarm aggregating towards a leader located at the far right
end of the swarm,which steadily moves towards the right. While following the
leader, the remaining swarm forms a line behind it, being lead away. This prim-
itive can be viewed as "aggregation at a specific, moving agent". For choosing a
leading agent, the primitive "leader election", which was earlier introduced, can
be executed prior to this primitive.
22
Varughese, Hornischer, Zahadat, Thenius, Wotawa, Schmickl
(a)
(b)
(c)
(d)
Fig. 14 This figure shows a swarm being lead by a single agent towards the right. From the
initial state in (a), the swarm aggregates towards the leading agent in (b) and (c). In (d)
the swarm formed a line following the leader. Also shown in blue are the trajectories of each
agent for the entire simulation. Times [tmax
: (a) 1, (b) 4, (c) 12, (d) 40. Parameters: N = 80,
Rs = 3.34 r, tref = 5 s, tmax
= 50.
p
p
5.9 Locomotion: Gas expansion
Considering a swarm exploring its environment, it can maximize its covered sur-
rounding area by physically expanding. The primitive "gas expansion" enables a
swarm to uniformly expand. Each agent sets its internal counter tp to a random
value between tp ∈ (0, tmax
]. As soon as the internal counter reaches tp = 0 an
agent sends a ping. Each agent moves away a small step from incoming pings. As
soon as an agent receives no pings anymore, it does not move further away. See
Algorithm 10 for pseudo code.
p
Controlling Swarms: A Programming Paradigm with Minimalistic Communication
23
Data: Paradigm parameters
Result: Expanded swarm
Algorithm 10: Code block for primitive "Gas expansion"
In Figure 15 (a) an initially densely packed swarm is shown, which then expands
in Figure 15 (b) and (c) until it is fully expanded in Figure 15 (d). Agents can then
reconnect with its swarm members by moving back, in the opposite direction of
the previous step, or by integrating its entire trajectory and thus finding their way
back until they again perceive signals. Depending on the communication abilities
of the swarm, the perception range or sensitivity can be temporarily decreased
during the expansion such that afterwards the agents will again be connected.
(a)
(b)
(c)
(d)
Fig. 15 A swarm performing the primitive "gas expansion". The initial state of the swarm is
shown in (a), where it is fully aggregated. In (b) and (c) it gradually expands. The final state
is shown in (d) with the trajectories of each swarm as blue lines. Times [timesteps]: (a) 0, (b)
20, (c) 60, (d) 280. Parameters: N = 80, Rs = 0.67 r, tref = 5 s, tmax
= 50 s.
p
Function Relay-CodeBlock
unction Initiate-CodeBlock
timer(tp) ← random integer ∈ (0, tmax
timer(tp) ← tmax
record ping direction;
calculate average of incoming pings;
move away from incoming ping;
p
];
p
;
. . F
24
Varughese, Hornischer, Zahadat, Thenius, Wotawa, Schmickl
6 Combining primitives
All previously presented primitives are based on single-bit communication for
demonstrating that even with minimum communication bandwidth complex be-
haviors can be produced. Using multi-bit signals the spectrum of possible primi-
tives can be extended significantly. Examples and possibilities for multi-bit com-
munication based systems and behaviors are presented in the discussion.
However, let alone by combining primitives not only more elaborate behaviors
can be produced, by enabling a swarm to switch between a set of primitives it
can operate autonomously. The most intuitive way of combining primitives is to
execute primitives one after another in a sequential manner. This allows the design
of complex tasks which can be executed by the swarm autonomously. This is
schematically shown in Figure 16 (a).
(a)
(b)
Fig. 16 Schematic illustration of (a): sequential execution and (b): interleaved execution of
three primitives A, B and C.
An example for sequential execution of primitives producing an autonomously
acting swarm is a collective exploration procedure, shown in Figure 17. The fol-
lowing sequence of primitives is executed periodically: aggregation, leader election,
moving collectively, gas expansion. In Figure 17(a)-(b) the swarm aggregates and
then determines a leader in Figure 17(c)). This leader will choose a random di-
rection and lead the swarm to a new location, as shown in Figure 17(c) to (d).
Then the entire swarm expands and explores the area and for example, collects
data before again aggregating and restarting this procedure. Due to the limited
abilities of the individual members of the swarm, they have no awareness of the
collective state or if the execution of a primitve was completed. For this example,
the execution times of all primitives were fixed or "hard-coded".
Controlling Swarms: A Programming Paradigm with Minimalistic Communication
25
(a)
(b)
(c)
(d)
(e)
(f)
Fig. 17 Consecutive execution of the primitives Aggregation, Leader election, Moving collec-
tively and Gas expansion as example for an exploring routine of an autonomous swarm. The
swarm prepares for changing its location and thus aggregates from (a) to (c). It then decides
on a leading agent (marked in red) which then leads the swarm towards the top right of the
system, a target area, shown in (c) and (d). The swarm expands again for exploring the new
environment, shown in (e). In (f) the final state along with the trajectories of all agents over
the entire simulation are shown. Parameters: N = 50, tref and tmax
vary for each primitive.
p
Another approach to combining primitives is to execute several primitives in
an interleaved manner. This allows the emergence of a larger variety of complex
behaviors. This is schematically shown in Figure 16 (b). For executing several
primitives in a quasi-simultaneous manner, the previously presented single bit
communication can be extended. A simple option is to introduce several individual
layers of single bit communication, one for each primitive. Alternatively, multi bit
signals could be used, every signal encoding the primitive it is associated with.
The demonstrations shown here are only exemplary and many more combina-
tions of primitives are possible. In case an observer controls a swarm, autonomy
of the swarm is not necessary and full control through manual choice of primitives
can be exerted.
7 Discussion
In Section 5, a set of primitives which can be utilized and combined as basic
building blocks for a meta control scheme for a swarm is presented, covering the
categories "internal organization", "swarm awareness" and "locomotion". Two ex-
emplary realizations of combination of previously presented primitives for complex
26
Varughese, Hornischer, Zahadat, Thenius, Wotawa, Schmickl
collective behaviors are presented in Section 6. Through this paper, it is demon-
strated that WOSPP enables swarms consisting of agents with limited abilities to
collectively perform a large variety of complex behaviors using "scroll wave" based
communication. Due to its simple and flexible fundamental concept, this program-
ming paradigm is applicable to a large spectrum of different types of swarms and
environments while requiring minimal communication abilities. A cross section of
possible abilities of WOSPP is presented in Section 5 where both primitives and
basic analysis of their behaviors is shown. In this section WOSPP as a whole
including its advantages, scope for further work and application in robotics is
discussed.
In the introduction, several areas dealing with swarm control, such as amor-
phous computing were briefly examined. As pointed out, there are significant dif-
ferences between amorphous computing and WOSPP one of which being that
amorphous computing requires multi-bit communication. In amorphous comput-
ing, multiple gradients are propagated starting from a seed agent. The gradient
is essentially a hop count which enables the internal positioning of agents with
respect to the seed agent which in turn allows a group of robots to organize them-
selves globally. The paradigm presented in this paper functions even using single
bit communication between the agents. Therefore, the extreme case i.e, the re-
striction to single-bit communication, is focused on in this paper. Though many
systems do not have such constraint and could thus make use of complex signals
being transmitted yielding even greater versatility. One such possibility is the use
of so called "hop counts", encoding within the signal how often it was relayed, as
done in [24, 1]. It allows for instance the limitation of the range up to how many
agents or nodes a signal is relayed.
An analysis has been conducted on the resilience of "scroll wave" based com-
munication[41] where its robustness against signal loss was examined. It was shown
that due to redundancy in signal pathways, a system using slime mold based com-
munication, as utilized in WOSPP, can compensate up to 70% individual prob-
ability of signal loss without significant decrease in performance. The ability of
this basic behavior to cope with high amounts of signal loss endows WOSPP with
resilient functioning when pings fail to be sent or received.
As opposed to approaches such as [22], decentralized control in WOSPP allows
scalability limited primarily by the communication abilities relative to operational
time scales. For the class of swarms presented in this paper the main constraint
is constituted by the condition to choose the maximum internal cycle length tmax
significantly larger than the time for a ping wave to propagate from one end
of the swarm to the other. It ensures that ping waves likely propagate through
the entire system without colliding with other waves, thus enabling swarm-wide
communication. By sufficient choice of parameters, the number of swarm members
can be increased almost arbitrarily without loss of functionality.
p
However, considering a swarm encountering frequent collisions of ping waves,
for instance while aggregating a swarm could ultimately split into sub-swarms,
especially at sparsely connected regions in the swarm. Each group that splits out
of the parent swarm retains the properties of the original swarm. Thus, in case
of splitting, each sub-swarm immediately adapts to the new situation, being fully
functional. Such properties of WOSPP can even be used to add to the richness
in collective behavioral diversity. For example, swarms performing a search or
exploration task can deliberately split into sub-swarms and proceed separately.
Controlling Swarms: A Programming Paradigm with Minimalistic Communication
27
One of the prerequisites for a swarm to be able to implement WOSPP is di-
rectional communication similar to most animals in nature which exhibit swarm
behavior. In this paper, most simulations conducted follow the assumption that
agents have the ability to precise detect the direction of incoming pings. In prac-
tice, this requirement can be substantially loosened for the agents to have a lower
angular resolution without significant loss of functionality. In other words, a rough
perception of the direction of the incoming ping is sufficient for the basic func-
tionality of WOSPP. Preliminary work was done but is not shown in this paper
and will be subject of future work and further analysis on WOSPP. Only a selec-
tion of primitives is shown in this work, more ideas for primitives are for instance
the incorporation of statistical regularities in very large swarms. The spectrum of
collective behaviors can be varied and extended much further and applied a vari-
ety of systems, naturally depending on the requirements, tasks and creativity of
the user. Consequently, the paradigm is applicable not only to swarms, but yields
great potential in network system such as sensor networks, internet of things et
cetera due to structural similarities in signal/information propagation throughout
the system. In those examples presumably the main focus will be on "internal
organization" and "swarm awareness" primitives.
Other future work connected to subCULTron[38], a project aiming to deploy
a heterogeneous swarm of underwater robots to monitor environmental param-
eters in the lagoon of Venice. Within the framework of this project, individual
primitives of WOSPP are already being used for swarm control. Robotic systems
such as subCULTron, which employ a large number of individual agents in noisy
environment aiming for autonomous operation, can benefit from WOSPP. In the
future, a WOSPP language will be developed enabling users to combine primitives
in a convenient manner and apply them as control scheme to a swarm of robots.
Alternatively, a programming language for robotic swarms, called "buzz" [29] can
be used for implementing the WOSPP. This will further facilitate the usage and
application of WOSPP and the development of increasingly elaborate primitives,
e.g. involving complex collective decision making, allowing in the future an easier
designing of fully autonomous swarms with the ability to flexibly adapt to varying
environmental conditions.
Acknowledgements This work was supported by EU-H2020 Project no. 640967, subCUL-
Tron, funded by the European Unions Horizon 2020 research and innovation programme.
References
1. Abelson, H., Allen, D., Coore, D., Hanson, C., Homsy, G., Knight Jr, T.F., Nagpal, R.,
Rauch, E., Sussman, G.J., Weiss, R.: Amorphous computing. Communications of the
ACM 43(5), 74–82 (2000)
2. Alcantara, F., Monk, M.: Signal propagation during aggregation in the slime mould dic-
tyostelium discoideum. Microbiology 85(2), 321–334 (1974)
3. Bahge¸ci, E., Sahin, E.: Evolving aggregation behaviors for swarm robotic systems: A sys-
tematic case study. In: Swarm Intelligence Symposium, 2005. SIS 2005. Proceedings 2005
IEEE, pp. 333–340. IEEE (2005)
4. Ben-Shahar, O., Dolev, S., Dolgin, A., Segal, M.: Direction election in flocking swarms.
Ad Hoc Networks 12, 250–258 (2014)
5. Brock, V.E., Riffenburgh, R.H.: Fish schooling: a possible factor in reducing predation.
ICES Journal of Marine Science 25(3), 307–317 (1960)
28
Varughese, Hornischer, Zahadat, Thenius, Wotawa, Schmickl
6. Buck, J., Buck, E.: Biology of synchronous flashing of fireflies. Nature 211, 562–564 (1966)
7. Buck, J., Buck, E.: Mechanism of rhythmic synchronous flashing of fireflies: Fireflies of
southeast asia may use anticipatory time-measuring in synchronizing their flashing. Science
159(3821), 1319–1327 (1968)
8. Camazine, S., Denenbourg, J.L., Franks, N.R., Sneyd, J., Theraulaz, G., Bonabeau, E.:
Synchronized flashing among fireflies. pp. 143–166. Princton University Press, Princton
(2001)
9. Christensen, A.L., Rehan, O., Dorigo, M., et al.: Morphology control in a multirobot
system. IEEE Robotics & Automation Magazine 14(4), 18–25 (2007)
10. Coore, D.: Towards a universal language for amorphous computing.
In: International
Conference on Complex Systems (ICCS2004) (2004)
11. Cornejo, A., Nagpal, R.: Distributed range-based relative localization of robot swarms. In:
Algorithmic Foundations of Robotics XI, pp. 91–107. Springer (2015)
12. Decugniere, A., Poulain, B., Campo, A., Pinciroli, C., Tartini, B., Os´ee, M., Dorigo, M.,
Birattari, M.: Enhancing the cooperative transport of multiple objects. In: International
Conference on Ant Colony Optimization and Swarm Intelligence, pp. 307–314. Springer
(2008)
13. Devreotes, P.: Dictyostelium discoideum: a model system for cell-cell interactions in de-
velopment. Science 245(4922), 1054–1058 (1989)
14. Eberhart, R.C., Shi, Y., Kennedy, J.: Swarm intelligence. Elsevier (2001)
15. Fox, D., Burgard, W., Kruppa, H., Thrun, S.: A probabilistic approach to collaborative
multi-robot localization. Autonomous robots 8(3), 325–344 (2000)
16. Hall, S., Wardle, C., MacLennan, D.: Predator evasion in a fish school: test of a model for
the fountain effect. Marine biology 91(1), 143–148 (1986)
17. Hayes, A.T., Martinoli, A., Goodman, R.M.: Swarm robotic odor localization: Off-line
optimization and validation with real robots. Robotica 21(4), 427–441 (2003)
18. Karpov, V., Karpova, I.: Leader election algorithms for static swarms. Biologically Inspired
Cognitive Architectures 12, 54–64 (2015)
19. Kennedy, J., Eberhart, R.C.: Particle swarm optimization. In: IEEE International Con-
ference on Neural Networks. IEEE Press, Los Alamitos, CA (1995)
20. Kennedy, J.S.: The migration of the desert locust (schistocerca gregaria forsk.) i. the
behaviour of swarms. ii. a theory of long-range migrations. Phil. Trans. R. Soc. Lond. B
235(625), 163–290 (1951)
21. Labella, T.H., Dorigo, M., Deneubourg, J.L.: Division of labor in a group of robots inspired
by ants' foraging behavior. ACM Transactions on Autonomous and Adaptive Systems
(TAAS) 1(1), 4–25 (2006)
22. Le Goc, M., Kim, L.H., Parsaei, A., Fekete, J.D., Dragicevic, P., Follmer, S.: Zooids:
Building blocks for swarm user interfaces. In: Proceedings of the 29th Annual Symposium
on User Interface Software and Technology, pp. 97–109. ACM (2016)
23. Middleton, E.J., Latty, T.: Resilience in social insect infrastructure systems. Journal of
The Royal Society Interface 13(116), 20151022 (2016)
24. Nagpal, R.: Programmable self-assembly using biologically-inspired multiagent control. In:
Proceedings of the first international joint conference on Autonomous agents and multia-
gent systems: part 1, pp. 418–425. ACM (2002)
25. Nagpal, R., Kondacs, A., Chang, C.: Programming methodology for biologically-inspired
self-assembling systems. In: AAAI Spring Symposium on Computational Synthesis, pp.
173–180 (2003)
26. O'Keeffe, K.P., Hong, H., Strogatz, S.H.: Oscillators that sync and swarm. Nature Com-
munications 8(1), 1504 (2017)
27. Perez-Diaz, F., Trenkwalder, S.M., Zillmer, R., Gross, R.: Emergence and inhibition of
synchronization in robot swarms. In: Distributed Autonomous Robotic Systems, pp. 475–
486. Springer (2018)
28. Perez-Diaz, F., Zillmer, R., Gross, R.: Control of synchronization regimes in networks of
mobile interacting agents. Physical Review Applied 7(5), 054002 (2017)
29. Pinciroli, C., Lee-Brown, A., Beltrame, G.: Buzz: An extensible programming language
for self-organizing heterogeneous robot swarms. arXiv preprint arXiv:1507.05946 (2015)
30. Reynolds, C.W.: Steering behaviors for autonomous characters. In: Game developers con-
ference, vol. 1999, pp. 763–782 (1999)
31. Roumeliotis, S.I., Bekey, G.A.: Collective localization: A distributed kalman filter approach
to localization of groups of mobile robots. In: Robotics and Automation, 2000. Proceedings.
ICRA'00. IEEE International Conference on, vol. 3, pp. 2958–2965. IEEE (2000)
Controlling Swarms: A Programming Paradigm with Minimalistic Communication
29
32. Rubenstein, M., Cabrera, A., Werfel, J., Habibi, G., McLurkin, J., Nagpal, R.: Collective
transport of complex objects by simple robots: theory and experiments. In: Proceedings
of the 2013 international conference on Autonomous agents and multi-agent systems, pp.
47–54. International Foundation for Autonomous Agents and Multiagent Systems (2013)
33. Rubenstein, M., Cornejo, A., Nagpal, R.: Programmable self-assembly in a thousand-robot
swarm. Science 345(6198), 795–799 (2014)
34. Schmickl, T., Hamann, H.: BEECLUST: A swarm algorithm derived from honeybees. In:
Y. Xiao (ed.) Bio-inspired Computing and Communication Networks. CRC Press (2011)
35. Seeley, T.D.: The tremble dance of the honey bee: message and meanings. Behavioral
Ecology and Sociobiology 31, 375–383 (1992)
36. Siegert, F., Weijer, C.J.: Three-dimensional scroll waves organize dictyostelium slugs.
PNAS 89(14), 6433–6437 (1992)
37. Simpson, S.J., McCaffery, A.R., Haegele, B.F.: A behavioural analysis of phase change in
the desert locust. Biological Reviews 74(4), 461–480 (1999)
38. subCULTron: Submarine cultures perform long-term robotic exploration of unconventional
environmental niches (2015). http://www.subcultron.eu/
39. Thenius, R., Varughese, J.C., Moser, D., Schmickl, T.: Wospp-a wave oriented swarm
programming paradigm. IFAC-PapersOnLine 51(2), 379–384 (2018)
40. Trianni, V., Gross, R., Labella, T.H., S¸ahin, E., Dorigo, M.: Evolving aggregation behaviors
in a swarm of robots. In: European Conference on Artificial Life, pp. 865–874. Springer
(2003)
41. Varughese, J.C., Thenius, R., Schmickl, T., Wotawa, F.: Quantification and analysis of the
resilience of two swarm intelligent algorithms. In: C. Benzmuller, C. Lisetti, M. Theobald
(eds.) GCAI 2017. 3rd Global Conference on Artificial Intelligence, EPiC Series in Com-
puting, vol. 50, pp. 148–161. EasyChair (2017)
42. Varughese, J.C., Thenius, R., Wotawa, F., Schmickl, T.: Fstaxis algorithm: Bio-inspired
In: Proceedings of the 15th International Conference on the
emergent gradient taxis.
Synthesis and Simulation of Living Systems. MIT Press (2016)
43. Von Frisch, K.: The dance language and orientation of bees. (1967)
44. Yang, X.S.: Firefly algorithms for multimodal optimization.
In: Stochastic algorithms:
foundations and applications, pp. 169–178. Springer (2009)
45. Zahadat, P., Hahshold, S., Thenius, R., Crailsheim, K., Schmickl, T.: From honeybees to
robots and back: division of labour based on partitioning social inhibition. Bioinspiration
& biomimetics 10(6), 066005 (2015)
|
1905.11838 | 1 | 1905 | 2019-05-28T14:20:33 | A Parameterized Perspective on Protecting Elections | [
"cs.MA",
"cs.AI",
"cs.CY",
"cs.DS",
"cs.GT"
] | We study the parameterized complexity of the optimal defense and optimal attack problems in voting. In both the problems, the input is a set of voter groups (every voter group is a set of votes) and two integers $k_a$ and $k_d$ corresponding to respectively the number of voter groups the attacker can attack and the number of voter groups the defender can defend. A voter group gets removed from the election if it is attacked but not defended. In the optimal defense problem, we want to know if it is possible for the defender to commit to a strategy of defending at most $k_d$ voter groups such that, no matter which $k_a$ voter groups the attacker attacks, the outcome of the election does not change. In the optimal attack problem, we want to know if it is possible for the attacker to commit to a strategy of attacking $k_a$ voter groups such that, no matter which $k_d$ voter groups the defender defends, the outcome of the election is always different from the original (without any attack) one. | cs.MA | cs |
A Parameterized Perspective on Protecting
Elections
Palash Dey
Indian Institute of Technology, Kharagpur, India
[email protected]
Neeldhara Misra
Indian Institute of Technology, Gandhinagar, India
[email protected]
Swaprava Nath
Indian Institute of Technology, Kanpur, India
[email protected]
Garima Shakya
Indian Institute of Technology, Kanpur, India
[email protected]
Abstract
We study the parameterized complexity of the optimal defense and optimal attack problems in voting.
In both the problems, the input is a set of voter groups (every voter group is a set of votes) and two
integers ka and kd corresponding to respectively the number of voter groups the attacker can attack
and the number of voter groups the defender can defend. A voter group gets removed from the election
if it is attacked but not defended. In the optimal defense problem, we want to know if it is possible for
the defender to commit to a strategy of defending at most kd voter groups such that, no matter which
ka voter groups the attacker attacks, the outcome of the election does not change.
In the optimal
attack problem, we want to know if it is possible for the attacker to commit to a strategy of attacking
ka voter groups such that, no matter which kd voter groups the defender defends, the outcome of
the election is always different from the original (without any attack) one. We show that both the
optimal defense problem and the optimal attack problem are computationally intractable for every
scoring rule and the Condorcet voting rule even when we have only 3 candidates. We also show that
the optimal defense problem for every scoring rule and the Condorcet voting rule is W[2]-hard for both
the parameters ka and kd, while it admits a fixed parameter tractable algorithm parameterized by the
combined parameter (ka, kd). The optimal attack problem for every scoring rule and the Condorcet
voting rule turns out to be much harder -- it is W[1]-hard even for the combined parameter (ka, kd).
We propose two greedy algorithms for the OPTIMAL DEFENSE problem and empirically show that they
perform effectively on reasonable voting profiles.
Keywords and phrases parameterized complexity, election control, optimal attack, optimal defense
1
Introduction
The problem of election control asks if it is possible for an external agent, usually with a
fixed set of resources, to influence the outcome of the election by altering its structure in
some limited way. There are several specific manifestations of this problem: for instance,
one may ask if it is possible to change the winner by deleting k voter groups, presumably
by destroying ballot boxes or rigging electronically submitted votes. Indeed, several cases
of violence at the ballot boxes have been placed on record [7, 2], and in 2010, Halderman
2
A Parameterized Perspective on Protecting Elections
and his students exposed serious vulnerabilities in the electronic voting systems that are
in widespread use in several states [1]. A substantial amount of the debates around the
recently concluded presidential elections in the United States revolved around issues of
potential fraud, with people voting multiple times, stuffing ballot boxes, etc. all of which
are well recognized forms of election control. For example, Wolchok et al. [54] studied
security aspects on Internet voting systems.
Parameters
kd
ka
(ka, kd)
m
OPTIMAL DEFENSE
OPTIMAL ATTACK
Scoring rules
Condorcet
Scoring rules
Condorcet
W[2]-hard [Theorem 15] W[2]-hard [Theorem 18] W[2]-hard [Theorem 16] W[2]-hard [Theorem 19]
W[2]-hard [Theorem 22] W[2]-hard [Theorem 23]
O∗(kkd
a ) [Theorem 28]
No poly kernel [Theorem 27]
para-NP-hard [Theorem 13]
W[1]-hard [Theorem 25] W[1]-hard [Theorem 26]
para-coNP-hard [Theorem 13]
Table 1 Summary of parameterized complexity results. kd : the maximum number of voter groups
that the defender can defend. ka : the maximum number of voter groups that the attacker can attack.
m : the number of candidates.
The study of controlling elections is fundamental to computational social choice: it is widely
studied from a theoretical perspective, and has deep practical impact. Bartholdi et al [4]
initiated the study of these problems from a computational perspective, hoping that compu-
tational hardness of these problems may suggest a substantial barrier to the phenomena of
control: if it is, say NP-hard to control an election, then the manipulative agent may not
be able to compute an optimal control strategy in a reasonable amount of time. This basic
approach has been intensely studied in various other scenarios. For instance, Faliszewski
et al. [27] studied the problem of control where different types of attacks are combined
(multimode control), Mattei et al [44] showed hardness of a variant of control which just
exercises different tie-breaking rules, Bulteau et al. [10] studied voter control in a combin-
atorial setting, etc [49, 52, 28, 11, 43, 31, 30, 29, 26, 45, 25, 24, 24, 34, 37, 33, 36, 32, 47,
48, 51, 14, 21, 20, 16, 17, 15].
Exploring parameterized complexity of various control problems has also gained a lot of
interest. For example, Betzler and Uhlmann [6] studied parameterized complexity of can-
didate control in elections and showed interesting connection with digraph problems, Liu
and Zhu [41, 42] studied parameterized complexity of control problem by deleting voters
for many common voting rules, and so on [40, 53, 38, 18, 22]. Studying election control
from a game theoretic approach using security games is also an active area of research. See,
for example, the works of An et al. and Letchford et al. [3, 39].
The broad theme of using computational hardness as a barrier to control has two distinct lim-
itations: one is, of course, that some voting rules simply remain computationally vulnerable
to many forms of control, in the sense that optimal strategies can be found in polynomial
time. The other is that even NP-hard control problems often admit reasonable heuristics,
can be approximated well, or even admit efficient exact algorithms in realistic scenarios.
Therefore, relying on NP-hardness alone is arguably not a robust strategy against control.
To address this issue, the work of Yin et al. [56] explicitly defined the problem of protect-
ing an election from control, where in addition to the manipulative agent, we also have a
"defender", who can also deploy some resources to spoil a planned attack. In this setting,
elections are defined with respect to voter groups rather than voters, which is a small dif-
ference from the traditional control setting. The voter groups model allows us to consider
P. Dey, N. Misra, S. Nath, and G. Shakya
3
attacks on sets of voters, which is a more accurate model of realistic control scenarios.
In Yin et al. [56], the defense problem is modeled as a Stackelberg game in which limited
protection resources (say kd) are deployed to protect a collection of voter groups and the
adversary responds by attempting to subvert the election (by attacking, say, at most ka
groups). They consider the plurality voting rule, and show that the problem of choosing the
minimal set of resources that guarantee that an election cannot be controlled is NP-hard.
They further suggest a Mixed-Integer Program formulation that can usually be efficiently
tackled by solvers. Our main contribution is to study this problem in a parameterized setting
and provide a refined complexity landscape for it. We also introduce the complementary
attack problem, and extend the study to voting rules beyond plurality. We now turn to a
summary of our contributions.
Contribution:
We refer the reader to Section 2 for the relevant formal definitions, while focusing here on a
high-level overview of our results. Recall that the OPTIMAL DEFENSE problem asks for a set
of at most kd voter groups which, when protected, render any attack on at most ka voter
groups unsuccessful. In this paper, we study the parameterized complexity of OPTIMAL DE-
FENSE for all scoring rules and the Condorcet voting rule (these are natural choices because
they are computationally vulnerable to control - - the underlying "attack problem" can be
resolved in polynomial time). We show that the problem of finding an optimal defense is
tractable when both the attacker and the defender have limited resources. Specifically, we
show that the problem is fixed-parameter tractable with the combined parameter (ka, kd)
by a natural bounded-depth search tree approach. We also show that the OPTIMAL DEFENSE
problem is unlikely to admit a polynomial kernel under plausible complexity theoretic as-
sumption. We observe that both these parameters are needed for fixed parameter tractab-
ility, as we show W[2]-hardness when OPTIMAL DEFENSE is parameterized by either ka or
kd.
Another popular parameter considered for voting problems is m, the number of candidates
-- as this is usually small compared to the size of the election in traditional application
scenarios. Unfortunately, we show that OPTIMAL DEFENSE is NP-hard even when the election
has only 3 candidates, eliminating the possibility of fixed-parameter algorithms (and even
XP algorithms). This strengthens a hardness result shown in Yin et al. [56]. Our hardness
results on a constant number of candidates rely on a succinct encoding of the information
about the scores of the candidates from each voter group. We also observe that the problem
is polynomially solvable when only two candidates are involved.
We introduce the complementary problem of attacking an election: here the attacker plays
her strategy first, and the defender is free to defend any of the attacked groups within the
budget. The attacker wins if she is successful in subverting the election no matter which
defense is played out. This problem turns out to be harder: it is already W[1]-hard when
parameterized by both ka and kd, which is in sharp contrast to the OPTIMAL DEFENSE prob-
lem. This problem is also hard in the setting of a constant number of candidates -- specific-
ally, it is coNP-hard for the plurality voting rule [Theorem 10] and the Condorcet voting
rule [Theorem 12] even when we have only three candidates if every voter group is en-
coded as the number of plurality votes every candidate receives from that voter group. Our
demonstration of the hardness of the attack problem is another step in the program of using
4
A Parameterized Perspective on Protecting Elections
computational intractability as a barrier to undesirable phenomenon, which, in this context,
is the act of planning a systematic attack on voter groups with limited resources.
We finally propose two simple greedy algorithms for the OPTIMAL DEFENSE problem and
empirically show that it may be able to solve many instances of practical interest.
2
Preliminaries
Let C = {c1, c2, . . . , cm} be a set of candidates and V = {v1, v2, . . . , vn} a set of voters. If
not mentioned otherwise, we denote the set of candidates by C, the set of voters by V, the
number of candidates by m, and the number of voters by n. Every voter vi has a preference
or vote ≻i which is a complete order over C. We denote the set of all complete orders over
C by L(C). We call a tuple of n preferences (≻1, ≻2, · · · , ≻n) ∈ L(C)n an n-voter preference
profile. Often it is convenient to view a preference profile as a multi-set consisting of its
votes. The view we are taking will be clear from the context. A voting rule (often called
voting correspondence) is a function r : ∪n∈NL(C)n −→ 2C \ {∅} which selects, from a
preference profile, a nonempty set of candidates as the winners. We refer the reader to [9]
for a comprehensive introduction to computational social choice. In this paper we will be
focusing on two voting rules -- the scoring rules and the Condorcet voting rule which are
defined as follows.
Scoring Rule: A collection of m-dimensional vectors −→
sm = (α1, α2, . . . , αm) ∈ Rm with
α1 > α2 > . . . > αm and α1 > αm for every m ∈ N naturally defines a voting rule --
a candidate gets score αi from a vote if it is placed at the ith position, and the score of
a candidate is the sum of the scores it receives from all the votes. The winners are the
candidates with the highest score. Given a set of candidates C, a score vector −→
α of length
−→
α
C, a candidate x ∈ C, and a profile P, we denote the score of x in P by s
P (x). When
the score vector −→
α from the superscript. A straight
forward observation is that the scoring rules remain unchanged if we multiply every αi by
any constant λ > 0 and/or add any constant µ. Hence, we assume without loss of generality
that for any score vector −→
sm, there exists a j such that αj − αj+1 = 1 and αk = 0 for all k > j.
We call such a score vector a normalized score vector.
α is clear from the context, we omit −→
Weighted Majority Graph and Condorcet Voting Rule: Given an election E = (C, (≻1, ≻2
, . . . , ≻n)) and two candidates x, y ∈ C, let us define NE(x, y) to be the number of votes
where the candidate x is preferred over y. We say that a candidate x defeats another can-
didate y in pairwise election if NE(x, y) > NE(y, x). Using the election E, we can construct
a weighted directed graph GE = (U = C, E) as follows. The vertex set U of the graph GE
is the set of candidates C. For any two candidates x, y ∈ C with x 6= y, let us define the
margin DE(x, y) of x from y to be NE(x, y) − NE(y, x). We have an edge from x to y in GE if
DE(x, y) > 0. Moreover, in that case, the weight w(x, y) of the edge from x to y is DE(x, y).
A candidate c is called the Condorcet winner of an election E if there is an edge from c to
every other vertices in the weighted majority graph GE. The Condorcet voting rule outputs
the Condorcet winner if it exists and outputs the set C of all candidates otherwise.
Let r be a voting rule. We study the r-OPTIMAL DEFENSE problem which was defined by
Yin et al. [56]. It is defined as follows. Intuitively, the r-OPTIMAL DEFENSE problem asks if
there is a way to defend kd voter groups such that, irrespective of which ka voter groups the
P. Dey, N. Misra, S. Nath, and G. Shakya
5
attacker attacks, the output of the election (that is the winning set of candidates) is always
same as the original one. A voter group gets deleted if only if it is attacked but not defended.
◮ Definition 1 (r-OPTIMAL DEFENSE). Given n voter groups Gi, i ∈ [n], two integers ka and
kd, does there exist an index set I ⊆ [n] with I 6 kd such that, for every I′ ⊂ [n] \ I with
I′ 6 ka, we have r((Gi)i∈[n]\I′ ) = r((Gi)i∈[n])? The integers ka and kd are called respectively
attacker's resource and defender's resource. We denote an arbitrary instance of the r-OPTIMAL
DEFENSE problem by (C, {Gi : i ∈ [n]}, ka, kd).
We also study the r-OPTIMAL ATTACK problem which is defined as follows. Intuitively, in the
r-OPTIMAL ATTACK problem the attacker is interested to know if it is possible to attack ka
voter groups such that, no matter which kd voter groups the defender defends, the outcome
of the election is never same as the original (that is the attack is successful).
◮ Definition 2 (r-OPTIMAL ATTACK). Given n voter groups Gi, i ∈ [n], two integers ka and kd,
does there exist an index set I ⊆ [n] with I 6 ka such that, for every I′ ⊆ [n] with I′ 6 kd,
we have r((Gi)i∈[n]\(I\I′)) 6= r((Gi)i∈[n])? We denote an arbitrary instance of the r-OPTIMAL
ATTACK problem by (C, {Gi : i ∈ [n]}, ka, kd).
Encoding of the Input Instance: In both the r-OPTIMAL DEFENSE and r-OPTIMAL ATTACK
problems, we assume that every input voter group G is encoded as follows. The encoding
lists all the different votes ≻ that appear in the voter group G along with the number of
times the vote ≻ appear in G. Hence, if a voter group G contains only k different votes over
m candidates and consists of n voters, then the encoding of G takes O(km log m log n) bits
of memory.
In parameterized complexity, each problem instance comes
Parameterized complexity:
with a parameter k. Formally, a parameterized problem Π is a subset of Γ ∗ × N, where Γ is
a finite alphabet. An instance of a parameterized problem is a tuple (x, k), where k is the
parameter. A central notion is fixed parameter tractability (FPT) which means, for a given
instance (x, k), solvability in time f(k) · p(x), where f is an arbitrary function of k and p is
a polynomial in the input size x. Just as NP-hardness is used as evidence that a problem
probably is not polynomial time solvable, there exists a hierarchy of complexity classes above
FPT, and showing that a parameterized problem is hard for one of these classes is considered
evidence that the problem is unlikely to be fixed-parameter tractable. The main classes in
this hierarchy are: FPT ⊆ W[1] ⊆ W[2] ⊆ · · · ⊆ W[P] ⊆ XP. We now define the notion of
parameterized reduction [13].
◮ Definition 3. Let A, B be parameterized problems. We say that A is fpt-reducible to B if
there exist functions f, g : N → N, a constant α ∈ N and an algorithm Φ which transforms an
instance (x, k) of A into an instance (x ′, g(k)) of B in time f(k)xα so that (x, k) ∈ A if and
only if (x ′, g(k)) ∈ B.
To show W-hardness in the parameterized setting, it is enough to give a parameterized
reduction from a known hard problem. For a more detailed and formal introduction to
parameterized complexity, we refer the reader to [13] for a detailed introduction to this
paradigm.
◮ Definition 4. [Kernelization] [50, 35] A kernelization algorithm for a parameterized prob-
lem Π ⊆ Γ ∗ × N is an algorithm that, given (x, k) ∈ Γ ∗ × N, outputs, in time polynomial in
x + k, a pair (x ′, k ′) ∈ Γ ∗ × N such that (a) (x, k) ∈ Π if and only if (x ′, k ′) ∈ Π and (b)
x ′, k ′ 6 g(k), where g is some computable function. The output instance x ′ is called the kernel,
6
A Parameterized Perspective on Protecting Elections
and the function g is referred to as the size of the kernel. If g(k) = kO(1), then we say that Π
admits a polynomial kernel.
For many parameterized problems, it is well established that the existence of a polynomial
kernel would imply the collapse of the polynomial hierarchy to the third level (or more
precisely, CoNP ⊆ NP/Poly). Therefore, it is considered unlikely that these problems would
admit polynomial-sized kernels. For showing kernel lower bounds, we simply establish
reductions from these problems.
◮ Definition 5. [Polynomial Parameter Transformation] [8] Let Γ1 and Γ2 be paramet-
erized problems. We say that Γ1 is polynomial time and parameter reducible to Γ2, written
Γ1 6Ptp Γ2, if there exists a polynomial time computable function f : Σ∗ × N → Σ∗ × N, and a
polynomial p : N → N, and for all x ∈ Σ∗ and k ∈ N, if f ((x, k)) = (x ′, k ′), then (x, k) ∈ Γ1 if
and only if (x ′, k ′) ∈ Γ2, and k ′ 6 p (k). We call f a polynomial parameter transformation (or
a PPT) from Γ1 to Γ2.
This notion of a reduction is useful in showing kernel lower bounds because of the following
theorem.
◮ Theorem 6. [8, Theorem 3] Let P and Q be parameterized problems whose derived classical
problems are Pc, Qc, respectively. Let Pc be NP−complete, and Qc ∈ NP. Suppose there exists
a PPT from P to Q. Then, if Q has a polynomial kernel, then P also has a polynomial kernel.
3
Classical Complexity Results
Yin et al. [56] showed that the OPTIMAL DEFENSE problem is polynomial time solvable for
the plurality voting rule when we have only 2 candidates. On the other hand, they also
showed that the OPTIMAL DEFENSE problem is NP-complete when we have an unbounded
number of candidates. We begin with improving their NP-completeness result by showing
that the OPTIMAL DEFENSE problem becomes NP-complete even when we have only 3 can-
didates and the attacker can attack any number of voter groups. Towards that, we reduce
the k-SUM problem to the OPTIMAL DEFENSE problem. The k-SUM problem is defined as
follows.
◮ Definition 7 (k-SUM). Given a set of n positive integers W = {wi, i ∈ [n]}, and two positive
integers k 6 n and M, does there exist an index set I ⊂ [n] with I = k such that Pi∈I wi =
M?
The k-SUM problem can be easily proved to be NP-complete by modifying the NP-
completeness proof of the Subset Sum problem in Cormen et al. [12]. We also need the
following structural result for normalized scoring rules which has been used before [5, 19].
◮ Lemma 8. Let C = {c1, . . . , cm} be a set of candidates and −→
α a normalized score vector of
length C. Let x, y ∈ C, x 6= y, be any two arbitrary candidates. Then there exists a profile Py
x
consisting of m votes such that we have the following.
sPy
(a) for every a ∈ C \ {x, y}
(x) + 1 = sPy
(y) − 1 = sPy
x
x
x
For any two candidates x, y ∈ C, x 6= y, we use Py
x to denote the profile as defined in
Theorem 8. We are now ready to present our NP-completeness result for the OPTIMAL
DEFENSE problem for the scoring rules even in the presence of 3 candidates only.
In the
interest of space, we will provide only a sketch of a proof for a several results.
P. Dey, N. Misra, S. Nath, and G. Shakya
7
◮ Theorem 9. The OPTIMAL DEFENSE problem is NP-complete for every scoring rule even if
the number of candidates is 3 and the attacker can attack any number of the voter groups.
Proof. The OPTIMAL DEFENSE problem for every scoring rule can be shown to belong to NP
by using a defense strategy S (a subset of at most kd voter groups) as a certificate. The fact
that the certificate can be validated in polynomial time involves checking if there exists a
successful attack despite protecting all groups in S. This can be done in polynomial time, but
due to space constraints, we defer a detailed argument to a full version of this manuscript.
We now turn to the reduction from k-SUM.
Let −→
α be any normalized score vector of length 3. The OPTIMAL DEFENSE problem for
the scoring rule based on −→
α belongs to NP. Let (W = {w1, . . . , wn}, k, M) be an arbitrary
instance of the k-SUM problem. We can assume, without loss of generality, that 8 divides M
and wi for every i ∈ [n]; if this is not the case, we replace M and wi by respectively 8M and
8wi for every i ∈ [n] which clearly is an equivalent instance of the original instance. Let us
also assume, without loss of generality, that 2k < n (if not then add enough copies of M + 1
to W) and M < Pn
i=1 wi (since otherwise, it is a trivial NO instance). We construct the
following instance of the OPTIMAL DEFENSE problem for the scoring rule based on −→
α . Let
M′ be an integer such that M′ > Pn
i=1 wi and 8 divides M′. We have 3 candidates, namely
a, b, and c. We have the following voter groups.
-- For every i ∈ [n], we have a voter group Gi consisting of wi copies of Pc
a (as defined in
Theorem 8) and M′ − wi copies of Pc
sGi (c) = sGi (a) + M′ + wi = sGi (b) + 2M′ − wi
b. Hence, we have the following.
-- We have one voter group G consisting of (kM′+M)/2 − 3 copies of Pa
c , (kM′−M)/2 − 1 copies
c , and (kM′−M)/2 − 1 copies of Pb
of Pb
s G(c) = s G(a) − (kM′ + M − 6) = s G(b) − (2kM′ − M − 6)
a. We have the following.
i=1 wi −M+6 = sQ(b)+(n−2k)M′ +M−Pn
i=1Gi ∪ G. We have sQ(c) = sQ(a) + (n − k)M′ +
Let Q be the resulting profile; that is Q = ∪n
Pn
i=1 wi,
we have sQ(c) > sQ(a) and sQ(c) > sQ(b). Thus the candidate c wins the election uniquely.
We define kd, the maximum number of voter groups that the defender can defend, to be
k. We define ka, the maximum number of voter groups that the attacker can attack, to be
n + 1. This finishes the description of the OPTIMAL DEFENSE instance. We claim that the
two instances are equivalent.
i=1 wi +6. Since n > 2k and M′ > Pn
In the forward direction, let the k-SUM instance be a YES instance and I ⊂ [n] with I =
k be an index set such that Pi∈I wi = M. Let us consider the defense strategy where
the defender protects the voter groups Gi for every i ∈ I. Since Pi∈I wi = M, we have
Pi∈I(M′ − wi) = kM′ − M. Let H be the profile of voter groups corresponding to the index
set I; that is, H = ∪i∈IGi. Let H′ be the profile remaining after the attacker attacks some
voter groups. Without loss of generality, we can assume that the attacker does not attack the
voter group G since otherwise the candidate c continues to win uniquely. We thus obviously
have H ∪ G ⊆ H′. We have sH∪ G(c) = sH∪ G(a) + kM′ + Pi∈I wi − (kM′ + M − 6) =
sH∪ G(a) + 6 and sH∪ G(c) = sH∪ G(b) + 2kM′ − Pi∈I wi − (2kM′ − M − 6) = sH∪ G(b) + 6.
Since the candidate c receives as much score as any other candidate in the voter group Gi
for every i ∈ [n], we have sH′∪ G(c) > sH′∪ G(a)+6 and sH′∪ G(c) > sH′∪ G(b)+6. Hence, the
candidate c wins uniquely in the resulting profile H′ after the attack and thus the defense is
successful.
8
A Parameterized Perspective on Protecting Elections
In the other direction, let the OPTIMAL DEFENSE instance be a YES instance. Without loss of
generality, we can assume that the attacker does not attack the voter group G and thus the
defender does not defend the voter group G. We can also assume, without loss of generality,
that the defender defends exactly k voter groups since the candidate c receives as much score
as any other candidate in the voter group Gi for every i ∈ [n]. Let I ⊂ [n] with I = k such
that defending all the voter groups Gi, i ∈ I is a successful defense strategy. We claim that
Pi∈I wi > M. Suppose not, then let us assume that Pi∈I wi < M. Since, wi is divisible
by 8 and positive for every i ∈ [n] and m is divisible by 8, we have Pi∈I wi 6 M − 8. Let
H be the profile of voter groups corresponding to the index set I; that is, H = ∪i∈IGi. We
have sH∪ G(c) = sH∪ G(a) + kM′ + Pi∈I wi − (kM′ + M − 6) 6 sH∪ G(a) + M − 8 − M + 6 =
sH∪ G(a) − 2. Hence attacking the voter groups Gi, i ∈ [n] \ I makes the score of c strictly
less than the score of a. This contradicts our assumption that defending all the voter groups
Gi, i ∈ I is a successful defense strategy. Hence we have Pi∈I wi > M. We now claim that
Pi∈I wi 6 M. Suppose not, then let us assume that Pi∈I wi > M. Since, wi is divisible by
8 and positive for every i ∈ [n] and m is divisible by 8, we have Pi∈I wi > M + 8. Let H′ be
the profile of voter groups corresponding to the index set I; that is, H′ = ∪i∈IGi. We have
sH′∪ G(c) = sH′∪ G(b) + 2kM′ − Pi∈I wi − (2kM′ − M − 6) 6 sH′∪ G(b) − (M + 8) + M + 6 =
sH′∪ G(b) − 2. Hence attacking the voter groups Gi, i ∈ [n] \ I makes the score of c strictly
less than the score of b. This contradicts our assumption that defending all the voter groups
Gi, i ∈ I is a successful defense strategy. Hence we have Pi∈I wi 6 M. Therefore we have
Pi∈I wi = M and thus the k-SUM instance is a YES instance.
◭
In the proof of Theorem 9, we observe that the reduced instance of the OPTIMAL DEFENSE
problem viewed as an instance of the OPTIMAL ATTACK problem is a NO instance if and
only if the k-SUM instance is a YES instance. Hence, the same reduction as in the proof of
Theorem 9 gives us the following result for the OPTIMAL ATTACK problem.
◮ Corollary 10. The OPTIMAL ATTACK problem is coNP-hard for every scoring rule even if the
number of candidates is 3 and the attacker can attack any number of voter groups.
We now prove a similar hardness result as of Theorem 9 for the Condorcet voting rule.
◮ Theorem 11. The OPTIMAL DEFENSE problem is NP-complete for the Condorcet voting rule
even if the number of candidates is 3 and the attacker can attack any number of voter groups.
Proof. The OPTIMAL DEFENSE problem for the Condorcet voting rule clearly belongs to
NP. To show NP-hardness, we reduce an arbitrary instance of the k-SUM problem to the
OPTIMAL DEFENSE problem for the Condorcet voting rule. Let ({w1, . . . , wn}, k, M) be an
arbitrary instance of the k-SUM problem. We construct the following instance of the OPTIMAL
DEFENSE problem for the Condorcet voting rule. Let M′ = max{wi : i ∈ [n]}. We have 3
candidates, namely a, b, and c. We have the following voter groups.
-- For every i ∈ [n], we have a voter group Gi where DGi (a, b) = 2wi, DGi (a, c) = 2(M′ −
wi), and DGi (b, c) = 0.
-- We have one voter group G where the candidates b and c receive respectively D G(b, a) =
2M − 1, D G(c, a) = 2(kM′ − M) − 1, and D G(b, c) = 1.
We define kd, the maximum number of voter groups that the defender can defend, to be
k. We define ka, the maximum number of voter groups that the attacker can attack, to
be n + 1. We observe that the candidate a is the Condorcet winner of the election. This
P. Dey, N. Misra, S. Nath, and G. Shakya
9
finishes the description of the OPTIMAL DEFENSE instance. We claim that the two instances
are equivalent.
In the forward direction, let the k-SUM instance be a YES instance and I ⊂ [n] with I =
k be an index set such that Pi∈I wi = M. Let us consider the defense strategy where
the defender protects the voter groups Gi for every i ∈ I. Since Pi∈I wi = M, we have
Pi∈I(M′ − wi) = kM′ − M. Without loss of generality, we can assume that the attacker
does not attack the voter group G. We observe that the candidate a is the Condorcet winner
of the election even when the attacker attacks all the voter groups Gj, j ∈ [n] \ I. Hence the
OPTIMAL DEFENSE instance is a YES instance.
In the other direction, let the OPTIMAL DEFENSE instance be a YES instance. Without loss of
generality, we can assume that the attacker does not attack the voter group G and thus the
defender does not defend the voter group G. We can also assume, without loss of generality,
that the defender defends exactly k voter groups since the candidate a continues to be the
Condorcet winner if the attacker attacks at most k − 1 voter groups. Let I ⊂ [n] with
I = k such that defending all the voter groups Gi, i ∈ I is a successful defense strategy.
We claim that Pi∈I wi > M. Suppose not, then let us assume that Pi∈I wi < M. Then
attacking the voter groups Gi, i ∈ [n] \ I makes the candidate b defeat the candidate a
in pairwise election. This contradicts or assumption that defending all the voter groups
Gi, i ∈ I is a successful defense strategy. Hence we have Pi∈I wi > M. We now claim that
Pi∈I wi 6 M. Suppose not, then let us assume that Pi∈I wi > M. Then attacking the
voter groups Gi, i ∈ [n] \ I makes the candidate c defeat the candidate a in pairwise election.
This contradicts or assumption that defending all the voter groups Gi, i ∈ I is a successful
defense strategy. Hence we have Pi∈I wi 6 M. Therefore we have Pi∈I wi = M and thus
the k-SUM instance is a YES instance.
◭
In the proof of Theorem 11, we observe that the reduced instance of OPTIMAL DEFENSE
viewed as an instance of the OPTIMAL ATTACK problem is a NO instance if and only if the
k-SUM instance is a YES instance. Hence, the same reduction as in the proof of Theorem 11
gives us the following result for the OPTIMAL ATTACK problem.
◮ Corollary 12. The OPTIMAL ATTACK problem is coNP-hard for the Condorcet voting rule
even if the number of candidates is 3 and the attacker can attack any number of voter groups.
4 W-Hardness Results
In this section, we present our hardness results for the OPTIMAL DEFENSE and the OPTIMAL
ATTACK problems in the parameterized complexity framework. We consider the following
parameters for both the problems -- number of candidate (m), defender's resource (kd), and
attacker's resource (ka). From Theorems 9 to 12 we immediately have the following result
for the OPTIMAL DEFENSE and OPTIMAL ATTACK problems parameterized by the number of
candidates for both the scoring rules and the Condorcet voting rule.
◮ Corollary 13. The OPTIMAL DEFENSE problem is para-NP-hard parameterized by the num-
ber of candidates for both the scoring rules and the Condorcet voting rule. The OPTIMAL ATTACK
problem is para-coNP-hard parameterized by the number of candidates for both the scoring
rules and the Condorcet voting rule.
10
A Parameterized Perspective on Protecting Elections
The NP-completeness proof for the OPTIMAL DEFENSE problem for the plurality voting rule
by Yin et al. [56] is actually a parameter preserving reduction from the HITTING SET problem
parameterized by the solution size. The HITTING SET problem is defined as follows.
◮ Definition 14 (HITTING SET). Given a universe U, a set S = {Si : i ∈ [t]} of subsets of U,
and a positive integer k which is at most U, does there exist a subset W ⊆ U with W = k such
that W ∩ Si 6= ∅ for every i ∈ [t]. We denote an arbitrary instance of HITTING SET by (U, S, k).
Since the HITTING SET problem parameterized by the solution size k is known to be W[2]-
complete [23], the following result immediately follows from Theorem 2 of Yin et al. [56].
⊲ Observation 1 ([56]). The OPTIMAL DEFENSE problem for the plurality voting rule is
W[2]-hard parameterized by kd.
We now generalize Observation 1 to any scoring rule by exhibiting a polynomial parameter
transform from the HITTING SET problem parameterized by the solution size.
◮ Theorem 15. The OPTIMAL DEFENSE problem for every scoring rule is W[2]-hard paramet-
erized by kd.
Proof. Let (U, S = {Sj : j ∈ [t]}, k) be an arbitrary instance of HITTING SET. Let U = {zi : i ∈
[n]}. Without loss of generality, we assume that Sj 6= ∅ for every j ∈ [t] since otherwise the
instance is a NO instance. Let −→
α be a normalized score vector of length t + 2. We construct
the following instance of the OPTIMAL DEFENSE problem for the scoring rule based on −→
α .
The set of candidates C = {xj : j ∈ [t]} ∪ {y, d}. We have the following voter groups.
-- For every i ∈ [n], we have a voter group Gi. For every j ∈ [t] with zi ∈ Sj we have 2
copies of Pd
xj
in Gi.
-- We have one group G where we have 2tn copies of Pxj
d for every j ∈ [n] and 2tn − 1
copies of Py
d.
i=1Gi ∪ G. We define the defender's resource
Let Q be the resulting profile; that is Q = ∪n
kd to be k + 1 and attacker's resource to be n. This finishes the description of the OPTIMAL
DEFENSE instance. Since Sj 6= ∅ for every j ∈ [t], we have sQ(y) > sQ(xj) for every j ∈ [t].
We also have sQ(y) > sQ(d). Hence the candidate y is the unique winner of the profile Q. We
now prove that the OPTIMAL DEFENSE instance (C, Q, ka, kd) is equivalent to the HITTING
SET instance (U, S, k).
In the forward direction, let us suppose that the HITTING SET instance is a YES instance. Let
I ⊂ [n] be such that I = k and {zi : i ∈ I} ∩ Sj 6= ∅. We claim that the defender's strategy of
defending the voter groups Gj for every j ∈ [t] \ I and G results in a successful defense. Let H
be the profile of voter groups corresponding to the index set I; that is, H = ∪i∈IGi. Let H′ be
the profile remaining after the attacker attacks some voter groups. We thus obviously have
H ∪ G ⊆ H′. Since {zi : i ∈ I} forms a hitting set, we have sH′(y) > sH′ (xj) for every j ∈ [t].
Also since the voter group G is defended, we have sH′ (y) > sH′ (d). Hence the candidate y
continues to win uniquely even after the attack and hence the OPTIMAL DEFENSE instance is
a YES instance.
In the other direction, let the OPTIMAL DEFENSE instance be a YES instance. Without loss
of generality, we can assume that the defender defends the voter group G since otherwise
the attacker can attack the voter group G which makes the score of the candidate d more
than the score of the candidate y and thus defense would fail. We can also assume, without
P. Dey, N. Misra, S. Nath, and G. Shakya
11
loss of generality, that the defender defends exactly k voter groups. Let I ⊂ [n] with I = k
such that defending all the voter groups Gi, i ∈ I and G is a successful defense strategy.
Let us consider Z = {zi : i ∈ I} ⊆ U. We claim that Z must form a hitting set.
Indeed,
otherwise let us assume that there exists a j ∈ [t] such that Z ∩ Sj = ∅. Consider the
situation where the attacker attacks voter groups Gi for every i ∈ [n] \ I. We observe that
s∪i∈IGi ∪ G(xj) > s∪i∈IGi∪ G(y). This contradicts our assumption that defending all the voter
groups Gi, i ∈ I and G is a successful defense strategy. Hence Z forms a hitting set and thus
the HITTING SET instance is a YES instance.
◭
In the proof of Theorem 15, we observe that the reduced instance of OPTIMAL DEFENSE
viewed as an instance of the OPTIMAL ATTACK problem is a NO instance if and only if the
k-SUM instance is a YES instance. Hence, the same reduction as in the proof of Theorem 15
gives us the following result for the OPTIMAL ATTACK problem.
◮ Corollary 16. The OPTIMAL ATTACK problem for every scoring rule is W[2]-hard parameter-
ized by kd.
We now show W[2]-hardness of the OPTIMAL DEFENSE problem for the Condorcet voting
rule parameterized by kd. Towards that, we need the following lemma which has been used
before [46, 55].
◮ Lemma 17. For any function f : C × C −→ Z, such that
1. ∀a, b ∈ C, f(a, b) = −f(b, a).
2. ∀a, b, c, d ∈ C, f(a, b) + f(c, d) is even,
there exists a n voters' profile such that for all a, b ∈ C, a defeats b with a margin of f(a, b).
Moreover,
n is even and n = O
X
{a,b}∈C×C
f(a, b)
Next, we show the W[2]-hardness of the OPTIMAL DEFENSE problem for the Condorcet voting
rule parameterized by kd. This is also a parameter-preserving reduction from the HITTING
SET problem.
◮ Theorem 18. The OPTIMAL DEFENSE problem for the Condorcet voting rule is W[2]-hard
parameterized by kd.
Proof. Let (U, S = {Sj : j ∈ [t]}, k) be an arbitrary instance of HITTING SET. Let U = {zi :
i ∈ [n]}. Without loss of generality, we assume that Sj 6= ∅ for every j ∈ [t] since otherwise
the instance is a NO instance. We construct the following instance of the OPTIMAL DEFENSE
problem for the Condorcet voting rule. The set of candidates C = {xj : j ∈ [t]} ∪ {y}. For every
i ∈ [n], we have a voter group Gi. For every j ∈ [t] with zi ∈ Sj we have DGi (y, xj) = 2.
Let Q be the resulting profile; that is Q = ∪n
i=1Gi. We define the defender's resource kd to
be k and attacker's resource to be n. This finishes the description of the OPTIMAL DEFENSE
instance. Since Sj 6= ∅ for every j ∈ [t], we have DQ(y, xj) > 2 for every j ∈ [t]. Hence
the candidate y is the Condorcet winner of the profile Q. We now prove that the OPTIMAL
DEFENSE instance (C, Q, ka, kd) is equivalent to the HITTING SET instance (U, S, k).
In the forward direction, let us suppose that the HITTING SET instance is a YES instance. Let
I ⊂ [n] be such that I = k and {zi : i ∈ I} ∩ Sj 6= ∅. We claim that the defender's strategy
12
A Parameterized Perspective on Protecting Elections
of defending the voter groups Gj for every j ∈ [t] \ I results in a successful defense. Let H
be the profile of voter groups corresponding to the index set I; that is, H = ∪i∈IGi. Let
H′ be the profile remaining after the attacker attacks some voter groups. We thus obviously
have H ⊆ H′. Since {zi : i ∈ I} forms a hitting set, we have DH′ (y, xj) > 2 for every
j ∈ [t]. Hence the candidate y continues to win uniquely even after the attack and hence the
OPTIMAL DEFENSE instance is a YES instance.
In the other direction, let the OPTIMAL DEFENSE instance be a YES instance. We can also
assume, without loss of generality, that the defender defends exactly k voter groups. Let
I ⊂ [n] with I = k such that defending all the voter groups Gi, i ∈ I is a successful defense
strategy. Let us consider Z = {zi : i ∈ I} ⊆ U. We claim that Z must form a hitting set.
Indeed, otherwise let us assume that there exists a j ∈ [t] such that Z ∩ Sj = ∅. Consider the
situation where the attacker attacks voter groups Gi for every i ∈ [n] \ I. We observe that
D∪i∈IGi (y, xj) = 0 and hence the candidate y is not the Condorcet winner. This contradicts
our assumption that defending all the voter groups Gi, i ∈ I is a successful defense strategy.
Hence Z forms a hitting set and thus the HITTING SET instance is a YES instance.
◭
In the proof of Theorem 18, we observe that the reduced instance of OPTIMAL DEFENSE
viewed as an instance of the OPTIMAL ATTACK problem is a NO instance if and only if the
k-SUM instance is a YES instance. Hence, the same reduction as in the proof of Theorem 18
gives us the following result for the OPTIMAL ATTACK problem.
◮ Corollary 19. The OPTIMAL ATTACK problem for the Condorcet voting rule is W[2]-hard
parameterized by kd.
We now show that the OPTIMAL DEFENSE problem for scoring rules is W[2]-hard paramet-
erized by ka also by exhibiting a parameter preserving reduction from a problem closely
related to HITTING SET, which is SET COVER problem parameterized by the solution size.
The SET COVER problem is defined as follows. This is a W[2]-complete problem [23]. We
now present our W[2]-hardness proof for the OPTIMAL DEFENSE problem for scoring rules
parameterized by ka, by a reduction from SET COVER.
◮ Definition 20 (SET COVER). Given an universe U, a set S = {Si : i ∈ [t]} of subsets of U, and
a non-negative integer k which is at most t, does there exists an index set I ⊂ [t] with I = k
such that Si∈I Si = U. We denote an arbitrary instance of SET COVER by (U, S, k).
◮ Theorem 21. The OPTIMAL DEFENSE problem for every scoring rule and Condorcet rule is
W[2]-hard parameterized by ka.
◮ Theorem 22. The OPTIMAL DEFENSE problem for every scoring rule is W[2]-hard paramet-
erized by ka.
Proof. Let (U, S = {Sj : j ∈ [t]}, k) be an arbitrary instance of SET COVER. Let U = {zi :
i ∈ [n]}. We assume that k > 3 since otherwise the SET COVER instance is polynomial
time solvable. For i ∈ [n], let fi be the number of j ∈ [t] such that zi ∈ Sj; that is, fi =
{j ∈ [t] : zi ∈ Sj}. We assume, without loss of generality, that for every i ∈ [n], t − fi −
k > 3k by adding at most 9t empty sets in S. We construct the following instance of the
OPTIMAL DEFENSE problem for the scoring rule induced by the score vector −→
α rule. The set
of candidates C = {xi : i ∈ [n]} ∪ {y, d}. Let −→
α be any normalized score vector of length n + 2.
We have the following voter groups.
P. Dey, N. Misra, S. Nath, and G. Shakya
13
-- For every j ∈ [t], we have a voter group Gj. For every i ∈ [n] and j ∈ [t] with zi /∈ Sj, we
have 2 copies of Pd
xi
.
-- We have another voter group H where, for every i ∈ [n], we have 2tn + (2(t − fi − k) + 1)
copies of Pxi
d and 2tn copies of Py
d.
We define attacker resource ka to be k and the defender's resource kd to be t − k. This
finishes the description of the OPTIMAL DEFENSE instance. We first observe that the score
of the candidate d is strictly less than the score of every other candidate. We now observe
that the candidate y is the unique winner of the election since the score of the candidate y
is 2k − 1 more than the score of the candidate xi for every i ∈ [n]. We now prove that the
OPTIMAL DEFENSE instance (C, ∪j∈[t]Gj ∪ H, ka, kd) is equivalent to the SET COVER instance
(U, S, k).
In the forward direction, let us suppose that the SET COVER instance is a YES instance. Let
I ⊂ [t] be such that I = k and Sj∈I Sj = U. We claim that the defender's strategy of
defending the voter groups Gj for every j ∈ [t] \ I results in a successful defense. To see
this, we first observe that, if the attacker attacks the voter group H, then the candidate y
continues to uniquely win the election irrespective of what other voter groups the attacker
attacks. Indeed, since t − fi − k > 3k for every i ∈ [n], the score of the candidate xi is strictly
less than the score of the candidate y irrespective of what other voter groups the attacker
attacks. Since, for every i ∈ [n] and j ∈ [t], the score of the candidate xi is not more than
the score of the candidate y in the voter group Gj, we may assume that the attacker attacks
the voter group Gj for every j ∈ I (since they are the only voter groups unprotected except
H). Now, since Sj, j ∈ I forms a set cover of U, after deleting the voter groups Gj, j ∈ I, the
score of the candidate xi increases by at most 2(k − 1) from the original election for every
i ∈ [n]. Hence, after deleting the voter groups Gj, j ∈ I, the score of the candidate xi is still
strictly less than the score of the candidate y. Hence the candidate y continues to win and
thus the defense is successful. Hence the OPTIMAL DEFENSE instance is a YES instance.
In the other direction, let us suppose that the OPTIMAL DEFENSE instance is a YES instance.
We assume, without loss of generality, that the defender protects exactly t − k voter groups.
We argued in the forward direction that we can assume, without loss of generality, that
the attacker never attacks the voter group H. Hence, we can also assume, without loss of
generality, that the defender also does not defend the voter group H. Let I ⊂ [t] be such
that I = k and the defender defends the voter group Gj for every j ∈ [t] \ I. We claim
that the sets Sj, j ∈ I forms a set cover of U. Suppose not, then let zi be an element in U
which is not covered by Sj, j ∈ I. We observe that attacking the voter groups Gj for every
j ∈ I increases the score of the candidate xi by 2k which makes the candidate y lose in the
resulting election (after deleting the voter groups Gj for every j ∈ I) since the score of xi is
strictly more than the score of y. This contradicts our assumption that defending the voter
group Gj for every j ∈ [t] \ I is a successful defense strategy. Hence Sj, j ∈ I forms a set cover
of U and thus the SET COVER instance is a YES instance.
◭
We now present our W[2]-hardness proof for the OPTIMAL DEFENSE problem for the Con-
dorcet voting rule parameterized by ka.
◮ Theorem 23. The OPTIMAL DEFENSE problem for the Condorcet voting rule is W[2]-hard
parameterized by ka.
Proof. Let (U, S = {Sj : j ∈ [t]}, k) be an arbitrary instance of SET COVER. Let U = {zi :
14
A Parameterized Perspective on Protecting Elections
i ∈ [n]}. We assume that k > 3 since otherwise the SET COVER instance is polynomial time
solvable. For i ∈ [n], let fi be the number of j ∈ [t] such that zi ∈ Sj; that is, fi = {j ∈
[t] : zi ∈ Sj}. We assume, without loss of generality, that for every i ∈ [n], t − fi − k > 3k
by adding at most 9t empty sets in S. We construct the following instance of the OPTIMAL
DEFENSE problem for the Condorcet voting rule. The set of candidates C = {xi : i ∈ [n]} ∪ {y}.
We have the following voter groups.
-- For every j ∈ [t], we have a voter group Gj. For every i ∈ [n] and j ∈ [t], we have
DGj (y, xi) = 2 if zi /∈ Sj and DGj (y, xi) = 0 otherwise. We also have DGj (xi, xℓ) = 0 for
every j ∈ [t], i, ℓ ∈ [n] with i 6= ℓ.
-- We have another voter group H where, for every i ∈ [n], we have DH(xi, y) = 2(t − fi −
k). We also have DH(xi, xℓ) = 0 for every i, ℓ ∈ [n] with i 6= ℓ.
We define attacker resource ka to be k and the defender's resource kd to be t − k. This fin-
ishes the description of the OPTIMAL DEFENSE instance. We first observe that the candidate
y is a Condorcet winner of the resulting election. We now prove that the OPTIMAL DEFENSE
instance (C, ∪j∈[t]Gj ∪ H, ka, kd) is equivalent to the SET COVER instance (U, S, k).
In the forward direction, let us suppose that the SET COVER is a YES instance. Let I ⊂ [t]
be such that I = k and Sj∈I Sj = U. We claim that the defender's strategy of defending
the voter groups Gj for every j ∈ [t] \ I results in a successful defense. To see this, we first
observe that, we can assume without loss of generality that the attacker does not attack the
voter group H since the candidate y loses every pairwise election in H. Since, for every
i ∈ [n] and j ∈ [t], the candidate y does not lose any pairwise election in the voter group
Gj, we may assume that the attacker attacks the voter group Gj for every j ∈ I (since they
are the only voter groups unprotected except H). Now, since Sj, j ∈ I forms a set cover of
U, after deleting the voter groups Gj, j ∈ I, we have D∪j∈[t]\IGi∪H(y, xi) > 2(t − fi − k +
1) − 2(t − fi − k) = 2 for every i ∈ [n]. Hence, after deleting the voter groups Gj, j ∈ I,
the candidate y continues to be the Condorcet winner of the remaining profile. Hence the
OPTIMAL DEFENSE instance is a YES instance.
In the other direction, let us suppose that the OPTIMAL DEFENSE instance is a YES instance.
We assume, without loss of generality, that the defender protects exactly t − k voter groups.
We argued in the forward direction that we can assume, without loss of generality, that
the attacker never attacks the voter group H. Hence, we can also assume, without loss of
generality, that the defender also does not defend the voter group H. Let I ⊂ [t] be such that
I = k and the defender defends the voter group Gj for every j ∈ [t] \ I. We claim that the
sets Sj, j ∈ I forms a set cover of U. Suppose not, then let zi be an element in U which is not
covered by Sj, j ∈ I. We observe that D∪j∈[t]\IGi ∪H(y, xi) = 2(t−fi−k)−2(t−fi −k) = 0 and
thus attacking the voter groups Gj for every j ∈ I makes the candidate y not the Condorcet
winner. This contradicts our assumption that defending the voter group Gj for every j ∈ [t]\I
is a successful defense strategy. Hence Sj, j ∈ I forms a set cover of U and thus the SET COVER
instance is a YES instance.
◭
We now show that the OPTIMAL ATTACK problem for the scoring rules is W[1]-hard even
parameterized by the combined parameter ka and kd. Towards that, we exhibit a polyno-
mial parameter transform from the CLIQUE problem parameterized by the size of the clique
we are looking for which is known to be W[1]-complete. The CLIQUE problem is defined as
follows.
P. Dey, N. Misra, S. Nath, and G. Shakya
15
◮ Definition 24 (CLIQUE). Given a graph G and an integer k, does there exist a clique in G of
size k? We denote an arbitrary instance of CLIQUE by (G, k).
◮ Theorem 25. The OPTIMAL ATTACK problem for every scoring rule is W[1]-hard parameter-
ized by (ka, kd).
Proof. Let (G = (V, E), k) be an arbitrary instance of the CLIQUE problem. Let V = {vi :
i ∈ [n]} and E = {ej : j ∈ [m]}. Let −→
α be any arbitrary normalized score vector of length
m + 2. We construct the following instance of the OPTIMAL ATTACK problem for the scoring
rule induced by the score vector −→
α . The set of candidates C = {xj : j ∈ [m]} ∪ {y, d}. We have
the following voter groups.
-- For every i ∈ [n], we have a voter group Gi. For every i ∈ [n], we have 10m copies of Px
d
in the voter group Gi if the
for every x ∈ C \ {d} in Gi. We also have two copies of Pd
xj
edge ej is incident on the vertex vi, for every i ∈ [m] and j ∈ [m].
-- We have another voter group H. We have one copy of Pxj
d for every j ∈ [m] in H.
We define attacker resource ka to be k and the defender's resource kd to be k − 2. This
finishes the description of the OPTIMAL ATTACK instance. Let Q be the resulting profile; that
it Q = ∪i∈[n]Gi ∪ H. We first observe that the candidate y is the winner of the resulting
election since sQ(y) = sQ(xj) + 3 and sQ(y) > sQ(d). This completes a description of the
construction. Due to lack of space, we defer the proof of equivalence to a longer version of
this manuscript. We now prove that the OPTIMAL ATTACK instance (C, Q, ka, kd) is equivalent
to the CLIQUE instance (G, k).
In the forward direction, let us assume that U = {vi : i ∈ I} ⊂ V with I = k forms a clique
in G. We claim that attacking all the voter groups Gi, i ∈ I forms a successful attack. Indeed,
suppose the defender defends all the voter groups Gi, i ∈ I except Gℓ and Gℓ′ . Let ej⋆ be
the edge between the vertices vℓ and vℓ′ in G. Let the profile after the attack be G; that is,
G = ∪i∈[n]\IGi ∪ Gℓ ∪ Gℓ′ ∪ H. Then we have s G(y) = s G(xj⋆ ) − 1 and thus the candidate y
does not win after the attack. Hence the OPTIMAL ATTACK instance is YES instance.
In the other direction, let the OPTIMAL ATTACK instance be a YES instance. We first observe
that the candidate d performs worse than everyone else in every voter group and thus d can
never win. Now we can assume, without loss of generality, that the attacker does not attack
the voter group H since the candidate y is not receiving more score than any other candidate
except d in H. Let attacking all the voter groups Gi, i ∈ I with I 6 k is a successful attack.
We observe that if I < k, then defending any k − 2 of the groups that are attacked foils the
attack -- since the candidate y continues to win even after deleting any one group. Hence we
have I = k. Let us consider the subset of vertices U = {vi : i ∈ I}. We claim that U forms a
clique in G. Indeed, if not, then let us assume that there exists two indices ℓ, ℓ′ ∈ I such that
there is no edge between the vertices vℓ and vℓ′ in G. Let us consider the defender strategy
of defending all the voter groups Gi, i ∈ I \ {ℓ, ℓ′}. We observe that the candidate y continues
to uniquely receive the highest score among all the candidates and thus y wins uniquely in
the resulting election. This contradicts our assumption that attacking all the voter groups
Gi, i ∈ I with I 6 k is a successful attack. Hence U forms a clique in G and thus the CLIQUE
instance is a YES instance.
◭
We now show similar result as of Theorem 25 for the Condorcet voting rule.
16
A Parameterized Perspective on Protecting Elections
◮ Theorem 26. The OPTIMAL ATTACK problem for the Condorcet voting rule is W[1]-hard
parameterized by (ka, kd).
Proof. Let (G = (V, E), k) be an arbitrary instance of the CLIQUE problem. Let V = {vi :
i ∈ [n]} and E = {ej : j ∈ [m]}. We construct the following instance of the OPTIMAL ATTACK
problem for the Condorcet voting rule. The set of candidates C = {xj : j ∈ [m]} ∪ {y}. We
have the following voter groups.
-- For every i ∈ [n], we have a voter group Gi. We have DGi (y, xj) = 2 if the edge ej is
incident on the vertex vi and DGi (y, xj) = 0 if the edge ej is not incident on the vertex
vi, for every i ∈ [n] and j ∈ [m]. We also have DGi (xℓ, xj) = 0 for every i ∈ [n], j, ℓ ∈ [m],
and j 6= ℓ.
-- We have another voter group H where we have DH(xj, y) = 2 for every j ∈ [m] and
DH(xℓ, xj) = 0 for every j, ℓ ∈ [m] and j 6= ℓ.
We define attacker resource ka to be k and the defender's resource kd to be k − 2. This
finishes the description of the OPTIMAL ATTACK instance. Let Q be the resulting profile;
that it Q = ∪i∈[n]Gi ∪ H. We first observe that the candidate y is the Condorcet winner
of the resulting election. We now prove that the OPTIMAL ATTACK instance (C, Q, ka, kd) is
equivalent to the CLIQUE instance (G, k).
In the forward direction, let us assume that U = {vi : i ∈ I} ⊂ V with I = k forms a clique
in G. We claim that attacking all the voter groups Gi, i ∈ I forms a successful attack. Indeed,
suppose the defender defends all the voter groups Gi, i ∈ I except Gℓ and Gℓ′ . Let ej⋆ be
the edge between the vertices vℓ and vℓ′ in G. Let the profile after the attack be G; that is,
G = ∪i∈[n]\IGi ∪ Gℓ ∪ Gℓ′ ∪ H. Then we have D G(y, xj⋆ ) = 0 and thus the candidate y is not
the unique winner after the attack. Hence the OPTIMAL ATTACK instance is YES instance.
In the other direction, let the OPTIMAL ATTACK instance be a YES instance. We can assume,
without loss of generality, that the attacker does not attack the voter group H since the
candidate y loses every pairwise election in H. Let attacking all the voter groups Gi, i ∈ I
with I 6 k is a successful attack. We observe that if I < k, then defending any k − 2
of the groups that are attacked foils the attack -- since the candidate y continues to be the
Condorcet winner even after deleting any one group. Hence we have I = k. Let us consider
the subset of vertices U = {vi : i ∈ I}. We claim that U forms a clique in G. Indeed, if not,
then let us assume that there exists two indices ℓ, ℓ′ ∈ I such that there is no edge between
the vertices vℓ and vℓ′ in G. Let us consider the defender strategy of defending all the voter
groups Gi, i ∈ I \ {ℓ, ℓ′}. We observe that the candidate y continues to be the Condorcet
winner in the resulting election. This contradicts our assumption that attacking all the voter
groups Gi, i ∈ I with I 6 k is a successful attack. Hence U forms a clique in G and thus the
CLIQUE instance is a YES instance.
◭
Once we have a parameterized algorithm for the OPTIMAL DEFENSE problem for the para-
meter (ka, kd), an immediate question is whether there exists a kernel for the OPTIMAL
DEFENSE problem of size polynomial in (ka, kd). We know that the HITTING SET problem
does not admit polynomial kernel parameterized by the universe size [23]. We observe that
the reductions from the HITTING SET problem to the OPTIMAL DEFENSE problem in The-
orem 15 and ?? are polynomial parameter transformations. Hence we immediately have the
following corollary.
P. Dey, N. Misra, S. Nath, and G. Shakya
17
◮ Corollary 27. The OPTIMAL DEFENSE and OPTIMAL ATTACK problems for the scoring rules
and the Condorcet rule do not admit a polynomial kernel parameterized by (ka, kd).
5
The FPT Algorithm
We complement the negative results of Observation 1 and Theorem 22 by presenting an FPT
algorithm for the OPTIMAL DEFENSE problem parameterized by (ka, kd). In the absence of
a defender, that is when kd = 0, Yin et al. [56] showed that the OPTIMAL DEFENSE problem
is polynomial time solvable for the plurality voting rule. Their polynomial time algorithm
for the OPTIMAL DEFENSE problem can easily be extended to any scoring rule. Using this
polynomial time algorithm, we design the following O∗(kkd
a ) time algorithm for the OPTIMAL
DEFENSE problem for scoring rules. This result shows that the OPTIMAL DEFENSE problem
is fixed parameter tractable with (ka, kd) as the parameter.
◮ Theorem 28. There is an algorithm for the OPTIMAL DEFENSE problem for every scoring
rule and the Condorcet voting rule which runs in time O∗(kkd
a ).
Proof. Let us prove the result for any scoring rule. The proof for the Condorcet voting rule
is exactly similar. Initially we run the attacking algorithm over the n voter groups without
any group being protected. If a successful attack exists, the algorithm outputs the ka groups
to be deleted. We recursively branch on ka cases by protecting one of these ka groups in
each branch and running the attacking algorithm again. In addition, the parameter kd is
also reduced by 1 each time a group is protected. When kd=0, the attacking algorithm is
run on all the leaves of the tree and a valid protection strategy exists as long as for at least
one of the leaves the attack outputs no i.e. after deploying resources to protect kd groups
the attacker is unable to change the outcome of the election with any strategy. The groups
to be protected is determined by traversing the tree that leads to the particular leaf which
did not output an attack. Clearly the number of nodes in this tree is bounded by kkd
a . The
amount of time taken to find an attack at each node is bounded by poly(n). Hence the
running time of this algorithm is bounded by kkd
◭
a .poly(n).
6
Experiments
Though the previous sections show that the optimal defending problem is computationally
intractable, it is a worst-case result.
In practice, elections have voting profiles that are
generated from some (possibly known) distribution. In this section, we conduct an empirical
study to understand how simple defending strategies perform for two such statistical voter
generation models. The defending strategies we consider are variants of a simple greedy
policy.
Defending strategy: For a given voting profile and a voting rule, the defending strategy finds
the winner. Suppose the winner is a. The strategy considers a with every other candidate,
and for each such pair it creates a sorted list of classes based on the winning margin of
votes for a in those classes, and picks the top kd classes to form a sub-list. Now, among
all these (m − 1) sorted sub-lists, the strategy picks the most frequent kd classes to protect.
We call this version of the strategy GREEDY 1. For certain profiles an optimal attacker (a)
may change the outcome by attacking some of the unprotected classes or (b) is unable to
18
A Parameterized Perspective on Protecting Elections
2
Y
D
E
E
R
G
0.35
0.3
0.25
0.2
0.15
0.1
0.05
0.0
1000
1
Y
D
E
E
R
G
800
600
400
200
0
Plurality
Veto
Borda
P
V
B
P
V
B
P
V
B
P
V
B
P
V
B
P
V
B
P
V
B
P
V
B
P
V
B
optimal and defended
optimal but not defended
not optimal
7
8
9
10
2
3
4
5
6
kd
Figure 1 Performances of GREEDY 1 and GREEDY 2 for uniform voting profile generation model.
change the outcome. If (a) occurs, then there is a possibility that for the value of kd there
does not exist any defense strategy which can guard the election from all possible strategies
of the attacker. In that case, GREEDY 1 is optimal and is not optimal otherwise. It is always
optimal for case (b). Note that, given a profile and kd protected classes, it is easy to find
if there exists an optimal attack strategy, while it is not so easy to identify whether there
does not exist any defending strategy if the GREEDY 1 fails to defend. We find the latter
with a brute-force search for this experiment. A small variant of GREEDY 1 is the following:
when GREEDY 1 is unable to defend (which is possible to find out in poly-time), the strategy
chooses to protect kd classes uniformly at random. Call this strategy GREEDY 2.
2
Y
D
E
E
R
G
0.45
0.4
0.35
0.3
0.25
0.2
0.15
0.1
0.05
0.0
1000
1
Y
D
E
E
R
G
800
600
400
200
0
Plurality
Veto
Borda
P
V
B
V
P
B
P
V
B
P
V
B
P
V
B
P
V
B
P
V
B
P
V
B
P
V
B
optimal and defended
optimal but not defended
not optimal
7
8
9
10
2
3
4
5
6
kd
Figure 2 Performances of GREEDY 1 and GREEDY 2 for voting profile generation model with two
major contesting candidates.
Voting profile generation: Fix m = 5. We generate 1000 preference profiles over these
alternatives for n = 12000, where each vote is picked uniformly at random from the set of
all possible strict preference orders over m alternatives. The voters are partitioned into 12
classes containing equal number of voters. We consider three voting rules: plurality, veto,
and Borda. The lower plot in Figure 1 shows the number of profiles which belongs to the
three categories: (i) GREEDY 1 defends (is optimal), (ii) GREEDY 1 cannot defend but no
defending strategy exists (is optimal), (iii) GREEDY 1 cannot defend but defending strategy
P. Dey, N. Misra, S. Nath, and G. Shakya
19
exists (not optimal). The x-axis shows different values of kd and we fix ka = 12 − kd.
The upper plot of Figure 1 shows the fraction of the profiles successfully defended by GREEDY
2 where GREEDY 1 is not optimal (i.e., cannot defend but defending strategy exists) when
GREEDY 2 uniformly at random picks kd classes 100 times. These fractions therefore serves
as an empirical probability of successful defense of GREEDY 2 given GREEDY 1 is not optimal.
In an election where the primary contest happens between two major candidates, even
though there are more candidates present, the generation model may be a little different.
We also consider another generation model that generates 40% profiles having a fixed al-
ternative a on top and the strict order of the (m − 1) alternatives is picked uniformly at
random, a similar 40% profiles with some other alternative b on top, and the remaining
20% preferences are picked uniformly at random from the set of all possible strict prefer-
ence orders. Similar experiments are run on this generation model and results are shown in
Figure 2.
The results show that even though optimal defense is a hard problem, a simple strategy
like greedy achieves more than 70% optimality. From the rest 30% non-optimal cases, the
variant GREEDY 2 is capable of salvaging it into optimal with probability almost 5% for
uniform generation model and above 5% for two-major contestant generation model for
kd = ka = 6. This empirically hints at a possibility that defending real elections may not be
too difficult.
7
Conclusion
We have considered the OPTIMAL DEFENSE problem from a primarily parameterized per-
spective for scoring rules and the Condorcet voting rule. We showed hardness in the number
of candidates, the number of resources for the defender or the attacker. On the other hand,
we show tractability for the combined parameter (ka, kd). We also introduced the OPTIMAL
ATTACK problem, which is hard even for the combined parameter (ka, kd), and also showed
the hardness for a constant number of candidates. Even though the OPTIMAL DEFENSE prob-
lem is hard, empirically we show that relatively simple mechanisms ensure good defending
performance for reasonable voting profiles.
References
1
2
3
4
halderman
Alex
http://www.popsci.com/brilliant-10-alex-halderman-strengthens-democracy-using-software,
2010.
strengthens
using
software,
democracy
Popular
Science,
Election day bombings
https://www.rt.com/news/pakistan-election-day-bombing-136, 2013.
sweep pakistan:
Over 30 killed, more than 200 injured.
Bo An, Matthew Brown, Yevgeniy Vorobeychik, and Milind Tambe. Security games with surveil-
lance cost and optimal timing of attack execution. In International conference on Autonomous
Agents and Multi-Agent Systems, AAMAS '13, Saint Paul, MN, USA, May 6-10, 2013, pages 223 --
230, 2013.
John J. Bartholdi, Craig A. Tovey, and Michael A. Trick. How hard is it to control an election?
Mathematical and Computer Modelling, 16(8):27 -- 40, 1992.
20
A Parameterized Perspective on Protecting Elections
5
6
7
Dorothea Baumeister, Magnus Roos, and Jörg Rothe. Computational complexity of two variants
of the possible winner problem. In The 10th International Conference on Autonomous Agents and
Multiagent Systems (AAMAS), pages 853 -- 860, 2011.
Nadja Betzler and Johannes Uhlmann. Parameterized complexity of candidate control in elec-
tions and related digraph problems. Theor. Comput. Sci., 410(52):5425 -- 5442, 2009.
Satarupa Bhattacharjya.
http://www.sundaytimes.lk/100411/News/nws_16.html, 2010.
Low turnout and invalid votes mark first post war general polls.
8 Hans L. Bodlaender, Stéphan Thomassé, and Anders Yeo. Kernel Bounds for Disjoint Cycles
and Disjoint Paths. In Amos Fiat and Peter Sanders, editors, Proc. 17th Annual European Sym-
posium,on Algorithms (ESA 2009), Copenhagen, Denmark, September 7-9, 2009., volume 5757 of
Lecture Notes in Computer Science, pages 635 -- 646. Springer, 2009.
9
10
11
12
Felix Brandt, Vincent Conitzer, Ulle Endriss, Jérôme Lang, and Ariel Procaccia. Handbook of
computational social choice, 2016.
Laurent Bulteau, Jiehua Chen, Piotr Faliszewski, Rolf Niedermeier, and Nimrod Talmon. Com-
binatorial voter control in elections. Theor. Comput. Sci., 589:99 -- 120, 2015.
Jiehua Chen, Piotr Faliszewski, Rolf Niedermeier, and Nimrod Talmon. Elections with few voters:
Candidate control can be easy. In Proc. Twenty-Ninth AAAI Conference on Artificial Intelligence,
January 25-30, 2015, Austin, Texas, USA., pages 2045 -- 2051, 2015.
Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. Introduction to
Algorithms, Third Edition. The MIT Press, 3rd edition, 2009.
13 Marek Cygan, Fedor V. Fomin, Lukasz Kowalik, Daniel Lokshtanov, Dániel Marx, Marcin Pilip-
czuk, Michal Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer, 2015.
14
15
16
17
18
19
20
21
22
Palash Dey. Manipulative elicitation - A new attack on elections with incomplete preferences.
Theor. Comput. Sci., 731:36 -- 49, 2018.
Palash Dey. Optimal bribery in voting. In Proc. International Conference on Autonomous Agents
and Multiagent Systems, AAMAS, 2019.
Palash Dey and Neeldhara Misra. On the exact amount of missing information that makes finding
possible winners hard. In Proc. 42nd International Symposium on Mathematical Foundations of
Computer Science, MFCS, pages 57:1 -- 57:14, 2017.
Palash Dey, Neeldhara Misra, and Y. Narahari. Detecting possible manipulators in elections.
In Proc. International Conference on Autonomous Agents and Multiagent Systems, AAMAS, pages
1441 -- 1450, 2015.
Palash Dey, Neeldhara Misra, and Y. Narahari. Kernelization complexity of possible winner and
coalitional manipulation problems in voting. Theor. Comput. Sci., 616:111 -- 125, 2016.
Palash Dey, Neeldhara Misra, and Y. Narahari. Kernelization complexity of possible winner and
coalitional manipulation problems in voting. Theor. Comput. Sci., 616:111 -- 125, 2016.
Palash Dey, Neeldhara Misra, and Y. Narahari. Frugal bribery in voting. Theor. Comput. Sci.,
676:15 -- 32, 2017.
Palash Dey, Neeldhara Misra, and Y. Narahari. Complexity of manipulation with partial inform-
ation in voting. Theor. Comput. Sci., 726:78 -- 99, 2018.
Palash Dey, Neeldhara Misra, and Y. Narahari. Parameterized dichotomy of choosing committees
based on approval votes in the presence of outliers. Theor. Comput. Sci., 2019.
P. Dey, N. Misra, S. Nath, and G. Shakya
21
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
Rod G Downey and Michael Ralph Fellows. Parameterized Complexity, volume 3. springer Heidel-
berg, 1999.
Gábor Erdélyi, Edith Hemaspaandra, and Lane A. Hemaspaandra. More natural models of elect-
oral control by partition. In Algorithmic Decision Theory - 4th International Conference, ADT 2015,
Lexington, KY, USA, September 27-30, 2015, Proceedings, pages 396 -- 413, 2015.
Gábor Erdélyi, Markus Nowak, and Jörg Rothe. Sincere-strategy preference-based approval
voting fully resists constructive control and broadly resists destructive control. Math. Log. Q.,
55(4):425 -- 443, 2009.
Gábor Erdélyi and Jörg Rothe. Control complexity in fallback voting. In Theory of Computing
2010, CATS 2010, Brisbane, Australia, January 2010, pages 39 -- 48, 2010.
Piotr Faliszewski, Edith Hemaspaandra, and Lane A. Hemaspaandra. Multimode control attacks
on elections. J. Artif. Intell. Res. (JAIR), 40:305 -- 351, 2011.
Piotr Faliszewski, Edith Hemaspaandra, and Lane A. Hemaspaandra. Weighted electoral control.
J. Artif. Intell. Res. (JAIR), 52:507 -- 542, 2015.
Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra, and Jörg Rothe. Llull and
copeland voting broadly resist bribery and control. In Proc. Twenty-Second AAAI Conference on
Artificial Intelligence, July 22-26, 2007, Vancouver, British Columbia, Canada, pages 724 -- 730,
2007.
Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra, and Jörg Rothe. Copeland
voting fully resists constructive control. In Algorithmic Aspects in Information and Management,
4th International Conference, AAIM 2008, Shanghai, China, June 23-25, 2008. Proceedings, pages
165 -- 176, 2008.
Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra, and Jörg Rothe. Llull and cope-
land voting computationally resist bribery and constructive control. J. Artif. Intell. Res. (JAIR),
35:275 -- 341, 2009.
Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra, and Jörg Rothe. The shield
that never was: societies with single-peaked preferences are more open to manipulation and
control.
In Proc. 12th Conference on Theoretical Aspects of Rationality and Knowledge (TARK-
2009), Stanford, CA, USA, July 6-8, 2009, pages 118 -- 127, 2009.
Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra, and Jörg Rothe. The shield that
never was: Societies with single-peaked preferences are more open to manipulation and control.
Inf. Comput., 209(2):89 -- 107, 2011.
Zack Fitzsimmons, Edith Hemaspaandra, and Lane A. Hemaspaandra. Control in the presence of
manipulators: Cooperative and competitive cases. In IJCAI 2013, Proc. 23rd International Joint
Conference on Artificial Intelligence, Beijing, China, August 3-9, 2013, pages 113 -- 119, 2013.
Jörg Flum and Martin Grohe. Parameterized Complexity Theory, volume 3. Springer, 2006.
Edith Hemaspaandra, Lane A. Hemaspaandra, and Jörg Rothe. Hybrid elections broaden
complexity-theoretic resistance to control. Math. Log. Q., 55(4):397 -- 424, 2009.
Edith Hemaspaandra, Lane A. Hemaspaandra, and Jörg Rothe. Controlling candidate-sequential
elections. In ECAI 2012 - 20th European Conference on Artificial Intelligence. Including Prestigi-
ous Applications of Artificial Intelligence (PAIS-2012) System Demonstrations Track, Montpellier,
France, August 27-31 , 2012, pages 905 -- 906, 2012.
38
Lane A. Hemaspaandra, Rahman Lavaee, and Curtis Menton. Schulze and ranked-pairs voting
are fixed-parameter tractable to bribe, manipulate, and control. In International conference on
22
A Parameterized Perspective on Protecting Elections
Autonomous Agents and Multi-Agent Systems, AAMAS '13, Saint Paul, MN, USA, May 6-10, 2013,
pages 1345 -- 1346, 2013.
39
Joshua Letchford, Vincent Conitzer, and Kamesh Munagala. Learning and approximating the
optimal strategy to commit to.
In Algorithmic Game Theory, Second International Symposium,
SAGT 2009, Paphos, Cyprus, October 18-20, 2009. Proceedings, pages 250 -- 262, 2009.
40 Hong Liu, Haodi Feng, Daming Zhu, and Junfeng Luan. Parameterized computational complex-
ity of control problems in voting systems. Theor. Comput. Sci., 410(27-29):2746 -- 2753, 2009.
41 Hong Liu and Daming Zhu. Parameterized complexity of control problems in maximin election.
Inf. Process. Lett., 110(10):383 -- 388, 2010.
42 Hong Liu and Daming Zhu. Parameterized complexity of control by voter selection in maximin,
copeland, borda, bucklin, and approval election systems. Theor. Comput. Sci., 498:115 -- 123,
2013.
43
44
45
46
47
48
49
50
51
52
53
Krzysztof Magiera and Piotr Faliszewski. How hard is control in single-crossing elections? In
ECAI 2014 - 21st European Conference on Artificial Intelligence, 18-22 August 2014, Prague, Czech
Republic - Including Prestigious Applications of Intelligent Systems (PAIS 2014), pages 579 -- 584,
2014.
Nicholas Mattei, Nina Narodytska, and Toby Walsh. How hard is it to control an election by
breaking ties? In Torsten Schaub, Gerhard Friedrich, and Barry O'Sullivan, editors, ECAI, volume
263 of Frontiers in Artificial Intelligence and Applications, pages 1067 -- 1068. IOS Press, 2014.
Cynthia Maushagen and Jörg Rothe. Complexity of control by partitioning veto and maximin
elections and of control by adding candidates to plurality elections.
In ECAI 2016 - 22nd
European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Neth-
erlands - Including Prestigious Applications of Artificial Intelligence (PAIS 2016), pages 277 -- 285,
2016.
David C McGarvey. A theorem on the construction of voting paradoxes. Econometrica, pages
608 -- 610, 1953.
Curtis Menton. Normalized range voting broadly resists control.
53(4):507 -- 531, 2013.
Theory Comput. Syst.,
Curtis Glen Menton and Preetjot Singh. Control complexity of schulze voting. In IJCAI 2013,
Proc. 23rd International Joint Conference on Artificial Intelligence, Beijing, China, August 3-9,
2013, pages 286 -- 292, 2013.
Tomasz Miasko and Piotr Faliszewski. The complexity of priced control in elections. Ann. Math.
Artif. Intell., 77(3-4):225 -- 250, 2016.
Rolf Niedermeier.
Tübingen, 2002.
Invitation to fixed-parameter algorithms. Habilitationschrift, University of
David C. Parkes and Lirong Xia. A complexity-of-strategic-behavior comparison between
schulze's rule and ranked pairs. In Proc. Twenty-Sixth AAAI Conference on Artificial Intelligence,
July 22-26, 2012, Toronto, Ontario, Canada., 2012.
Tomasz Put and Piotr Faliszewski. The complexity of voter control and shift bribery under
parliament choosing rules. Trans. Computational Collective Intelligence, 23:29 -- 50, 2016.
Jianxin Wang, Weimin Su, Min Yang, Jiong Guo, Qilong Feng, Feng Shi, and Jianer Chen.
Parameterized complexity of control and bribery for d-approval elections. Theor. Comput. Sci.,
595:82 -- 91, 2015.
P. Dey, N. Misra, S. Nath, and G. Shakya
23
54
55
56
Scott Wolchok, Eric Wustrow, Dawn Isabel, and J. Alex Halderman. Attacking the washington,
D.C. internet voting system.
In Financial Cryptography and Data Security - 16th International
Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers,
pages 114 -- 128, 2012.
Lirong Xia and Vincent Conitzer. Determining possible and necessary winners under common
voting rules given partial orders. J. Artif. Intell. Res., 41(2):25 -- 67, 2011.
Yue Yin, Yevgeniy Vorobeychik, Bo An, and Noam Hazon. Optimally protecting elections.
In
Proc. Twenty-Fifth International Joint Conference on Artificial Intelligence, IJCAI 2016, New York,
NY, USA, 9-15 July 2016, pages 538 -- 545, 2016.
|
1112.1333 | 2 | 1112 | 2012-03-18T18:11:34 | Reaching an Optimal Consensus: Dynamical Systems that Compute Intersections of Convex Sets | [
"cs.MA"
] | In this paper, multi-agent systems minimizing a sum of objective functions, where each component is only known to a particular node, is considered for continuous-time dynamics with time-varying interconnection topologies. Assuming that each node can observe a convex solution set of its optimization component, and the intersection of all such sets is nonempty, the considered optimization problem is converted to an intersection computation problem. By a simple distributed control rule, the considered multi-agent system with continuous-time dynamics achieves not only a consensus, but also an optimal agreement within the optimal solution set of the overall optimization objective. Directed and bidirectional communications are studied, respectively, and connectivity conditions are given to ensure a global optimal consensus. In this way, the corresponding intersection computation problem is solved by the proposed decentralized continuous-time algorithm. We establish several important properties of the distance functions with respect to the global optimal solution set and a class of invariant sets with the help of convex and non-smooth analysis. | cs.MA | cs |
Reaching an Optimal Consensus: Dynamical
Systems that Compute Intersections of Convex Sets∗
Guodong Shi, Karl Henrik Johansson†and Yiguang Hong‡
Abstract
In this paper, multi-agent systems minimizing a sum of objective functions, where each
component is only known to a particular node, is considered for continuous-time dynamics
with time-varying interconnection topologies. Assuming that each node can observe a convex
solution set of its optimization component, and the intersection of all such sets is nonempty,
the considered optimization problem is converted to an intersection computation problem.
By a simple distributed control rule, the considered multi-agent system with continuous-time
dynamics achieves not only a consensus, but also an optimal agreement within the optimal
solution set of the overall optimization objective. Directed and bidirectional communications
are studied, respectively, and connectivity conditions are given to ensure a global optimal
consensus. In this way, the corresponding intersection computation problem is solved by the
proposed decentralized continuous-time algorithm. We establish several important properties
of the distance functions with respect to the global optimal solution set and a class of invariant
sets with the help of convex and non-smooth analysis.
Keywords: Multi-agent systems, Optimal consensus, Connectivity Conditions, Distributed
optimization, Intersection computation
1
Introduction
In recent years, multi-agent dynamics has been intensively investigated in various areas including
engineering, natural science, and social science. Cooperative control of multi-agent systems is an
∗This work has been supported in part by the Knut and Alice Wallenberg Foundation, the Swedish Research
Council, KTH SRA TNG, and the NNSF of China under Grant 61174071.
†G. Shi and K. H. Johansson are with ACCESS Linnaeus Centre, School of Electrical Engineering, Royal
Institute of Technology, Stockholm 10044, Sweden. Email: [email protected], [email protected]
‡Y. Hong is with Key Laboratory of Systems and Control, Institute of Systems Science, Chinese Academy of
Sciences, Beijing 100190, China. Email: [email protected]
1
active research topic, and rapid developments of distributed control protocols via interconnected
communication have been made to achieve the collective tasks, e.g., [16, 15, 12, 25, 10, 9, 20,
22, 17, 18]. However, fundamental challenges still lie in finding suitable tools to describe and
design the dynamical behavior of these systems and thus providing insights in their functioning
principles. Different from the classical control design, the multi-agent studies aim at fully
exploiting, rather than avoiding, interconnection between agents in analysis and synthesis in
order to deal with distributed design and large-scale information process.
Consensus is a basic problem of the study of multi-agent coordination, which usually requires
that all the agents achieve the same state, e.g., a certain relative position or velocity. To achieve
collective behavior, connectivity plays a key role in the coordination of multi-agent network,
and various connectivity conditions have been used to describe frequently switching topologies
in different cases. The "joint connection" or similar concepts are important in the analysis of
stability and convergence to guarantee a suitable convergence. Uniform joint-connection, i.e.,
the joint graph is connected during all intervals which are longer than a constant, has been
employed for different consensus problems [16, 15, 24, 19, 7]. On the other hand, [t,∞)-joint
connectedness, i.e., the joint graph is connected in the time intervals [t,∞), is necessary [22, 25],
and therefore the most general form to secure the global coordination.
Moreover, distributed optimization of a sum of convex objective functions,(cid:80)N
i=1 fi(z), where
each component fi is known only to node i, has attracted much attention in recent years, due
to its wide application in multi-agent systems and wireless networks [29, 30, 32, 31, 33]. A class
of subgradient-based incremental when some estimate of the optimal solution can be passed
over the network via deterministic or randomized iteration were studied in [29, 30, 34]. Then a
non-gradient-based algorithm was proposed in [33], where each node starts at its own optimal
solution and updates using a pairwise equalizing protocol. In view of multi-agent systems, the
local information transmitted over the neighborhood is usually limited to a convex combina-
tion of its neighbors [16, 15, 25]. Combining the ideas of consensus algorithms and subgradient
methods, a number of significant results were obtained. A subgradient method in combination
with consensus steps was given for solving coupled optimization problems with fixed undirected
topology in [31].
Then, an important work on multi-agent optimization was [27], where a
decentralized algorithm was proposed as a simple sum of an averaging (consensus) part and a
subgradient part, and convergence bounds for a distributed multi-agent model under various
connectivity conditions were shown. Constrained consensus and optimization were further stud-
2
ied in [28], where each agent was always restricted in its own convex set. A "projected consensus
algorithm" was presented to solve the constrained consensus problem in which each agent takes
averaging and projection steps alternatively, and it was generalized to "projected subgradient
algorithm" with optimization goal also took into consideration [28].
Most of the literature on optimization and consensus algorithms is in discrete time, and it is
usually hard for the considered agents to reach both consensus and optimum unless the weights
rule of the links, the step size in the iteration and the connectedness of the communication
graph are properly selected [27, 28, 30]. Few researchers have considered continuous-time agent
dynamics that solves a distributed optimization problem. However, dynamical system solution
to optimization problem is of great interest since a simple vector-field solution may provide
important geometrical insights. The classical Arrow-Hurwicz-Uzawa flow was shown to converge
to the set of saddle points for a constrained convex optimization problem [41]. Then in [42],
a simple and elegant continuous-time protocol was presented which solves linear programming
The goal of this paper is to establish a simple distributed continuous-time control law which
problems.
can ensure consensus and minimize(cid:80)N
that the intersection set,(cid:84)N
i=1 fi(z) asymptotically. Each optimal solution set, Xi of
optimization objective fi(z), is assumed to be a convex set observed only by node i. Assuming
i=1 Xi, is nonempty, the optimal solution set of the group objective
becomes this intersection set, and the considered optimization problem is then converted to a
distributed intersection computation problem.
In fact, computing several convex sets' inter-
section is a classical problem, and "alternating projection algorithm" was a standard solution,
in which the algorithm is carried out by iteratively projecting onto each set [38, 39, 40]. The
"projected consensus algorithm" presented in [28] can be viewed as its generalized version. The
intersection computation problem is also of interest in the study of computational geometry, a
branch of computer science [44, 45]. Hence, an important motivation for our work is to provide
a system-theoretic insight into the convergence properties of certain distributed optimization
problems. Similar to the continuous-time approximation of recursive algorithms [43] and con-
strained optimizations [41, 42], we establish a suitable dynamical model for such analysis. Also
by itself, the considered continuous-time distributed optimization problem has many applica-
tions, e.g., wireless resource allocation [29, 30], formation control [9, 22, 14], and mobile sensing
[10, 37].
In this paper, we present a simple dynamical system solution to this convex intersection
3
computation problem, as the sum of a consensus part and a projection part. Since this pro-
jection part can be viewed as a special subgradient information, this protocol is actually a
continuous-time version of the algorithm proposed in [27]. We show that an optimal consen-
sus (i.e., consensus within the global optimal solution set), can be achieved under time-varying
communications. Both directed and bidirectional cases are investigated, and sharp connectivity
conditions are obtained in the sense that a general optimal consensus will no longer hold for a
general model with weaker connectedness. Additionally, we use quite general weights rule which
allow the weight of each arc in the communication graph to depend on time or system state.
The rest of the paper is organized as follows. In Section 2, some preliminary concepts are
introduced. In Section 3, we formulate the considered optimal consensus problem, and the main
results are shown. Then, in Sections 4 and 5, convergence to the optimal solution set and global
consensus are analyzed, respectively, based on which the proofs of the main results are obtained.
Finally, in Section 6 concluding remarks are given.
2 Preliminaries
In this section, we introduce some notations and theories on graph theory [4], convex analysis
[1, 3] and nonsmooth analysis [5].
A directed graph (digraph) G = (V,E) consists of a finite set V of nodes and an arc set
E,
in which an arc is an ordered pair of distinct nodes of V. An element (i, j) ∈ E de-
scribes an arc which leaves i and enters j. A walk in digraph G is an alternating sequence
W : i1e1i2e2 . . . em−1im of nodes iκ and arcs eκ = (iκ, iκ+1) ∈ E for κ = 1, 2, . . . , m− 1. A walk is
called a path if the nodes of this walk are distinct, and a path from i to j is denoted as i → j. G
is said to be strongly connected if it contains path i → j and j → i for every pair of nodes i and
j. A digraph G is called to be bidirectional when for any two nodes i and j, (i, j) ∈ E if and only
if (j, i) ∈ E. Ignoring the direction of the arcs, the connectedness of a bidirectional digraph will
be transformed to that of the corresponding undirected graph. A time-varying graph is defined
as Gσ(t) = (V,Eσ(t)) with σ : [0, +∞) → Q as a piecewise constant function, where Q is a finite
set indicating all possible graphs. Moreover, the joint graph of Gσ(t) in time interval [t1, t2) with
t1 < t2 ≤ +∞ is denoted as G([t1, t2)) = ∪t∈[t1,t2)G(t) = (V,∪t∈[t1,t2)Eσ(t)).
A set K ⊂ Rm is said to be convex if (1 − λ)x + λy ∈ K whenever x ∈ K, y ∈ K and
0 ≤ λ ≤ 1. For any set S ⊂ Rm, the intersection of all convex sets containing S is called the
4
convex hull of S, denoted by co(S). The next lemma can be found in [2].
Lemma 2.1 Let K be a subset of Rm. The convex hull co(K) of K is the set of elements of
the form
m+1(cid:88)
i=1
x =
where λi ≥ 0, i = 1, . . . , m + 1 with(cid:80)m+1
i=1 λi = 1 and xi ∈ K.
Let K be a closed convex subset in Rm and denote xK
λixi,
= inf y∈K x − y as the distance
.
between x ∈ Rm and K, where · denotes the Euclidean norm. There is a unique element
PK(x) ∈ K satisfying x − PK(x) = xK associated to any x ∈ Rm [2]. The map PK is called
the projector onto K. We also have
(cid:104)PK(x) − x, PK(x) − y(cid:105) ≤ 0,
∀y ∈ K.
Moreover, PK has the following non-expansiveness property:
PK(x) − PK(y) ≤ x − y, x, y ∈ Rm.
Clearly, x2
K is continuously differentiable at point x, and (see [2])
∇x2
K = 2(x − PK(x)).
The following lemma was obtained in [22], which is useful in what follows.
Lemma 2.2 Suppose K ⊂ Rm is a convex set and xa, xb ∈ Rm. Then
(cid:104)xa − PK(xa), xb − xa(cid:105) ≤ xaK · xaK − xbK .
Particularly, if xaK > xbK, then
(cid:104)xa − PK(xa), xb − xa(cid:105) ≤ −xaK · (xaK − xbK).
(1)
(2)
(3)
(4)
(5)
Next, the upper Dini derivative of a continuous function h : (a, b) → R (−∞ ≤ a < b ≤ ∞)
at t is defined as
D+h(t) = lim sup
s→0+
h(t + s) − h(t)
s
.
When h is continuous on (a, b), h is non-increasing on (a, b) if and only if D+h(t) ≤ 0 for any
t ∈ (a, b). The next result is given for the calculation of Dini derivative (see [6, 24]).
5
Lemma 2.3 Let Vi(t, x) : R × Rd → R (i = 1, . . . , n) be C1 and V (t, x) = maxi=1,...,n Vi(t, x).
If I(t) = {i ∈ {1, 2, . . . , n} : V (t, x(t)) = Vi(t, x(t))} is the set of indices where the maximum is
reached at t, then D+V (t, x(t)) = maxi∈I(t)
Vi(t, x(t)).
Finally, consider a system
x = f (t, x),
(6)
where f : R × Rd → Rd is piecewise continuous in t and continuous in x. Let x(t) = x(t, t0, x0)
be a solution of (6) with initial condition x(t0) = x0. Then Ω0 ⊂ Rd is called a positively
invariant set of (6) if, for any t0 ∈ R and any x0 ∈ Ω0, x(t, t0, x0) ∈ Ω0 when t ≥ t0.
3 Problem Formulation and Main Results
In this section, we first define the considered optimal consensus problem. We propose a multi-
agent optimization model and a distributed control law to solve this optimization problem. Then
the main results are presented on connectivity conditions which can ensure an optimal consensus
globally.
3.1 Multi-agent Model
Consider a multi-agent system with agent set V = {1, 2, . . . , N}, for which the dynamics of each
agent is a first-order integrator:
xi = ui,
i = 1, . . . , N
(7)
where xi ∈ Rm represents the state of agent i, and ui is the control input.
The communication in the multi-agent network is modeled as a time-varying graph Gσ(t) =
(V,Eσ(t)). Moreover, node j is said to be a neighbor of i at time t when there is an arc (j, i) ∈ Eσ(t),
and Ni(σ(t)) represents the set of agent i's neighbors at time t. As usual in the literature
[15, 24, 22], an assumption is given to the variation of Gσ(t).
A1 (Dwell Time) There is a lower bound constant τD > 0 between two consecutive switching
time instants of σ(t).
We have the following definition.
Definition 3.1 (i) Gσ(t) is said to be uniformly jointly strongly connected (UJSC) if there exists
a constant T > 0 such that G([t, t + T )) is strongly connected for any t ≥ 0.
6
(ii) Assume that Gσ(t), t ≥ 0 is bidirectional. Gσ(t) is said to be infinitely jointly connected
(IJC) if G([t, +∞)) is connected for all t ≥ 0.
Remark 3.1 [t, +∞)-joint connectedness for all t ≥ 0 is equivalent to that there exists an
unbounded time sequence 0 ≤ t1 < ··· < tk < tk+1 < . . . such that G([tk, tk+1)) is connected for
all k = 1, 2, . . . . Note that it does not require an upper bound for tk+1 − tk in the definition.
The objective for this group of autonomous agents is to reach a consensus, and meanwhile to
cooperatively solve the following optimization problem
N(cid:88)
i=1
min
z∈Rm
fi(z)
(8)
where fi : Rm → R represents the cost function of agent i, observed by agent i only, and z is
a decision vector. We suppose the optimal solution set of each component fi exists, denoted
Xi
= {v fi(v) = min
.
z∈Rm
We impose the following assumptions.
fi(z)}.
A2 (Convexity) X1, . . . , XN , are closed convex sets.
A3 (Nonempty Intersection) X0
.
=
Xi is nonempty and bounded.
N(cid:84)
i=1
Remark 3.2 The assumption that each Xi is a convex set is quite general, and it is not hard
to see that this assumption will be satisfied as long as each fi is a convex function. Moreover,
since the intersection of convex sets is a convex set itself, X0 is a convex set with the convexity
of each Xi. Additionally, with A3, it is obvious to see that X0 is compact, and it is the optimal
solution set of (8).
3.2 Distributed Control
1 , . . . , xT
Denote x = (xT
arc (j, i), for i, j ∈ V. Then we present the following distributed control law:
N )T ∈ RmN and let the continuous function aij(x, t) > 0 be the weight of
(cid:88)
aij(x, t)(xj − xi) + PXi(xi) − xi, i = 1, . . . , N
ui =
(9)
j∈Ni(σ(t))
Remark 3.3 We write the arc weight aij(x, t) in a quite general form showing that this weight
function can be time-varying and may depend nonlinearly on the state. Note that this doesn't
mean global information is required for the control design.
7
Remark 3.4 When Xi can be observed by node i, PXi(xi(t)) − xi(t) can be easily obtained.
For instance, node i may first establish a local coordinate system, and then construct a function
h(z) = z2
to compute ∇h(z) within this coordinate system. Then by (3), we have PXi(xi(t))−
xi(t) = −1/2∇h(z)z=xi(t).
Xi
Another assumption is made on each aij(x, t), i, j = 1, 2, ..., N .
A4 (Weights Rule) There are a∗ > 0 and a∗ > 0 such that
a∗ ≤ aij(x, t) ≤ a∗,
t ∈ R+, x ∈ RmN .
In this paper, we assume that Assumptions A1-A4 always hold. With (7) and (9), the closed
loop system is expressed by
(cid:88)
xi =
j∈Ni(σ(t))
aij(x, t)(xj − xi) + PXi(xi) − xi, i = 1, . . . , N.
(10)
Remark 3.5 By the non-expansiveness property (2), the convex projection PK(z) is continuous
for all z ∈ Rm for any closed convex set K ⊆ Rm. Therefore, a solution of (10) exists at least
over a finite interval for any initial condition x(t0). Note that the solution is not necessarily
unique. As will be shown in Remark 4.1, it also exists in [t0, +∞).
Remark 3.6 Since the projection term can be viewed as a subgradient for the special case
fi(z) = z2
which has the form of the sum of a consensus term and a subgradient term. On the other hand,
/2, (10) is actually a continuous-time version of the algorithm proposed in [27],
Xi
in [28], a "projected consensus algorithm" was presented to solve the same intersection com-
putation problem in which each agent takes consensus and projection steps alternatively. Note
that there is some essential difference between (10) and the "projected consensus algorithm" in
[28], because (10) takes advantage of the consensus and projection information at the same time
instant. It is not hard to construct examples in which each node i would never enter its own set
Xi along the trajectories of (10).
Let x(t) be the trajectory of (10) with initial condition x0 = x(t0) = (xT
1 (t0), . . . , xT
N (t0))T ∈
RmN . Then the considered optimal consensus is defined as following (see Fig. 1).
Definition 3.2 (i) A global optimal set convergence of (10) is achieved if for all x0 ∈ RmN , we
have
t→+∞xi(t)X0 = 0,
lim
i = 1, . . . , N.
(11)
8
Figure 1: The goal of the agents is to achieve a consensus in X0.
(ii) A global consensus of (10) is achieved if for all x0 ∈ RmN , we have
t→+∞xi(t) − xj(t) = 0,
lim
i, j = 1, . . . , N.
(12)
(iii) A global optimal consensus is achieved of (10) if both (i) and (ii) hold.
Remark 3.7 It is easy to find that, based on the analysis methods we provide, all the results
obtained in this paper will still hold if the control law (10) is replaced by
aij(x, t)(xj − xi) + bi(xi, t)(PXi(xi) − xi), i = 1, . . . , N
(cid:88)
xi =
j∈Ni(σ(t))
for some scalar functions 0 < b∗ ≤ bi(xi, t), i = 1,··· , N with b∗ > 0 being a constant. Here we
just choose the form of (10) to make the statements and proofs simplified.
3.3 Main Results
In this subsection, we present the main results on optimal consensus.
First the following conclusion is our main result for directed graphs.
Theorem 3.1 System (10) achieves a global optimal consensus if Gσ(t) is UJSC.
We say the communications over the considered multi-agent network are bidirectional if
Gσ(t) is a bidirectional graph for all t ≥ t0. Note that, this does not imply that the arc weights,
aij(x, t), i, j = 1, . . . , N , are symmetric. Then we have the following main result on optimal
consensus for the bidirectional case.
9
Theorem 3.2 System (10) with bidirectional communications achieves a global optimal consen-
sus if (and in general only if ) Gσ(t) is IJC.
Theorem 3.2 shows that the connectedness conditions to reach an optimal consensus can be
relaxed for bidirectional communications without requiring a uniform bound of the length of
intervals in the definition of connectivities.
Remark 3.8 Let us explain what "in general only if" means in Theorems 3.2. Clearly, the
connectivity condition proposed in Theorem 3.2 is not a necessary condition to ensure a global
optimal consensus for a particular optimization problem (8). However, in regard to a global
In fact, as long as (cid:84)N
optimal consensus for all possibilities of X1, . . . , XN , simple examples could show that this IJC
assumption is also necessary using the same idea studying state agreement problem in [25, 22].
i=1 Xi is not a singleton, it can be easily shown that consensus cannot be
guaranteed for all initial conditions. Therefore, from this perspective, Theorem 3.2 gives "sharp"
connectivity conditions for a global optimal consensus of system (10).
Remark 3.9 If A3, the nonempty intersection assumption, is removed, control law (10) becomes
i=1 Xi).
In this case, under proper connectivity assumptions (even each node cannot always obtain the
a special case of the target aggregation controller studied in [22] with respect to co((cid:83)N
information of Xi), it can be shown that (10) will lead the network to converge into co((cid:83)N
[22]. The dynamics within co((cid:83)N
i=1 Xi)
i=1 Xi) can be complicated, and the optimal consensus will
fail since there is no longer a simple expression of X∗, the real optimal solution set of (8).
However, we guess that in this case the control law (10) still implies a suboptimal convergence
such that there will be a constant B, which does not depend on the initial condition, satisfying
lim supt→∞ xi(t)X∗ ≤ B under UJSC connectivity conditions.
In order to prove Theorems 3.1 and 3.2, on one hand, we have to prove all the agents
converge to the global optimal solution set, i.e., X0; and, on the other hand, we have to verify
that a consensus is also achieved. In fact, the convergence analysis is quite challenging, due to
the nonlinearity nature of each weight function aij(x, t) and the convex projection part in the
control law. In the following two sections, we will focus on the optimal solution set convergence
and the consensus analysis, respectively, by which complete the proofs for Theorems 3.1 and
3.2.
10
4 Optimal Set Convergence
In this section, we prove the optimal solution set convergence for system (10). We first establish
a method to analyze the distance between the agents and the global optimal set with the help
of convex analysis, and then the convergence to X0 for all the agents is proposed under directed
and bidirectional communications, respectively.
4.1 Distance Function
Define di(t) = xi(t)2
and let
X0
d(t) = max
i∈V di(t)
be the maximum among all the agents. Although d(t) may not be continuously differentiable,
it is still continuous. Thus, we can analyze the Dini derivative of d(t) to study its convergence
property. Moreover, it is easy to see that d(t) is locally Lipschitz. Then the Dini derivative of
d(t) is finite for any t.
We prove several elementary lemmas for the following analysis. At first, the following lemma
indicates that d(t) is nonincreasing.
Lemma 4.1 D+d(t) ≤ 0 for all t ≥ 0.
Proof. According to (3), one has
d
dt
(cid:88)
di(t) = 2(cid:104)xi − PX0(xi), xi(cid:105)
= 2(cid:104)xi − PX0(xi),
j∈Ni(σ(t))
aij(x, t)(xj − xi) + PXi(xi) − xi(cid:105).
(13)
Then, based on Lemma 2.3 and denoting I(t) as the set containing all the agents that reach the
maximum in the definition of d(t) at time t, we obtain
D+d(t) = max
i∈I(t)
= 2 max
i∈I(t)
d
di(t)
dt
[(cid:104)xi − PX0(xi),
(cid:88)
j∈Ni(σ(t))
aij(xj − xi) + PXi(xi) − xi(cid:105)].
(14)
Furthermore, for any i ∈ I(t), according to (5) of Lemma 2.2, one has
(cid:104)xi − PX0(xi), xj − xi(cid:105) ≤ 0
for any j ∈ Li(σ(t)) since it always holds that xjX0 ≤ xiX0.
(15)
11
Moreover, in light of (1), we obtain
(cid:104)PXi(xi) − PX0(xi), PXi(xi) − xi(cid:105) ≤ 0
(16)
since we always have PX0(xi) ∈ Xi for all i = 1, . . . , N . Therefore, it is easy to see that for any
i ∈ V,
(cid:104)xi − PX0(xi), PXi(xi) − xi(cid:105) ≤ (cid:104)xi − PXi(xi), PXi(xi) − xi(cid:105) = −xi2
Xi.
Thus, with (14), (15) and (17), one has
D+d(t) ≤ 2 max
i∈I(t)
[−xi2
Xi] ≤ 0.
Then the proof is completed.
(17)
(18)
(cid:3)
Remark 4.1 According to Lemma 4.1, {y y2
≤ d(t0)} is a positively invariant set for system
(10). Since X0 is compact, {y y2
≤ d(t0)} is also compact. This leads to that each solution
of (10) exists in [t0, +∞). Moreover, if the weight functions aij, i, j = 1, . . . , N , are only state-
dependent, the continuity implies that there will be a∗ ≥ a∗ > 0 such that
X0
X0
a∗ ≤ aij(x(t)) ≤ a∗,
∀t > 0, i, j = 1, 2, ...N
(19)
along trajectory x(t) of system (10). In this case, A4 follows automatically, and then needs not
to be assumed.
With Lemma 4.1, for any initial condition, there exists a constant d∗ ≥ 0 such that limt→∞ d(t) =
d∗. Clearly, the optimal solution set convergence will be achieved for system (10) if and
only if d∗ = 0. Furthermore, since it always holds that di(t) ≤ d(t), there exist constants
0 ≤ θi ≤ ηi ≤ d∗, i = 1, . . . , N such that
lim inf
t→∞ di(t) = θi,
lim sup
t→∞ di(t) = ηi.
To establish the optimal set convergence, we also need the following lemmas, whose proofs
can be found in the Appendix.
Lemma 4.2 Assume that θi = ηi = d∗, i = 1, . . . , N . Then we have limt→+∞ xi(t)Xi = 0 for
all i = 1, . . . , N .
Lemma 4.3 Assume that either Gσ(t) being UJSC or Gσ(t) being IJC with bidirectional commu-
nications. Then θi = ηi = d∗ for all i = 1, 2, . . . , N .
12
Remark 4.2 If the network communication graph is undirected, i.e., i ∈ Nj(σ(t)) if and only if
j ∈ Ni(σ(t)) with aij(x, t) ≡ aji(x, t), i, j = 1, . . . , N , then according to (13) and (17), we have
di(t) ≤ 2
aij(x, t)(cid:104)xi − PX0(xi), xj − xi(cid:105) − 2
xi2
Xi
N(cid:88)
d
dt
i=1
=
+
=
i=1
j∈Ni(σ(t))
N(cid:88)
N(cid:88)
N(cid:88)
N(cid:88)
j=1
i=1
(cid:88)
(cid:88)
(cid:88)
(cid:88)
i=1
j∈Ni(σ(t))
j∈Ni(σ(t))
i∈Nj (σ(t))
N(cid:88)
i=1
N(cid:88)
i=1
xi2
Xi
aij(x, t)(cid:104)xi − PX0(xi), xj − xi(cid:105)
aji(x, t)(cid:104)xj − PX0(xj), xi − xj(cid:105) − 2
aij(x, t)(cid:104)xi − xj + PX0(xj) − PX0(xi), xj − xi(cid:105) − 2
N(cid:88)
i=1
xi2
Xi.
Furthermore, based on (1) and (2), we obtain
(cid:104)xi − xj + PX0(xj) − PX0(xi), xj − xi(cid:105) ≤ −xi − xj2 + xi − xj · PX0(xj) − PX0(xi) ≤ 0
for all i, j = 1, . . . , N . Therefore, we have
di(t) ≤ −2
N(cid:88)
i=1
xi(t)2
Xi,
d
dt
N(cid:88)
(cid:90) ∞
N(cid:88)
i=1
which implies
immediately based on Lemma 4.1.
i=1
0
xi(t)2
Xi <
N
2
d(t0)
(20)
As a result, with (20), we can apply Barbalat's lemma on xi(t)2
, and then it follows
Xi
immediately that limt→+∞ xi(t)Xi = 0, i = 1, . . . , N without the assumptions of Lemma 4.2.
Remark 4.3 Note that, Lemmas 4.1 and 4.2 hold without requiring any connectivity of the
system communication graph.
4.2 Directed Graphs
The following conclusion is for optimal set convergence with directed communications.
Proposition 4.1 System (10) achieves the global optimal solution set convergence if Gσ(t) is
UJSC.
13
Proof. According to Lemmas 4.2 and 4.3, we have limt→∞ xi(t)Xi = 0, i = 1, . . . , N . As a
result, for any ε > 0, there exists T1(ε) > 0 such that when t ≥ T1,
xi(t)Xi ≤ ε,
Take t1 = T1 and k0 ∈ V. Defining hk0(t)
i = 1, . . . , N.
.
= maxi∈V xi(t)Xk0
(21)
, similarly to the analysis of
(14), we have that for all t,
d
dt
k0(t) ≤ 2hk0(t) · max
h2
i=1,...,N
xi(t)Xi,
which implies D+hk0(t) ≤ ε, t ≥ t1. Thus, hk0(t) ≤ hk0(t1) + (N − 1)T0ε, t ∈ [t1, t1 + (N − 1)T0].
Since Gσ(t) is UJSC, we can find a node k1 such that (k0, k1) ∈ Eσ(t) for t ∈ [t1, t1 + τD) ⊆
[t1, t1 + T0), where T0 = T + 2τD. In light of Lemma 2.2 and (21), we have
(xk1), xk0 − xk1(cid:105) + 2(cid:104)xk1 − PXk0
= 2ak1k0(x, t)(cid:104)xk1 − PXk0
xk1(t)2
Xk0
d
dt
(xk1),
ak1j(xj − xk1) + PXk1
(xk1) − xk1(cid:105)
(cid:88)
j∈Nk1 (σ(t))\k0
≤ −2a∗xk1(t)Xk0
(xk1(t)Xk0
− ε) + 2(N − 2)a∗xk1(t)Xk0
) + 2xk1(t)Xk0
· ε,
· (hk0(t1)
t ∈ [t1, t1 + τD),
(22)
(23)
(24)
1 + [2(N − 2)(N − 1)T0 + 1]a∗
w0 =
; M0 =
.
Proceeding the estimation in time interval [t1 + τD, t1 + (N − 1)T0] will lead to
D+xk1(t)Xk0
for all t ∈ [t1 + τD, t1 + (N − 1)T0]. This implies
≤ −(N−1)a∗xk1(t)Xk0
a∗ + (N − 2)a∗
+(N−1)a∗[hk0(t1)+(N−1)T0ε]+ε, t ∈ [t1+τD, t1+(N−1)T0],
xk1(t)Xk0
≤ ς0(w0hk0(t1) + M0ε) + (1 − ς0)(w0hk0(t1) + (N − 1)T0ε +
≤ w0hk0(t1) + M0ε,
t ∈ [t1 + τD, t1 + (N − 1)T0]
ε
(N − 1)a∗ )
(25)
14
+ (N − 1)T0ε − xk1(t)Xk0
from which we obtain that for any t ∈ [t1, t1 + τD),
D+xk1(t)Xk0
Therefore, noticing that xk1(t1)Xk0
≤ −(a∗ + (N − 2)a∗)xk1(t)Xk0
one has
xk1(t1 + τD)Xk0
where
≤ ν0xk1(t1)Xk0
≤ w0hk0(t1) + M0ε,
(N − 2)a∗ + a∗ν0
(N − 2)a∗ + a∗
+ (N − 2)a∗[hk0(t1) + (N − 1)T0ε] + (1 + a∗)ε.
≤ hk0(t1) + (N − 1)T0ε and denoting ν0 = e−(a∗+(N−2)a∗)τD ,
+ (1 − ν0) · (N − 2)a∗[hk0(t1) + (N − 1)T0ε] + (1 + a∗)ε
a∗ + (N − 2)a∗
where
ς0 = e−(N−1)2a∗T0;
M0 =
2 + [3(N − 1)2T0 + 1]a∗
a∗ + (N − 2)a∗
.
(26)
Further, continuing the analysis on time interval [t1 + T0, t1 + 2T0], k2 can be found with a
neighbor in {k0, k1} during [t2, t2 + τD) ⊆ [t1 + T0, t1 + 2T0]. An upper bound for xk2(t)Xk0
can
be similarly obtained as
xk2(t)Xk0
≤ w1hk0(t1) + 2 M0ε, t ∈ [t2 + τD, t1 + (N − 1)T0]
(27)
where w1 = (N−2)a∗+a∗ν2
(N−2)a∗+a∗ .
0
Next, respectively, we repeat the analysis on time intervals [t1 + 2T0, t1 + 3T0], . . . , [t1 + (N −
2)T0, t1 + (N − 1)T0] for k3, . . . , kN−1 ∈ V, and we finally reach
xi(t1 + (N − 1)T0)Xk0
≤ wN−1hk0(t1) + (N − 1) M0ε, i = 1, . . . , N,
which implies
hk0(t2) ≤ wN−1hk0(t1) + (N − 1) M0ε,
(28)
(29)
where t2 = t1 + (N − 1)T0 and 0 < wN−1 = (N−2)a∗+a∗νN
(N−2)a∗+a∗ < 1.
0
Denoting w∗ = wN−1 and tn+1 = tn + (N − 1)T0 for n = 2, . . . , and by the same analysis on
time intervals [tn, tn+1], n = 2, . . . , one has
hk0(tn) ≤ wn−1∗ hk0(t1) +
≤ wn−1∗ hk0(t1) +
n−1(cid:88)
wj−1∗
(N − 1) M0ε
j=1
(N − 1) M0
1 − w∗
· ε
(30)
Since ε in (30) can be arbitrarily small, we see that limt→∞ xi(t)Xk0
1, . . . , N , which immediately implies limt→∞ xi(t)X0 = 0. The proof is completed.
= 0 for all i, k0 =
(cid:3)
4.3 Bidirectional Graphs
The following conclusion is for optimal set convergence under bidirectional graphs.
Proposition 4.2 System (10) achieves the optimal solution set convergence with bidirectional
communications if Gσ(t) is IJC.
Proof. Suppose d∗ > 0. According to Lemmas 4.2 and 4.3, we have that for all i = 1, . . . , N ,
t→∞xi(t)X0 =
lim
√
d∗,
15
t→∞xi(t)Xi = 0.
lim
(31)
.
= {y√
d∗ + ε ≤ yX0 ≤ √
This implies, for any ε > 0, we have that xi(t) ∈ B0(ε) ∩ Bi(ε) for sufficiently large t, where
B0(ε)
= {yyXi ≤ ε}, i = 1, . . . , N . Then we see
.
from (13) that the derivative of xi(t)2
is globally Lipschitz. Therefore, based on Barbalat's
lemma, we know
d∗ + ε} and Bi(ε)
X0
(32)
= {(i, j)(i, j) ∈ Eσ(t) for infinitely long time}. Then G∞ = (V,E∞) is connected
X0 = 0.
lim
t→∞
Define E∞ .
xi(t)2
d
dt
since G([t, +∞)) is connected for all t ≥ 0.
Let N∞
i be the neighbor set of node i in graph G∞. With Lemma 2.2, (31) and (32) yield
that for any i = 1, . . . , N and j ∈ N∞
,
i
t→∞(cid:104)xi(t) − PX0(xi(t)), xj(t) − xi(t)(cid:105) = 0.
lim
(33)
Taking i0 ∈ V, we define two hyperplanes:
H1(t)
= {v(cid:104)xi0(t) − PX0(xi0(t)), v − xi0(t)(cid:105) = 0};
.
H2(t)
= {v(cid:104)xi0(t) − PX0(xi0(t)), v − PX0(xi0(t))(cid:105) = 0}.
.
Then ∀j ∈ N∞
i0
, (33) implies that
t→∞xj(t)H1(t) = 0;
lim
t→∞xj(t)H2(t) =(cid:112)g∗,
lim
which leads to
t→∞PX0(xj(t)) − PH2(t)(xj(t)) = 0.
(34)
Because G∞ is connected, we can repeat the analysis over the network, then arrive that (34)
holds for all j = 1, . . . , N .
lim
Let Ci0(t) = co{PXi0
Therefore, with (31) and (34) and according to the structure of H1(t) and H2(t), there will
(xi0(t)), PX0(x1(t)), . . . , PX0(xN (t))}. Then Ci0(t) ⊆ Xi0,∀t ≥ 0.
be a point z∗ ∈(cid:84)N
i0=1 Ci0(t) ⊆ X0 for sufficiently large t such that
(cid:104)xi0(t) − PX0(xi0(t)), z∗ − PX0(xi0(t))(cid:105) > 0,
which contradicts (1). Therefore, d∗ > 0 does not hold, and then the optimal set convergence
(cid:3)
follows.
16
5 Global Consensus
In this section, we present the consensus analysis. In order to show the consensus, we have to
present a clear estimation of the influence on state agreement by terms xi−PXi(xi), i = 1, . . . , N .
We first introduce a class of positively invariant set for system (10) which characterizes the
agreement property in Subsection 5.1. Then the consensus analysis is investigated for directed
and bidirectional communication cases, respectively in Subsection 5.2.
5.1
Invariant Set
We define a multi-projection function: Pikik−1...i1 : Rm →(cid:83)N
i=1 Xi with i1, . . . , ik ∈ {1, . . . , N}, k =
1, 2, . . . , by
Pikik−1...i1(x) = PXik
PXik−1
. . . PXi1
(x).
Particularly, P∅ is denoted by P∅(x) = x as the case for k = 0. Let
= {Pikik−1...i1i1, . . . , ik ∈ {1, . . . , N}, k = 0, 1, 2, . . .}
.
Γ
be the set which contains all the multi-projection functions we define.
= co{P (y)y ∈ K, P ∈ Γ}.
.
, based on a similar analysis as the proof of Lemma 4.1, it is
Furthermore, let K be a convex set in Rm, and define ∆K as ∆K
Denoting g(t) = max
xi(t)2
i=1,...,N
∆K
not hard to find that
D+g(t) ≤ 0,
t ≥ 0.
This implies, g(t) ≡ 0 for all t ≥ t0 once we have g(t0) = 0, which leads to the following
conclusion immediately (see Fig. 2).
Lemma 5.1 Let K be a convex set in Rm. Then ∆N
K
= ∆K × ··· × ∆K is positively invariant
.
for system (10).
We next establish an important property of the constructed invariant set ∆N
K.
Lemma 5.2 yK ≤ 2 maxz∈K zX0, ∀y ∈ ∆K.
m+1(cid:88)
Proof. With Lemma 2.1, any y ∈ ∆K has the following form
y =
λiP (cid:104)i(cid:105)(zi),
i=1
17
Figure 2: Constructing an invariant set from K = co{y1, y2}.
where (cid:80)m+1
i=1 λi = 1 with λi ≥ 0, P (cid:104)i(cid:105) ∈ Γ and zi ∈ K, i = 1, . . . , m + 1. Then, by the
non-expansiveness property (2), we have that for any z ∈ Rm and P∗ ∈ Γ,
PX0(z) − P∗(z) = P∗(PX0(z)) − P∗(z) ≤ PX0(z) − z = zX0.
i=1
This leads to
m+1(cid:88)
λiP (cid:104)i(cid:105)(zi) − m+1(cid:88)
λizi ≤ m+1(cid:88)
≤ m+1(cid:88)
which implies the conclusion because(cid:80)m+1
i=1
i=1
i=1
zX0,
≤ 2 max
z∈K
i=1 λizi ∈ K.
λizi − P (cid:104)i(cid:105)(zi)
λizi − PX0(zi) +
m+1(cid:88)
i=1
λiPX0(zi) − P (cid:104)i(cid:105)(zi)
(cid:3)
Now we are ready to reach the global consensus for system (10). Let us focus on each
coordinate, and denote x(cid:96)
i(t) as the (cid:96)-th coordinate of xi(t). Moreover, let
φ(t) = min
i∈V {x(cid:96)
i(t)}, ϕ(t) = max
i∈V {x(cid:96)
i(t)}
be the minimum and the maximum within all the agents. Denote H(t) (cid:44) ϕ(t) − φ(t). Then a
consensus is achieved for system (10) if and only if limt→∞ H(t) = 0.
In the next subsection, we will prove the global consensus for system (10) with directed and
bidirectional communications, respectively by showing that limt→∞ H(t) = 0.
5.2 Consensus Analysis
In this subsection, we propose the consensus analysis. First we study the directed case.
18
Proposition 5.1 System (10) achieves a global consensus if Gσ(t) is UJSC.
Proof. Based on Proposition 4.1, we have that limt→∞ xi(t)X0 = 0 for all i = 1, . . . , N .
Therefore, for any ε > 0, there exists T1(ε) > 0 such that, when t ≥ T1,
As a result, according to Lemma 5.2, for any y ∈ ∆co{x1(t),...,xN (t)} with t > T1(ε), we have
xi(t)X0 ≤ 1
2
ε, i = 1, . . . , N
(35)
dist(y, co{x1(t), . . . , xN (t)}) ≤ ε.
Moreover, by Lemma 5.1, we see that xi(t) ∈ ∆co{x1(t),...,xN (t)}, i = 1, . . . , N for all t ≤ t ≤ ∞,
which implies that for all t ≥ t ≥ T1, we have
dist(xi(t), ∆co{x1(t),...,xN (t)}) ≤ ε,
i = 1, . . . , N.
(36)
We divide the following proof into three steps.
Step 1: Take t1 = T1 with x(cid:96)
i0
to x(cid:96)
i0
(t) during t ∈ [t1, t1 + (N − 1)T0].
Based on (36), we see that for all T1 ≤ t < t ≤ ∞
(t1) = φ(t1) and denote T0 = T + 2τD. In this step, we give bound
φ(t) ≥ φ(t) − ε; ϕ(t) ≤ ϕ(t) + ε.
Noting the fact that
i0(t) ≤ −(N − 1)a∗x(cid:96)
x(cid:96)
i0(t) + (N − 1)a∗(ϕ(t1) + ε) + ε, t ≥ t1,
d
dt
we obtain
(37)
(38)
i0(t) ≤ µ1 (cid:44) ς0φ(t1) + (1 − ς0)ϕ(t1) +
x(cid:96)
(39)
Step 2: Since Gσ(t) is UJSC, we can find i1 ∈ V and t1 ≥ t1 such that (i0, i1) ∈ Gσ(t) for t ∈
[t1, t1+τD) ⊆ [t1, t1+T0). In this step, we give bound to x(cid:96)
(t1) during t ∈ [t1+τD, t1+(N−1)T0].
· ε, t ∈ [t1, t1 + (N − 1)T0].
i1
(N − 1)a∗ + 1
(N − 1)a∗
Similarly to the analysis of (22), when t ∈ [t1, t1 + τD), one has
d
dt
which yields
i1(t) ≤ a∗(µ1 − x(cid:96)
x(cid:96)
i1(t)) + (N − 2)a∗(ϕ(t1) + ε − x(cid:96)
i1(t)) + ε,
i1(t1 + τD) ≤ ν0(ϕ(t1) + ε) + (1 − ν0) × a∗µ1 + (N − 2)a∗(ϕ(t1) + ε) + ε
x(cid:96)
a∗ + (N − 2)a∗
= (1 − w0)ς0φ(t1) + [1 − (1 − w0)ς0]ϕ(t1) + L0ε
(cid:44) θ1
(40)
19
after some simple manipulations by combining (39) and (40), where L0 = 1 +
Then, applying (38) on node i1 during t ∈ [t1 + τD, t1 + (N − 1)T0] will lead to
[a∗+(N−2)a∗](N−1) .
N
i1(t) ≤ ς0θ1 + (1 − ς0)ϕ(t1) +
x(cid:96)
(N − 1)a∗ + 1
(N − 1)a∗
· ε
= m1φ(t1) + [1 − m1]ϕ(t1) + L0ε,
(41)
for all t ∈ [t1 + τD, t1 + N T0], where m1 = (1 − w0)ς 2
0 and L0 = ς0 L0 + 1 +
Step 3: We proceed the analysis for i2, . . . , iN−1 with mk = ((1 − w0)ς 2
Denoting t2 (cid:44) t1 + (N − 1)T0, we obtain
1
(N−1)a∗ .
0 )k, k = 2, . . . , N − 1.
i(t2) ≤ mN−1φ(t1) + (1 − mN−1)ϕ(t1) + (N − 1)L0ε, = 0, . . . , N − 1,
x(cid:96)
which implies
ϕ(t2) ≤ mN−1φ(t1) + (1 − mN−1)ϕ(t1) + (N − 1)L0ε.
(37) and (43) lead to
H(t2) ≤ mN−1φ(t1) + (1 − mN−1)ϕ(t1) + (N − 1)L0ε − (φ(t1) − ε)
= (1 − mN−1)H(t1) + [(N − 1)L0 + 1]ε
(42)
(43)
(44)
Define a time sequence T1 = t1 < t2 < . . . with tk = tk−1 + (N − 1)T0. Applying the same
analysis on each interval [tk−1, tk) will lead to
H(tk) ≤ (1 − mN−1)H(tk−1) + [(N − 1)L0 + 1]ε, k = 1, 2, . . . .
(45)
As a result, we obtain
H(tk+1) ≤ (1 − mN−1)kH(t1) +
k−1(cid:88)
(1 − mN−1)j[(N − 1)L0 + 1]ε
≤ (1 − mN−1)kH(t1) +
j=0
(N − 1)L0 + 1
mN−1
· ε,
k = 1, 2, . . .
(46)
Therefore, noting the fact that 0 < mN−1 < 1, (37) and (46) yield
lim sup
t→∞ H(t) ≤ (2 +
(N − 1)L0 + 1
mN−1
) · ε.
Then limt→∞ H(t) = 0 since ε can be arbitrarily small. This completes the proof.
(cid:3)
Then the global consensus for bidirectional case is proved by the following conclusion.
Proposition 5.2 System (10) achieves a global consensus with bidirectional communications if
Gσ(t) is IJC.
20
Proof. Take t1 = T1 with x(cid:96)
i0
(t1) = φ(t1) as the proof of Proposition 5.1. Then (36) and (37)
still hold.
Denote the first time when i0 has at least one neighbor during t ≥ t1 as t1, and denote the
neighbor set of i0 for t ∈ [t1, t1 + τD) as V1. Next, we show the bound for i0 and j ∈ V1 during
t ∈ [t1, t1 + τD) .
Note that when i0 has no neighbor during t ∈ (t1, s) for t1 ≤ s ≤ ∞, one has that for any
t ∈ [t1, s),
Then, we see that
x(cid:96)
i0(t) − x(cid:96)
i0(s) ≤ ε.
(47)
i0(t) ≤ µ1 (cid:44) ς0φ(t1) + (1 − ς0)ϕ(t1) +
x(cid:96)
(N − 1)a∗ + 1
(N − 1)a∗
· ε
for all t ∈ [t1, t1 + τD], where ς0 = e−(N−1)a∗τD
By similar analysis with (40), we have that for any j ∈ V1,
j(t1 + τD) ≤ θ1 (cid:44) m1φ(t1) + (1 − m1)ϕ(t1) + L0ε
x(cid:96)
(48)
with m1 = (1 − w0)ς0.
When there is no link between V \ ({i0} ∪ V1) and {i0} ∪ V1 for t ∈ [t1 + τD, t), applying
Lemma 5.1 on the subsystem formed by nodes in {i0} ∪ V1, (36) leads to
j(t) ≤ θ1 + ε, t ∈ [t1 + τD, t), j ∈ {i0} ∪ V1.
x(cid:96)
(49)
Therefore, defining t2 as the first moment during t ∈ [t1 + τD,∞) when there is an edge
between j ∈ {i0} ∪ V1 and V \ ({i0} ∪ V1), we have
j(t) ≤ ς0(θ1 + ε) + (1 − ς0)ϕ(t1) +
x(cid:96)
(N − 1)a∗ + 1
(N − 1)a∗
· ε
(50)
for t ∈ [t2, t2 + τD].
Denoting V2 = {k ∈ Vthere is a link between k and {i0} ∪ V1 at t2}, bounds for x(cid:96)
k(t2 +
τD), k ∈ V2 can be similarly given by
k(t2 + τD) ≤ m2φ(t1) + (1 − m2)ϕ(t1) + L0ε,
x(cid:96)
(51)
where m2 = ((1 − w0)ς 2
0 )2.
with mj0 = ((1 − w0)ς 2
0 )j0, we have
Next, V3, . . . ,Vj0 can be defined until V = {i0} ∪ V1 ∪ ··· ∪ Vj0 since Gσ(t) is JC. Moreover,
i(tj0 + τD) ≤ mj0φ(t1) + (1 − mj0)ϕ(t1) + L0(N − 1)ε, = 1, . . . , N.
x(cid:96)
(52)
21
Therefore, denoting t2 (cid:44) tj0 + τD, we obtain
ϕ(t2) ≤ mj0φ(t1) + (1 − mj0)ϕ(t1) + L0(N − 1)ε,
which implies
H(t2) ≤ (1 − mj0)H(t1) + (N − 1)L0ε.
(53)
(54)
Then limt→∞ H(t) = 0 holds by similar analysis as the proof of Proposition 5.1. This
(cid:3)
completes the proof.
With Propositions 4.1, 4.2, 5.1 and 5.2, it is straightforward to see that the main results of
the paper, Theorems 3.1 and 3.2 hold.
6 Conclusions
This paper addressed an optimal consensus problem for multi-agent systems. With jointly
connected graphs, the considered multi-agent system achieved not only consensus, but also op-
timum by agreeing within the global solution set of a sum of objective functions. Assuming that
each agent can observe the projection information onto the solution set of its own optimization
component and the intersection of all solution sets is nonempty, the original unconstrained opti-
mization problem was converted to an intersection computation problem. Control laws applied
to the agents were simple and distributed. The results showed that a global optimization prob-
lem can be solved over a multi-agent network under time-varying communications and limited
interactions. Future work includes randomization in the nodes' decision-making and event-based
methods in the optimization algorithm design.
Appendix
A.1 Proof of Lemma 4.2
Based on the definitions of θi and ηi, when θi = ηi = d∗ holds for all i = 1, . . . , N , one has
t→+∞ di(t) = d∗,
lim
i = 1, . . . , N
Thus, for any ε > 0, there exists T1(ε) > 0 such that, when t ≥ T1(ε),
di(t) ∈ [d∗ − ε, d∗ + ε],
i = 1, . . . , N.
(55)
22
When d∗ = 0, then it is easy to see that the conclusion holds because xi(t)Xi ≤ xi(t)X0
for all t ≥ 0. Therefore, we just assume d∗ > 0 in the following.
According to (13) and (17), it is not hard to find that
di(t) ≤ −2xi2
Xi + 2(cid:104)xi − PX0(xi),
d
dt
aij(x, t)(xj − xi)(cid:105).
(cid:88)
j∈Ni(σ(t))
(56)
(57)
(58)
(59)
(60)
(61)
(62)
(cid:3)
Furthermore, based on (55) and Lemmas 2.2 and 4.1, one has that when t > T1(ε),
(cid:104)xi − PX0(xi), xj − xi(cid:105) ≤ xiX0 · xiX0 − xjX0 ≤ 2(cid:112)d(t0)ε
for all i = 1, . . . , N and j ∈ Ni(σ(t)).
If the conclusion does not hold, there exist a node i0 and a constant M0 > 0 such that
xi0(tk)Xi0
= M0
for a time serial 0 < t1 < ··· < tk < tk+1 < . . . with limk→∞ tk+1 = ∞. Noting the fact that
there is a constant L > 0 such that a − b ≤ L for all a, b ∈ {y y2
≤ d(t0)} since X0 is
compact, we have that for all for all i = 1, . . . , N ,
X0
(cid:12)(cid:12)(cid:12)(cid:12) d
dt
xi(t)2
Xi
(cid:88)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)2
(cid:12)(cid:12)(cid:12)(cid:12) =
≤ 2d(t0) + 2(N − 1)a∗(cid:112)d(t0)L.
≤ 2xi(t)2
j∈Ni(σ(t))
aij(cid:104)xi − PXi(xi), xj − xi(cid:105) − 2xi(t)2
Xi
X0 + 2(N − 1)a∗xi(t)X0 · xj(t) − xi(t)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
Denoting τ0 (cid:44)
and according to (58) and (59), we obtain
2
M0
(cid:113)
d(t0)+(N−1)a∗√
xi0(tk)2
Xi0
d(t0)L
≥ 1
2
M 2
0 ,
t ∈ [tk, tk + τ0],
which leads to
d
dt
di0(t) ≤ − 1
2
0 + 2(cid:112)d(t0)ε ≤ − 1
M 2
4
M 2
0 ,
t ∈ [tk, tk + τ0].
√
for all tk > T1 and ε ≤ M 2
0
d(t0)
8
. As a result, we have
di0(tk + τ0) ≤ d(t0) − M 2
0 τ0
4
+ ε
Therefore, (62) contradicts (55) when ε < M 2
0 τ0
8
, which completes the proof.
A.2 Proof of Lemma 4.3
23
We prove the conclusion by contradiction. Suppose there exists a node i0 ∈ V such that
0 ≤ θi0 < ηi0 ≤ d∗. Then for any ε > 0, there exists T1(ε) > 0 such that, when t ≥ T1(ε),
di(t) ∈ [0, d∗ + ε],
i = 1, . . . , N.
(63)
(cid:113) 1
Take ζ0 =
2 (θi0 + ηi0). Then there exists a time serial
0 < t1 < ··· < tk < . . .
with limt→∞ tk = ∞ such that xi0(tk)X0 = ζ0 for all k = 1, 2, . . . .
According to (63) and Lemma 2.2, we have that for all t > tk0,
(cid:88)
di0(t) ≤ 2
d
dt
j∈Ni0 (σ(t))
ai0j(x, t)(cid:104)xi0 − PX0(xi0), xj − xi0(cid:105)
≤ 2(N − 1)a∗xi0(t)X0(
√
d∗ + ε − xi0(t)X0),
which will lead to
D+xi0(t)X0 ≤ −(N − 1)a∗xi0(t)X0 + (N − 1)a∗√
d∗ + ε.
As a result, for t ∈ [s,∞) with s ≥ tk0, we have
√
xi0(t)X0 ≤ e−(N−1)a∗(t−s)xi0(s)X0 + (1 − e(N−1)a∗(t−s))
d∗ + ε.
(64)
(65)
We divide the following proof into two cases: directed communications and bidirectional com-
munications.
Directed Case: Denote T0 = T + 2τD. Since Gσ(t) is UJSC, it is not hard to find that there exist
i1 ∈ V and t1 such that (i0, i1) ∈ Gσ(t) for t ∈ [t1, t1 + τD) ⊆ [tk0, tk0 + T0). Then based on (65),
we obtain
xi0(t)X0 ≤ ξ1 (cid:44) ς0ζ0 + (1 − ς0)
√
d∗ + ε, t ∈ [tk0, tk0 + (N − 1)T0],
(66)
where ς0 = e−(N−1)2a∗T0. Thus, for t ∈ [t1, t1 + τD), one has
ai1j(cid:104)xi1 − PX0(xi1), xj − xi1(cid:105) + ai1i0(cid:104)xi1 − PX0(xi1), xi0 − xi1(cid:105)]
√
d∗ + ε − xi1(t)X0) − a∗xi1(t)X0(xi1(t)X0 − ξ1),
(67)
(cid:88)
di1(t) ≤ 2[
d
dt
j∈Ni1 (σ(t))\i0
≤ 2(N − 2)a∗xi1(t)X0(
which leads to
D+xi1(t)X0 ≤ −((N − 2)a∗ + a∗)xi1(t)X0 + (N − 2)a∗√
d∗ + ε + a∗ξ1.
(68)
24
Therefore, we obtain
xi1(t)X0 ≤ e−((N−2)a∗+a∗)(t−t1)xi1(t1)X0 + (1− e−((N−2)a∗+a∗)(t−t1))· (N − 2)a∗√
for t ∈ [t1, t1 + τD), which implies
d∗ + ε + a∗ξ1
(N − 2)a∗ + a∗
xi1(t1 + τD)X0 ≤ ζ1 (cid:44) w0
d∗ + ε + (1 − w0)ξ1,
(69)
√
where w0 is defined in (24). Furthermore, applying the same analysis of (65) on node i1, one
has that when t ∈ [t1 + τD,∞),
√
xi1(t)X0 ≤ e−(N−1)a∗(t−(t1+τD))ζ1 + (1 − e−(N−1)a∗(t−(t1+τD)))
d∗ + ε,
(70)
Combing (66), (69) and (70), we obtain
√
xi1(t)X0 ≤ m1ζ0 + (1 − m1)
d∗ + ε,
for all t ∈ [t1 + τD, tk0 + (N − 1)T0], where m1 = (1 − w0)ς 2
0 .
0 < ς0 < m1 < 1.
(71)
(71) also holds for i0 since
We can proceed to find a node i2 ∈ V such that there is an arc leaving from {i0, i1} entering
i2 in G([tk0 + T0, tk0 + 2T0)) because Gσ(t) is uniformly jointly strongly connected. Meanwhile,
similar analysis will result in estimations for agent i2 with the form (71) by m2 = ((1− w0)ς 2
0 )2.
Repeating similar analysis on time intervals [tk0 + 2T0, tk0 + 3T0], . . . , [tk0 + (N − 2)T0, tk0 +
(N − 1)T0] respectively, and finally, by mN−1 = ((1 − w0)ς 2
0 )N−1, we obtain
√
xi(tk0 + N T0)X0 ≤ mN−1ζ0 + (1 − mN−1)
d∗ + ε, i = 1, . . . , N,
(72)
which yields
√
d(tk0 + N T0) ≤ mN−1ζ0 + (1 − mN−1)
d∗ + ε.
Note that, (73) contradicts the definition of d∗ since mN−1ζ0 + (1 − mN−1)
for sufficiently small ε. The conclusion holds.
Bidirectional Case: When i0 has no neighbor for t ∈ [tk0, s], by (17) we see that
√
d∗ + ε <
(73)
√
d∗
xi0(t)X0 ≤ xi0(tk0)X0 = ζ0, t ∈ [tk0, s].
(74)
Denote the first moment when i0 has at least one neighbor during t ∈ [tk0,∞) as t1, and
denote the neighbor set of i0 for t ∈ [t1, t1 + τD) as V1. Then, by a similar analysis as (66), one
has
√
xi0(t)X0 ≤ ξ1 (cid:44) ς0ζ0 + (1 − ς0)
d∗ + ε, t ∈ [t1, t1 + τD]
(75)
25
with ς0 = e−(N−1)a∗τD . Thus, according to the same process by which we obtain (69), one also
obtains
√
d∗ + ε,
(76)
xi1(t1 + τD)X0 ≤ w0
where m1 = ς0(1 − w0).
√
d∗ + ε + (1 − w0) ξ1 = m1ζ0 + (1 − m1)
Similarly, we can define t2 as the first moment when there is another node connected to
{i0} ∪ V1 during t ≥ t1 + τD. Let V2 be the node set which connect to {i0} ∪ V1 at t2. Since we
have the dwell time for σ(t), without loss of generality, we can always assume that all the links
between {i0}∪V1 and V2 last for at least τD time starting from t2. Moreover, similar estimations
will lead to
√
xi2(t2 + τD)X0 ≤ m2ζ0 + (1 − m2)
d∗ + ε
for all i2 ∈ {i0} ∪ V1 ∪ V2, where m2 = (ς0(1 − w0))2.
Furthermore, since Gσ(t) is JC, we can always proceed the upper process until V = {i0} ∪
V1 ∪ ··· ∪ Vj0, and then we obtain
√
xi(tj0 + τD)X0 ≤ mj0ζ0 + (1 − mj0)
d∗ + ε,
with mj0 = (ς0(1 − w0))j0, which contradicts the definition of d∗. Then the conclusion holds for
bidirectional case.
The proof is completed.
References
(cid:3)
[1] S. Boyd and L. Vandenberghe, Convex Optimization. New York, NY: Cambridge University
Press, 2004.
[2] J. Aubin and A. Cellina, Differential Inclusions. Berlin: Speringer-Verlag, 1984.
[3] R. T. Rockafellar, Convex Analysis. New Jersey: Princeton University Press, 1972.
[4] C. Godsil and G. Royle, Algebraic Graph Theory. New York: Springer-Verlag, 2001.
[5] N. Rouche, P. Habets, and M. Laloy, Stability Theory by Liapunov's Direct Method. New
York: Springer-Verlag, 1977.
[6] J. Danskin, "The theory of max-min, with applications," SIAM J. Appl. Math., vol. 14,
641-664, 1966.
26
[7] D. Cheng, J. Wang, and X. Hu, "An extension of LaSalle's invariance principle and its
applciation to multi-agents consensus," IEEE Trans. Autom. Control, vol. 53, no. 7, pp.
1765-1770, 2008.
[8] F. Clarke, Yu.S. Ledyaev, R. Stern, and P. Wolenski, Nonsmooth Analysis and Control
Theory. Berlin: Speringer-Verlag, 1998.
[9] S. Martinez, J. Cortes, and F. Bullo, " Motion coordination with distributed information,"
IEEE Control Syst. Mag., vol. 27, no. 4, pp. 75-88, 2007.
[10] R. Olfati-Saber, "Flocking for multi-agent dynamic systems: algorithms and theory," IEEE
Trans. Autom. Control, vol. 51, no. 3, pp. 401-420, 2006.
[11] M. Cao, D. A. Spielman and A. S. Morse, "A lower bound on convergence of a distributed
network consensus algorithm," in Proc. IEEE Conf. on Decision and Control, pp. 2356-
2361, 2005.
[12] R. Olfati-Saber and R. Murray, "Consensus problems in the networks of agents with switch-
ing topology and time delays," IEEE Trans. Autom. Control, vol. 49, no. 9, pp. 1520-1533,
2004.
[13] J. Fax and R. Murray, "Information flow and cooperative control of vehicle formations,"
IEEE Trans. Automatic Control, vol. 49, no. 9, 1465-1476, 2004.
[14] H. G. Tanner, A. Jadbabaie, G. J. Pappas, "Flocking in fixed and switching networks,"
IEEE Trans. Autom. Control, vol. 52, no.5, pp. 863-868, 2007.
[15] A. Jadbabaie, J. Lin, and A. S. Morse, "Coordination of groups of mobile autonomous
agents using nearest neighbor rules," IEEE Trans. Autom. Control, vol. 48, no. 6, pp.
988-1001, 2003.
[16] J. Tsitsiklis, D. Bertsekas, and M. Athans, "Distributed asynchronous deterministic and
stochastic gradient optimization algorithms," IEEE Trans. Autom. Control, vol. 31, no. 9,
pp. 803-812, 1986.
[17] F. Xiao and L. Wang, "State consensus for multi-agent systems with swtiching topologies
and time-varying delays," Int. J. Control, vol. 79, no. 10, pp. 1277-1284, 2006.
27
[18] F. Xiao and L. Wang, "Asynchronous consensus in continuous-time multi-agent systems
with switching topology and time-varying delays," IEEE Trans. Autom. Control, vol. 53,
no. 8, pp. 1804-1816, 2008.
[19] Y. Hong, L. Gao, D. Cheng, and J. Hu, "Lyapuov-based approach to multiagent systems
with switching jointly connected interconnection," IEEE Trans. Autom. Control, vol. 52,
no. 5, pp. 943-948, 2007.
[20] W. Ren and R. Beard. Distributed Consensus in Multi-vehicle Cooperative Control,
Springer-Verlag, London, 2008.
[21] W. Ren and R. Beard, "Consensus seeking in multi-agent systems under dynamically chang-
ing interaction topologies," IEEE Trans. Autom. Control, vol. 50, no. 5, pp. 655-661, 2005.
[22] G. Shi and Y. Hong, "Global target aggregation and state agreement of nonlinear multi-
agent systems with switching topologies," Automatica, vol. 45, no. 5, pp. 1165-1175, 2009.
[23] G. Shi, Y. Hong and K. H. Johansson, "Connectivity and set tracking of multi-agent systems
guided by multiple moving leaders," IEEE Trans. Autom. Control, vol. 57, no. 3, pp. 663-
676, 2012.
[24] Z. Lin, B. Francis, and M. Maggiore, "State agreement for continuous-time coupled nonlin-
ear systems," SIAM J. Control Optim., vol. 46, no. 1, pp. 288-307, 2007.
[25] L. Moreau, "Stability of multiagent systems with time-dependent communication links,"
IEEE Trans. Autom. Control, vol. 50, no. 2, pp. 169-182, 2005.
[26] A. Nedi´c, A. Olshevsky, A. Ozdaglar, and J. N. Tsitsiklis, "Distributed subgradient methods
and quantization effects," in Proc. IEEE Conf. on Decision and Control, Cancun, Mexico,
pp. 4177-4184, 2008.
[27] A. Nedi´c and A. Ozdaglar, "Distributed subgradient methods for multi-agent optimization,"
IEEE Trans. Autom. Control, vol. 54, no. 1, pp. 48-61, 2009.
[28] A. Nedi´c, A. Ozdaglar and P. A. Parrilo, "Constrained consensus and optimization in multi-
agent networks," IEEE Trans. Autom. Control, vol. 55, no. 4, pp. 922-938, 2010.
[29] M. Rabbat and R. Nowak, "Distributed optimization in sensor networks," in IPSN'04, pp.
20-27, 2004.
28
[30] B. Johansson, M. Rabi, and M. Johansson, "A simple peer-to-peer algorithm for distributed
optimization in sensor networks, in Proc. IEEE Conf. on Decision and Control, New Or-
leans, LA, pp. 4705-4710, 2007.
[31] B. Johansson, T. Keviczky, M. Johansson, and K. H. Johansson, "Subgradient methods
and consensus algorithms for solving convex optimization problems," in Proc. IEEE Conf.
on Decision and Control, Cancun, Mexico, pp. 4185-4190, 2008.
[32] S. S. Ram, A. Nedi´c, and V. V. Veeravalli, "Stochastic incremental gradient descent for
estimation in sensor networks," in Proc. Asilomar Conference on Signals, Systems, and
Computers, Pacific Grove, pp. 582-586, 2007.
[33] J. Lu, C. Y. Tang, P. R. Regier, and T. D. Bow, "Gossip algorithms for convex consensus
optimization over networks," IEEE Trans. Autom. Control, vol. 56, pp. 2917-2923, 2011.
[34] S. S. Ram, A. Nedi´c, and V. V. Veeravalli, "Incremental stochastic subgradient algorithms
for convex optimization," SIAM Journal on Optimization, vol. 20, no. 2, 691-717, 2009.
[35] B. Johansson, A. Speranzon, M. Johansson, K. H. Johansson, "On decentralized negotiation
of optimal consensus," Automatica, vol. 44, pp. 1175-1179, 2008.
[36] B. Johansson, M. Rabi and M. Johansson. A randomized incremental subgradient method
for distributed optimization in networked systems. SIAM Journal on Optimization, vol. 20,
no. 3, pp. 1157-1170, 2009.
[37] D. Jakoveti´c, J. Xavier and J. M. F. Moura, "Cooperative convex optimization in net-
worked systems: augmented lagrangian algorithms with directed gossip communication,"
http://arxiv.org/abs/1007.3706, 2011.
[38] N. Aronszajn, "Theory of reproducing kernels," Trans. Amer. Math. Soc., vol. 68, no. 3,
pp. 337-404, 1950.
[39] L. G. Gubin, B. T. Polyak, and E. V. Raik, "The method of projections for finding the
common point of convex sets," U.S.S.R Comput. Math. Math. Phys., vol. 7, no. 6, pp.
1211-1228, 1967.
[40] F. Deutsch, "Rate of convergence of the method of alternating projections," in Parametric
Optimization and Approximation, B. Brosowski and F. Deutsch, Eds. Basel, Switzerland:
Birkhauser, vol. 76, pp. 96-107, 1983.
29
[41] K. Arrow, L. Hurwicz and H. Uzawa, Studies in linear and non-linear programming. Stan-
ford University Press, 1958.
[42] R. W. Brockett, "Dynamical systems that sort lists, diagonalize matrices, and solve linear
programming problems," vol. 146, pp. 79-91, 1991.
[43] L. Ljung, "Analysis of recursive stochastic algorithms," IEEE Trans. Autom. Control, vol.
22, no. 4, pp. 551-575, 1977.
[44] M. Shamos and D. Hoey, "Geometric intersection problems," in 17th IEEE Conf. Founda-
tions of Computer Science (FOCS 1976), pp. 208-215, 1976.
[45] J. L. Bentley and T. Ottmann, "Algorithms for reporting and counting geometric intersec-
tions", IEEE Trans. Computers, vol. C-28, no. 9, pp. 643647, 1979.
30
|
1802.08534 | 2 | 1802 | 2018-04-14T16:34:29 | Weighted Double Deep Multiagent Reinforcement Learning in Stochastic Cooperative Environments | [
"cs.MA",
"cs.AI",
"cs.LG"
] | Recently, multiagent deep reinforcement learning (DRL) has received increasingly wide attention. Existing multiagent DRL algorithms are inefficient when facing with the non-stationarity due to agents update their policies simultaneously in stochastic cooperative environments. This paper extends the recently proposed weighted double estimator to the multiagent domain and propose a multiagent DRL framework, named weighted double deep Q-network (WDDQN). By utilizing the weighted double estimator and the deep neural network, WDDQN can not only reduce the bias effectively but also be extended to scenarios with raw visual inputs. To achieve efficient cooperation in the multiagent domain, we introduce the lenient reward network and the scheduled replay strategy. Experiments show that the WDDQN outperforms the existing DRL and multiaent DRL algorithms, i.e., double DQN and lenient Q-learning, in terms of the average reward and the convergence rate in stochastic cooperative environments. | cs.MA | cs | Weighted Double Deep Multiagent Reinforcement Learning in Stochastic
Cooperative Environments
Yan Zheng1, Jianye Hao1, Zongzhang Zhang2,
1 Tianjin University, Tianjin, China
2 Soochow University, Suzhou, China
[email protected], [email protected], [email protected]
8
1
0
2
r
p
A
4
1
]
A
M
.
s
c
[
2
v
4
3
5
8
0
.
2
0
8
1
:
v
i
X
r
a
Abstract
Recently, multiagent deep reinforcement learning
(DRL) has received increasingly wide attention.
Existing multiagent DRL algorithms are inefficient
when facing with the non-stationarity due to agents
update their policies simultaneously in stochastic
cooperative environments. This paper extends the
recently proposed weighted double estimator to
the multiagent domain and propose a multiagent
DRL framework, named weighted double deep Q-
network (WDDQN). By utilizing the weighted dou-
ble estimator and the deep neural network, WD-
DQN can not only reduce the bias effectively but
also be extended to scenarios with raw visual in-
puts. To achieve efficient cooperation in the mul-
tiagent domain, we introduce the lenient reward
network and the scheduled replay strategy. Ex-
periments show that the WDDQN outperforms the
existing DRL and multiaent DRL algorithms, i.e.,
double DQN and lenient Q-learning, in terms of the
average reward and the convergence rate in stochas-
tic cooperative environments.
1 Introduction
The goal of reinforcement learning (RL) is to learn an optimal
behavior within an unknown dynamic environment, usually
modeled as a Markov decision process (MDP), through trial
and error [Sutton and Barto, 1998]. Over the past years, deep
RL (DRL) has achieved great successes.
It has been prac-
tically shown to successfully master various complex prob-
lems [Mnih et al., 2013; Mnih et al., 2015]. To a large extent,
these successes can be credited to the incorporation of the
experience replay and target network that stabilizes the net-
work training [Mnih et al., 2016; Mnih et al., 2013; Mnih
et al., 2015; Schaul et al., 2016; Van Hasselt et al., 2016;
Wang et al., 2016].
Approaches like [Bloembergen et al., 2011; Matignon
et al., 2007; Matignon et al., 2012; Panait et al., 2006;
Wei and Luke, 2016] have been proposed by extending Q-
learning to address the coordination problems in cooperative
multiagent systems. They are able to achieve coordination
in relatively simple cooperative multiagent system. However,
none of them has been combined with deep learning tech-
niques.
Recently, increasing wide attention has been drawn in em-
ploying DRL in multiagent environments. Unfortunately,
these multiagent DRL algorithms still suffer from two intrin-
sic difficulties in the interactive environments [Gupta et al.,
2017; Lanctot et al., 2017; Matignon et al., 2012]: stochas-
ticity due to the noisy reward signals; and non-stationarity
due to the dynamicity of coexisting agents. The stochas-
ticity introduces additional biases in estimation, while the
non-stationarity harms the effectiveness of experience replay,
which is crucial for stabilizing deep Q-networks. These two
characteristics result in the lack of theoretical convergence
guarantees of most multiagent DRL algorithms and amplify
the difficulty of finding the optimal Nash equilibriums, espe-
cially in cooperative multiagent problems.
This work focuses on learning algorithms of independent
learners (ILs) in cooperative multiagent systems. Here, we
assume that agents are unable to observe other agents' ac-
tions and rewards [Claus and Boutilier, 1998]; they share a
common reward function and learn to maximize the com-
mon expected discounted reward (a.k.a. return). To handle
the stochastic and non-stationary challenges in the multiagent
systems, we propose the weighted double deep Q-network
(WDDQN) with two auxiliary mechanisms, the lenient re-
ward network and the scheduled replay strategy, to help ILs
in finding the optimal policy that maximizes the common re-
turn.
Our contributions are three-fold. First, we extend weighted
double Q-learning (WDQ) [Zhang et al., 2017], a state-of-
the-art traditional RL method, to the multiagent DRL set-
tings. Second, we introduce a lenient reward network in-
spired by the lenient Q-learning [Palmer et al., 2018; Panait
et al., 2006]. Third, we modify the exisitin prioritized expe-
rience replay strategy to stabilize and speed up the learning
process in complex multiagent problems with raw visual in-
puts. Empirical results demonstrate that on a fully coopera-
tive multiagent problem WDDQN with the new mechanisms
indeed contribute to increasing the algorithm's convergence,
decreasing the instability and helping ILs to find an optimal
policy simultaneously.
[0, 1] such that ∃s ∈ S,∃a ∈ A,(cid:80)
2 Preliminaries
This section briefly introduces the definition of cooperative
Markov games, Q-learning and its variants.
2.1 Cooperative Markov Game
Markov (stochastic) games, as an extension of repeated
games and MDPs, provide a commonly used framework for
modeling interactions among agents. They can be formalized
as a tuple < N, S, A, T r, R1, ...RN , γ >. Here, N is the
number of players (or agents), S is the set of states, A =
A1 × ... × AN is the joint action set, where Ai is the action
space of player i, T r is the transition function S × A × S →
s(cid:48)∈S T r(s, a, s(cid:48)) = 1, Ri
is the reward function S × A → R for player i, and γ ∈ [0, 1]
is a discount factor. The state s is assumed to be observable
for all players. A fully cooperative Markov game is a spe-
cific type of Markov games where all agents receive the same
reward under the same outcome, and thus share the same best-
interest action.
2.2 Q-learning and Its Variants
Q-learning
is based on the core idea of temporal difference (TD) learn-
ing [Sutton, 1988] and is well suited for solving sequen-
tial decision making problems [Claus and Boutilier, 1998;
Watkins, 1989]. Q-learning tries to find an accurate estimator
of the Q-Values, i.e. Qt(s, a), for state-action pairs [Claus
and Boutilier, 1998]. Each Q-value is an estimate of the dis-
counted sum of future rewards that can be obtained at time
t through selecting action a in state s. The iterative update
formula is outlined in Equation 1:
a(cid:48) Q(s(cid:48), a(cid:48))− Q(s, a)], (1)
Q(s, a) ← Q(s, a) + α[r + γ max
where r is the immediate reward and α ∈ [0, 1) is the learn-
ing rate. The updating process always chooses the action a(cid:48)
with the maximum Q value and updates Q with the saved Q
value. Once the process terminates, an optimal policy can
be obtained by selecting the action with the maximum Q-
value in each state [Bellman, 1957]. However, Q-learning
uses a single estimator to estimate E{maxa(cid:48) Q(s(cid:48), a(cid:48))},
to
which has been proved to be greater than or equal
maxa(cid:48) E{Q(s(cid:48), a(cid:48))} [Smith and Winkler, 2006]. Thus, a pos-
itive bias always exists in the single estimator.
Deep Q-Network (DQN)
extends Q-learning with neural network to solve complex
problems with extensive state spaces.
It uses an online
neural network parametrized by θ to approximate the vec-
tor of action values Q(s,·; θ) for each state s, and a target
network parameterized by θ(cid:48) which is periodically copied
from θ to reduce oscillation during training. The neu-
ral network is optimized by minimizing the difference be-
tween the predicted value Q(st, at; θt) and the target value
t = rt+1 + γ maxa Q(st+1, a; θ(cid:48)
Y Q
t), using experienced sam-
ples (st, at, rt+1, st+1) drawn from a replay memory. To
minimize the difference, the parameters of the network are
updated along with the direction of the target value Y Q
es-
t
timated by experienced samples (st, at, rt+1, st+1) drawn
from a replay memory using the following formula:
t − Q(st, at; θt))∇θtQ(st, at; θt)], (2)
θt+1 = θt + αE[(Y Q
where ∇θtQ(st, at; θt) is the gradient. Both the replay mem-
ory and the target network help DQN to stabilize learning and
can dramatically improve its performance. However, like tab-
ular Q-learning, using the single maximum estimator is prone
to cause overestimating, leading to poor performance in many
situations.
Double Q-learning
uses the double estimator to ease the overestimation. The
double estimator selects the action with the maximum Q
value and evaluates the Q values of different actions sepa-
rately in turn [Hasselt, 2010]. The double Q-learning algo-
rithm stores two Q-values, denoted QU and QV , and replaces
the estimated value maxa(cid:48) Q(s(cid:48), a(cid:48)) in Equation 1 with the
combination QU (s(cid:48), arg maxa(cid:48) QV (s(cid:48), a(cid:48))). Unfortunately,
Hasselt [Hasselt, 2010] proved that though the double esti-
mator can overcome the overestimation issue, a negative bias
is introduced in the same time which may harm the resulting
algorithm's performance and effectiveness.
Double DQN
incorporates the idea of double Q-learning into DQN to avoid
the overestimation [Van Hasselt et al., 2016]. It uses two sets
of Q-networks Q(s, a; θ) and Q(s, a, θ(cid:48)): one for selecting
action and the other for estimating the target Q-value. At each
time the Q-network Q(s, a; θ) is updated using the following
target value:
t ≡ Rt+1 + γQ(st+1, arg max
Y Q
a
Q(st+1, a, θt); θ(cid:48)
t).
(3)
By leveraging the above two Q-networks to select and eval-
uate the Q-values symmetrically in turn, this algorithm takes
advantage of the double estimator to reduce the overestima-
tion of Q values and lead to better performance in a variety of
complex RL scenarios.
Weighted Double Q-learning (WDQ)
uses a dynamic heuristic value β, which depends on a con-
stant c, to balance between the overestimation of the single
estimator and the underestimation of the double estimator
during the iterative Q-value update process:
Q(s, a)U,W DQ = βQU (s, a∗) + (1 − β)QV (s, a∗),
(4)
where a linear combination of QU and QV is used for
updating Q-value. When a∗ is chosen by QU , i.e., a∗ ∈
arg maxa QU (s, a), QU (s, a∗) will be positively biased and
QV (s, a∗) will be negatively biased, and vice versa. β ∈
[0, 1] balances between the positive and negative biases. Ex-
periments on tabular MDP problems show that more accu-
rate value estimation can indeed boost Q-learning's perfor-
mance. However, it is still not clear whether this idea can be
extended to the end-to-end DRL framework to handle high-
dimensional problems.
Lenient Q-learning
[Potter and De Jong, 1994] updates the policies of multi-
ple agents towards an optimal joint policy simultaneously by
letting each agent adopt an optimistic dispose at the initial
exploration phase. This has been empirically proved to be
efficient at increasing the likelihood of discovering the op-
timal joint policy in stochastic environments and avoiding
agents gravitating towards a sub-optimal joint policy [Bloem-
bergen et al., 2015; Palmer et al., 2018; Panait et al., 2006;
Wei and Luke, 2016].
During training, lenient agents keep track of the tempera-
ture Tt(s, a) for each state-action pair (s, a) at time t, which
is initially set to a defined maximum temperature value and
used for measuring the leniency l(s, a) as follows:
l(st; at) = 1 − e−K∗Tt(st,at),
(5)
where K is a constant determining how the temperature af-
fects the decay in leniency. As suggested by [Wei and Luke,
2016], Tt(st, at) is decayed using a discount factor κ ∈ [0, 1]
and Tt+1(st, at) = κTt(st, at). Given the TD error δ =
t − Qt(st, at; θt), the iterative update formula of lenient
Y Q
Q-learning is defined as follows:
(cid:26) Q(st, at) + αδ
Q(st, at)
Q(st, at) =
prioritized experience replay [Schaul et al., 2016] in multi-
agent DRL leads to poor performance, as stored transitions
can become outdated because agents update their policies si-
multaneously. To address this, we propose a scheduled replay
strategy to enhance the benefit of prioritization by adjusting
the priority for transition sample dynamically. In the remain-
der of this section, we will describe these facets in details.
3.1 Network Architecture
WDDQN outlined in Algorithm 1 is adapted from WDQ by
leveraging neural network as the Q-value approximator to
handle problems with high-dimensional state spaces. The
overall network architecture of the algorithm is depicted in
Fig. 1. To reduce the estimation bias, WDDQN uses the com-
bination of two estimators, represented as Deep Q-networks
QU and QV with the same architecture, to select action
a = maxa(cid:48) QU (s,a(cid:48))+QV (s,a(cid:48))
(line 5). Besides, the target
QTarget(s, a) (lines 12 and 17) used for Q-value updating in
back-propagation is replaced with a weighted combination as
well (lines 11 and 16). Intuitively, the combination balances
between the overestimation and the underestimation. In addi-
tion, we also propose to use a reward approximator and an ef-
ficient scheduled replay strategy in WDDQN to achieve bias
reduction and efficient coordination in multiagent stochastic
environments.
2
if δ > 0 or x > l(st, at),
otherwise.
(6)
The random variable x ∼ U (0, 1) is used to ensure that a neg-
ative update δ is performed with a probability 1 − l(st, at).
Due to the initial state-action pairs being visited more of-
ten than the later ones, the temperature values for states
(cid:80)
close to the initial state can decay rapidly. One solution
to address this is to fold the average temperature ¯T (s(cid:48)) =
ai∈A T (s(cid:48), ai) for next state s(cid:48) into the temperature that
1A
is being decayed for (st, at) [Wei and Luke, 2016], as below:
Tt+1(st, at) = κ∗
(cid:26) Tt(st, at)
(1 − η) ∗ Tt(st, at) + η ¯Tt(s(cid:48))
(7)
where η is a constant controlling the extent that ¯T (s(cid:48)) is
folded in. We absorb this interesting notion of forgiveness
into our lenient reward network to boost the convergence in
cooperative Markov games which will be explained later.
if s(cid:48) is terminal,
otherwise.
3 Weighted Double Deep Q-Networks
In the section, we introduce a new multiagent DRL algorithm,
weighted double deep Q-networks (WDDQN), with two aux-
iliary mechanisms, i.e., the lenient reward approximation and
the scheduled replay strategy, to achieve efficient coordina-
tion in stochastic multiagent environments. In these environ-
ments, reward could be extremely stochastic due to the envi-
ronments' inherent characteristics and the continuous change
of the coexisting agents' behaviors.
For the stochastic rewards caused by the environments,
WDDQN uses the combination of the weighted double es-
timator and the reward approximator to reduce the estima-
tion error. As for the non-stationary coexisting agents, we
incorporate the leniency from lenient Q-learning [Palmer et
al., 2018; Panait et al., 2006] into the reward approximator to
provide an optimistic estimation of the expected reward under
each state-action pair r(s, a). In addition, directly applying
Figure 1: Network Architecture of WDDQN
3.2 Lenient Reward Network
To reduce noise in stochastic rewards, we use a reward net-
work, which is a neural network estimator, to approximate the
reward function R(s, a) explicitly. The reward network can
reduce bias in immediate reward r yielded from stochastic
environments by averaging all rewards for distinct (s, a) pair
and be trained using the transitions stored in the experience
replay during the online interaction. When updating the net-
work, instead of using the reward r in transition (s, a, r, s(cid:48))
from experience memory, WDDQN uses the estimated re-
ward by the reward network (lines 12 and 17).
In addition to stochasticity, in a cooperative multiagent en-
vironment, the coexisting agents introduce additional bias to
r as well. The mis-coordination of coexisting teammates may
Algorithm 1 WDDQN
1: The maximum number of episodes: M axE, the max-
imum number of steps: M axS, global memory: DG,
episodic memory: DE, reward network: RN , deep Q-
networks: QU and QV
Initialize DE
for step = 1 to M axS do
2: for episode = 1 to M axE do
3:
4:
5:
6:
7:
a ← maxa(cid:48) QU (s,a(cid:48))+QV (s,a(cid:48))
Execute a and store transitions into DE
Sample mini-batch (s, a, r, s(cid:48)) of transitions from
(with ε-greedy)
2
DG
8:
9:
10:
11:
12:
13:
14:
15:
16:
Update QU or QV randomly
if update QU then
a∗ ← arg maxa QU (s(cid:48), a)
U (s(cid:48), a∗) ← βQU (s(cid:48), a∗) + (1 −
Qw
β)QV (s(cid:48), a∗)
QTarget(s, a) ← RN (s, a) + Qw
Update network QU towards QTarget
a∗ ← arg maxa QV (s(cid:48), a)
V (s(cid:48), a∗) ← βQV (s(cid:48), a∗) + (1 −
Qw
β)QU (s(cid:48), a∗)
QTarget(s, a) ← RN (s, a) + Qw
Update network QV towards QTarget
V (s(cid:48), a∗)
U (s(cid:48), a∗)
else
end if
Update RN according to transitions in DG
17:
18:
19:
20:
21:
22:
23: end for
end for
Store DE into DG
lower the reward r for (s, a∗) despite the agent has adopted
the optimal action. To address this, we use a lenient reward
network (LRN) enhanced with the lenient concept in [Pot-
ter and De Jong, 1994] to allow the reward network to be
optimistic during the initial exploration phase. The LRN is
updated periodically (line 20) as follows:
(cid:26) Rt(st, at) + αδ
Rt(st, at)
Rt+1(st, at) =
if δ > 0 or x < l(st, at),
otherwise.
i
i
t
t
i=1...n r(s,a)
1/n(cid:80)
(8)
where Rt(st, at) is the reward approximation of state s and
− R(st, at) is the TD
action a at time t, and δ = ¯r(s,a)
error between the Rt(st, at) and the target reward ¯r(s,a)
=
obtained by averaging all immediate re-
ward r(s,a)
of (s, a) pairs in experience memory. Note that
l(st, at) inherits from Equation 6 and has the same meaning,
which is gradually decayed each time a state-action (s, a) pair
is visited. Consequently, the LRN contributes to reduce bias
by reward approximation and can help agents to find optimal
joint policies in cooperative Markov games.
3.3 Scheduled Replay Strategy
Prioritized experience replay (PER) can improve the DQN
algorithm's training efficiency by allocating samples with
Figure 2: Comparison between the prioritized experience re-
play and the scheduled replay strategy: each dot represents a
sample (s, a, r, s), and a trajectory consists of an ordered se-
quence of samples. The x-axis represents the order that each
sample comes into the relay memory and the y-axis is the pri-
ority of each sample.
different priorities according to their TD error. Samples
with higher priorities are more likely to be chosen for net-
work training. However, in stochastic multiagent environ-
ments, due to the noisy reward and the continuous behavior
changes of coexisting agents, PER may deteriorate the algo-
rithm's convergence and perform poorly. Given a transition
(s, a, r, s, d) with an extremely biased reward r, PER will
treat it as an important sample for its large TD error and will
frequently select it to update the network, though it is incor-
rect due to the big noise in r at the beginning. To address
this, we replace r with an estimation RN (s, a) using LRN
to correct TD error, by which the PER can distinguish truly
important samples.
Another potential problem is that PER gives all samples
in the new trajectory the same priority, thus resulting in the
indistinguishability of importance for all new samples. To
be specific, in Fig. 2, the sample with the maximum prior-
ity is colored by red dot. PER gives all samples (blue dots)
in the latest trajectory with an identical priority 1. However,
in cooperative multiagent environments, the trajectories that
agents succeed in cooperation are relatively rare, and in these
trajectories the samples closer to the terminal state is even
more valuable than the ones far from the terminal state. Be-
sides, the Q(s, a) = r + Q(s(cid:48), a∗) far from the terminal state
can further deteriorate if bootstrap of action value Q(s(cid:48), a∗)
is already highly inaccurate, since inaccurate estimation will
propagate throughout the whole contiguous samples. These
two traits explain why samples that are close to the terminal
state should be frequently used for network training. To this
end, we develop a scheduled replay strategy (SRS) using a
precomputed rising schedule [w0, w1, ..., wn] with size n to
assign different priorities according to the sample's position i
in the trajectory with n samples.
The values for wi = eρc∗ui are computed using an expo-
nent ρc which grows with a rising rate u > 1 for each i,
0 (cid:54) i < n. The priority pi assigned to sample with index i is
obtained by multiplying the current maximum priority pmax
in experience memory (priority of the red point in Fig. 2) by
1See
source
https://github.com/openai/baselines.
OpenAI
code
for
details:
Figure 3: Comparisons of DDQN, WDDQN w.o. LRN+SRS and WDDQN on pacman with 4 different sizes. The X-axis is the
number of training episodes and the Y-axis is a ratio of the number of minimum steps to the goal to the number of steps that the
agent actually used during training.
wi:
pi = pmax × wi
The SRS assigns higher priority to samples near the ter-
minal state (the green dot in Fig. 2) to ensure they are more
likely to be sampled for network training. In this way, the
estimation bias of the Q(s, a) near the terminal state is ex-
pected to decrease rapidly. This can significantly speed up
the convergence and improve the training performance, as to
be experimentally verified in the following section.
4 Experiments
Empirical evaluation is conducted to verify the effectiveness
of WDDQN in terms of reducing bias and achieving coordi-
nation in stochastic multiagent domains.
First, we present comparisons of double DQN (DDQN)
and WDDQN with /without LRN and SRS, denoted by WD-
DQN and WDDQN w.o. LRN+SRS, in terms of the bias re-
duction, learning speed and performance on a gridworld game
with raw visual input. Then, we use a cooperative Markov
game to investigate WDDQN's effectiveness of finding an
optimal cooperative policy. A discussion about benefits of
WDDQN, LNR and SRS is given in the end.
Figure 4: Gridworld game.
Figure 5: Predator game.
Table 1: Network architectures in WDDQN
# Network Visual input
84 * 84 * 3
84 * 84 * 3
DQN
LRN
Filters in Conv. 1/2/3 Unit in F.C
32/64/64
16/16/16
512
128
We set the constant c in β to 0.1 in WDDQN, parameters
K, κ, η in lenient Q-learning to 2, 0.95 and 0.6 respectively.
Besides, the learning rate α for network training of DDQN,
lenient Q-learning is set to 0.0001. Table 1 depicts the ar-
chitecture of deep Q-networks and LRN in WDDQN. We use
three hidden convolution layers (using rectifier non-linearities
between each two consecutive layers), and a fully-connected
hidden layer. The output layer of DQN and LRN is a fully-
connect linear layer with a single output layer for each valid
action Q(s, a) and reward R(s, a). For exploration purpose,
DQN(-greedy) is adopted with the annealed linearly from
1 to 0.01 over the first 10000 steps. We used the Adam algo-
rithm with 0.0001 learning rate and the minibatches of size
32. We trained for a total of 2500 episodes and used a replay
memory of 8192 most recent frames. Last, to be fair, K, κ, η
in LRN is the same as the lenient Q-learning while ρc and µ
in SRS is set to 0.2 and 1.1.
4.1 Pacman-like Grid World
The first experiment is an n×n pacman-like grid-world prob-
lem (Fig. 4), where the agent starts at the s0 (top left cell),
and moves towards the goal cell (pink dot at right bottom cell)
using only four actions: {north, south, east, west}. Every
movement leads the agent to move one cell in the correspond-
ing direction, except that a collision on the edge of the grid
results in no movement. The agent tries to search the goal
cell which may appear randomly in any position in the grid
world. The agent receives a stochastic reward of -30 or 40
with equal probability for any action entering into the goal
and ending an episode. Choosing north or west will get a re-
ward of -10 or +6, and south or east get a reward of -8 or +6
at a non-goal state. The environment is extremely noisy due
to the uncertainty in the reward function.
Empirical results in Figure 3 demonstrate that, under ex-
tremely stochastic environments, DDQN takes a long time
to optimize the policy, while WDDQN w.o. LRN+SRS and
WDDQN need much less episodes to get a better policy due
to the weighted double estimator. DDQN and WDDQN w.o.
LRN+SRS oscillate too frequently to converge to an optimal
policy, while WDDQN performs steadily and smoothly be-
cause of the use of LRN. Another finding is that the train-
ing speed of WDDQN is faster than the others, which is at-
tributed to the SRS. In general, WDQ works not as well as
in relatively simple RL problems and both DDQN and WD-
(a) deterministic rewards.
(b) stochastic rewards.
Figure 6: (Left) Comparisons of WDDQN and its variants using the predator game with deterministic rewards; and (right)
comparisons of WDDQN and other algorithms using the predator game with stochastic rewards. Note that, each point in the
x-axis consists of 50 episodes, and the y-axis is the corresponding averaged reward. The shadow area ranges from the lowest
reward to the highest reward within the 50 episodes.
DQN w.o. LRN+SRS may not converge even after a very
long training time. By contrast, as shown in Fig. 1, WDDQN
learns efficiently and steadily due to the use of both LRN and
SRS.
4.2 Cooperative Markov Game
In this section, we consider the two predators pursuit prob-
lem.
It is a more complex cooperative problem and firstly
defined in [Benda et al., 1986]. Here we redefine it in a sim-
ple way. The robots in Figure 5 represent two agents trying
to enter into the goal state at the same time. The cell with
letter S is a suboptimal goal with a reward of +10 while G
is a global optimal with a reward of +80. There is a thick
wall (in gray) in the middle that separates the area into two
zones.
In each episode, two agents start at the left bottom
cell and right bottom cell separately and try to go to the green
goal cell together. Each agent has four actions: {north, south,
east, west}. Every movement leads the agent to move one
grid in the corresponding direction, except that a collision on
the edge of the grid or thick wall results in no movement.
A reward of 0 is received whenever entering into a non-goal
state. The agent receives a positive reward for any action en-
tering into the goal together and ending an episode, otherwise
a negative reward of -1 is received with miscoordination.
There are two types of cooperative policies moving to-
wards the suboptimal goal cell S or the global optimal cell
G, as shown in the Fig. 5.
In the remaining part, we in-
vestigate whether WDDQN and related algorithms can find
cooperative policies, especially the optimal policy.
Evaluation on WDDQN
Our goal is to train two agents simultaneously to coordinate
in order to get higher rewards. The performance of WDDQN
w.o. LRN+SRS, WDDQN(LRN)2, and WDDQN in terms of
the average reward is depicted in Figure 6(a). As WDDQN
w.o. LRN+SRS's convergence is no longer guaranteed in the
neural network representation, it is not surprising that it fails
in finding the cooperative policy by directly combining WDQ
with neural network. By contrast, WDDQN(LRN), due to
the LRN, achieves coordination more quickly and finds the
optimal policy after a period of exploration. By leveraging
the SRS, WDDQN shows a more promising result that the
optimal policy is learned much faster than the two others.
Evaluation Against Other Algorithms
Here, we compare WDDQN against DDQN, a DRL algo-
rithm, and lenient Q-learning, a multiagent RL algorithm on
the same game except that the agent receives a reward of +10
or +100 with the possibility of 60% or 40% at goal S and a
deterministic reward of +80 at goal G. Goal S is still subop-
timal as its average reward is 46. This slight adjustment may
affect the algorithm's performance by misleading the agent to
converge to the suboptimal goal where a higher reward may
appear accidentally.
Results in terms of the average reward are depicted in Fig.
6(b), where two dashed lines indicate optimal and suboptimal
policy with the expected rewards of 80 and 46, respectively.
Both WDDQN and lenient Q-learning outperform DDQN in
terms of the convergence speed and the average reward in all
experiments, which confirms the infeasibility of directly ap-
plying DRL algorithms in multiagent problems. Note that,
WDDQN, due to the use of both LRN and SRS, is more sta-
ble, performs better and is more likely to find the optimal so-
lution with the average reward of 80 than lenient Q-learning
2WDDQN(LRN) uses only LRN and is identical to WDDQN
w.o. SRS
with the average reward of 46 in such a stochastic multiagent
environment.
5 Conclusion
This paper proposes WDDQN with the lenient reward net-
work and the scheduled replay strategy to boost the training
efficiency, stability and convergence under stochastic multia-
gent environments with raw image inputs, stochastic rewards,
and large state spaces. Empirically, WDDQN performs bet-
ter than WDDQN w.o. LRN+SRS, DDQN and lenient Q-
learning in terms of the average reward and convergence rate
on the pacman and two predators pursuit domains.
One downside to our approach is that it only uses one agent
to explore the large-scale RL problems and train network at
the same time. These can significantly slow down the ex-
ploration procedure and affect WDDQN's performance and
efficiency. This could be remedied in practice by accelerating
the training procedure of WDDQN using asynchronization,
as being used in the A3C algorithm [Mnih et al., 2016]. We
leave this investigation to future work.
References
[Bellman, 1957] Richard Bellman. Dynamic programming.
Princeton University Press., 1957.
[Benda et al., 1986] M. Benda, V. Jagannathan, and R. Dod-
hiawala. On optimal cooperation of knowledge sources
- an empirical investigation.
Technical Report BCS–
G2010–28, Boeing Advanced Technology Center, Boeing
Computing Services, 1986.
[Bloembergen et al., 2011] Daan Bloembergen, Michael
Kaisers, and Karl Tuyls.
Empirical and theoretical
support for lenient learning. In International Conference
on Autonomous Agents and Multiagent Systems, pages
1105–1106, 2011.
[Bloembergen et al., 2015] Daan Bloembergen, Karl Tuyls,
Daniel Hennes, and Michael Kaisers. Evolutionary dy-
namics of multi-agent learning: A survey. Journal of Arti-
ficial Intelligence Research, 53:659–697, 2015.
[Claus and Boutilier, 1998] Caroline Claus
and Craig
Boutilier. The dynamics of reinforcement learning in
cooperative multiagent systems. In AAAI Conference on
Artificial Intelligence, pages 746–752, 1998.
[Gupta et al., 2017] Jayesh K Gupta, Maxim Egorov, and
Mykel Kochenderfer. Cooperative multi-agent control us-
In International Con-
ing deep reinforcement learning.
ference on Autonomous Agents and Multiagent Systems,
pages 66–83, 2017.
[Hasselt, 2010] Hado V. Hasselt. Double Q-learning. In Ad-
vances in Neural Information Processing Systems, pages
2613–2621, 2010.
[Lanctot et al., 2017] Marc Lanctot, Vinicius Zambaldi, Au-
drunas Gruslys, Angeliki Lazaridou, Julien Perolat, David
Silver, Thore Graepel, et al. A unified game-theoretic ap-
proach to multiagent reinforcement learning. In Advances
in Neural Information Processing Systems, pages 4193–
4206, 2017.
[Matignon et al., 2007] Laetitia Matignon, Guillaume J Lau-
rent, and Nadine Le Fort-Piat. Hysteretic q-learning: an
algorithm for decentralized reinforcement learning in co-
operative multi-agent teams. In International Conference
on Intelligent Robots and Systems, pages 64–69, 2007.
[Matignon et al., 2012] Laetitia Matignon, Guillaume J Lau-
rent, and Nadine Le Fort-Piat. Independent reinforcement
learners in cooperative markov games: a survey regarding
coordination problems. The Knowledge Engineering Re-
view, 27(1):1–31, 2012.
[Mnih et al., 2013] Volodymyr Mnih, Koray Kavukcuoglu,
David Silver, Alex Graves, Ioannis Antonoglou, Daan
Wierstra, and Martin Riedmiller. Playing atari with deep
reinforcement learning. arXiv preprint arXiv:1312.5602,
2013.
[Mnih et al., 2015] Volodymyr Mnih, Koray Kavukcuoglu,
David Silver, Andrei A. Rusu, Joel Veness, Marc G. Belle-
mare, Alex Graves, Martin Riedmiller, Andreas K. Fid-
jeland, Georg Ostrovski, Stig Petersen, Charles Beattie,
Amir Sadik, Ioannis Antonoglou, Helen King, Dharshan
Kumaran, Daan Wierstra, Shane Legg, and Demis Has-
sabis. Human-level control through deep reinforcement
learning. Nature, 518(7540):529–533, 2015.
[Mnih et al., 2016] Volodymyr Mnih, Adria Puigdomenech
Badia, Mehdi Mirza, Alex Graves, Timothy Lillicrap, Tim
Harley, David Silver, and Koray Kavukcuoglu. Asyn-
chronous methods for deep reinforcement learning.
In
International Conference on Machine Learning, pages
1928–1937, 2016.
[Palmer et al., 2018] Gregory Palmer, Karl Tuyls, Daan
Bloembergen, and Rahul Savani. Lenient multi-agent deep
In International Conference on
reinforcement learning.
Autonomous Agents and Multi-Agent Systems, page to ap-
pear, 2018.
[Panait et al., 2006] Liviu Panait, Keith Sullivan, and Sean
Luke. Lenient learners in cooperative multiagent systems.
In International Conference on Autonomous Agents and
Multiagent Systems, 2006.
[Potter and De Jong, 1994] Mitchell A Potter and Kenneth A
De Jong. A cooperative coevolutionary approach to func-
tion optimization. In International Conference on Parallel
Problem Solving from Nature, pages 249–257, 1994.
[Schaul et al., 2016] Tom Schaul,
Ioannis
Antonoglou, and David Silver. Prioritized experience re-
play. In International Conference on Learning Represen-
tations, 2016.
John Quan,
[Smith and Winkler, 2006] James E Smith and Robert L
Winkler. The optimizer's curse: Skepticism and postde-
cision surprise in decision analysis. Management Science,
52(3):311–322, 2006.
[Sutton and Barto, 1998] Richard S Sutton and Andrew G
Barto. Reinforcement learning: An introduction. MIT
press Cambridge, 1998.
[Sutton, 1988] Richard S Sutton. Learning to predict by
the methods of temporal differences. Machine learning,
3(1):9–44, 1988.
[Van Hasselt et al., 2016] Hado Van Hasselt, Arthur Guez,
and David Silver. Deep reinforcement learning with dou-
In AAAI Conference on Artificial Intelli-
ble q-learning.
gence, pages 2094–2100, 2016.
[Wang et al., 2016] Ziyu Wang, Tom Schaul, Matteo Hes-
sel, Hado Van Hasselt, Marc Lanctot, and Nando De Fre-
itas. Dueling network architectures for deep reinforcement
learning. In International Conference on Learning Repre-
sentations, 2016.
[Watkins, 1989] Christopher John Cornish Hellaby Watkins.
Learning from delayed rewards. PhD thesis, King's Col-
lege, University of Cambridge, 1989.
[Wei and Luke, 2016] Ermo Wei and Sean Luke. Lenient
learning in independent-learner stochastic cooperative
games. Journal of Machine Learning Research, 17(84):1–
42, 2016.
[Zhang et al., 2017] Zongzhang Zhang, Zhiyuan Pan, and
Mykel J Kochenderfer. Weighted double Q-learning. In
International Joint Conference on Artificial Intelligence,
pages 3455–3461, 2017.
|
1811.12557 | 1 | 1811 | 2018-11-30T00:38:18 | Deep Multi-Agent Reinforcement Learning with Relevance Graphs | [
"cs.MA",
"cs.LG"
] | Over recent years, deep reinforcement learning has shown strong successes in complex single-agent tasks, and more recently this approach has also been applied to multi-agent domains. In this paper, we propose a novel approach, called MAGnet, to multi-agent reinforcement learning (MARL) that utilizes a relevance graph representation of the environment obtained by a self-attention mechanism, and a message-generation technique inspired by the NerveNet architecture. We applied our MAGnet approach to the Pommerman game and the results show that it significantly outperforms state-of-the-art MARL solutions, including DQN, MADDPG, and MCTS. | cs.MA | cs |
Deep Multi-Agent Reinforcement Learning with
Relevance Graphs
Aleksandra Malysheva∗†
JetBrains Research
National Research University
Higher School of Economics
St. Petersburg, Russia
[email protected]
Tegg Taekyong Sung∗†
Department of Electronics and
Communications Engineering
Kwangwoon University
Seoul, Republic of Korea
[email protected]
Chae-Bong Sohn
Department of Electronics and
Communications Engineering
Kwangwoon University
Seoul, Republic of Korea
[email protected]
Daniel Kudenko
University of York
York, United Kingdom
[email protected]
Aleksei Shpilman
JetBrains Research
National Research University
Higher School of Economics
St. Petersburg, Russia
[email protected]
Abstract
Over recent years, deep reinforcement learning has shown strong successes in
complex single-agent tasks, and more recently this approach has also been applied
to multi-agent domains. In this paper, we propose a novel approach, called MAGnet,
to multi-agent reinforcement learning (MARL) that utilizes a relevance graph
representation of the environment obtained by a self-attention mechanism [17], and
a message-generation technique inspired by the NerveNet architecture [18]. We
applied our MAGnet approach to the Pommerman game [11] and the results show
that it significantly outperforms state-of-the-art MARL solutions, including DQN,
MADDPG, and MCTS.
1
Introduction
A common difficulty of reinforcement learning in a multi-agent environment is that in order to
achieve successful coordination, agents require information about the relevance of environment
objects to themselves and other agents. For example, in the game of Pommerman it is important
to know how relevant bombs placed in the environment are for teammates, e.g. whether or not the
bombs can threaten them. While such information can be hand-crafted into the state representation
for well-understood environments, in lesser-known environments it is preferable to derive it as part of
the learning process.
∗Equal contribution.
†Work performed while at Deep Learning Camp Jeju.
32nd Conference on Neural Information Processing Systems (NIPS 2018), Montréal, Canada.
In this paper, we propose a novel method, named MAGNet, to learn such relevance information in
form of a relevance graph and incorporate this into the reinforcement learning process. Furthermore,
we propose the use of message generation techniques from this graph, inspired by the NerveNet
architecture [18]. NerveNet has been introduced in the context of robot locomotion, where it has
been applied to a graph of connected robot limbs. MAGNet uses a similar approach, but basing the
message generation on the learned relevance graph.
We applied MAGNet to the popular Pommerman [11] multi-agent environment, and achieved sig-
nificantly better performance than a baseline heuristic method and state-of-the-art RL techniques
including DQN [12], MADDPG [9] and MCTS [5]. Additionally, we empirically demonstrate the
effectiveness of self-attention, graph sharing and message generating modules with an ablation study.
2 Deep Multi-Agent Reinforcement Learning
In this section we describe the state-of-the-art (deep) reinforcement learning techniques that were
applied to multi-agent domains. The algorithms introduced below (DQN, MCTSNet, and MADDPG)
were also used as evaluation baselines in our experiments.
The majority of work in the area of reinforcement learning applies a Markov Decision Process (MDP)
as a mathematical model [13]. An MDP is a tuple (S, A, T, R), where S is the state space, A is the
action space, T (s, a, s(cid:48)) = P r(s(cid:48)s, a) is the probability that action a in state s will lead to state s(cid:48),
and R(s, a, s(cid:48)) is the immediate reward r received when action a taken in state s results in a transition
to state s(cid:48). The problem of solving an MDP is to find a policy (i.e., mapping from states to actions)
which maximises the accumulated reward. When the environment dynamics (transition probabilities
and reward function) are available, this task can be solved using policy iteration [2].
The problem of solving an multi-agent MDP is to find policies π = π1, . . . , πN that maximize the
expected reward Ji = Es∼pπ,a∼πi[R] for every agent i, where pπ is the distribution of states visited
with policy π.
2.1 Deep Q-Networks
Q-learning is a value iteration method that tries to predict future rewards from current state and an
action. This algorithm apply so called temporal-difference updates to propagate information about
values of state-action pairs, Q(s, a). After each transition, (s, a) → (s(cid:48), r), in the environment, it
updates state-action values by the formula:
Q(s, a) → Q(s, a) + α[r + γ max Q(s(cid:48), a(cid:48)) − Q(s, a)],
(1)
where α is the rate of learning and γ is the discount factor. It modifies the value of taking action a in
state s, when after executing this action the environment returned reward r, and moved to a new state
s(cid:48).
Deep Q-learning utilizes a neural network to predict Q-values of state-action pairs [12]. This so-called
deep Q-network is trained to minimize the difference between predicted and actual Q-values as
follows:
y = r + γ max
a
Qpast(s(cid:48), a(cid:48))
L(θ) = Es∼ρπ,a∼p(s)[yi − Q(s, aθ)]2,
(2)
(3)
where y is best action according to the previous deep Q-network, θ is the parameter vector of the
current Q-function and a ∼ p(s) denotes all actions that are permitted in state s.
The simplest way to apply this approach in multi-agent systems is to use an independent network for
every agent [15]. However this approach has been shown to not perform well with more complex
environments [10]. One of the shortcomings of DQN learning in multi-agent settings is that past
experience replay is less informative, because unlike a single-agent setting, the same action in the
same state may produce a different result based on the actions of other agents. A way to alleviate this
problem is passing parameters of other agents as additional environmental information [16].
2
2.2 Monte-Carlo Tree Search nets (MCTSNet)
An alternative approach to reinforcement learning is to directly find an optimal policy without the
intermediate step of computing a value function. Policy gradient methods (e.g. [14]) have been
developed to do just this.
Policy gradient methods have been shown to be successful in combination with Monte-Carlo tree
search (MCTS) [3], which is a general, powerful, and widely used decision making algorithm, most
commonly applied to games. In MCTS a sample tree of simulated future states is created, and
evaluations of those states are backed-up to the root of this so-called search tree to compute the best
action.
A recent study [5] incorporates a neural network inside the tree-search by expanding, evaluating and
backing-up a vector embedding of the states. The key idea is to assign a feature or a "memory" vector
h ∈ Rn to an internal state (search tree node) that is then propagated up the tree and used to calculate
the value or action in the root node. This MCTSNet approach has been shown to outperform other
MCTS methods.
2.3 Multi-agent Deep Deterministic Policy Gradient
When dealing with continuous action spaces, the methods described above can not be applied. To
overcome this limitation, the actor-critic approach to reinforcement learning was proposed [14]. In
this approach an actor algorithm tries to output the best action vector and a critic tries to predict the
value function for this action.
Specifically, in the Deep Deterministic Policy Gradient (DDPG [8]) algorithm two neural networks
are used: µ(s) is the actor network that returns the action vector. Qw(s, a) is the critic network, that
returns the Q value, i.e. the value estimate of the action of a in state s.
The gradient for the critic network can be calculated in the same way as the gradient for Deep
Q-Networks described above (Equation 3). Knowing the critic gradient ∇aQw we can then compute
the gradient for the actor as follows:
∇θµJ = Es∼ρπ [∇aQw(s, aθw)s = st, a = µ(sθµ)],
(4)
where θw and θµ are parameters of critic and actor neural networks respectively, and ρπ(s) is the
probability of reaching state s with policy π.
The authors of [9] proposed an extension of this method by creating multiple actors, each with it's
own critic with each critic taking in the respective agent's observations and actions of all agents.
3 MAGnet approach and architecture
The overall network architecture of our MAGNet approach is shown in Figure 1. The whole process
can be divided into a relevance graph generation stage (shown in the left part) and a decision making
stages (shown in the right part). We see them as a regression and classification problem respectively.
In this architecture, the concatenation of the current state and previous action forms the input of the
models, and the output is the next action. The details of the two processes are described below.
3.1 Relevance graph generation stage
In the first part of our MAGNet approach, a neural network is trained that produces a relevance graph.
The relevance graph represents the relationship between agents and between agents and environment
objects. The higher the weight of an edge between an agent a and another agent b or object o is, the
more important b or o are for the achievement of agent a's task. The graph is generated by MAGNet
from the current and previous state together with the respective actions.
Figure 4B shows an example of such a graph for two agents. The displayed graph only shows those
edges which have a non-zero weight (thus there are objects to which agent 1 is not connected in the
graph).
In MAGNet, a neural network is trained via back-propagation to output a relevance graph represented
as an A × (A + O) matrix, where A is the number of agents and O is the maximum number
3
Figure 1: The overall network architecture of MAGNet. Left section shows the graph generation
stage. Right part shows the decision making stage.
of environment objects. The input to the network are the current and the two previous states (denoted
by X(t), X(t − 1), and X(t − 2) in Figure 1), the two previous actions (denoted by a(t − 1) and
a(t − 2)), and the relevance graph produced at the previous time step (denoted by graph(t − 1)). For
the first learning step (i.e. t = 0), the input consists out of three copies of the initial state, no actions,
and a random relevance graph. The inputs are passed into a convolution and pooling layer, followed by
a padding layer, and then concatenated and passed into fully connected layer and finally into the graph
generation network (GGN). The GGN can be either a multilayer perceptron (MLP) or a self-attention
network, which uses an attention mechanism to catch long and short term time-dependencies, and is
an analogue to a recurrent network such as LSTM, but takes much less time to compute [17]. The
result of the GGN is fed into a two-layer fully connected network with dropout, which produces the
relevance graph matrix, as described above.
The loss function for the back-propagation training is composed of two parts:
(5)
L = (cid:107)Wt − Wt−1(cid:107)2
2 +
(wt(ξ) − s(ξ))2
(cid:88)
ξ∼Ξ
The first component is based on the difference between the current graph Wt and the one generated
in the previous state Wt1. It is important to note that graph on each step is the same only weights are
changing. The second component comes into play when a special pre-defined event ξ ∈ Ξ occurs,
and is based on the difference between a selected edge weight updated according to heuristic rules
s(ξ) and the weight of the same edge in the current graph wt(ξ). For example, a heuristic rule would
specify that if a bomb explodes and kills the agent, the edge weight between the agent and the bomb
is set to a high value (i.e. the bomb is clearly of high relevance of the agent).
The training of the neural network can be performed in two stages: first with a default rule-based AI
agent, and then with a learning agent.
3.2 Decision making stage
The agent AI responsible for decision making is also represented as a neural network whose inputs
are accumulated messages (generated by a method inspired by NerveNet [18] and described below)
and the current state. The output of the network is an action to be executed.
4
The graph G generated at the last step is G = (V, E) where edges represent relevance between agents
and objects. Every vertex v has a type: b(v) ∈ {0, 1, 2, 3, 4, 5, 6} that in our case corresponds to:
"ally", "enemy", "placed bomb" (about to explode), "increase kick ability", "increase blast power",
"extra bomb" (can be picked up). Every edge has a type as well: c(e) ∈ {0, 1}, that corresponds to
"edge between the agents" and "edge between the agent and the object in the environment".
The final (action) vector is computed in 4 stages through message passing system, similar to a system
used for distributed computing and described in [1]. Stages 2 and 3 are repeated for a specified
number of message propagation steps.
1. Initialization of information vector. Each vertex v has an initialization network M LP b(v)
init
associated with it according to it's type b(v) that takes as input the current individual
observation Ov and outputs initial information vector µ0
v for each vertex.
v = M LP b(v)
µ0
init (Ov)
(6)
2. Message generation. At message propagation step t + 1 message networks M LP c(v,u)
mess
compute output messages for every edge (v, u) ∈ E based on type of the edge c(v, u).
mt
(v,u) = M LP c(v,u)
m
(µt
v)
(7)
3. Message processing. Information vector mt+1
at message propagation step t is updated by
update network LST M b(v)
associated with it according to it's type b(v), that takes as input
up
a sum of all message vectors from connected to v edges multiplied by the edge relevance
v.
w(v,∗) and information at previous step mt
µt+1
v = LST M b(v)
(cid:88)
up (µt
v,
v
mt
(v,∗)w(v,∗))
(8)
4. Choice of action. All vertices that are associated with agents have a decision network
v and compute the mean
choice which takes as an input its final information vector mt
M LP b(v)
of the action of the Gaussian policy.
All networks are trained using back-propagation following the DDPG actor-critic approach [8].
av = M LP b(v)
choice(µt
v)
(9)
4 Experiments
4.1 Environment
In this paper, we use popular Pommerman game environment which can be played by up to 4
players [11]. This game has been used in many empirical evaluations of multi-agent algorithms,
and therefore is especially suitable for a comparison to state-of-the-art techniques. In Pommerman,
the environment is a grid-world where each agent can move in one of four directions, lay a bomb,
or do nothing. A grid square is either clear (which means that an agent can enter it), wooden, or
rigid. Wooden grid squares can not be entered, but can be destroyed by a bomb (i.e. turned into clear
squares). Rigid squares are indestructible and impassable. When a wooden square is destroyed, there
is a probability of items appearing, e.g., an extra bomb, a bomb range increase, or a kick ability. Once
a bomb has been placed in a grid square it explodes after 10 time steps. The explosion destroys any
wooden square within range 1 and kills any agent within range 4. The last surviving agent wins the
gameast
The map of the environment is randomly generated for every episode. The game has two different
modes: free for all and team match. Our experiments were carried out in the team match mode in
order to evaluate the ability of MAGnet to exploit the discovered relationships between agents (e.g.
being on the same team).
4.2 Network training
We first trained the graph generating network on 50,000 episodes with the default Pommerman AI as
the decision making agent. After this initial training, the default AI was replaced with the learning
5
decision making AI described in section 3. All learning graphs show the training episodes starting
with this replacement (except the ones which explicitly show the relevance graph learning).
Table 1 shows results for different MAGNet variants in terms of achieved win percentage against
a default agent after 50,000 episodes. The MAGNet variants are differing in the complexity of the
approach, starting from the simplest version which takes the relevance graph as a direct input, to the
version incorporating message generation, graph sharing, and self-attention. The table clearly shows
the benefit of each extension.
Table 1: Influence of different modules on the performance of the MAGnet model.
MAGnet modules
Self-
attention
+
+
+
+
-
-
-
-
Graph
Sharing
+
+
-
-
+
+
-
-
Message
Generation
+
-
+
-
+
-
+
-
Win %
71.3±0.7
56.7 ± 1.8
62.4 ± 1.7
54.5 ± 2.6
67.1 ± 1.9
52.0 ± 1.7
45.2 ± 3.6
32.7 ± 5.9
Each of the three extensions with their hyper-parameters are described below:
Graph Generating Network (GGN): we used a MLP (number of layers and neurons was varied, and
a network with 3 layers 512-128-128 neurons achieved the best result) and a self-attention (SA)
layer [17] with default parameters.
Graph Sharing (GS): relevance graphs were trained individually for both agents, or in form of a
shared graph for both agents.
Message Generation (MG): the message generation module was implemented as either a MLP or a
message generation (MG) architecture, as described in Section 3. We tested the MLP and message
generation network with a range of hyper-parameters. For the MLP with 3 fully connected layers
1024-256-64 neurons achieved the best result, while for the message generation network 2 layers
with 128-32 neurons and 5 message passing iterations showed the best result.
Dropout layers were individually optimized by grid search in [0, 0.2, 0.4] space.
We tested two convolution sized: [3x3] and [5x5]. [5x5] convolutions showed the best result.
Rectified Linear Unit (ReLU) transformation was used for all connections.
4.3 Evaluation Baselines
In our experiments, we compare the proposed method with state-of-the-art reinforcement learning
algorithms simulated in team match mode. Figure 2a shows a comparison with DQN [12], MCT-
SNets [5], MADDPG[9], and a default heuristic AI. The latter algorithm is provided as part of the
Pommerman environment [11]. Each of the reinforcment learning algoritms played a number of
games (i.e. episodes) against the heuristic AI, and the respective win rates are shown.
All graphs display a 95% confidence interval to illustrate the statistical significance of our results.
The parameters chosen for the baselines were set as follows.
For DQN we implemented multi-agent deep Q-learning approach which has been shown to be
successful in past work [4]. In this method training is performed in two repeated steps: first, one agent
is training at a time, while policies of other agents are kept fixed; second, the agent that was trained
in the previous step distributes its policy to all of its allies as an additional environmental variable.
The network consists of five convolutional layers with 64 3x3 filters in each layer followed by three
fully connected layers with 128 neurons each with residual connections [6] and batch normalization [7]
that takes an input an 11x11x4 environment tensor and one-hot encoded action vector (a padded 1x6
6
(a)
(b)
Figure 2: (a) The best performing MAGnet variant (MAGnet-Att-NerveNet-GS) compared to state-
of-the-art MARL techniques. (b) The effectiveness MAGNet with various module combinations:
Message Generation (MG), shared relevance graph (GS), and Self-Attention (SA). MADDPG is
currently the best performing state-of-the-art algorithm.
vector) that are provided by the Pommerman environment and outputs a Q-function for that state.
This network showed the best result at the parameter exploration stage.
Parameter exploration on MCTSNet led to the following settings: The backup network β is a
multilayer perceptron (MLP) with 5 fully connected layer with 64 neurons in each layer that takes in
current "memory" vectors of the node and updated "memory" vector of the child and updated the
node's "memory" vector. The embedding network , is consists of 7 convolutional layers with 64
3x3 filters followed by 3 fully connected layers with 128 neurons each with residual connections [6]
and batch normalization [7] that takes an input an 11x11x4 environment tensor and one-hot encoded
action vector (a padded 1x6 vector) that are provided by Pommerman and outputs a "memory" vector.
The policy network has the same architecture, but with 5 convolutional layers with 32 3x3 filters
each and it outputs an action for simulation. The readout network, is a multilayer perceptron with 2
fully connected layer with 128 neurons in each layer that inputs root "memory" vector and outputs an
action.
For our implementation of MADDPG we used a multilayer perceptron (MLP) with 5 fully connected
layer with 128 neurons in each layer and for the critic we used a 3 layer network with 128 neurons in
each layer.
4.4 Self-attention and graph sharing in training a relevance graph
Figure 3 shows the shared graph loss value (Equation 5) with and without self-attention module
and with or without graph sharing. As we can see from this figure, both self-attention and graph
sharing significantly improve graph generation in terms of speed of convergence and final loss value.
Furthermore, their actions are somewhat independent which is seen in that using them together gives
additional improvement.
To provide further evidence for the usefulness of the shared graph approach, we let a MAGNet-
AttNerveNet team play against a MAGNet-Att-NerveNet-GS team. As the graph in 3a shows, even
though both have the same base architectures, the graph sharing method yields a higher win-rate after
10,000 episodes.
4.5 Relevance graph visualization
Figure 4 shows examples of relevance graphs with the corresponding environment states. Red nodes
denote friendly team agents, the purple nodes denote the agents on the opposing team, and the other
nodes denote environment objects such as walls (green) and bombs (black). The lengths of edges
represent their weights (shorter edge equals higher weight, i.e. higher relevance). The graphs in
Figure 4B are shared, while the graphs in Figure 4C are agent-individual.
As can be seen when comparing the individual and shared graphs, in the shared case agent 1 and agent
2 have different strategies related to the opponent agents (agents 3 and 4). Agent 4 is of relevance to
7
(a)
(b)
Figure 3: (a) Win rate of a MAGNet team with a shared relevance graph vs a MAGNet team with
agent-individual relevance graphs. (b) Loss value in training the graph generator with and without a
self-attention module (SA+/-) and with or without graph sharing (GS+/-).
agent 1 but not to agent 2. Similarly, agent 3 is of relevance to agent 2, but not to agent 1. In contrast,
when considering the individual graphs, both agents 3 and 4 have the same relevance to agents 1
and 2. Furthermore, it can be seen from all graphs that different environment objects are relevant to
different agents.
5 Conclusion
In this paper we presented a novel method, MAGNet, for deep multi-agent reinforcement learning
incorporating information on the relevance of other agents and environment objects to the RL
agent. We also extended this basic approach with various optimizations, namely self-attention, shared
relevance graphs, and message generation inspired by Nervenet. The MAGNet variants were evaluated
on the popular Pommerman game environment, and compared to state-of-the-art MARL techniques.
Our results show that MAGNet significantly outperforms all competitors.
6 Acknowledgments
This was supported by Deep Learning Camp Jeju 2018 which was organized by TensorFlow Korea
User Group. This work was partially supported by the Ministry of Trade, Industry & Energy (MOTIE,
Korea) under Industrial Technology Innovation Program No.10077659, 'Development of artificial
intelligence based mobile manipulator for automation of logistics in manufacturing line and logistics
center'.
8
References
[1] H. Attiya and J. Welch. Distributed computing: fundamentals, simulations, and advanced topics,
volume 19. John Wiley & Sons, 2004.
[2] D. P. Bertsekas, D. P. Bertsekas, D. P. Bertsekas, and D. P. Bertsekas. Dynamic programming
and optimal control, volume 1. Athena scientific Belmont, MA, 2005.
[3] G. Chaslot, S. Bakkes, I. Szita, and P. Spronck. Monte-carlo tree search: A new framework for
game ai. In AIIDE, 2008.
[4] M. Egorov. Multi-agent deep reinforcement learning, 2016.
[5] A. Guez, T. Weber, I. Antonoglou, K. Simonyan, O. Vinyals, D. Wierstra, R. Munos, and
D. Silver. Learning to search with mctsnets. arXiv preprint arXiv:1802.04697, 2018.
[6] K. He, X. Zhang, S. Ren, and J. Sun. Deep residual learning for image recognition.
In
Proceedings of the IEEE conference on computer vision and pattern recognition, pages 770 --
778, 2016.
[7] S. Ioffe and C. Szegedy. Batch normalization: Accelerating deep network training by reducing
internal covariate shift. arXiv preprint arXiv:1502.03167, 2015.
[8] T. P. Lillicrap, J. J. Hunt, A. Pritzel, N. Heess, T. Erez, Y. Tassa, D. Silver, and D. Wierstra.
Continuous control with deep reinforcement learning. arXiv preprint arXiv:1509.02971, 2015.
[9] R. Lowe, Y. Wu, A. Tamar, J. Harb, O. P. Abbeel, and I. Mordatch. Multi-agent actor-critic for
mixed cooperative-competitive environments. In Advances in Neural Information Processing
Systems, pages 6379 -- 6390, 2017.
[10] L. Matignon, G. J. Laurent, and N. Le Fort-Piat. Independent reinforcement learners in coopera-
tive markov games: a survey regarding coordination problems. The Knowledge Engineering
Review, 27(1):1 -- 31, 2012.
[11] T. Matiisen.
pommerman-baselines, 2018.
Pommerman
baselines.
https://github.com/tambetm/
[12] V. Mnih, K. Kavukcuoglu, D. Silver, A. Graves, I. Antonoglou, D. Wierstra, and M. Riedmiller.
Playing atari with deep reinforcement learning. arXiv preprint arXiv:1312.5602, 2013.
[13] M. L. Puterman. Markov decision processes: discrete stochastic dynamic programming. John
Wiley & Sons, 2014.
[14] R. S. Sutton, D. A. McAllester, S. P. Singh, and Y. Mansour. Policy gradient methods for rein-
forcement learning with function approximation. In Advances in neural information processing
systems, pages 1057 -- 1063, 2000.
[15] M. Tan. Multi-agent reinforcement learning: Independent vs. cooperative agents. In Proceedings
of the tenth international conference on machine learning, pages 330 -- 337, 1993.
[16] G. Tesauro. Extending q-learning to general adaptive multi-agent systems. In Advances in
neural information processing systems, pages 871 -- 878, 2004.
[17] A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, Ł. Kaiser, and
I. Polosukhin. Attention is all you need. In Advances in Neural Information Processing Systems,
pages 5998 -- 6008, 2017.
[18] T. Wang, R. Liao, J. Ba, and S. Fidler. Nervenet: Learning structured policy with graph neural
networks. Proceedings of the International Conference on Learning Representations, 2018.
9
A Visualization of Relevance Graph
Figure 4: Visualization of relevance graph. (A) Corresponding game states. (B) Shared graph. (C)
Agent-individual graphs.
10
|
1302.1937 | 1 | 1302 | 2013-02-08T04:03:50 | Embedding agents in business applications using enterprise integration patterns | [
"cs.MA"
] | This paper addresses the issue of integrating agents with a variety of external resources and services, as found in enterprise computing environments. We propose an approach for interfacing agents and existing message routing and mediation engines based on the endpoint concept from the enterprise integration patterns of Hohpe and Woolf. A design for agent endpoints is presented, and an architecture for connecting the Jason agent platform to the Apache Camel enterprise integration framework using this type of endpoint is described. The approach is illustrated by means of a business process use case, and a number of Camel routes are presented. These demonstrate the benefits of interfacing agents to external services via a specialised message routing tool that supports enterprise integration patterns. | cs.MA | cs | Embedding agents in business applications using
enterprise integration patterns
Stephen Cranefield and Surangika Ranathunga
Department of Information Science, University of Otago, Dunedin, New Zealand
{scranefield,surangika}@infoscience.otago.ac.nz
Abstract. This paper addresses the issue of integrating agents with a variety of
external resources and services, as found in enterprise computing environments.
We propose an approach for interfacing agents and existing message routing and
mediation engines based on the endpoint concept from the enterprise integration
patterns of Hohpe and Woolf. A design for agent endpoints is presented, and
an architecture for connecting the Jason agent platform to the Apache Camel
enterprise integration framework using this type of endpoint is described. The
approach is illustrated by means of a business process use case, and a number of
Camel routes are presented. These demonstrate the benefits of interfacing agents
to external services via a specialised message routing tool that supports enterprise
integration patterns.
1
Introduction
Much of the research in multi-agent systems (MAS) is based on a conceptual model
in which the only entities are agents and an abstracted external environment. This is in
contrast to modern enterprise computing environments, which comprise a diverse range
of middleware and server technologies.
The current solutions for integrating agents with external computing infrastructure
are: (a) to access these resources and services directly from agent code (if using a
conventional programming language), (b) to implement user-defined agent actions or an
environment model to encapsulate these interactions, (c) to provide custom support in an
agent platform for specific types of external service, or (d) to provide a generic interface
for calling external resources and services, either using a platform-specific API [9] or by
encapsulating them as agents [4], artifacts [8] or active components [7]. However, none
of these approaches are a good solution when agents need to be integrated with a range
of technologies. They either require agent developers to learn a variety of APIs, or they
assume that agent platform developers or their users will provide wrapper templates for
a significant number of commonly used technologies.
This paper proposes an alternative approach: the use of a direct bridge between
agents and the mainstream industry technology for enterprise application integration:
message routing and mediation engines, and in particular, those that support the enterprise
integration patterns (EIP) of Hohpe and Woolf [5]. Our integration approach is illustrated
in Figure 1. In this figure, each "pipes" graphic represents a messaging-based service
coordination tool, such as an enterprise service bus [3]. The larger one represents an
3
1
0
2
b
e
F
8
]
A
M
.
s
c
[
1
v
7
3
9
1
.
2
0
3
1
:
v
i
X
r
a
Fig. 1. The proposed MAS integration model1
organisation's existing message-based infrastructure for managing business processes
by coordinating information passing between applications and services. We propose
that agents can be embedded into this infrastructure by integrating them with their
own local message-routing and mediation engines, such as the lightweight Java-based
Apache Camel enterprise integration framework [6]. This integration is based on the EIP
notion of an endpoint, and we present the design of endpoints that can translate agent
requests (encoded as agent communication language messages or action executions) to
EIP messages, and from EIP messages to agent messages and percepts.
We describe an implemented architecture for connecting the Jason agent platform [2]
to Camel using these "agent endpoints". The approach is illustrated by means of a
business process use case requiring the integration of Jason agents with a database
management system, a mail server, a message broker and the Apache ZooKeeper coordi-
nation server. A number of Camel routes handling aspects of this use case are presented
to demonstrate the benefits of interfacing agents to external services via a specialised
message routing tool that supports enterprise integration patterns.
2 Enterprise Integration Patterns
Enterprise computing environments typically comprise hundreds and possibly thousands
of applications [5]. These may use a variety of communication protocols and interface
technologies due to departmental autonomy (e.g. to acquire "best of breed" applications
for specific business problems), incremental and opportunistic growth, mergers, etc. To
preserve loose coupling between the diverse applications involved in the automation of
business processes, and thus facilitate maintenance and extensibility, the use of middle-
ware products based on asynchronous message-passing has emerged as the mainstream
approach for enterprise application integration. In this approach, applications interact
1 Pipes photo by Herv´e Cozanet, source: http://commons.wikimedia.org/wiki/File:Piping system
on a chemical tanker.jpg (CC BY-SA 3.0)
...Centralised service integration and orchestrationLocal agent/ external system integration……………Service(s) used only by agentsEnterprise services(e.g. message brokers, mail servers, DBMSs)Enterprise applicationsby sending and receiving structured messages to and from named queues or publish-
subscribe 'topics' managed by (possibly federated) message brokers. Message routing
and transformation rules can be executed by the message broker or by specialised mes-
sage routing and mediation engines, thus providing a single location for the specification
of business processes. The concept of the enterprise service bus extends this idea further
by integrating message brokers with middleware for deploying and interacting with
various type of service, such as web services [3].
Hohpe and Woolf [5] have identified 65 "enterprise integration patterns" (EIPs) for
solving basic problems that commonly arise in messaging-based enterprise application
integration, such as the scatter-gather pattern: "How do you maintain the overall message
flow when a message needs to be sent to multiple recipients, each of which may send a
reply?" A number of middleware tools have direct support for these patterns, including
Apache Camel.
3 Apache Camel
Camel is an open source Java framework for executing message routing and mediation
rules that are defined using domain-specific languages (DSLs) based on Java and Scala,
or by using XML configuration files. In the work reported in this paper we have used the
Java DSL.
Camel is based on the EIP concepts of routes and endpoints. A Camel application
comprises a set of route definitions. Each route receives messages from a consumer
endpoint, and performs a sequence of processing steps on each message, such as filtering
and transforming messages, before sending the processed messages to one or more
producer endpoints. Endpoints can be "direct" links to other routes in the application
(i.e. messages leaving one route may flow directly into another route) or they may
represent connections to external resources and services. For example, a mail endpoint
may be used as a consumer to receive messages representing unread mail in a specified
account on a mail server, or as a producer that sends mail to a server. Camel has more
than 130 different components defined to provide a variety of endpoint types. These
enable sending and/or receiving messages to and from external resources such as files,
databases, message brokers, generic web services, specific Amazon and Google services,
RSS and Atom feeds, and Twitter. To enable this diversity of endpoint types, Camel's
concept of a message is very general: a message has headers (a map from names to Java
objects), a body (which can be any Java object) and optional attachments.
The code below defines two simple Camel routes. These use the agent component
described in this paper to enable "local" agents (those running within the same process
as the Camel routes) to communicate with remote agents via a message broker.
from("agent:message")
.setHeader("CamelJmsDestinationName",
simple("$headers.receiver.split(\" \")[0]"))
.to("jms:dummy")
from("jms:"+containerId).to("agent:message");
These routes are defined using Camel's Java DSL. This is a Java API for constructing
routes via a sequence of method calls. The from method creates a consumer endpoint
and the to method creates a producer endpoint. Endpoints are specified using uniform
resource identifiers (URIs), with the first part of the URI (the scheme) identifying the
type of the endpoint. Other parts of the URI provide additional details, and the various
endpoint types provided by Camel make use of URI parameters to provide configuration
details for the instantiation of the endpoint. The routes shown above use two types of
endpoint: the agent endpoint described in this paper, and Camel's JMS endpoint for
sending and receiving messages from a message broker using the Java Message Service.
The first route definition above creates an endpoint that receives all messages sent by
local Jason agents. For each Jason message received, this endpoint copies the message
content into the body of a new Camel message, and records the other message details
using sender, receiver and illoc_force headers (these correspond directly to
Jason message properties).
The routes are run within a Camel context object. Our architecture allows
multiple distributed Camel contexts, each with their own set of local agents run-
ning within an agent container, so all agents are created with names of the form
containerId__localName. The second and third lines of the first route above
use Camel's "Simple" expression language to extract the first part of the name, which
identifies the agent container that the message recipient is attached to, and stores this
as the value of a specific header predefined by the JMS component. When the message
is processed by the JMS producer endpoint, this header is used to override the queue
or topic name that appears as a mandatory component of a JMS endpoint URI (hence
the "dummy" message queue name at the end of the first route above). This illustrates
two aspects of the use of message headers in Camel: they are commonly used within
routes to store information needed later in the route, and they can affect the handling of
messages by endpoints.
The second route definition above creates a JMS endpoint that receives messages
from a message broker (the address of the broker is provided to Camel's JMS component
on initialisation). The endpoint listens to a specific queue, which is named after the
unique identifier for the local agent container (note that there may be agent containers
associated with other Camel contexts running elsewhere on the network or in other
processes). The JMS consumer endpoint copies the body and the message headers from
the received JMS messages to create Camel message objects. The route specifies that
these messages flow from the JMS consumer endpoint directly to a Jason producer
endpoint. This endpoint generates Jason messages corresponding to the Camel messages
and delivers them to the appropriate agents. The Jason producer endpoint does the reverse
of the Camel to Jason message mapping described above.
Camel supports a number of message exchange patterns (MEPs), with the most
commonly used being InOnly and InOut. The pattern to use for handling a message
arriving at a consumer endpoint is set by that endpoint, possibly based on information in
the message (such as a JMSReplyTo header on incoming JMS messages). The MEP
can also be manually set by a route using methods of the Java DSL. If a message reaches
the end of a route with the InOut MEP, it is returned to the consumer endpoint. If that
endpoint supports it, that message will be treated as the reply to the initial request. Thus
Fig. 2. The architecture of our Jason/Camel bridge
Camel can be used to implement both synchronous and asynchronous processing of
messages.
Note that Camel routes can be significantly more complicated than those shown
above, as later examples in this paper will demonstrate. In particular, the Java DSL
includes methods for conditional branching, exception-handling and for starting, stop-
ping, suspending and resuming routes. In addition, an important feature of Camel is the
provision of methods that can be used singly or in combination to implement enterprise
integration patterns such as splitting and aggregating messages, or to "enrich" messages
with content obtained by making synchronous calls to other endpoints.
4 A Jason/Camel bridge
In this section we briefly describe the architecture of our Jason/Camel bridge and discuss
how we map between the conceptual models of Jason and Camel. In particular, we
describe the design and interpretation of agent endpoints.
4.1 Application architecture
Our Jason/Camel bridge2 consists of an "agent component" for Camel and an application
template that integrates the Jason BDI interpreter with a Camel context. The agent
component for Camel is a factory for creating agent consumer and producer endpoints.
Its implementation consists of the component class and classes that are instantiated to
create producer and consumer endpoints for Jason.
The architecture of the bridge is shown in Figure 2 using UML3. A Camel application
initialises any required components, creates a CamelContext object, passes it a Route-
Builder object with a method that defines the routes, and then starts the context. Our
2 http://github.com/scranefield/camel-agent
3 Classes and interfaces developed or adapted by us are shaded in the figure.
ApplicationDefaultCamelContextAgentComponent«interface»Component«interface»Endpoint«instantiate»«instantiate»«instantiate»«interface»Producer«interface»Consumer«thread»AgentProducer«thread»AgentConsumerAgentContainer«thread»SimpleJasonAgentConcurrentLinkedQueue«interface»AgentActionListenerAgentEndpoint3*«interface»Route*****integration architecture extends this by adding to the application an agent container.
On initialisation, this container locates all Jason agent source (.asl) files in a given
directory4 and, for each agent, instantiates our extension of the SimpleJasonAgent
class5. This class allows the Jason BDI interpreter to be used without any of the existing
Jason "infrastructures" for agent communication. It is responsible for providing the BDI
interpreter with methods to call to get percepts, to perform actions, and to send and
check for messages. We chose this as the most lightweight approach for embedding
Jason agents into business processes via Camel
Our SimpleJasonAgent class maintains concurrently accessible queues for per-
cepts of two types (transient and persistent) and for incoming messages. Messages on
these queues are read (and consumed in the case of transient percepts) when the BDI in-
terpreter calls the class's methods for getting percepts and messages. Note that each agent
and endpoint runs in a separate thread. The agent container writes messages and percepts
to the queues for the relevant agents after receiving them from agent:message and
agent:percept endpoints that appear in Camel routes. An endpoint for producing
percepts chooses whether percepts are transient or persistent based on the endpoint URI
parameters and/or the headers of the Camel message being processed. Transient percepts
are cleared after an agent has perceived them, whereas persistent ones will repeatedly
perceived (but may be overwritten by other percepts with the same functor -- see the
discussion of the updateMode URI parameter and message header in Section 4.2).
On construction, each agent is passed a list of agent consumer endpoints, and these
are used to deliver messages and actions -- the endpoints are responsible for selecting
which of these match their configuration parameters. Camel messages generated by the
consumer endpoints are processed using the InOnly message exchange pattern, unless
specified otherwise by a route or an endpoint URI.
Inter-agent messaging via a message broker, as implemented by the routes shown
above in Section 3, requires the existence of a separate message queue for each agent
container. To enable this functionality, our application class has a optional configuration
parameter specifying that an Apache ZooKeeper6 server should be used to dynamically
obtain a unique identifier for the container.
A ZooKeeper server maintains a set of named nodes, arranged in a tree structure, to
which system configuration information can be read and written by clients. The nodes
are kept in memory to enable high performance, but transaction logs and persistent
snapshots are also used to provide reliability. The data can be replicated across a cluster
of ZooKeeper servers. Nodes can be persistent or ephemeral -- a node of the latter type
is automatically deleted if the client session that created it is no longer maintaining a
"heartbeat". Nodes can also be sequential. These have a unique number appended to the
specified node name, based on a counter associated with the parent node. A client can
place a watch for changes to the data recorded in a node, the existence of a node, or
the set of children of a node. Together, these features can be used to implement a range
4 This simple approach will be replaced in the future by the use of OSGi "bundles" to package
and deploy Camel contexts together with their associated agents.
5 http://jason.sourceforge.net/faq/faq.html#SECTION00057000000000000000
6 http://zookeeper.apache.org/
Consumer endpoints
Endpoint type
agent:message illoc force,
Optional parameters Camel headers set
sender, receiver,
annotations,
match, replace
agent:action actor,
annotations,
match, replace,
resultHeaderMap
illoc force,
sender, receiver,
annotations,
msg id
actor,
annotations,
actionName,
params
Endpoint type
Optional parameters Camel headers used
Producer endpoints
agent:message illoc force,
sender, receiver,
annotations
agent:percept receiver,
annotations,
persistent,
updateMode
illoc force,
sender, receiver,
annotations
receiver,
annotations,
persistent,
updateMode
Table 1. Agent endpoint types
Camel body contains
The message content
(as a string)
The action term
(as a string)
Camel body expected
to be
The message content
(as a string)
The percept (as a string)
of distributed coordination mechanisms, such as distributed queues, barriers and locks,
maintaining lists of active group members, and electing group leaders.
Our application class obtains the agent container identifier by requesting the creation
of an ephemeral sequence node with the path containers/container and receives
in response the name of the created node with a sequence number appended.
ZooKeeper servers can also be accessed from within Camel routes, via ZooKeeper
endpoints. A use case for this functionality is illustrated in our MAS application scenario
in Section 5.
Another option provided by our bridge is to directly deliver messages between agents
that are in the same context, if preferred, rather than sending these to the Camel context
for routing via JMS or any other means specified by the provided routes.
4.2 Agent endpoint design
We support two types of Jason consumer endpoints to handle local agent messages
and actions delivered to them from our Jason/Camel bridge. Endpoints of these types
generate Camel messages that correspond (respectively) to messages sent by the local
agents and to actions executed by them. The details of the Jason messages and actions
are encoded in the headers and body of the Camel message, as shown in Table 1. For
example, the content of a Jason message is placed in the body of the Camel message,
and the illoc_force (illocutionary force), sender, receiver, msg_id and
annotations properties of the Jason message are stored on the Camel message using
headers with these names.
A route definition creates these types of endpoints by calling the from method
with an argument that is string of the form "agent:message?options" or
"agent:action?options". The options are specified using the standard URI query
parameter syntax ?opt1=v1&opt2=v2.... Camel messages are only generated by
these endpoints if the selection criteria specified by the optional parameters are satisfied.
The parameters recognised by these endpoint types are shown in Table 1 and explained
below.
We also support two types of Jason producer endpoints, which generate messages and
percepts, respectively, for the local agents. These messages and percepts are created from
Camel messages that reach the endpoints via Camel routes, and their content is taken
from the body and headers of those Camel messages and the endpoint URI parameters.
As shown in Table 1, the URI parameters supported for the producer endpoints are
mirrored by the headers that the endpoints check. This is because these message headers
can be used to override the URI parameters when converting a Camel message to a Jason
message or percept. This allows Camel routes to dynamically control the delivery and
construction of Jason messages and percepts.
The URI endpoint parameters and Camel message headers are used as agent message
and action selectors (for consumer endpoints) or to specify generated percepts or agent
messages (for producer endpoints). Below, we provide some additional details for some
of the parameter and header options.
receiver: We interpret the value "all" for this URI parameter and message header
as meaning that only broadcast messages should be selected by a message consumer
endpoint or that the message should be sent to all local agents from a message or percept
producer endpoint. This is the default value for a producer. No agent can have this name
because the agent container identifier is prepended to the names of all agents on creation.
The receiver value can also be a comma-separated list of recipients when provided
to a message or percept producer endpoint.
annotations: Jason supports the attachment of a list of annotation terms to a
literal. An annotations URI parameter or header can be specified for controlling the
selection of messages or actions by a consumer endpoint or to trigger the generation of
annotations by a producer endpoint. The values are specified as a comma-separated list
of literal strings (for the parameter) or as a Java list of strings (when using a header).
match and replace: These are used on consumer endpoints. A match parameter
specifies a regular expression, and a Camel message is only generated if this matches
the incoming message or action (in string format). The Java regular expression syntax
is used, and pairs of parentheses may be used to specify 'groups' in the pattern. The
values corresponding to these groups in the matched string are recorded and used when
processing a replace parameter (if present). A replace parameter specifies a string
to be used as the body of the generated Camel message. This can contain group variables
(in the form $n), and these are replaced with the values that were recorded during
matching.
resultHeaderMap: An action consumer endpoint supports both synchronous and
asynchronous actions. An asynchronous action corresponds to a Jason external action
Fig. 3. Architecture of our use case
(which cannot contain variables), and the endpoint always returns the result true to
the agent that performed the action. In order to handle actions that map to routes with
an InOut message exchange pattern, we implemented a Java class that provides a new
Jason internal action jasoncamel.syncInOut-Exchange. This is used to send
terms that represent actions with unbound variables to Jason action consumer endpoints.
Once the route (which is run with an InOut message exchange pattern) is completed, the
endpoint unifies the variables in the action term with the resulting Camel message body.
An endpoint processing this type of action must have a resultHeaderMap endpoint
parameter. Its value should be a comma-separated list of header-name:argument-index
pairs. When a Camel message completes the route, for each of these pairs the value of
the header with name header-name header is unified with the action term's argument at
index argument-index.
persistent and updateMode: As described in Section 4.1, percepts delivered to
agents by a percepts producer endpoint can be transient or persistent. The choice is
controlled by the updateMode URI parameter or a message header with that name.
Persistent percepts with the same functor and arity but different argument values can
either accumulate in an agent's persistent percepts list, or each new percept of that form
can replace previous ones. The latter case is useful for percepts that represent the state of
an external resource. A value of "-+" for an updateMode URI parameter or a Camel
message header with that name can be used to specify the percept replacement behaviour.
This can also apply to transient beliefs to prevent multiple percepts with the same functor
and arity being queued up between consecutive perceptions by an agent.
5 A business process use case
In this section we illustrate the use of the Jason/Camel bridge by describing a hypothetical
business process in which agents could play a valuable role. This use case addresses
the problem of achieving more targeted information flow within an organisation and
Mail serverZooKeeperserver clusterPrefs.Prefs.Prefs.Prefs.Prefs.Prefs.Application serverDBMSAgent clustersMessage brokerListing 1. Camel route for implementing an action as a database query
from("agent:action?exchangePattern=InOut" +
"&actionName=get_email_accounts" +
"&resultHeaderMap=result:1"
)
.setBody(constant("select email from users"))
.to("jdbc:dataSource")
.setHeader("result").groovy(
"exchange.in.body.collect{'\"'+it['email']+'\"'}")
reducing the overuse of the CC header in email messages. Our solution, shown in
Figure 3, assumes the existence of a specific "to.share" email account. Users with
information they think may be of interest to others can mail it to this account. Agents
monitor this account and evaluate the relevance of each new message to other users, with
each agent responsible for considering the interests and needs of a specific subset of
users. The sets of users assigned to the agents form a partition of the complete user base.
The agents base their decision on knowledge of the roles of users and the organisational
structure (stored in a database), as well as specific plans that may optionally be provided
by users to encode their goals for receiving information. We assume that these plans are
created using a graphical web interface that provides a user-friendly abstraction layer on
top of Jason's plan syntax. When agents determine which users might be interested in an
email message, they deliver the message to those users' mail accounts via SMTP.
Our system design for implementing this business process involves coordinated use
of Jason agents, a mail server, a database management system, a message broker and
ZooKeeper, with the coordination performed by Camel routes. The key routes are as
follows7.
1. On start-up, each agent performs an action get_email_ accounts(Accounts)
that is mapped to a database query by a Camel route. The route sets a message header
to hold the list of accounts, and the agent consumer endpoint instantiates the argu-
ment Accounts with this value. After this action succeeds, the agent records this
account list in a belief. This route is shown in Listing 1.
2. On start-up, each agent also performs a register action. A route maps this to the
creation of an ephemeral sequential node in ZooKeeper (under the node /agents).
3. A route is watching the children of the ZooKeeper node /agents. Whenever there
is a change (due to Camel contexts and their associated agent containers starting
and stopping), the route sends an updated list of active agents to its local agents as a
persistent percept in -+ update mode. This, and the route described in the previous
paragraph, are shown in Listing 2.
4. Whenever a new email account is created or deleted by the administrator, the
database is updated, and in addition a notification of the change is sent to a specific
publish-subscribe topic on a message broker (a topic is needed rather than a queue
7 Note that the two example routes presented earlier in Section 3 are not used because agents in
this application do not send messages to each other, but rather interact with external services
via actions and percepts.
to allow all running Camel contexts to receive the message). A route monitors this
topic and sends any received messages as transient percepts to all local agents.
5. Similar routes are provided for agents to obtain from the database information
about users' roles and their positions in the organisation structure, as well as a set
of default email-forwarding plans. This is done by database queries from routes
that are triggered by agent actions. Notifications of changes to this information are
sent by an administrative tool (or a database trigger) to a message broker topic. A
route monitoring that topic generates updates to the corresponding persistent agent
percepts, which then cause agents to call the actions to load this information again.
6. Similar routes are also provided for agents to retrieve from a database, for a specified
set of users, their information relevance assessment plans, and to receive notifications
of changes to these plans via a message broker topic.
7. The agents have plans that react to changes in their beliefs about the currently active
agents and the list of email accounts. When a change occurs, they each run an
algorithm (common to all agents) to divide the list of email accounts amongst them,
based on their own position in the list of agents. They maintain a belief recording
the accounts they are responsible for.
8. A set of routes polls the "to.share" email account for new mail using a mail consumer
endpoint, sends a message to all local agents asking them to evaluate which of their
allocated email accounts the message is relevant for, aggregates the reply with the
email message, and forwards it to the nominated users, via a mail producer endpoint.
These routes are shown in Listing 3.
9. When the list of accounts that an agent is responsible for changes, or it is notified
of changes to the plans for any of the accounts it handles, it must re-fetch plans for
the relevant agents. The routes handling these notifications suspend the mail-polling
route and start another route that uses a timer endpoint to resume the mail-polling
route after a fixed amount of time. This gives agents time to fetch any required new
plans from the database.
Listings 1, 2 and 3 show the routes we have implemented and tested for three aspects
of the system's functionality. We underline the beginnings of the agent endpoint URIs to
highlight where the integration with agents occurs. Listing 1 shows how the execution
of an agent action literal with a free variable can be implemented by a Camel route
with the InOut message exchange pattern (note the use of the standard Camel URI
parameter exchangePattern). The route sends an SQL query to a pre-configured
database connection, the returned result is converted to an AgentSpeak list of strings
using a Groovy expression, and then the result header is used to store the result.
The consumer endpoint URI has a resultHeaderMap parameter specifying that the
endpoint should unify the value of the result header with the first argument of the
action literal.
Listing 2 illustrates how Camel provides a convenient way to use ZooKeeper to
monitor the active members of a distributed group of agents, and to map this information
to agent percepts. The first route (lines 3 -- 11) implements the agent register action
by creating an ephemeral sequential node (see Section 4.1) in a ZooKeeper server to
represent the agent, and storing its name in that node. Camel's support for the idempotent
receiver enterprise integration pattern provides a simple way to filter out duplicate
Listing 2. Camel routes for tracking active agents via ZooKeeper
1 // Implement registration by creating a new ZooKeeper sequence
2 // node with the agent name as its content
3 from("agent:action?actionName=register")
4
// Process only one register action from each agent
.idempotentConsumer(
5
6
7
8
9
10
11
header("actor"),
MemoryIdempotentRepository.memoryIdempotentRepository(100)
).eager(true)
.setBody(header("actor")) // Put actor name in message body
.to("zookeeper://" + zkserver + "/agents/agent" +
"?create=true&createMode=EPHEMERAL_SEQUENTIAL");
12
13 // Watch agents node in ZooKeeper for changes to list of children
14 from("zookeeper://" + zkserver + "/agents" +
15
"?listChildren=true&repeat=true")
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
.setHeader("numChildren", simple("${body.size}"))
.split(body()) // Split agent node list into separate messages
.process(new Processor() {
public void process(Exchange exchange) throws Exception {
// Map the ZooKeeper node name for an agent to the agent
// name by getting the content of the ZooKeeper node
ConsumerTemplate consumer = camel.createConsumerTemplate();
String agentName =
consumer.receiveBody("zookeeper://"+zkserver+"/agents/"
+ exchange.getIn().getBody(),
String.class);
exchange.getIn().setBody(agentName);
}})
// Aggregate mapped names into a single message containing a
// list of names. All messages will have the same headers - any
// will do as the message correlation id
.aggregate(header("numChildren"),
new ArrayListAggregationStrategy()
).completionSize(header("numChildren"))
.setBody(simple("agents(${bodyAs(String)})"))
.to("agent:percept?persistent=true&updateMode=-+");
Listing 3. Camel routes for forwarding email based on agent recommendations
1 // Poll for email messages
2 from("imaps://mail.bigcorp.com?username=to.share"
3
+ "&password="+mailPassword+"&delete=true©To=processed")
4
5
.setHeader("id", simple("\"${id}\""))
.to("seda:forward-message", "direct:ask-agents");
6
7 // Request agents to evaluate message on behalf of their
8 // allocated users
9 from("direct:ask-agents")
10
.setBody(
11
12
13
14
15
16
simple("check_relevance(" +
"${header.id}, \"${header.from}\", " +
"\"${header.subject}\", \"${bodyAs(String)}\")"))
.setHeader("receiver", constant("all"))
.setHeader("sender", constant("router"))
.to("agent:message?illoc_force=achieve");
17
18 // Receive responses from agents and aggregate them to get a
19 // single lists of relevant users
20 from("agent:message?illoc_force=tell" +
21
"&receiver=router" +
"&match=relevant\\((.*),(.*)\\)" +
"&replace=$1:$2")
22
23
24
25
26
27
28
29
30
.setHeader("id", simple("${body.split(\":\")[0]}"))
.setBody(simple("${body.split(\":\")[2]}"))
.aggregate(header("id"),
new SetUnionAggregationStrategy()
).completionTimeout(2000)
.setHeader("to", simple("${bodyAs(String)}"))
.to("seda:forward-message");
31
32 // Aggregate original mail message with message summarising
33 // interested users in "to" header, and send it
34 from("seda:forward-message")
35
.aggregate(header("id"),
36
37
38
39
new CombineBodyAndHeaderAggregationStrategy("to")
).completionSize(2)
.setHeader("from", constant("[email protected]"))
.to("smtp://[email protected]?password="+mailPassword);
registration requests from agents. The second route (lines 14 -- 36) is triggered by changes
to the set of ZooKeeper sequence nodes representing agents. On each change, it receives a
message listing the current sequence nodes. The splitter pattern is used (line 17) to obtain
a separate message for each node, and each of these triggers a query to ZooKeeper to get
the agent name stored at that node (lines 22 -- 27). Finally (lines 32 -- 34), the aggregator
pattern is used to combine the names into a list stored in the body of a single message,
and that is sent to the local agents as the argument of a percept (lines 35 -- 36).
In the first route in Listing 3, the to.share mail account is polled for new mail (lines
2 -- 3). A Camel message representing each new mail message is generated and the Camel
message exchange identifier is written to a message header for latter use in correlating
the agent responses with this Camel message (line 4). The message is then forwarded to
two other routes (line 5). One is started asynchronously (via a "seda" endpoint, which
queues incoming messages) and the other synchronously (via a "direct" endpoint). The
second route (lines 9 -- 16) sends an achieve request to the local agents, asking them to
consider whether the mail is relevant to any of their allocated users. The third route (lines
20 -- 28) handles messages sent by agents in response to this goal, which contain lists of
potentially interested users. The aggregator pattern (lines 24 -- 26) is used to produce, for
each email message, a single message containing a combined list of users to forward it
to. This is sent to the final route (lines 32 -- 37), which also has (in a queue) the Camel
message containing the email message that is waiting to be forwarded. This route uses
the aggregator pattern again to combine the email message and the list of users to send
the message to (stored in the to header). Finally, an SMTP endpoint is used to send the
mail to these users.
The routes discussed in this paper have been tested using Jason stubs and the
necessary external services, but the full Jason code for this scenario has not yet been
developed and is not the focus of this paper. However, because the coordination logic
is factored out and encoded in the Camel routes, the agent code required will be much
simpler than would otherwise be needed without the use of our Jason/Camel bridge.
Most of the agent behaviour is to react to percepts sent from Camel by performing
actions (e.g. to fetch an updated list of email accounts), and to use Jason's .add_plan
and .remove_plan internal actions to update the plans used to evaluate the relevance
of email messages to users. In response to the goal to evaluate a message, the agent must
call the user plans, collect the users for whom these plans succeed, and send these in
a message to Camel. The agents must also recompute the allocation of users to agents
whenever the set of agents changes or new users are added, which they detect via 'new
belief' events.
6 Related Work
One of the oldest approaches to integrating agents with other technologies is the use of
wrappers or transducers that make the functionality of all the tools to be interconnected
available through agent communication [4]. The overall system coordination can then be
treated as a pure multi-agent system coordination problem. However, this approach has
not gained traction in industry and we do not see it as a viable approach for integrating
agents into enterprise computing environments.
A pragmatic but low-level approach for integrating agents with external systems is
to call them directly from the agent program. If an agent platform is a framework for
using a mainstream programming language for agent development (e.g. JADE8), then
it is possible for agents to use whatever protocols and client libraries are supported in
that language to invoke external services directly from within agents or to monitor for
external events. An interpreter for a specialised agent programming language may allow
user-defined code in the underlying implementation language to implement functionality
called by the agent program. For example, new "internal actions" for Jason can be
developed in Java, and these can use any Java communication libraries for external
interaction. An agent's environment abstraction is another potential location for user
customisation. For example, a Jason developer can implement an environment class that
acts as a facade for external interaction.
The integration of agents with web services has been an important topic over the last
decade, and some agent platforms provide specific support for this. For example, the
online documentation for the JADE platform includes tutorials on calling web services
from JADE and exposing agent services as web services, and the Jack WebBots [1]
framework allows web applications to be built using agents.
More generally, it would be possible for the developers of an agent platform (or its
community) to provide support for connecting agents to a range of external resource
and service types. For example, the IMPACT agent platform [9] includes a module that
provides a uniform interface for connecting agents to external services, with support for
a small number of service types already implemented.
The A&A (Agents and Artifacts) meta-model extends the concept of an agent
environment to include artifacts. These represent resources and tools with observable
properties and specific operations that agents can invoke. These can be used to provide
services internal to an MAS, or as an interface to external services, such as web services
[8]. However, it is unlikely that the developer and user community for any agent-specific
technology, whether a specific platform like IMPACT or a more general approach such
as A&A, could rival the scale and diversity provided by a more mainstream integration
technology such as Camel, which supports more than 130 endpoint types. Also, for the
case of A&A, an agent developer would need to learn multiple APIs (for each artifact
type) when integrating agents with different types of external service. This is not the
case in our approach (see Section 7).
The active components paradigm is a combination of a component model with agent
concepts [7]. Active components can communicate via method calls or asynchronous
messages and may be hierarchically composed of subcomponents. They run within a
management infrastructure that controls non-functional properties such as persistence
and replication. They may have internal architectures of different types, and this hetero-
geneity, combined with a uniform external interface model, facilitates the interoperation
of different types of system that are encapsulated as active components. As with artifacts,
the success of this approach for large-scale integration rests on the availability of active
components encapsulating a wide range of service types. However, a Camel context
could be encapsulated within an active component (or, alternatively, an artifact).
8 http://jade.tilab.com/
7 Conclusion
In this paper we have proposed a novel approach for integrating agents with external
resources and services by leveraging the capabilities of existing enterprise integration
technology. By using a mainstream technology we can benefit from the competitive
market for robust integration tools (or the larger user base for open source software),
and can have access to a much larger range of pre-built components for connecting
to different resource and service types. This is evidenced by Camel's large number of
available endpoint types.
We presented the design of an interface between agents and the Camel integra-
tion framework in terms of the EIP endpoint concept. This can serve as a pattern for
interconnecting agents with any type of message-based middleware.
We described an implemented architecture for this approach and illustrated its
practical use in a hypothetical (but, we think, plausible) business process use case. The
Camel routes we presented demonstrate the benefits of using a specialist coordination
tool such as Camel for handling the coordination of distributed agents and services,
and leaving the agent code to provide the required core functionality. This division
of responsibilities also enables a division of implementation effort: the coordination
logic can be developed by business process architects using a programming paradigm
that directly supports common enterprise integration patterns, and less development
time is needed from (currently scarce) agent programmers. An agent programmer using
our framework does not need to learn any APIs for client libraries or protocols -- the
agent code can be based entirely on the traditional agent concepts of messages, actions
and plans. The developer of the message-routing logic does not need to know much
about agents except the basic concepts encoded in the agent endpoint design (message,
illocutionary force, action, percept, etc.) and the syntax of the agent messages to be sent
from and received by the message routes.
References
1. Agent Oriented Software: JACK Intelligent Agents WebBot manual. http://www.aosgrp.com/
documentation/jack/WebBot Manual WEB/ (2011)
2. Bordini, R.H., Hubner, J.F., Wooldridge, M.: Programming Multi-Agent Systems in Agent-
Speak using Jason. Wiley (2007)
3. Chappell, D.: Enterprise Service Bus: Theory in Practice. O'Reilly (2004)
4. Genesereth, M.R., Ketchpel, S.P.: Software agents. Communications of the ACM 37(7), 48 -- 53
(1994)
5. Hohpe, G., Woolf, B.: Enterprise Integration Patterns: Designing, Building, and Deploying
Messaging Solutions. Addison-Wesley (2004)
6. Ibsen, C., Anstey, J.: Camel in Action. Manning (2010)
7. Pokahr, A., Braubach, L., Jander, K.: Unifying agent and component concepts. In: Multiagent
System Technologies, LNAI, vol. 6251, pp. 100 -- 112. Springer (2010)
8. Ricci, A., Piunti, M., Viroli, M.: Environment programming in multi-agent systems: an artifact-
based perspective. Autonomous Agents and Multi-Agent Systems 23(2), 158 -- 192 (2011)
9. Rogers, T.J., Ross, R., Subrahmanian, V.: IMPACT: A system for building agent applications.
Journal of Intelligent Information Systems 14, 95 -- 113 (2000)
|
1906.09874 | 1 | 1906 | 2019-06-05T17:44:36 | Escaping the State of Nature: A Hobbesian Approach to Cooperation in Multi-agent Reinforcement Learning | [
"cs.MA",
"cs.AI",
"cs.GT"
] | Cooperation is a phenomenon that has been widely studied across many different disciplines. In the field of computer science, the modularity and robustness of multi-agent systems offer significant practical advantages over individual machines. At the same time, agents using standard reinforcement learning algorithms often fail to achieve long-term, cooperative strategies in unstable environments when there are short-term incentives to defect. Political philosophy, on the other hand, studies the evolution of cooperation in humans who face similar incentives to act individualistically, but nevertheless succeed in forming societies. Thomas Hobbes in Leviathan provides the classic analysis of the transition from a pre-social State of Nature, where consistent defection results in a constant state of war, to stable political community through the institution of an absolute Sovereign. This thesis argues that Hobbes's natural and moral philosophy are strikingly applicable to artificially intelligent agents and aims to show that his political solutions are experimentally successful in producing cooperation among modified Q-Learning agents. Cooperative play is achieved in a novel Sequential Social Dilemma called the Civilization Game, which models the State of Nature by introducing the Hobbesian mechanisms of opponent learning awareness and majoritarian voting, leading to the establishment of a Sovereign. | cs.MA | cs | ESCAPING THE STATE OF NATURE: A HOBBESIAN APPROACH TO
COOPERATION IN MULTI-AGENT REINFORCEMENT LEARNING
A Thesis Presented
By
William F. Long
To
The Departments of Computer Science and Government
in partial fulfillment of the requirements
for a degree with honors of Bachelor of Arts
Harvard College
March 2019
Acknowledgments
This thesis is the product of an incredible network of supporters and advisors. I owe a huge debt
of gratitude to my advisors Prof. Michael Rosen, for his invaluable feedback and tireless editing,
and Prof. David Parkes and Max Kleiman-Weiner, for their patient direction and generous
availability. The work here is dedicated to my parents, without whose love and countless
sacrifices it would not have been possible. And as with all things, ad majorem Dei gloriam.
Abstract
Cooperation is a phenomenon that has been widely studied across many different
disciplines. In the field of computer science, the modularity and robustness of multi-agent
systems offer significant practical advantages over individual machines. At the same time, agents
using standard independent reinforcement learning algorithms often fail to achieve long-term,
cooperative strategies in unstable environments when there are short-term incentives to defect.
Political philosophy, on the other hand, studies the evolution of cooperation in humans who face
similar incentives to act individualistically, but nevertheless succeed in forming societies.
Thomas Hobbes in Leviathan provides the classic analysis of the transition from a pre-social
State of Nature, where consistent defection results in a constant state of war, to stable political
community through the institution of an absolute Sovereign. This thesis argues that Hobbes's
natural and moral philosophy are strikingly applicable to artificially intelligent agents and aims
to show that his political solutions are experimentally successful in producing cooperation
among modified Q-Learning agents. Cooperative play is achieved in a novel Sequential Social
Dilemma called the Civilization Game, which models the State of Nature by introducing the
Hobbesian mechanisms of (1) opponent learning awareness and (2) majoritarian voting, leading
to (3) the establishment of a Sovereign.1
1 The code implementation for this research is openly available at www.github.com/wlong0827/state_of_nature
TABLE OF CONTENTS
1
5
10
12
16
18
23
24
26
29
31
33
36
39
44
46
49
51
54
55
58
59
62
65
68
INTRODUCTION
OVERVIEW
COOPERATION AND GAME THEORY
MULTI-AGENT SYSTEMS
SEQUENTIAL SOCIAL DILEMMAS
REINFORCEMENT LEARNING
HOBBES AND LEVIATHAN
METHODOLOGY
AI AS HOBBESIAN MAN
MECHANISTIC MATERIALISM
STRICT DETERMINISM
MORAL SUBJECTIVISM
RATIONAL SELF-INTEREST
EQUALITY AND INDIVIDUALISM
THE STATE OF WAR
THE CIVILIZATION GAME
HOBBESIAN Q-LEARNING
OPPONENT LEARNING AWARENESS
MAJORITARIAN VOTING
SOVEREIGN REWARD SHAPING
RESULTS
Q-LEARNING VS HOBBESIAN Q-LEARNING
LEARNING CURVES
POLICIES
MATRIX GAME ANALYSIS
CONCLUSION
DISCUSSION
FUTURE WORK
WORKS CITED
I.
Introduction
Overview
The central goal of the field of Artificial Intelligence is to produce fully autonomous
agents that interact with their environments to learn optimal behaviors, improving over time
through trial and error. A principled mathematical framework for generating that experience-
driven learning is reinforcement learning (RL) which teaches software agents to take actions in
an environment so as to maximize some notion of cumulative reward. Incredible strides have
been taken with recent state-of-the-art RL algorithms like deep Q-networks and asynchronous
advantage actor-critic that enable intelligent agents to master previously intractable problems2
including, famously, playing graphical video games3 and beating humans at Go4. But as we
apply AI to larger and more complex problems like coordinating entire transportation or
manufacturing infrastructures, it becomes increasingly untenable for a single agent to master an
entire problem by itself.
Consequently, multi-agent systems (MAS) is one of the most important frontiers of
research within the field of AI. Research in this subfield is concerned with how to produce
desired global properties in "heterogeneous groups of autonomous agents that pursue partially
conflicting goals in an autonomous fashion."5 Even when each of a group of agents has identical
interests -- for example, when acting on behalf of a single user or organization -- physical or
computational considerations can make it desirable to have these agents make decisions
independently.6 With the advent of autonomous vehicles and the explosive growth of software
2 Arulkumaran, K et al. A Brief Survey of Deep Reinforcement Learning. 2017. 1.
3 Mnih, V et al. Playing Atari with Deep Reinforcement Learning. 2013.
4 Silver, D et al. Mastering the Game of Go without Human Knowledge. 2017.
5 Ossowski, S and Serrano, A. Social Coordination among Autonomous Problem-solving Agents. 1998. 134-148.
6 Groves, T. 1973. Incentives in Teams. 617 -- 631.
1
systems, MAS offer solutions to enable intelligent agents, while pursuing their own objectives
(e.g. driving a car from point A to B), to interact with other independent agents and humans in a
shared environment in a way that leads to optimal global behavior (e.g. minimizing total travel
time) without requiring external coordination.
When we place RL agents in a MAS setting, however, we get the problem of cooperation.
Traditional learning algorithms are self-regarding and have only the objective of optimizing their
behavior so as to maximize their own cumulative reward. So, when placing multiple self-
interested agents in a shared environment, often there is divergence between what is best for the
individual and what is best for the group. Such scenarios are called social dilemmas and they are
a matter of interdisciplinary interest from game theory and economics7 to biology8 and
sociology9. Multi-agent reinforcement learning faces an additional challenge because of the
unique perception-action-learning feedback loop within which each individual agent operates.
When the reward received by an agent in a state is a function of not only its action, but the
actions of other agents beyond its control, it can have difficulty determining the optimal policy to
follow. As a result, a research area of critical importance focuses on how to overcome these
obstacles and achieve cooperation in order to make MAS feasible. In the last several decades,
this field of research has developed "a vast array of techniques for cooperation and collaboration
as well as for agents to handle adversarial or strategic situations," but even so, "current
generation agents are unlikely to meet this new challenge except in very simple situations."10
7 Curtis Eaton, B. The elementary economics of social dilemmas. 2004.
8 Ale, S. B. Evolution of Cooperation: Combining Kin Selection and Reciprocal Altruism into Matrix Games with
Social Dilemmas. 2013.
9 Kollock, P. Social dilemmas: The anatomy of cooperation. 1998.
10 Grosz, B. A Multi-Agent Systems 'Turing Challenge'. 2013.
2
The field of political philosophy, likewise, is concerned with the cooperation of
autonomous, self-interested individuals in pursuit of common goods. Human society, or political
community, is the vehicle by which we achieve these collective goods and, consequently, it is
said that "society is the complete political good."11 While we often take the fact of human
cooperation within the nation-state for granted, political philosophers have long argued about
whether humans naturally form political communities and which preexists the other. Aristotle
summarizes one view when he claims that "men journey together with a view to particular
advantage, and by way of providing some particular thing needed for the purposes of life, and
similarly the political association seems to have come together originally, and to continue in
existence, for the sake of the general advantages it brings."12
Thomas Hobbes, one of the central modern political philosophers and the father of
modern liberalism, on the other hand, takes the opposite view. Gauthier summarizes Hobbes's
view as claiming that "individual human beings not only can, but must, be understood apart from
society. The fundamental characteristics of men are not products of their social existence." 13
Much of modern political philosophy and social contract theory exists in response to Hobbes'
ideas about human nature and interaction. His famous contention is that life in the State of
Nature is so terrible that it is overwhelmingly in the best interest of individuals "to confer all
their power and strength upon one Man,"14 the Sovereign, whose exclusive and absolute powers
of retributive punishment finally establish stable human society. Once pre-social man comes to
realize this necessity, he will desire to subject himself to laws and limitations as long as others
are also similarly desirous, and when a majority of them come to this agreement, they ratify the
11 Strauss, L. What is Political Philosophy? And other Studies. 1959. 10.
12 Aristotle, Ethics viii. 9.1160a
13 Gauthier, David, The Social Contract as Ideology. 138.
14 Id. at 120.
3
Social Contract and institute the Sovereign. This individualistic train of thinking shaped a strand
of later political thought as well, which Macpherson labels "possessive individualism,"15 in
which an individual is conceived as the sole proprietor of his or her skills and owes nothing to
society for them.
While it may be unclear at first sight, the problem of cooperation in the fields of MAS
and political philosophy overlap in significant ways. Both see a tension between individual and
collective interests and both are interested in developing practical mechanisms for moving
individuals away from acting on their short-sighted interests, which we might call defection,
towards a joint policy of cooperation that's strictly better for everyone involved in the long-run.
It stands to reason, then, that the political solutions that seem to have been successful in
promoting civil society for humans might also be conducive to producing cooperation in MAS.
Hobbes's theory of the state is well suited to AI because of the applicability of his theory of
human nature and the mathematical approach he takes to deducing the formation of the state
from those foundational assumptions.
Given these similarities, I suggest that, to the degree that the mechanisms in Hobbes's
political philosophy are actually effective in prompting humans to cooperate, those same
solutions should be beneficial for teaching MAS to find cooperative policies. The overarching
objectives of the thesis, therefore, can be listed as follows:
1) Present an original case for the applicability of Hobbes' philosophy of human nature and
moral psychology to AI.
2) Introduce the Civilization Game, a new Markov game modelled on the Hobbesian State
of Nature to measure the performance of a MAS composed of RL agents.
15 Macpherson, C. B. The political theory of possessive individualism: Hobbes to Locke. 1962.
4
3) Show that an augmentation of the Civilization Game and standard Q-Learning algorithms
with Hobbesian political mechanisms with Opponent Learning Awareness, Majoritarian
Voting, and Sovereign reward-shaping produces a significant improvement in the ability
of agents to find the long-term cooperative strategy.
This project applies methodologies from these two disparate fields, AI and political
philosophy, to synthesize solutions for producing cooperation. This project, beyond its
immediate research goals, also seeks to motivate further interdisciplinary exploration that draws
on long-standing philosophical ideas about human nature to inform contemporary work on
reproducing intelligence in machines. My hope is that the research and solution produced in this
thesis might offer a compelling instance of such a synthesis.
Cooperation and Game Theory
Cooperation is a wide-ranging concept that has been studied across many different
disciplines from economics and social science to evolutionary biology and philosophy. Olson
famously summarized the central problem by saying that "unless the number of individuals in a
group is quite small, or unless there is coercion or some other special device to make individuals
act in their common interest, rational, self-interested individuals will not act to achieve their
common or group interests."16 Hobbes likewise agreed that men are not like bees and ants for
whom "the Common good differs not from the Private."17 Even in evolutionary biology, it seems
that "Darwinian selection should preclude cooperation from evolving,"18 because of the constant
drive for individual survival.
16 Olson, Mancur. The Logic of Collective Action. 2009. 2.
17 Hobbes, Thomas. Leviathan. Tuck, R, Cambridge: Cambridge University Press. 2016. XVII. 119.
18 Supra, Ale at 1.
5
Popular consensus had generally been that groups of individuals with common interests
usually attempt to further those common interests. Groups of individuals with common interests
are expected to act on behalf of their common interests much as single individuals are expected
to act on behalf of their personal interests. This opinion about group behavior is frequently found
in both popular discussions and scholarly work. Such a view has, for example, been important in
many theories of labor unions, in Marxian theories of class action19, and in concepts of "counter-
vailing power."20 It also underpins the Madisonian concept of faction built into the American
political system wherein citizens are supposed to be "united and actuated by some common
impulse of passion, or of interest, adverse to the rights of other citizens"21 in a way that translates
into policy outcomes.
Olson's thesis motivated both the further study of the dynamics of individual behavior in
collective settings and the concept of the organization which "performs a function when there are
common or group interests," although organizations often also serve purely personal, individual
interests, "their characteristic and primary function is to advance the common interests of groups
of individuals."22 The formation and operation of organizations is often far from optimal,
however, as is shown by "the fact that profit maximizing firms in a perfectly competitive
industry can act contrary to their interests as a group."23 In the same way that market pressures
cause competing companies to produce and sell goods at lower and lower profit margins though
it is against the interest of each company individually, individuals with aligned common interests
may fail to realize them in an organization because of competing private interests.
19 Przeworski, A. Capitalism and social democracy. 1985.
20 Galbraith, J. American capitalism: the concept of countervailing power. 1956.
21 Hamilton, A. and Madison, J. The federalist papers. X.
22 Supra, Olson.
23 Chamberlin, E. Monopolistic Competition. 4.
6
So, then, "if the members of a large group rationally seek to maximize their personal
welfare, they will not act to advance their common or group objectives unless there is coercion to
force them to do so"24 Coercion is ultimately what enables communities to prevent the Tragedy
of the Commons (e.g. coordinating communal resource use, according to Ostrom25),
governments to pursue public goods (e.g. taxing citizens to build highways), and, crucially for
Hobbes's political system, enables individuals in the State of Nature to enforce contracts with
one another, for "Covenants, without the Sword, are but words, and of no strength to secure a
man at all."26 Indeed, we will see that for Hobbes, once a central coercive power has been
established, the situation individuals face in the State of Nature changes dramatically, and their
actions become calculated based not on what they think conduces to their self-interest, but what
the Sovereign knows to be best for the society.
Game theory offers a powerful, formal setting within which to study the individual vs
collective tensions that exist within organizations like human society or MAS. Hobbes is often
said to be the father of game theory since his broader project was to resolve the complex whole
of political society into simple social interactions. In De Cive, he writes:
For as in a watch, or some such small engine, the matter, figure, and motion of the wheels
cannot well be known, except it be taken asunder and viewed in parts; so to make a more
curious search into the rights of states and duties of subjects, it is necessary, I say, not to take
them asunder, but yet that they be so considered as if they were dissolved; that is, that we
rightly understand what the quality of human nature is, in what matter it is, in what not, fit to
24 Supra, Olson at 2.
25 Ostrom, E. Governing the commons: The evolution of institutions for collective action. 1990.
26 Supra, Leviathan at XVII. 117
7
make up a civil government, and how men must be agreed amongst themselves that intend to
grow up into a well-grounded state.27
Hobbes attempts to reduce the whole of human existence in the State of Nature into individual,
game-theoretic encounters between one individual and another, and by examining these
encounters, culminate with the Social Contract, which represents the establishment of civil
government. Depending on what kind of dilemma is faced by pre-social humans, we should see a
proper objective, function, and scope of the state.
Skyrms argues that "if one simple game is to be chosen as an exemplar of the central
problem of the social contract… the most appropriate choice is not the prisoner's dilemma, but
rather the stag hunt."28 The story is first told by Rousseau in 1750: "If it was a matter of hunting
a deer, everyone well realized that he must remain faithful to his post; but if a hare happened to
pass within reach of one of them, we cannot doubt that he would have gone off in pursuit of it
without scruple."29
The game is formalized into a game-theoretic environment when (1) the hunters each
have just the choice of hunting the hare or the deer; (2) the deer is much more valuable than the
hare; (3) the chance of getting the hare is independent of the actions of other hunters and so is
called the risk-dominant strategy; (4) the chances of getting the deer is directly dependent on the
number of cooperating hunters but is the payoff-dominant strategy.
27 Hobbes, Thomas. De Cive. II, xiv.
28 Skyrms, Brian. The Stag Hunt and the Evolution of Social Structure. 2004. xii
29 Rousseau, Jean-Jacques, A Discourse on Inequality, III.
8
Figure 1: Matrix game social dilemmas. A cell of X, Y represents a payoff of X for the row player
and Y for the column player. Each player chooses either to cooperate (C) or defect (D). In the Stag
Hunt, agents defect out of fear of a non-cooperative partner whereas in the Prisoner's Dilemma,
agents motivated by both fear and greed.
Represented in this way, the stag hunt interaction can be seen in many other places.
David Hume postulated a similar dilemma in his Treatise on Human Nature: "Two neighbors
may agree to drain a meadow, which they possess in common; because 'tis easy for them to
know each other's mind, and each may perceive that the immediate consequence of failing in his
part is the abandoning of the whole project. But 'tis difficult, and indeed impossible, that a
thousand persons should agree in any such action."30 Hume observed that cooperation in the stag
hunt is consistent with rationality, but that the viability of cooperation depends on mutual beliefs
and trust. Consequently, the Stag Hunt is also referred to equivalently as the Assurance Game.
Rational agents are pulled in one direction by considerations of mutual benefit and in the other
by considerations of personal risk.31 For these reasons, the greater the number of players or
agents in the game, the more difficult it is to achieve cooperation.
In this way, the problem of cooperation in the State of Nature can be seen as a Stag Hunt
dilemma between individuals where working together will result in common benefit but
cooperating when others refuse may lead to personal risk. In the Hobbesian account, then, both
the State of Nature and the state of society can be called Nash equilibria since it's always better
30 Hume, David, A Treatise of Human Nature, Book III, Pt II, Section VII, 538.
31 Supra, Skyrms at 3.
9
to cooperate when others cooperate and to defect when others defect. Thus, formulated in game-
theoretic terms, the fundamental question of both Hobbesian political philosophy and MAS
cooperation becomes: "how do we get from the hunt-hare equilibrium to the hunt-stag
equilibrium"?
Multi-agent Systems
A multi-agent system is defined as the structure in which multiple agents share a common
environment, each interacting with every other and having its internal state changed by its own
actions as well as those of others. An agent can be a physical or virtual entity that can act,
perceive its environment and communicate with others, is autonomous and has skills to achieve
its goals and tendencies; even human can be considered components of a MAS32. A MAS
contains an environment, objects and agents, relations between all the entities, a set of operations
that can be performed by the entities and the changes of the universe in time due to these
actions.33 Because each agent has no control over the actions of others and "no global control is
applied to the participating agents, it has a subjective view of the evolution of the world."34 Since
this "evolution" is partly a function of actions beyond any individual agent's control, we can
understand why a learning algorithm might find it difficult to converge to long-term cooperative
behavior since an agent's action only imperfectly maps to a resulting outcome or reward,
meaning that it must learn to reason about other agents' actions and intentions.
32 Mao A et al. Human Computation and Multiagent Systems: An Algorithmic Perspective. 2011.
33 Ferber, J. Multi-agent systems: an introduction to distributed artificial intelligence. 1999.
34 Schumacher, M. Objective Coordination in Multi-agent Systems. 2.
10
Figure 2: A typology of cooperation in MAS. The type that is aimed at in this experimental
setting is emergent cooperation since each agent in the Civilization Game maintains its own
independent agenda, self-preservation. (Doran et al.)
Cooperation is "one of the key concepts which differentiates MAS from other related
disciplines such as distributed computing, object-oriented systems, and expert systems."35 A
MAS is independent if each agent pursues its own agenda36 independently of the others. It is
discrete if it is independent and the agendas of the agents bear no relation to one another; these
systems involve no cooperation. On the other hand, a system's behavior is considered emergent
if it can only be specified using descriptive categories which are not to be used to describe the
behavior of the constituent components.37 This behavior maintains an intrinsically "subjective
aspect by directly depending on the cognitive properties of an observer."38 For example, the puck
gathering robots of Beckers et al.39 represent an independent system, each following the agenda
of moving in a straight line till an obstacle is encountered and then changing direction. Puck
gathering is an emergent behavior of the system in that, from an observer's viewpoint, the agents
appear to be working together, but from the agent's viewpoint they are not. They are simply
carrying out their own individual behavior. This emergent cooperation is ultimately the objective
35 Doran J. E. et al. On cooperation in multi-agent systems. 1996. 2.
36 Franklin, S. Is it an Agent, or just a Program?: A Taxonomy for Autonomous Agents. 1996
37 Forrest, S. Emergent Computation: Self-organizing, Collective and Cooperative Phenomena in Natural and
Artificial Computing Networks. 1990. 42.
38 Chantemargue, F, Lerena, P and Courant, M. Autonomy-based multi-agent systems: statistical issues.
39 Beckers, R. From Local Actions to Global Tasks: Stigmergy in Collective Robotics. 1994.
11
being pursued for the MAS playing the Civilization Game, and the relevant benchmark for
success will be something measurable only at the system level.
When MAS find successful strategies for cooperation, "the interactions of individual
agents possess a value-add compared with each simple agent capability."40 Specifically, these
advantages include natural implementations of problems that ask for distributed data and control,
greater robustness, scalability, and reusability. Looking ahead to an increasingly automated
future, MAS will also offer a valuable paradigm for human-computer cooperation.
Sequential Social Dilemmas
Before delving into the agents themselves, we'll lay out the structure of the environment
within which they will operate. In order to meaningfully explore the concept of cooperation in
MAS, agents must face a social dilemma: an environment or scenario which exposes the tension
between collective and individual rationality. If individual objectives align with the common
good, then cooperation is achieved trivially. Historically, the theory of repeated general-sum
matrix games has provided a powerful framework for understanding cooperation through a
mathematical model of social dilemmas and has produced famous strategies like Tit-for-Tat in
Iterated Prisoner's Dilemma.41
40 Nwana, H.S. and Ndumu, D. T. A Perspective on Software Agents Research. 1999.
41 Rapoport, A. Prisoner's dilemma-recollections and observations. 1974. 17-34.
12
Figure 3: Outcome variables R, P, S, and T are mapped to the cells of a generic game matrix.
Incentives are calculated as Fear = P -- S and Greed = T -- R and games are classified based on
those incentives that exist in a game.
At each stage of the game, there are precisely four possible outcomes: the player will
receive a reward for mutual cooperation, 𝑅, a punishment arising from mutual defection, 𝑃, a
"sucker" outcome obtained by the player who cooperates with a defecting partner, 𝑆, and a
temptation reward achieved by defecting against a cooperating player, 𝑇. A matrix game is a
social dilemma when its four payoffs satisfy the following social dilemma inequalities42:
1) 𝑅 > 𝑃. Mutual cooperation is preferred to mutual defection
2) 𝑅 > 𝑆 . Mutual cooperation is preferred to being exploited by a defector
3) 2𝑅 > 𝑇 + 𝑆. Mutual cooperation is preferred to an equal probability of unilateral
cooperation and defection
4) Either of greed: 𝑇 > 𝑅 or fear: 𝑃 > 𝑆. Mutual defection is preferred over being
exploited
These Matrix Game Social Dilemmas (MGSD) have been fruitfully utilized to study a
wide variety of phenomena and scenarios in social science and biology43, but game-theoretic
frameworks like the two-player Iterated Prisoner's Dilemma, Stag Hunt or other multi-player
matrix games44 necessarily treat the choice to cooperate or defect as a discrete, atomic action.
Either a hunter will choose to hunt hare or to hunt stag. In real-world social dilemmas, however,
42 Macy, Michael and Flache, Andreas. Learning dynamics in social dilemmas. 2002. 7229-7236.
43 Supra, Ale et al.
44 Broom, M, Cannings, C, and Vickers G. T. Multi-player matrix games. 1997. 931-952.
13
these choices are temporally extended. Cooperativeness is a property that applies to policies not
elementary actions and consequently exists on a graded spectrum. Decisions to cooperate or
defect are made with only impartial information about other players' activities and the state of
the world.45 A real hunter scouts, tracks, runs, and shoots, but we don't label these actions as
intrinsically cooperative or defecting. Rather when we observe the broader policy of observing
other hunters pursuing the stag and then joining in the chase, we call the hunter's strategy
cooperative, and when he chooses the easier route to the hare, disregarding the actions and
intentions of his fellow hunters, we call it defecting.
Recent research in social dilemmas centers around Markov game-based Sequential Social
Dilemmas (SSD) that treat cooperativeness as "a property that applies to policies, not elementary
actions" and requires "agents to learn policies that implement their strategic intentions." 46
Because cooperation and defection are measured through observed behavior and not simply
through binary choice, they offer the most powerful framework today for measuring true
cooperation in realistic ways.47 SSDs are a recent innovation on Markov Games that share the
mixed incentive structure of MGSDs but also require agents to learn policies that implement
their strategic intentions.
A Markov game is formally defined, in the two-player case for simplicity, as 𝑀 =
(𝑆, 𝑂, 𝐴1, 𝐴2, 𝑇, 𝑟) where 𝑆 is the set of states and 𝑂 is the observation function 𝑂 ∶
𝑆 × {1, 2} → ℝ𝑑 specifying each player's partial 𝑑-dimensional view of the current state of the
world, 𝐴1and 𝐴2 denoting the two players' sets of legal actions, a transition function 𝑇 ∶
𝑆 × 𝐴1 × 𝐴2 → Δ(𝑆) where Δ(𝑆) is the set of discrete probability distributions over the state
45 Leibo, Joel et al. Multi-agent Reinforcement Learning in Sequential Social Dilemmas. 2017. 2.
46 Id at 1.
47 Kleiman-Weiner, M. et al. Coordinate to cooperate or compete: abstract goals and joint intentions in social
interaction. 2016.
14
space 𝑆, and the reward function 𝑟𝑖 ∶ 𝑆 × 𝐴1 × 𝐴2 → ℝ for player 𝑖. If we further let each
player's observation function be defined as 𝑂𝑖 = {𝑜𝑖 𝑠 ∈ 𝑆, 𝑜𝑖 = 𝑂(𝑠, 𝑖)}, then to choose
actions, each player uses a policy 𝜋𝑖 ∶ 𝑂𝑖 → Δ(𝐴𝑖). Formalized in this way, it becomes apparent
that matrix games are simply the special case where the state is perfectly observable (𝑂𝑖(𝑠) = 𝑠)
and the size of the state 𝑆 = 1. In general, we can split the universe of all possible legal policies
into two disjoint sets of cooperative and defecting policies Π𝐶 and Π𝐷 where there is no
guarantee that Π𝐶 ∪ Π𝐷 = Π since for sequential behavior, cooperativeness will usually be a
graded property. Thus, we define these two sets by thresholding a continuous social behavior
metric 𝛼 ∶ Π → ℝ with values 𝛼𝑐 and 𝛼𝑑 such that 𝛼(𝜋) < 𝛼𝑐 ↔ 𝜋 ∈ Π𝐶 and 𝛼(𝜋) >
𝛼𝑑 ↔ 𝜋 ∈ Π𝐷. This behavior metric will represent our key benchmark for achieving
cooperation.
Formally, we can define an SSD as the tuple (𝑀, Π𝐶, Π𝐷) when the Markov Game 𝑀
satisfies the condition that there exist states 𝑠 ∈ 𝑆 for which the induced empirical payoff matrix
satisfies the social dilemma inequalities above. SSD games studied include the Gathering game,
where players choose between shooting other players which temporarily disables them and
gathering apples located around a grid-like map, and the Wolfpack game, where players can
choose to capture prey alone or capture together with other players to obtain an extra bonus.48
Both these games expose tensions between immediate short-term rewards and optimal
cooperative behavior that leads to long-term bonuses but requires adjusting one's policies to
coordinate with others. I introduce here a new SSD, the Civilization game, that faithfully models
the dynamics that Hobbes posits in the State of Nature and enables the study of a more complex
range of incentive structures than previous SSDs.
48 Supra, Leibo et al.
15
Reinforcement Learning
Turning now to the mechanics of the agents within a MAS, we see that there are three
broad approaches to learning: (1) supervised learning where the correct output is provided by a
teacher during a training phase; (2) un-supervised learning where there is no knowledge of the
correct output but where it is possible to distinguish equivalence classes in the input itself to
guide the learning process; and (3) reward-based or reinforcement learning where only a
feedback is provided by the environment on the utility of the performance. Of these, the theory
of reinforcement learning provides the most natural framework, deeply rooted in psychological49
and neuroscientific50 perspectives on animal behavior and how agents can optimize their control
of an environment. The family of RL algorithms, as a subset of all machine learning algorithms,
is particularly concerned with how to act in a given environment so as to maximize cumulative
reward. From this family, the Q-Learning algorithm represents an extremely powerful RL
technique because it is model-free, meaning it doesn't require complete knowledge of the
environment, and consequently well suited to play partially-observable Markov games.
Q-Learning computes a value for every state and action combination with a function 𝑄 ∶
𝑆 × 𝐴 → ℝ where the magnitude of the Q-value is proportional to the perceived value of
taking action 𝐴 at state 𝑆. At any state, a QL agent simply looks at the set of all possible actions
that can be taken and, under the epsilon greedy strategy, chooses with some probability 𝜖 to take
the action with the highest Q-value and takes a random legal action with probability 1 − 𝜖. This
strategy enables the agent to both explore the state space by performing actions it wouldn't
otherwise take while also exploiting learned experience. It also embodies the classic explore vs
49 Thorndike, E. L. Animal Intelligence: Experimental studies. 1911
50 Schultz, W., Dayan, P. & Montague, P. R. A neural substrate of prediction and reward. 1997. 1593 -- 1599.
16
exploit trade-off where taking actions that are known from experience to yield rewards may
prevent an agent from finding global maximums.
Procedurally, all Q-values are initially assigned a random value before learning begins.
Then, at every time 𝑡, the agent selects an action 𝑎𝑡 from state 𝑠𝑡 and receives reward 𝑟𝑡 and
updates the Q-value according to the Bellman update equation:
𝑄(𝑠𝑡, 𝑎𝑡) ← (1 − 𝛼)𝑄(𝑠𝑡, 𝑎𝑡) + 𝛼(𝑟𝑡 + 𝛾 ∙ max
𝑎
𝑄(𝑠𝑡+1, 𝑎))
The parameter 𝛼 ∈ [0,1] is the learning rate where a value of 𝛼 = 0 means that the agent
essentially learns nothing, exploiting only previous experience, and a value of 𝛼 = 1 means that
the agent considers only the most recent experience, ignoring prior knowledge. The discount
factor 𝛾 ∈ [0,1] determines the importance of future rewards where 𝛾 = 0 makes the agent
myopic, or short-sighted, by considering only immediate reward, and 𝛾 = 1 will make it strive
towards future reward. Taken altogether, the update equation describes a simple value iteration
update ran for a fixed length of time that utilizes a weighted average of old values and new
information. We will see later how RL and the learning parameters in particular find a parallel in
Hobbes' theory of the nature of human perception and decision-making.
Figure 4: The perception-action-learning loop where the action 𝑎𝑡 taken translates directly into
the reward 𝑟𝑡+1 and new state 𝑠𝑡+1. In a MAS, learning becomes unstable because the reward and
state are functions of other agents' actions over which a player has no control. (Sutton and Barto)
17
For Q-Learning in the multi-agent system setting, the i-th agent stores its own Q-
function 𝑄𝑖 ∶ 𝑆 × 𝐴𝑖 → ℝ in a Q-value table. The policy for that agent can then be written as:
𝜋𝑖(𝑠) = {
argmax𝑎 ∈ 𝐴𝑖 𝑄𝑖(𝑠, 𝑎),
𝑈(𝐴𝑖),
𝑝 = 𝜖
𝑝 = 1 − 𝜖
Where 𝑈(𝐴𝑖) denotes a sample of legal actions from the uniform distribution. In independent
multi-agent reinforcement learning, each agent regards the actions of others simply as part of the
environment. This independence assumption can be considered an assumption of bounded
rationality in that agents do no reasoning about other agents' learning and it represents a major
obstacle for achieving cooperation in MAS. Some promising work has been done recently to
make agents aware of opponents' learning51, and that paradigm will also play an important role
in implementing a Hobbesian mechanism for achieving cooperation.
Hobbes and Leviathan
From what we've considered so far, it might not yet be obvious why the political
philosophy of Hobbes would play an intuitive or valuable role in offering new solutions to the
problem of cooperation in MAS. Providing some historical and philosophical background on this
thinker and his unique ideas will hopefully help make the case for their applicability to the
problem at hand.
Thomas Hobbes (1588-1679) was an English political philosopher writing in a
tumultuous period of European history. From the French Wars of Religion and the bloody Thirty
Years' War to the English Civil War culminating in Cromwell's Protectorate, the 17th century
was one characterized by extraordinary instability and savagery. Given this kind of political
51 Foerster, Jakob et al, Learning with Opponent-Learning Awareness. 2018
18
turmoil, it is not surprising that Hobbes came to hold a view of human beings as creatures who
will, if unchecked, inevitably behave violently toward one another. The chief political struggle in
England during this period was between the Parliamentarians, who advocated the rights of
Parliament, and the Royalists, who supported King Charles I.
In particular, Charles's claim to the right to imprison nobles per special mandatum
domini reges (by special command of the King) raised the question of whether the King was
above the Law and could therefore subvert it in order to secure the Commonwealth or whether he
himself was subject to the Law. Hobbes, seeking to settle this disagreement which was causing
so much conflict and bloodshed, sided strongly with the King, presenting his famous argument in
Leviathan that the Sovereign embodied the body politic and consequently exercised complete
and absolute authority. No entity could behave with a single will and reject its Sovereign; he
could not be tried and executed by the authority of 'the people' as Charles I was. Hobbes's
royalist friends in 1640-2 were well satisfied with this argument, for it secured to the king all the
powers vis-à-vis Parliament which he claimed in those years,52 although they eventually realized
that those same arguments would go on to support obedience to Cromwell's republican
government.53 Hobbes himself was likely a staunch royalist whose radical arguments ended up
undermining his own monarchist position.54
Leviathan is both Hobbes's systematic construction of the social state and consequently,
it is the work this thesis will build its cooperative mechanism upon. It is also the culmination of
his metaphysical, moral, and natural philosophy begun in De Cive and Elements of Law, and so
these two works will primarily form the basis of the argument motivating the application of
52 Supra, Leviathan at xix
53 Skinner, Q. Conquest and consent: Hobbes and the engagement controversy. Visions of Politics. 2002. 287-307
54 Hamilton, J. Hobbes the royalist, Hobbes the republican. History of Political Thought. 2009. 411-454.
19
Hobbesian political philosophy to Artificial Intelligence. To the degree that his natural and moral
philosophy is applicable to artificially intelligent agents, the mechanism or process he proposes
in his political philosophy for the formation of society should in principle be applicable to
producing cooperation in MAS. Consequently, a substantial portion of this thesis will offer an
interpretation of his metaphysics and natural and moral philosophy as uniquely fitting for
artificially intelligent agents, specifically reinforcement learning-based AI. Finally, on the
strength of that comparison, it will implement Hobbes's political solutions as modifications to
standard RL to test in the Civilization Game.
Before that, understanding Hobbes's philosophical methodology is important. For
Hobbes, philosophy is divided into three branches: natural, moral, and political, each of which
study a different kind of "body". His natural philosophy is guided by a fundamental belief in
mechanistic materialism, claiming that the universe is machine-like, and strict determinism,
acting according to strict scientific laws of cause and effect and being composed exclusively of
material bodies. Similarly for humans, there is no such thing as soul or spirit; rather, everything
from our actions, emotions, and states of mind, are series of internal "motions" caused by
external sensation. This materialism enables Hobbes to attempt a "science of politics", deriving
political truths from fundamental, self-evident principles through a logical, almost mathematical,
methodology. He makes a case for political argumentation based on reason, or "ratiocination",
alone, since "the principles of politics consist in the knowledge of the motions of the mind."55
As Hampton puts it, "Hobbes characterizes his political argument as a 'demonstration' in
the style of geometry, in which his political conclusions are derived from his psychological
55 Supra, De Corpore at 6.74.
20
theories, which in turn can be derived from his physiological theories of human behavior." 56 In
his biography of Hobbes, John Aubrey explains the encounter that inspired this radical approach:
He was... 40 years old before he looked upon geometry; which happened accidentally. Being in a
gentleman's library..., Euclid's Elements lay open, and 'twas the 47 El. libri I. He read the
proposition. 'By G -- ,' said he (he would now and then swear, by way of emphasis), 'this is
impossible!' So he reads the demonstration of it, which referred him back to such a proposition,
which proposition he read. That referred him back to another, which he also read. Et sic deinceps,
that at last was demonstrably convinced of the truth. This made him in love with geometry. 57
Impressed with the incontrovertible conclusions which geometry enabled mathematicians to
show, Hobbes set his mind to deriving a system of government in a similar fashion. In his mind,
the serious political problems of his time resulted from disagreements over who had the ultimate
authority in political and religious affairs.
Consequently, a purely rational methodology could avert the constant quarrels amongst
philosophers about the proper structure and scope of government. This system of careful,
deductive, one might say, mathematical reasoning, seeks to establish definitively the proper
organization and scope of political society. Beginning with Hobbes's fundamental premises
about human nature and the universe, he forms a chain of consequences that passes through
morality and society before reaching politics. If we can show that Hobbes's premises in natural
and moral philosophy hold, then his political prescription for the problem of Cooperation should
also prove effective.
It's worth noting that this rationalist epistemology and materialist metaphysics radically
contrasted with the Christian Scholastic philosophy of Hobbes's immediate predecessors and to
other traditional thinkers like Augustine. Augustine, for example, also defined civitas as "nothing
56 Hampton, Jean. Hobbes and the Social Contract Tradition. 30.
57 Aubrey, John. A Brief Life of Thomas Hobbes, 1588-1679. 1898.
21
else than a multitude of men bound together by some associating tie,"58 but he emphasized that
this was insufficient to distinguish civitas from other forms of communal life. It is only when we
give due consideration to the religious and moral implications of the adjective "earthly," that the
distinctive traits of the civitas terrena become plain.59
And, for a modern example, Tocqueville insisted that he would "never admit that men
form a society by the sole fact that they acknowledge the same leader and obey the same laws;
there is a society only when men consider a great number of objects in the same way; when they
have the same opinions on a great number of subjects; when, finally, the same facts give rise
among them to the same impressions and the same thoughts."60 Disregarding mores, religion,
and common culture as superfluous to the formation of political society, Hobbes was freed to
pursue his geometric proof for the foundation of the state, but arguably lost the characteristics
that made his subjects uniquely human. But, regardless of whether it represents a compelling
model for human nature, I will show that his materialist and rationalist framework can apply to a
class of standard AI methodologies.
58 Augustine, City of God. XV. 73.
59 Loetscher, Frederick. St. Augustine's Conception of the State. 1935. 16-42.
60 Tocqueville, Alexis, Democracy in America. 598
22
II.
Methodology
AI as Hobbesian Man
The field of Computer Science and specifically its subfield Artificial Intelligence offers a
unique opportunity for Hobbesian scholarship, because, arguably, the tenets of Hobbes's natural
and moral philosophy apply remarkably well to computational intelligent agents. Six core
propositions, two from his foundational natural philosophy and four from his intermediate
human or moral philosophy, will enable us to both examine this applicability and understand the
full geometric logic of Hobbes's political argument for the necessity of the Sovereign:
1) Mechanistic Materialism -- The universe consists solely of sensible material and motion
2) Strict Determinism -- Action in the universe is entirely determined by material causes
3) The Moral Vacuum -- Humans can/should do whatever is necessary for self-preservation
4) Rational Self-Interest -- Humans are rational and driven by subjective interest
5) Radical Individualism -- Humans should be considered as fundamentally individuals.
6) Equality of Condition -- Humans are essentially equal in mental and physical capacity
Hobbes's mechanistic materialism and determinism (the first two propositions) lead him to see
human nature as characterized by moral subjectivism, rational self-interest, radical
individualism, and equality of condition, which ultimately serves to prove "by experience known
to all men and denied by none, to wit, that the dispositions of men are naturally such, that except
they be restrained by some coercive power, every man will dread and distrust each other."61 I
shall examine each in turn.
61 Supra, De Cive at 103.
23
Mechanistic Materialism
For Hobbes, all that exists is physical: "for the Universe, being the aggregate of all
bodies, there is no real part thereof that is not also Body, nor anything properly a Body, that is
not also part of the Universe."62 The idea of metaphysical realities like soul or spirit are reducible
to physical, dispositional, or imaginative phenomena since substances are corporeal by
definition. "Substance and body signify the same thing and therefore substance incorporeal are
words, which when they are joined together, destroy one another, as if a man should say, an
incorporeal body"63 Even God Himself is not what is commonly called Spirit, and when we refer
to him as such, we do not "signify our opinion of his Nature, but our desire to honor him with
such names as we conceive most honorable amongst ourselves."64 In effect, he deflects man's
claims about the reality of the supernatural or metaphysical as simply a pious means of
expressing our intentions and opinions.
This materialist premise quickly translates into a mechanical interpretation of human
action: since life "is but a motion of limbs, the beginning whereof is in some principal part
within, why may we not say, that all Automata have an artificial life? For what is the Heart, but a
spring, and the Nerves, but so many strings, and the Joints, but so many wheels, giving motion to
the whole both, such as was intended by the Artificer?"65 Man is no more than a mechanical
automaton controlled and impelled by an internal force. And what is that internal force? Mere
Imagination, simply the impression of some object upon the senses, the "conception remaining,
and by little and little decaying from and after the act of sense,"66 which he calls "the first
62 Supra, Leviathan at 269.
63 Id at 270.
64 Id at 271.
65 Id at Introduction, 9.
66 Hobbes, Thomas. The Elements of Law, Natural and Politic. III. 27.
24
internal beginning of all Voluntary Motion." By the movement of the Imagination, "these small
beginnings of Motion, within the body of Man, before they appear in walking, speaking, striking,
and other visible actions, are commonly called Endeavour" and finally, "this endeavor, when it is
toward something which causes it, is called Appetite or Desire"67 or their opposite, Aversion. In
this way, all human desire, and consequent action, is reduced to exclusively material causes
through a mechanistic operation. It is in this sense that we can call Hobbes's natural philosophy a
mechanistic materialist one.
The implications of this view can be difficult to appreciate in our modern context.
Hobbes has overturned the traditional teleological view of the universe begun with Aristotle for
whom "every craft and every investigation, and likewise every action and decision, seems to aim
at some good" and consequently, the good can be meaningfully defined as "that at which
everything aims."68 Instead of seeing natural ends as the impetus of action, Hobbes's mechanical
model sees action merely as the result of blind matter and motion. The Platonic and Christian
conception of the incorporeal soul which balances reason with appetite and spirit is rejected.
Most pertinently for his political philosophy, Hobbes's reduction of the motivation of all human
action to the desires elevates the centrality of "power", the ability to satisfy or obtain the objects
of Appetite or avoid the objects of Aversion.69 And thus, his famous assertion in Leviathan that
"I put for a general inclination of all mankind, a perpetual and restless desire of Power after
power, that ceaseth only in Death."70
Hobbes's mechanistic materialist view of the universe is the aspect of his thought most
obviously and immediately applicable to AI. Strictly defined, "modern computers are simply
67 Supra, Leviathan at VI. 38.
68 Supra, Nicomachean Ethics at 1094a1.
69 Supra, Leviathan at X.
70 Id at XI. 70.
25
Turing machines that operate on an alphabet consisting of the two symbols '0' and '1'."71 A
Turing machine is simply a mathematical model of computation that defines an abstract machine
which manipulates symbols on a strip of tape according to a table of rules. As its creator, British
mathematician Alan Turing, described it, "the machine is supplied with a 'tape' (the analogue of
paper) running through it and divided into sections (called 'squares') each capable of bearing a
'symbol'."72 It shuttles the tape back and forth, reading data, making marks on its scratch tape,
and inspecting the tape for information on what to do next. Turing proved that such a seemingly
naïve and rudimentary contraption, in fact, could embody every imaginable computational
operation. Nothing significantly changes when we consider reinforcement learning AI. Every
intelligent operation for a Q-Learning agent is simply a computation that considers memories of
the quantified "pleasure" or "pain" of being in some state and a further operation to decide what
action is best fitted to attain maximal utility. So, then, we can easily see the applicability of
Hobbesian materialism to AI.
Strict Determinism
Mechanistic materialism is also closely related to strict determinism. If every extant body
and potential cause of motion is perfectly contained within the physical, sensible universe, then
every subsequent effect or observable motion is reducible to an enumerable set of causes, which
are themselves the result of observable causes, and so. Consequently, free will is also cast aside
"because every act of man's will and every desire and inclination proceedeth from some cause,
and that from another cause, in a continual chain, they proceed from Necessity." 73 Likewise, if
we consider that at the root of this chain lies "one first mover, that is, a first and eternal cause of
71 Weizenbaum, Joseph. Computer Power and Human Reason. 1976. III. 73.
72 Turing, A. M. On Computable Numbers with an Application to the Entscheidungsproblem. 1936. 2.
73 Supra, Leviathan at XXI. 146.
26
all things, which is that which men mean by the name of God,"74 then we can also understand
why Hobbes might consider himself a sort of compatibilist instead when he explains that "the
liberty of man in doing what he will, is accompanied with the necessity of doing that which God
will, and no more, nor less" 75 Now, when we apply this Hobbesian premise of strict determinism
to human beings, we form a portrait of human cognition as a sole function of a set of past
experiences: "conception of the future is but a supposition of the same, proceeding from
remembrance of what is past… And that anything hath power now to produce another thing
hereafter, we cannot conceive, but by remembrance that it hath produced the like heretofore"76
The epistemological implications of viewing human learning in such a deterministic way seem to
preclude the possibility of transcending our mechanical minds and grasping real truth, and indeed
Hobbes himself comes out and explicitly states that "experience concludes nothing
universally."77 Rather, truth, is simply a matter of linguistic convention and "consists in speech
and not in the things spoken of."78 Strict Determinism in Hobbesian natural philosophy, far from
being a marginal and inconsequential tenet, clearly has profound implications upon the nature of
truth and the capacity for humans to attain it.
Similarly, "machines, when they operate properly, are not merely law abiding; they are
embodiments of law."79 In the same way that materialism implies that every action by a physical
bodies is a result of a fixed and observable set of physical motion and cause, so for computers,
the output of any Turing Machine is simply the conclusion of a set of fixed computational
operations upon an input. "Every effective procedure can be reduced to a series of nothing but
74 Id at XII. 77.
75 Id at XXI. 146.
76 Supra, Elements of Law at VIII. 48.
77 Id at I. 10.
78 Supra, De Corpore at 35.
79 Supra, Weizenbaum at II. 40.
27
commands (i.e. statements of the form 'do this' and 'do that') interlaced with conditional-branch
instructions"80 which simply perform different commands based on whether some claim is true.
For Artificial Intelligence, the details of the computational decision process that determines
action has been laid out thoroughly above and it is unnecessary to recreate it here.
Thus, there is a striking similarity between Hobbes account of human perception and
cognition and the reinforcement learning model. In the same way that Hobbesian man consumes
sense information about the world and then translates it into "endeavor" by means of an internal
motion, so it is precisely with AI. And just as Hobbesian man is restricted in his cognition to the
operation of his imagination which is no more than shadows and memories of past experience, so
reinforcement learning, by definition, draws up its actions solely from the outcomes of previous
interactions with its environment in order to find the optimal policy of action that results in the
obtainment of reward and the avoidance of punishment.
There is, however, one potential deviation from the deterministic nature of that process:
the introduction of stochasticity, or randomness, that enables agents to occasionally explore new
states that their decision process would otherwise avoid. The conditional comparison of a
random number and the exploration parameter in an epsilon-greedy learning strategy
determines whether the agent will decide their action based on what has been historically
desirable (exploitation) or without factoring in any past experience (exploration). The question of
whether true randomness is deterministic is an exceedingly difficult one for which there is no
clear consensus amongst philosophers or physicists.
80 Id, at III. 97.
28
Moral Subjectivism
Having examined the nature and role of materialism and determinism, we now turn to its
effects on Hobbes's moral philosophy. How are humans living in a Hobbesian universe supposed
to behave? What injunctions exist in the State of Nature? What are the prerogatives and
limitations in such a state?
The first and most natural consequence is moral subjectivity. In precisely the same way
that truth is simply a matter of usage and the combination of words into definitions, so "these
words of Good, Evil, and Contemptible are ever used with relation to the person that useth them,
there being nothing simply and absolutely so, nor any common Rule of Good and Evil to be
taken from the nature of the objects themselves."81 Having dispensed with Aristotle's
teleological model of the universe by assuming a materialist framework, Hobbes destroys any
independent conception of the Good by precluding metaphysics and then removing the
possibility of deriving it from natural ends.
The Laws of Nature that he proposes in Leviathan are simply rules discovered by reason
for best maintaining one's self-preservation that are binding in foro interno, or within one's own
thinking and intentions, but not in foro externo, or the actual performance in practice. For
example, while all men must strive for peace internally, that doesn't necessarily obligate you to
work towards it. "For he that should be modest and tractable, and preform all he promises, in
such time and place where no man else should do, should be make himself prey to others and
procure his own certain ruin, contrary to the ground of all laws of nature, which tend to nature's
preservation."82
81 Supra, Leviathan at VI. 39.
82 Id at XV. 107.
29
This is quite different from what we might normally associate with conscience or natural
law, which is both objective, existing independently of one's own conceptions, and binding on
external activity. What results, then, is a moral vacuum in the State of Nature with no source of
authority or judgment to restrain human action. And so, in the "war of every man against every
man, this also is consequent: that nothing can be Unjust. The notions of Right and Wrong,
Justice and Injustice have there no place."83 With these premises securely in place, Hobbes
secures himself from the charge that his proposed state of war is prohibited by human conscience
and the natural law, since what actually exists are only reason, power, and appetite.
Computers, too, have no equivalent to conscience or natural law traditionally understood.
This is perhaps one of the strongest reasons for interpreting AI in Hobbesian terms. In many
other systems of natural and moral philosophy, from the Platonic and Aristotelian to the
Thomistic, writers assert the existence of both body and soul in humans and that there is an
imprint of the Law of God "written on their hearts, while their conscience also bears witness, and
their conflicting thoughts accuse or even excuse them."84 Obviously, such a picture of human
nature would be entirely unfit to be modelled by a machine (at least in the existing state of
Computer Science), but the mechanistic and deterministic Hobbesian system, by throwing away
the concept of natural morality, clears the way for the comparison.
The incapacity of AI to navigate questions of morality is a subject of significant scholarly
and policy interest.85 With the advent of autonomous agents driving cars, determining terms of
parole, and fighting wars, policymakers must grapple with "the capacity of algorithms or trained
systems to reflect human values such as fairness, accountability, and transparency." 86 The
83 Id at XIII. 90.
84 Rom 2:15
85 Kleiman-Weiner, M. Learning a commonsense moral theory. 2017.
86 Calo, Ryan. Artificial Intelligence Policy: A Primer and Roadmap. 2017. 9.
30
Hobbesian political system offers a framework for achieving cooperation in multi-agent social
dilemmas even without reference to something like moral reasoning.
Rational Self-Interest
From the moral vacuum of the State of Nature, follows the primacy of rational self-
interest in human action. This Hobbes calls "the Right of Nature, which writers commonly call
Jus Naturale, the Liberty each man hath, to use his own power, as he will himself, for the
preservation of his own Nature… and consequently, of doing anything, which in his own
Judgment and Reason he shall conceive to be the aptest means thereunto"87 Because Law and
Right are opposed, with the complete absence of law, natural or civil, in the State of Nature
comes the monopoly of right in determining human action.
While it may seem that certain ethical norms like prohibitions upon the murdering of the
innocent, for example, may be universally held, Hobbes rejects any intrinsic metaphysical
consideration separate from Reason and self-interest. In fact, for him, the variance in these norms
across culture and time is greater than the similarity; since a "common standard of virtues and
vices," Hobbes says, "does not appear except in civil life; this standard cannot, for this reason, be
other than the laws of each and every state."88 Instead, humans always can and do pursue their
self-interest, subjectively defined as that which satisfies their Appetites and removes their
Aversions, which in the vast majority of cases (with a few notable exceptions) includes self-
preservation.
In this sense, Hobbes falls under the category of what contemporary philosophers might
term behavioralism. In place of the prescriptive traditional natural law of Aristotle and Aquinas
he substitutes new Laws of Nature derived purely from reason upon the sole premise self-interest
87 Id at XIV. 91.
88 Hobbes, Thomas. De Homine. B. Gert, Indianapolis: Hackett Publishing, 1991. 69.
31
which counsel among other things the pursuit of peace, the performance of covenants, and
gratitude for benefits rendered, all rationally calculated to achieve one's self-interest. By freeing
man from all the constraints of traditional ethical norms, natural law, and conscience, Hobbes
removes any factors from the State of Nature that would have been outside the scope of his
geometric and deductive methodology. Most importantly, the absence of objective Justice to
arbitrate human interaction and check each man's self-interest in the State of Nature allows
Hobbes to paint it as a state of complete license to invade a neighbor's territory or renege on
one's vows, leading ultimately to continual fear and reprisal.
The decision process for AI agents takes as input the current state of the world (e.g. my
location relative to other agents, how much territory I occupy, whether I've been invaded by
another, etc.) and compares it to the "memory" of past experience taking action in that state. In
the standard case where the agent's objective function is to maximize its own reward, it
considers only that single factor when choosing which action to take from a given state. Just as
for Hobbesian man, then, rational self-interest generally represents the exclusive principle of
action for AI. My decision to invade my neighbor's land and thereby inflict injury upon him is a
calculation made solely with a view towards what I consider is best for me and not informed by
anything like Sympathy or Justice. If I choose not to invade, it must only be because I expect
either that he will invade me in retaliation or that I expect for some other reason to receive
greater long-term benefit for taking a peaceful policy. In the primacy of rational self-interest,
then, we also see the close applicability of the Hobbesian moral framework to computer
intelligence.
32
Equality and Individualism
Finally, this leads us to consider the radical individualism and equality of physical and
mental condition that characterizes humans in the State of Nature. The two premises are closely
related and represent a dramatic reversal of the traditional understanding of human nature.
Hobbes sees man as fundamentally isolated from family and society as well as conflict-
prone, not least because of the differing appellations of words which causes misunderstanding.
Contrast this with Aristotle who held that "man is by nature a social animal" and so "society is
something that precedes the individual."89 Hobbes's Ninth Law of Nature prohibits Pride and
obliges "every man to acknowledge the other for his Equal by Nature"90 since, unless men were
equal, they would never enter into mutual Peace, but would find that the self-interest of the
strong would be to dominate their inferiors. At the same time, because "the difference between
man, and man, is not so considerable, as that one man can thereupon claim to himself any
benefit, to which another may not pretend, as well as he,"91 there is a consequent mistrust or
"diffidence" about the intentions of others. If I declare a certain plot of land to be my property, I
will immediately suspect my neighbors, who are my equals in strength and ambition, of making
designs upon it.
The connection with Hobbes's individualism is most strikingly observed in his view of
the family within which "there is not always that difference of strength or prudence between the
man and the woman, as that the right can be determined without War."92 By positing the
equivalence of the father and mother, he destroys the natural paternal authority associated with
the father in the family. And so also with children, that authority "is not so derived from the
89 Aristotle, Politics. 1253a.
90 Supra, Leviathan at XV. 107.
91 Id at XIV. 87.
92 Id at XX. 139.
33
Generation, as if therefore the parent had Dominion over his child because he begat him, but
from the child's Consent."93 Rather than admitting the existence of some natural authority
separate from the political, Hobbes claims that the dominion of a father over his children is of the
same sort of that of the Sovereign over his citizens: a covenant entered into by consent in order
to achieve self-preservation. This has the further effect of breaking the natural familial ties that
would otherwise enable each member of the family to rely on every other member for support
and protection. Equality thus begets individualism and both, in turn, make the State of Nature
one of isolation, distrust, and paranoia.
That equality and individualism apply equally to AI, is very plausible. In some MAS, we
can imagine agents that are completely equal in cognitive and active capacities. In a given
experimental setup, every "instance" of a learning agent can be the result of the same code and
thus share precisely the same decision processes, set of potential actions, and motivating
principle. The only thing separating each agent would be the set of lived experiences unique to it
and the accidents of chance and position that may cause individual deviances in observed
behavior. And while individualism does not follow from equality of condition for AIs as it does
for the Hobbesian man, it applies just the same, but for different reasons.
Intelligent agents have no concept of the family or natural authority that Hobbes goes to
such lengths to deny for humans. Whereas one might reasonably consider that a father has a
natural tendency to protect and provide for his child in the State of Nature, no such relation exists
amongst agents in a MAS except by convention. For agents that behave in a rational, self-
interested way, any tendency towards cooperation and mutual support that arises is calculated to
achieve that ideal of individual self-preservation which Hobbes places at the foundation of every
93 Id at XX. 139.
34
relation of dominion between father and child, father and mother, and citizen and Sovereign. Just
as the premises of equality and independence produce distrust and violence in humans, so they
may also potentially turn out to be a cause of defecting behavior in multi-agent systems. If this is
the case, we should expect to see improvements in cooperation with the introduction of an agent
with dramatically superior power to dominate or reward and thus shape the behavior of other
agents (roughly a picture of natural authority).
In summary, I have shown how, starting from Hobbes's materialist and determinist
natural philosophy, he incrementally deduces the moral subjectivism, rational self-interest,
radical individualism, and equality of condition that constitutes the human condition.
Furthermore, I've correlated each premise with his infamous conclusion that the State of Nature
is a state of "continual fear, and danger of violent death; and the life of man, solitary, poor, nasty,
brutish, and short."94 By drawing out the causal links in his deductive methodology, we clearly
see that for subsequent philosophers to avoid his political conclusions, they must either reject his
foundational assumption about a material and deterministic universe or else uncover a flaw in
any of the four succeeding moral philosophical premises. Since these properties have been
shown to be applicable to the standard form of AI methodology (with agents adopting a rational,
self-interested viewpoint), we should reasonably expect to find Hobbes's description of a brutal
State of Nature and his political prescription, the Sovereign, to be important components of the
problem and solution for cooperation in MAS.
94 Supra, Leviathan at XIV. 89.
35
The State of War
From the preceding model of human nature, Hobbes goes on to show that the state of pre-
social man is a state of war where all involved lose out. In this, it is notable that he stands apart
from other social contractarians like Locke and Rousseau who paint the State of Nature in almost
idyllic tones preferable to their 18th century political societies. It is arguably the case that, for AI
in social dilemmas like the Prisoner's Dilemma, the consequences of the cycle of defection make
it far closer to the Hobbesian prediction. Consequently, there should be great interest in
understanding his particular political solution, and before that, his diagnosis for why the State of
Nature is a state of war and how it follows from human nature.
Hobbes begins by distancing himself from a long-standing strand of thinking about
cooperation and human nature: "It is true that certain living creatures such as bees and ants, live
sociably with one another (… by Aristotle numbered amongst political creatures), … and
therefore some man may perhaps desire to know why mankind may not do the same."95 For
animals, the "social contract" is written into the very chromosomes of their cells; rationality is
clearly not necessary for the emergence of cooperation. Hobbes believed, however, that not only
was it unnecessary, but rational self-interest was the very source of the problem since "the
agreement of these creatures is natural; but that of men is by covenant only, which is artificial." 96
Humans do not naturally work together and furthermore, "the difference between man,
and man, is not so considerable, as that one man can thereupon claim to himself any benefit, to
which another may not pretend, as well as he." The result of equality of condition is diffidence,
or distrust, amongst men, since "if any two men desire the same thing, which nevertheless they
cannot both enjoy, they become enemies; and in the way to their End, endeavor to destroy, or
95 Supra. Leviathan at Pt. II, Ch. 17.
96 Id
36
subdue one another."97 Faced with this position of vulnerability with respect to his fellow men,
each man inevitably pursues the rational policy of pre-emptive invasion. Owing to the high
potential for conflict in the State of Nature, rational individuals recognize that striking first in
their struggle for life provides them with the necessary advantage to survive. Consequently, the
State of Nature can be called a state of war and "Force and Fraud are in war, the two Cardinal
virtues."98 Propositions 3 and 5 make these seeming vices morally justifiable since each man has
the Right of Nature "to use his own power, as he will himself, for the preservation of his own
Nature; that is to say, of his own Life."99
Of course, when everyone has a Right of Nature to seize whatever it is in one's power to
obtain, human wellbeing is fleeting and building civilization is impossible. "In such condition,
there is no place for Industry; because the fruit thereof is uncertain"100 So then, if others are
willing to lay down this right to achieve security, then the rational policy is always to seek peace
as well. "But if other men will not lay down their Right, as well as he; then there is no Reason
for anyone, to divest himself of his: for that were to expose himself to Prey, rather than to
dispose himself to Peace."101 But after enough experience of the state of war, there may come a
point where a majority of individuals decide that they would rather submit to any authority or
limitation on their power than go on any longer in that state. When such a plurality of agreement
has been reached, each man, by "the mutual transferring of Right… which men call Contract,"102
enacts what we call the Social Contract.
97 Id at 87.
98 Id at 90.
99 Id at 91.
100 Id at 89.
101 Id at 92.
102 Supra, Leviathan at 94.
37
Now, once enacted, what is necessary is the performance of the obligations of that
contract "without which Covenants are in vain and but empty words; and the right of all men to
all things remaining, we are still in the condition of War."103 Hobbes finally introduces the role
of the Sovereign, explaining that "there must be some coercive Power, to compel men equally to
the performance of their Covenants, by the terror of some punishment, greater than the benefit
they expect by the breach of their Covenant."104 Only a figure with absolute and unquestionable
authority could possibly coerce unscrupulous, opportunistic men to perform their contracts with
one another. By "conferring all their power and strength upon one man" in an act which "is more
than Consent, or Concord; it is a real Unity of them all," political society is finally established.
The Commonwealth culminates in "one Person, of whose Acts a great Multitude, by mutual
Covenants one with another, have made themselves every one the Author, to the end he may use
the strength and means of them all, as he shall think expedient, for their Peace and Common
Defense."105
From his model of human nature, Hobbes has produced a political argument for the state
of war based on several key underlying factors: the inherent distrust that each agent has for the
other, the consensus of a majority to limit their own rights in order to escape this plight, and
subsequently, the necessity of an authority vested with the power to reward and punish agents in
a way that makes them amenable to living in society. These are the three core components that
comprise the force of Hobbes's solution.
103 Id at 100.
104 Id at 101.
105 Id at 121.
38
The Civilization Game
The Civilization Game is a game that mimics the agrarian conditions of pre-social
humanity and represents an experimental model of the experience of primitive man in the
Hobbesian State of Nature. Players move to acquire territory, farm rewards from existing
territory, or invade other player's territory to loot their rewards. Long-term cooperative behavior
(i.e. farming rather than invading) leads to overall higher cumulative rewards for all players,
while defecting behavior leads to higher short-run rewards from invading, but lower long-run
rewards since being invaded in turn incurs a much larger penalty. The game is turn-based and
agents navigate a 2-dimensional grid-world, moving in the four cardinal directions. These actions
translate into two broad categories of action, farming one's own land or invading others', that
represent cooperation and defection, respectively. As they traverse the grid world, they acquire
"territory" by labelling each square they occupy with their unique player ID. In order to mimic
the incentives that exist in the State of Nature, an "invasion bonus," a positive reward given to
the agent who has invaded another agent's territory, and an "invasion penalty," a negative fine
levied on the agent who has been invaded, are instituted. Choosing to farm, meanwhile, produces
a reward for the agent proportional to the amount of territory it owns on its turn (i.e. one point
for each square held).
This setup captures the fundamental dynamics that Hobbes posits in the State of Nature.
Man is isolated and self-sufficient, and, left to his own devices, can secure a reasonable
subsistence for himself by farming his property. Once he finds himself in the company of
neighbors and subject to a scarcity of resources, however, a social dilemma rapidly develops: "it
comes to pass, that where an Invader hath no more to fear, than another man's single power; if
one plant, sow, build, or possess a convenient Seat, others may probably be expected to come
39
prepared with forces united, to dispossess and deprive him, not only of the fruit of his labor, but
also of his life or liberty. And the Invader again is in the like danger of another."106
Greed emerges as the incentive to invade others' territory, both because of the immediate
ability to steal their goods, but also because of the expansion of one's own territory leads to more
farming rewards each turn. Fear, also, is the incentive not to be invaded by another, for the same
two reasons; it is also the incentive that is completely essential for Hobbes since the prospect of
invasion or death is far more painful than the profits of invasion are pleasant. To reflect this, the
invasion penalty is greater in magnitude than the invasion bonus.
Figure 5: The Civilization Game with b = 4 and p = 2. Player i = 0 has name 𝑃0 = 𝑃0 and Player
𝑖 = 1 has name 𝑃1 = 𝑃1. On his move 𝑚 = 1, if 𝑃1 takes action 𝑎 = 𝑙𝑒𝑓𝑡, then he has invaded
𝑃0's territory. 𝑃1 will then gain a 25-point invasion bonus in addition to an 8-point farming
reward and set 𝑛𝑡+1
1 = 𝑇𝑟𝑢𝑒 to indicate that 𝑃0 should incur a -10-invasion penalty on 𝑚 = 0.
In practice, the grid-world is square sized (e.g. a 4x4 grid with 16 squares) and holds up
to four agents, initially placed at the corners of the grid. Formally, for every moment in game
time 𝑡 ∈ [0, 1, 2, … 𝑇], where we end the game after 𝑇 steps, the state is given by 𝑠⃑𝑡 ∈ 𝑆, where 𝑆
is the set of all possible states, the action taken is 𝑎𝑡 ∈ 𝐴(𝑠⃑𝑡), where 𝐴(𝑠⃑𝑡) gives the set of all
106 Id at 87.
40
legal actions available in state 𝑠⃑𝑡, and the subsequent reward is some real number 𝑟𝑡 ∈ ℝ. For an
instance of the Civilization Game with board size, 𝑏, and number of players, 𝑝, any state 𝑠⃑𝑡 can
be represented as a single vector consisting of three components:
𝑠⃑𝑡 = 〈𝑏⃑⃑
𝑡, 𝑛⃑⃑𝑡, 𝑚𝑡〉
The vector 𝑏⃑⃑
𝑡 represents the 𝑏 × 𝑏 grid-world board, with each location containing either a
player or a player's territory. 𝑛⃑⃑𝑡 stores information about whether each player has been invaded
in an array of booleans of size 𝑝 where the 𝑖th entry represents whether player 𝑖 has been invaded
by another player since its last move. 𝑚𝑡 ∈ [0, 1, … , 𝑝 − 1] is an integer that tracks which
player's move it is at time 𝑡 such that on move 𝑚𝑡 = 𝑚, player 𝑖 = 𝑚 takes an action. Player
names that are placed in the locations of players in the board are stored in an array 𝑃⃑⃑ of size 𝑝
(e.g. [𝑃0, 𝑃1, … 𝑃3] for a game with four players), and if a location on a board is the territory of
player 𝑖 ∈ [0, 1, … 𝑝], then we simply place the integer 𝑖 at that location. So, in total, with a
representation consisting of (1) a 𝑏 × 𝑏 board with each player appearing once, (2) a 𝑝 sized
array tracking invasions, and (3) a single byte storing the current move, there are
𝑏2!
(𝑏2 − 𝑝)!
× 𝑏𝑝(𝑏 − 1) × 2𝑝 × 𝑝
possible legal states. For a game with a 3x3 board with 2 players, this translates into 𝑆 =
6,912 possible states, but with a 4x4 board and 4 players, the state size balloons to 𝑆 =
67,092,480 states.
The possible actions are any of the four cardinal directions, or if none are legally
available, then the agent can choose to stay in its current location. Formally, 𝑎 ∈
[𝑢𝑝, 𝑑𝑜𝑤𝑛, 𝑙𝑒𝑓𝑡, 𝑟𝑖𝑔ℎ𝑡, 𝑠𝑡𝑎𝑦], and in a given time 𝑡 and state 𝑠⃑, we have 𝑎𝑡 ∈ 𝐴(𝑠⃑𝑡) where 𝐴(𝑠⃑𝑡)
returns the legal actions for player 𝑖 = 𝑠⃑𝑡,𝑚 that meet two criteria: (1) taking action 𝑎 will not
41
cause the agent to move out of the boundaries of the board, and (2) taking action 𝑎 will not cause
the agent to move onto the location of another player. Because there are 𝑝 players in the
Civilization Game, at each time 𝑡, the collective actions for each player are stored in an action
array 𝑎⃑𝑡 = 〈𝑎𝑡
0, 𝑎𝑡
1, … , 𝑎𝑡
𝑝−1〉. Importantly, the game is also asynchronous, or turn-based. So,
while 𝑎⃑𝑡 contains an action for each player at every time 𝑡 for ease of notation, only the action
for player 𝑖 = 𝑚𝑡 actually executes at time 𝑡.
Traditionally, most standard MAS methodology utilizes a synchronous model where
"agents repeatedly and simultaneously take action, which leads them from their previous state to
a new one," but a problem in defining the transition functions of agents arises "due to the fact
that the state in which the agent ends up after taking a particular action at a particular state
depends also on actions and states of other agents." There are two standard ways to address this
problem: we can "think of the transition function of the entire system, a mapping from the states
and actions of all agents to the new states of all agents" or else we have to "define the transition
function of each agent independently, and account for the effects of other agents by making the
function nondeterministic."107 Instead of taking either of these routes, agents play the
Civilization Game in an asynchronous, turn-based way that allows the transition function to
remain deterministic.
We define that transition function 𝑇(𝑠⃑𝑡, 𝑎⃑𝑡) as follows: (1) take the single action 𝑎𝑡
𝑖 for
player 𝑖 = 𝑠𝑡,𝑚 from location 𝑙 = 𝐼𝑁𝐷𝐸𝑋(𝑏⃑⃑
𝑡, 𝑃𝑖), (2) move the player from position 𝑏𝑡
𝑙 to a new
location 𝑙′ = 𝑀𝑂𝑉𝐸(𝑏𝑡
𝑙, 𝑎𝑡
𝑖 , 𝑖) defined by:
107 Shoham, Y. and Tennenholtz, M. On Social Laws for Artificial agent societies. 1995. 243.
42
𝑀𝑂𝑉𝐸(𝑏⃑⃑
𝑡, 𝑎𝑡
𝑖 , 𝑖) =
𝑙 − 𝑏 𝑎𝑡
𝑙 + 𝑏 𝑎𝑡
𝑙 − 1 𝑎𝑡
𝑙 + 1 𝑎𝑡
𝑎𝑡
𝑙
𝑖 = 𝑢𝑝
𝑖 = 𝑑𝑜𝑤𝑛
𝑖 = 𝑙𝑒𝑓𝑡
𝑖 = 𝑟𝑖𝑔ℎ𝑡
𝑖 = 𝑠𝑡𝑎𝑦
{
And setting 𝑏𝑡+1
𝑙′
= 𝑃𝑖 (3) if another player's territory was in the location moved to, or 𝑏𝑡+1
𝑙′ ∈
[0, 1, … 𝑝] − [𝑖], then set that player's invaded state to be True by setting 𝑛𝑡+1
𝑖′
= 𝑇𝑟𝑢𝑒 for
player 𝑖′ = 𝑃𝑏𝑡+1
𝑙
, (4) set the previous location to be the player's territory 𝑏𝑡+1
𝑙′
= 𝑖 unless 𝑎𝑡
𝑖 =
𝑠𝑡𝑎𝑦, (5) if player 𝑖 was invaded, or 𝑛𝑡
𝑖 = 𝑇𝑟𝑢𝑒, then reset it to 𝑛𝑡
𝑖 = 𝐹𝑎𝑙𝑠𝑒, and finally, (6)
increment the move to the next player's turn 𝑚𝑡+1 = (𝑚𝑡 + 1) % (𝑝 − 1). Notice that we
assume that 𝑎𝑡
𝑖 ∈ 𝐴(𝑠⃑𝑡) is taken from the set of legal actions available to agent 𝑖 at time 𝑡 so that
we preclude the possibility of moving to a location outside the board or onto the same location as
another player.
The reward a player receives on its turn in the Civilization Game is determined by three
factors: the amount of territory the agent controls and can farm, the invasion bonus accrued if it
invades its neighbor's territory (i.e. gains +10 points), and the invasion penalty if the agent was
invaded itself by another player (i.e. loses -25 points if 𝑛𝑡
𝑖 = 𝑇𝑟𝑢𝑒). Formally, for player 𝑖 we
can write the reward function as:
𝑅𝑖(𝑠⃑𝑡, 𝑎⃑𝑡) = {
𝑇𝐸𝑅𝑅𝑖(𝑠𝑡,𝑏) + 10 𝐼𝑁𝑉𝐴𝐷𝐸𝑖(𝑠𝑡,𝑏, 𝑎𝑡
𝑠𝑡,𝑚 = 𝑖
0 𝑠𝑡,𝑚 ≠ 𝑖
𝑖 , 𝑖) − 25 𝐼𝑁𝑉𝐴𝐷𝐸𝐷𝑖(𝑠𝑡,𝑛)
where the amount of territory is calculated by 𝑇𝐸𝑅𝑅𝑖(𝑏⃑⃑
𝑡) = 𝐶𝑂𝑈𝑁𝑇(𝑏⃑⃑
𝑡, 𝑖), whether the player
has invaded another player's territory is calculated by:
𝐼𝑁𝑉𝐴𝐷𝐸𝑖(𝑏⃑⃑
𝑡, 𝑎, 𝑖) = {
𝑙′
∈ [0, 1, … 𝑝] − [𝑖]
1 𝑏𝑡
0 𝑜/𝑤
And whether the player has been invaded is determined by
43
𝐼𝑁𝑉𝐴𝐷𝐸𝐷𝑖 (𝑛⃑⃑𝑡) = {
1 𝑛𝑡
𝑛𝑡
0
𝑖 = 𝑇𝑟𝑢𝑒
𝑖 = 𝐹𝑎𝑙𝑠𝑒
Note that, defined in this way, the Civilization Game satisfies the Markov property since the
deterministic transition from any state-action pair 𝑇: 𝑆 × 𝐴 → 𝑆′ does not depend upon prior
states. Furthermore, it satisfies the definition of a Markov game 𝑀 = (𝑆, 𝑂, 𝐴⃑, 𝑇, 𝑟) with a
perfectly transparent observation function 𝑂𝑖(𝑠⃑𝑡) = 𝑠⃑𝑡 and a reward function 𝑟: 𝑆 × 𝐴⃑ → ℝ.
Because of the incentives for both greed and fear, the Game also contains an embedded Matrix
Game Social Dilemma, but this must be proved experimentally by observing the long-term
payoffs achieved by actual agent gameplay.
Hobbesian Q-Learning
As I have already described, Q-Learning is a model-free reinforcement learning
algorithm whose goal is to learn a policy that determines which actions to take under what
circumstances. Normally, Q-Learning converges to an optimal policy when playing a finite
Markov Decision Process,108 but in non-stationary environments like the Civilization Game
where other actors can interfere with state transitions and rewards, it generally can't distinguish
between the effects caused by its actions and those caused by external forces, and consequently,
fails to converge. In these types of unstable environments, there is no general theory for the
performance of Q-Learning. In general-sum games there can be multiple equilibria and thus
initial conditions can alter the long-run payoffs that an agent and others involved can earn.
Consequently, in some classes of games, many different kinds of dynamics can converge on
equilibria with low payoffs even though high payoff equilibria exist.109
108 Melo, Francisco. Convergence of Q-Learning: A Simple Proof. February 2017.
109 Kandori, M et al. Learning, mutation, and long run equilibria in games. 1993. 29.
44
The Civilization game represents an example of a game where a policy of invading offers
high immediate incentives but results in negative long-run reward while a policy of farming may
produce low rewards but leads to a positive long-run score. In a 4x4 grid world and 4 Q-Learning
agents with the following value iteration update parameters: the discount factor 𝛾 = 0.99, the
soft update parameter 𝑎 = 0.5, and the annealing discovery parameter 𝜀 = 0.1, we observe that
agents don't converge to a high payoff cooperative strategy (i.e. avoiding invasion in favor of
farming, which leads to positive long-term rewards). Rather the learning agents hardly out-
perform agents that behave purely randomly, thus invading one another regularly, and any
improvements in score are sporadic and temporary.
Figure 6: Collective scores of 4 Q-Learning agents playing on a 4x4 board versus collective
scores of 4 Random agents. Collective score sums all players' rewards earned in a 𝑏𝑖𝑛 = 2.5𝑘
game step period and divides by 𝑏𝑖𝑛 to get a time average. Error bars are the max and min values
from 𝑡𝑟𝑖𝑎𝑙𝑠 = 3 runs while the line represents the median scores.
From the Hobbesian game-theoretic perspective, Moehler succinctly summarizes this problem in
the following way:
45
If a situation of social interaction among rational individuals, who behave as if they were to
maximize their expected utility, has the form of a one-shot PD game, cooperation does not take
place, assuming common knowledge of rationality and complete information. Rational individuals
alone are not able to realize the possible gains of cooperation in a one-shot PD game. Instead, they
end up with a suboptimal outcome, both individually and collectively. To realize the (collectively)
optimal outcome, an external authority, such as the state, is needed to transform the one-shot PD
game into another game that makes mutual cooperation rational.110
In order to remedy this fundamental issue, we need to introduce additional social mechanisms
that equip Q-Learning players with means of learning and interacting with other players in the
game. Making learning agents social by implementing Hobbesian mechanisms for producing
cooperation in MAS avoids explicitly requiring either a single programmer to coordinate and
control all agents or, in the other extreme, allowing agents to behave in an unconstrained manner
and appealing to a supervisor for resolving conflicts.111 We call a learning agent with the basic
Q-learning framework, but equipped with the Hobbesian mechanisms of 1) Opponent Learning
Awareness, 2) Majoritarian Voting, and 3) Sovereign Reward-shaping, a Hobbesian Q-learner or
HQ-learner.
Opponent Learning Awareness
The three following social mechanisms introduced closely follow the Hobbesian account
of the formation of political society from the state of consistent defection that learning agents
find themselves stuck in. The low payoff equilibrium of defection is, as Hobbes would call it, a
state of war that "consists not in actual fighting, but in the known disposition thereto,"112
transitions in his view to a situation in which each player is "willing, when others are so too, as
110 Moehler, M. Why Hobbes' State of Nature is Best Modeled by an Assurance Game. 2009. 297.
111 Supra, Shoham at 232.
112 Id at XIII. 88.
46
far-forth, as for Peace, and defense of himself he shall think it necessary, to lay down this right to
all things, and be contented with so much liberty against other men, as he would allow other men
against himself."113 The problem facing an agent who would like to stop invading and being
invaded, leading to negative rewards, is that as soon as he "lays down his arms," another agent
has an incentive to invade him for short-term gain. "Rational individuals recognize, according to
Hobbes, that striking first in their struggle for life provides them with the necessary advantage to
survive in the State of Nature."114 The Hobbesian term for this phenomenon is Diffidence, or the
distrust of other player's intentions, and plays a central role in the unattainability of cooperation
for him. This is also why Moehler calls the Hobbesian State of Nature an Assurance game and
considers the primary role of the Sovereign to be one of eliminating Diffidence and
institutionalizing social trust. "In order for rational individuals to leave the State of Nature, and
in this sense to cooperate with each other, the Sovereign does not have to change the structure of
the game that rational individuals play in Hobbes' State of Nature… Instead, the Sovereign only
must assure the individuals that if they lay down their rights to everything and agree to keep their
contracts, all other individuals will do so, too. The Sovereign must only assure the individuals'
trust in one another to establish society."115
The first thing the Sovereign does is create a channel of communication that makes each
agent's intentions accessible to every other player in the game. This Opponent Learning
Awareness mechanism mitigates the mistrust and uncertainty surrounding intentions by shaping
the anticipated learning of other agents in the environment. It modifies the learning rule to
include an additional term ∆𝑡
𝑖 that accounts for the impact of agent 𝑖's learning update on the
113 Id at XIV. 92.
114 Supra, Moehler at 300.
115 Id at 311.
47
anticipated parameter update of the other agents. That term is the update from the Bellman
equation:
𝑖
𝑄𝑖(𝑠𝑡, 𝑎𝑡) ← (1 − 𝛼)𝑄𝑖(𝑠𝑡, 𝑎𝑡) + ∆𝑡
𝑖 = 𝛼(𝑟𝑡 + 𝛾 ∙ max
∆𝑡
𝑎
𝑄𝑖(𝑠𝑡+1, 𝑎𝑡))
Every time 𝑄𝑖(𝑠𝑡, 𝑎𝑡) gets updated on move 𝑚 = 𝑖, we also update every other player's Q-table
with ∆𝑡
𝑖 . If, for example, a player 𝑖 chooses to take the defer action (i.e. cooperate and enter
political society) in state 𝑠𝑡 and earns some reward 𝑟𝑡, which might be positive or negative, then
the Sovereign enables every other agent to learn by applying the same update term ∆𝑡
𝑖 in 𝑠𝑡 but
putting them "in the shoes" of player 𝑖 by adjusting the current move 𝑠𝑡,𝑚 and the invasion store
𝑠𝑡,𝑖 to reflect an alternate reality in which the other agent is the one deciding to take an action in
the state.
In other words, OLA induces a sort of "empathy" in which, on every player's turn, all
other players can "imagine" what it might be like to be in that situation and take that action, and
their proclivity towards or away from the action is adjusted in the same direction as the player
who actually does take the action. This mechanism is an internal feature of learning agents
themselves, not an adjustment in the framework of the game or social dilemma. Formally, it
modifies each player's Q-value update to adjust at every time step 𝑡 and every move 𝑚, rather
than just on its turn 𝑠𝑡,𝑚 = 𝑚 = 𝑖 for player 𝑖, and gives us the new update equation:
𝑄𝑖(𝑠𝑡
𝑖, 𝑎𝑡) ← (1 − 𝛼)𝑄𝑖(𝑠𝑡
𝑖, 𝑎𝑡) + ∆𝑡
𝑚 for 𝑖 ∈ [0, 1, … 𝑝 − 1]
Where ∆𝑡
𝑚 is the learning update for the player whose move it currently is and
𝑖 = 〈𝑆𝑊𝐴𝑃(𝑏⃑⃑
𝑠𝑡
𝑡, 𝐼𝑁𝐷𝐸𝑋(𝑏⃑⃑
𝑡, 𝑃𝑖), 𝐼𝑁𝐷𝐸𝑋(𝑏⃑⃑
𝑡, 𝑃𝑚)), 𝑆𝑊𝐴𝑃(𝑛⃑⃑𝑡, 𝑖, 𝑚𝑡), 𝑚𝑡 = 𝑖〉
𝑆𝑊𝐴𝑃(𝑣⃑, 𝑖, 𝑖′) = {𝑣⃑ 𝑡𝑒𝑚𝑝 = 𝑣𝑖, 𝑣𝑖 = 𝑣𝑖′, 𝑣𝑖′ = 𝑡𝑒𝑚𝑝}
48
is the "alternate reality" state where player 𝑖 is put in the place of player 𝑚 by swapping board
locations, invasion states, and current move.
As another consequence of this new OLA update, every player performs a Q-update
every turn, rather than as before, each player performing its update only every 𝑝 turns. With this
Hobbesian learning awareness mechanism built in, we should expect to see faster and steadier
convergence to equilibrium policies across all players by increasing the frequency of learning
and sharing those updates. It can still be the case that the equilibrium converged to may be a low
payoff one, (i.e. mutual defection) so in order to reach the high payoff equilibrium, we need a
further mechanism to ensure that the policy convergence for agents goes toward cooperation.
Majoritarian Voting
The only way to escape this State of Nature for Hobbes, is to form a political union under
a Sovereign with sufficient instruments and power to shape the policy of individual agents. To
erect this Commonwealth is "to confer all their power and strength upon one Man;" an act which
"is more than Consent, or Concord; it is a real Unity of them all." This action is "the Generation
of that great Leviathan, or rather of that Mortal God, to which we owe under the Immortal God,
our peace and defense."116 Practically, how does this political society come about? In the
Hobbesian account, after a while, agents come to recognize the frustrating predicament in which
they are stuck and, as we see in the Civilization game, rewards are consistently negative. What is
required is to offer players a vote in order for them to signal to others their desire, whether to
remain in or to escape the State of Nature. After the final tally, "if the representative consist of
many men, the voice of the greater number, must be considered as the voice of them all."117 Each
116 Supra, Leviathan at XVII. 120.
117 Id at XVI. 114.
49
agent votes to "authorize and give up my Right of Governing myself to this [Sovereign], on this
condition, that thou give up thy Right to him and authorize all his Actions in like manner."118 If a
majority of agents vote to "defer" their right to choose their own action in favor of the
Sovereign's choice, then for Hobbes, that vote is binding on all players since the threat of
preemptive invasion disappears. "In a civil state, where there is a Power set up to constrain those
that would otherwise violate their faith, that fear is no more reasonable, and for that cause, he
which by the Covenant is to perform first, is obliged so to do."119 With the Sovereign in power
through that vote, invasion becomes sine jure because the Right of Nature no longer exists, and
consequently the Sovereign enforces the social law that no player may enter another player's
territory on its turn, but rather should stay on its own property and farm it, which leads to
positive long-term payoff equilibrium. As Hobbes puts it, "the Sovereign assigns to every man a
portion according as he, and not according as any Subject or number of them, shall judge
agreeable to Equity and the Common Good."120
The Majoritarian Vote mechanism lowers the threshold of the number of agents disposed
to cooperative action to achieve system-wide cooperation and once reached, universalizes that
policy by making it binding on non-cooperative agents. Instead of allowing a single invading
player to upset the cooperative equilibrium, a simple majority vote can commit all other players
to take the "defer" action, and once players become habituated in this way to choosing to
cooperate, they learn from the reward feedback that the policy is good for them in the long run.
Formally, we adjust the Civilization Game dynamics to account for a new potential action
"defer" that, with a simple majority vote every 𝑝 turns, commits all players to taking the "defer"
118 Id at XVII. 120.
119 Id at XIV. 96.
120 Id at XXIV. 171.
50
action. The new action set is 𝑎𝑡 ∈ [𝑢𝑝, 𝑑𝑜𝑤𝑛, 𝑙𝑒𝑓𝑡, 𝑟𝑖𝑔ℎ𝑡, 𝑠𝑡𝑎𝑦, 𝑑𝑒𝑓𝑒𝑟] and we increment the
number of possible moves to 𝑚 ∈ [0, 1, … 𝑝], making move 𝑚 = 𝑝 the period where all 𝑝 agents
take the Majoritarian Vote for whether to institute the Sovereign. The Hobbesian transition
function becomes piecewise based upon the current move:
𝑇 𝐻(𝑠⃑𝑡, 𝑎⃑𝑡) = {
𝑇 𝑉𝑂𝑇𝐸(𝑠⃑𝑡, 𝑎⃑𝑡)
𝑇(𝑠⃑𝑡, 𝑎⃑𝑡)
𝑠𝑡,𝑚 = 𝑝
𝑠𝑡,𝑚 ≠ 𝑝
Where 𝑇(𝑠⃑𝑡, 𝑎⃑𝑡) is the standard transition function from the standard Q-Learning model and the
voting procedure is described by:
𝑇 𝑉𝑂𝑇𝐸(𝑠⃑𝑡, 𝑎⃑𝑡) = {
𝑠⃑𝑡
〈𝑠𝑡,𝑏, 𝑠𝑡,𝑛, 𝑠𝑡,𝑚 = 0〉
𝑉𝑂𝑇𝐸(𝑎⃑𝑡) > 𝑝/2
𝑉𝑂𝑇𝐸(𝑎⃑𝑡) ≤ 𝑝/2
The function to count votes is given by 𝑉𝑂𝑇𝐸(𝑎⃑𝑡) = ∑ [𝑎𝑡
𝑝−1
𝑖=0
𝑖 = 𝑑𝑒𝑓𝑒𝑟]
. A successful vote
simply forces each player to take the "defer" action by setting 𝐴(𝑠𝑡) = [𝑑𝑒𝑓𝑒𝑟] until the next
vote at 𝑡′ = 𝑡 + 𝑝, not moving from their current board location since 𝑇(𝑠𝑡, 𝑑𝑒𝑓𝑒𝑟) = 𝑠𝑡, and
thus changing nothing about the state except taking 𝑝 turns. A failed vote simply advances the
move to player 𝑖 = 0 but with 𝑑𝑒𝑓𝑒𝑟 ∉ 𝐴(𝑠𝑡) for all players until the next vote at 𝑡′. The reward
each player accrues by playing "defer" after a successful vote is simply the farming bonus
proportional to the amount of territory held 𝑅𝑖(𝑠⃑𝑡, 𝑑𝑒𝑓𝑒𝑟) = 𝑇𝐸𝑅𝑅𝑖(𝑠𝑡,𝑏). As long as a majority
of agents choose to defer to the Sovereign, we should see an improved convergence to
cooperation in the MAS playing the Civilization Game.
Sovereign Reward-shaping
With OLA, we have an intra-agent mechanism for modifying the way that agents learn
and share their intentions leading to faster and more stable convergence while with Majoritarian
Voting, we've introduced a modification in the game environment that pushes players towards
the high payoff equilibrium. In the Hobbesian narrative, we're halfway to the state of society:
51
individuals who are empowered to overcome their mutual Diffidence subsequently elect, by
common assent, a single authority to whom they defer their actions. What remains is to
institutionalize the behavior of this Sovereign and determine, from the Hobbesian perspective,
how it conduces to the security and benefit of political society. Famously, Hobbes believed that
the Sovereign exercised absolute power over its subjects and no policy it executed could be
considered unjust. Even so, he still held that a good Sovereign knew that its own majesty and
dominion went hand-in-hand with the flourishing of the state, for "the Nutrition of a
Commonwealth consists in the Plenty and Distribution of Materials conducing to Life."121 To
this end, this primary prerogative is committed to the Sovereign: "the Power of Rewarding with
riches, or honor; and of Punishing with corporal, or pecuniary punishment, or with ignominy
every Subject according… as he shall judge most to conduce to the encouraging of men to serve
the Commonwealth, or deterring of them from doing disservice to the same."122 The institution
of reward for players when they choose to defer to the Sovereign and penalty when they defect is
the last component in the Hobbesian political prescription and requires modifying the
Civilization Game.
In particular, after every 𝑝 turns, if the Majoritarian Vote succeeds, or 𝑉𝑂𝑇𝐸(𝑎⃑𝑡) > 𝑝/2,
then every player receives a 10 point bonus and performs a Q-update for taking the 𝑑𝑒𝑓𝑒𝑟 action
in that state. Even players who didn't vote 𝑑𝑒𝑓𝑒𝑟 still receive the bonus and perform the update
as if they had voted to cooperate. If the Vote fails, then only those players who did vote to 𝑑𝑒𝑓𝑒𝑟
receive a -10-point penalty in line with the Hobbesian and Assurance game view that those who
attempt to lay down their arms while others choose to invade, suffer terrible consequences.
Stated formally, we add a new integer component to the game state, 𝑟 ∈ [−1, 1], that represents
121 Id at XXIV. 170.
122 Id at XVIII. 126.
52
whether we should apply the Sovereign reward or penalty to players after a vote. The new game
state is then:
𝑠⃑𝑡 = 〈𝑏⃑⃑
𝑡, 𝑛⃑⃑𝑡, 𝑚𝑡, 𝑟𝑡〉
And the transition vote function 𝑇 𝑉𝑂𝑇𝐸 only is modified to reflect the new state, since it is the
only function that touches the new state component, not the overall Hobbesian transition 𝑇 𝐻 or
the standard transition 𝑇:
𝑇 𝑉𝑂𝑇𝐸(𝑠⃑𝑡, 𝑎⃑𝑡) = {
〈𝑠𝑡,𝑏, 𝑠𝑡,𝑛, 𝑠𝑡,𝑚, 𝑠𝑡,𝑟 = 1〉
〈𝑠𝑡,𝑏, 𝑠𝑡,𝑛, 𝑠𝑡,𝑚 = 0, 𝑠𝑡,𝑚 = −1〉
𝑉𝑂𝑇𝐸(𝑎⃑𝑡) > 𝑝/2
𝑉𝑂𝑇𝐸(𝑎⃑𝑡) ≤ 𝑝/2
The reward function is also adjusted to account for the Sovereign's reward/punishment
𝑅𝑖
𝑆(𝑠⃑𝑡, 𝑎⃑𝑡) function:
𝑅𝑖(𝑠⃑𝑡, 𝑎⃑𝑡) = {
𝑇𝐸𝑅𝑅𝑖(𝑠𝑡,𝑏) + 10 𝐼𝑁𝑉𝐴𝐷𝐸𝑖(𝑠𝑡,𝑏, 𝑎𝑡
𝑅𝑖
𝑆(𝑠⃑𝑡, 𝑎⃑𝑡)
𝑖 , 𝑖) − 25 𝐼𝑁𝑉𝐴𝐷𝐸𝐷𝑖(𝑠𝑡,𝑛)
𝑠𝑚 = 𝑖
𝑠𝑚 = 𝑝
0 𝑜/𝑤
Where the Sovereign reward function is given by:
𝑅𝑖
𝑆(𝑠⃑𝑡, 𝑎⃑𝑡) = {
10𝑠𝑡,𝑟
𝑎𝑡
max (10𝑠𝑡,𝑟, 0) 𝑎𝑡
𝑖 = 𝑑𝑒𝑓𝑒𝑟
𝑖 ≠ 𝑑𝑒𝑓𝑒𝑟
Finally, we utilize the same Q-update equation from OLA, but add the additional voting move
𝑚 = 𝑝 to 𝑖 ∈ [0, 1, … 𝑝] with the further Sovereign reward from 𝑅𝑝
𝑆(𝑠⃑𝑡, 𝑎⃑𝑡).
These three mechanisms, then, Opponent Learning Awareness, Majoritarian Voting, and
Sovereign Reward-shaping form the backbone for a Hobbesian strategy for overcoming
defection and entering and preserving the state of society. For Hobbes, each one is closely
related to the others in this narrative and without all of them, we theoretically lose either the
stability, speed, or direction of joint policy convergence for the MAS. Consequently, the HQ-
Learning agent proposed will be deployed experimentally with a single, comprehensive toolkit.
53
III.
Results
Q-Learning versus Hobbesian Q-Learning
Having seen the problems that independent multi-agent reinforcement learning faces in
overcoming the low payoff equilibrium to achieve the high payoff long-term cooperative policy
and shown their similarity to the ones faced in the Hobbesian State of Nature, I have proposed
that the three aforementioned political mechanisms offered by Hobbes should also be applicable
solutions in MAS. The problem of mistrust and the ever-present fear of being invaded is
mitigated by making each agent aware of its opponents' learning and using that to align all
agents' policies. The next step is to lower the barrier for system-wide joint cooperation by means
of making a majority vote for cooperative action binding on all agents in the game, thus also
teaching the disruptive players about the benefits of cooperation. Finally, reward-shaping by the
Sovereign ensures that when votes succeed, a central figure has authority to reward cooperation
and punish defection.
In order to compare the performance of simple Q-Learning and Hobbesian Q-Learning,
which is Q-Learning with the aforementioned Hobbesian mechanisms for shaping game and
learning dynamics, the Civilization Game is played with 𝑏 = 4 and 𝑝 = 4 with an invasion
bonus of 10 points and invasion penalty of -25 points as the experimental standard. The value
iteration update parameters used are the discount factor 𝛾 = 0.99, the soft update parameter 𝑎 =
0.5, and the annealing discovery parameter 𝜀𝑡 = 0.9 × 0.9999𝑡. Majoritarian Voting activates
the 𝑑𝑒𝑓𝑒𝑟 action with a strict majority 𝑉𝑂𝑇𝐸(𝑎⃑𝑡) > 𝑝/2 and the Sovereign rewards 𝑑𝑒𝑓𝑒𝑟 with
a 15 point incentive while players who get duped (i.e. vote for 𝑑𝑒𝑓𝑒𝑟 while other players decide
to defect) incur a -10 point hit.
54
Learning Curves
Figure 7: Collective rewards for all 𝑝 = 4 players every 𝑏𝑖𝑛 = 2500 steps for 𝑇 = 250𝑘 steps.
Error bars indicate the results of running the game 𝑡𝑟𝑖𝑎𝑙𝑠 = 3 times with the median line
displayed. Score is a function of 𝑇𝐸𝑅𝑅𝑖(𝑠𝑡,𝑏), 𝐼𝑁𝑉𝐴𝐷𝐸𝑖(𝑠𝑡,𝑏, 𝑎𝑡
𝑖 , 𝑖), and 𝐼𝑁𝑉𝐴𝐷𝐸𝐷𝑖(𝑠𝑡,𝑛).
The first point of comparison is the collective score earned over time. With a sample rate
of 0.01 and 𝑇 = 250𝑘 game steps, we get a bin size of 𝑏𝑖𝑛 = 2500. Collective Score earned
starting at game step 𝑡 is then defined as
𝑡+𝑏𝑖𝑛
𝑝
𝐶𝑆𝑡,𝑏𝑖𝑛
𝑎
𝐵 = ∑ ∑ 𝑟𝑖
𝑖=𝑡
𝑎=0
where 𝑟𝑖
𝑎 is the reward earned by agent 𝑎 at time 𝑖. Random play consistently incurs negative
reward and acts as the base comparison. The rewards available to Q-Learning and Hobbesian Q-
Learning are made equal even though the learning remains distinct in order to make a fair apples-
to-apples comparison. Specifically, the rewards that the Sovereign provides apply to Q-Learners
if a majority decide to take the 𝑑𝑒𝑓𝑒𝑟 action, but unlike HQ-Learning, that reward does not
cause a Q-update. As we can see from Figure 7, the scores earned by Q-Learning players every
𝑏𝑖𝑛 steps do improve over time, even jumping into positive territory a handful of times, but
55
learning is slow and sporadic as expected. For HQ-Learning, on the other hand, we see consistent
and fast convergence to the high payoff equilibrium. The reward growth demonstrated in the
learning curve is a dramatic improvement over independent reinforcement learning, but we still
want to examine the policy underlying this performance improvement.
Figure 8: Collective invasions for all 𝑝 = 4 players every 𝑏𝑖𝑛 = 2500 steps for 𝑇 = 250𝑘 steps.
Error bars indicate the results of running the game 𝑡𝑟𝑖𝑎𝑙𝑠 = 3 times with the median line
displayed. Invasions measured by tracking changes to the game state 𝑛⃑⃑𝑡.
For any compelling case of cooperation in the Civilization Game, we should see
that agents learn to stop invading one another. With the same game parameters and bin
size of 𝑏𝑖𝑛 = 2500, we see that collective invasions drop off dramatically for HQ-
Learning, converging to 0 invasions per 𝑏𝑖𝑛 steps. Collective Invasions starting at game
step 𝑡 is measured every 𝑝 turns at times 𝐸𝑡 ∈ [𝑡, 𝑡 + 𝑝, … 𝑡 + 𝑏𝑖𝑛] as
𝑝
𝐶𝐼𝑡,𝑏𝑖𝑛
𝐵 = ∑ ∑[𝑛𝑖
𝑎 = 𝑇𝑟𝑢𝑒]
𝑖∈𝐸𝑡
𝑎=0
where 𝑛𝑖
𝑎 = 𝑇𝑟𝑢𝑒 if agent 𝑎 has been invaded at time 𝑖. As expected, invasions roughly
inversely follow game score because of the invasion penalty that detracts from the score.
56
Even so, if agents are invading one another less often in HQ-Learning than standard Q-
Learning, they must be taking some other action instead.
Figure 9: Collective successful defer votes for all 𝑝 = 4 players every 𝑏𝑖𝑛 = 2500 steps for 𝑇 =
250𝑘 steps. Error bars indicate the results of running the game 𝑡𝑟𝑖𝑎𝑙𝑠 = 3 times with the median
line displayed. Successful votes measured by tracking the game state when 𝑟𝑡 = 1.
The other metric that shows that agents have learned to cooperate in the
Civilization Game is the number of successful votes where more than half of agents
choose to defer their actions to the Sovereign. Formally, collective successful defers is
measured every 𝑝 turns at time 𝐸𝑡 ∈ [𝑡, 𝑡 + 𝑝, … 𝑡 + 𝑏𝑖𝑛] by:
𝑆𝐷𝑡,𝑏𝑖𝑛
𝐵 = ∑[𝑠𝑡,𝑟 = 1]
𝑖∈𝐸𝑡
Just as in the collective score and invasions over time, Q-Learning learns to vote 𝑑𝑒𝑓𝑒𝑟
only inconsistently while HQ-Learning learns the cooperative policy stably, because of
the alignment of agent learning with OLA, and quickly, because of the Sovereign reward-
shaping. OLA is especially important here because only cooperative action by 𝑝/2 agents
at any time 𝑡 ∈ 𝐸𝑡 is needed to induce a learning step for defecting agents that increases
the Q-value of deferring at state 𝑠⃑𝑡. With more and more successful votes, defectors will
57
eventually discover that cooperating is more beneficial, even without necessarily having
taken the 𝑑𝑒𝑓𝑒𝑟 action.
Policies
Figure 10: Breakdown of actions played by Q-Learning player 𝑖 = 0 every 𝑏𝑖𝑛 = 2500 game
steps. The policy choice apparently fails to converge, with significant variance in the number of
𝑑𝑒𝑓𝑒𝑟 actions taken. Note that the 𝑠𝑡𝑎𝑦 action is only legal when the other four cardinal
directions are not.
Figure 11: Breakdown of actions played by HQ-Learning player 𝑖 = 0 every 𝑏𝑖𝑛 = 2500 game
steps. This player gradually learns the value of rejecting short-term incentives to navigate and
invade in favor of deferring to the Sovereign.
58
Lastly, to verify that the policy agents are learning is in fact to choose the
Sovereign and political society rather than pursuing their own independent actions, we
drop below the collective metrics and analyze the actions of a single agent playing the
Civilization Game, arbitrarily chosen from the 4 players. Q-Learning vacillates between
the high and low payoff equilibria as we anneal 𝜀 over time while HQ-Learning learns to
achieve the long-term cooperation policy by reliably deferring to the Sovereign.
Matrix Game Analysis
We can also perform an analysis to determine what kind of matrix game the Civilization
Game SSD would translate into by playing agents with cooperative policies against agents who
have learned to defect. As is the case for matrix games, Markov games like the Civilization
Game become social dilemmas when the payoff outcomes 𝑅, 𝑃, 𝑆 and 𝑇 defined below satisfy the
social dilemma inequalities. These outcomes are derived from:
𝑅(𝑠) ∶= 𝑉1
𝜋𝐶,𝜋𝐶
(𝑠) = 𝑉2
𝜋𝐶,𝜋𝐶
(𝑠)
𝑃(𝑠) ∶= 𝑉1
𝜋𝐷,𝜋𝐷
(𝑠) = 𝑉2
𝜋𝐷,𝜋𝐷
(𝑠)
𝑆(𝑠) ∶= 𝑉1
𝜋𝐶,𝜋𝐷
(𝑠) = 𝑉2
𝜋𝐷,𝜋𝐶
(𝑠)
𝑇(𝑠) ∶= 𝑉1
𝜋𝐷,𝜋𝐶
(𝑠) = 𝑉2
𝜋𝐶,𝜋𝐷
(𝑠)
Where 𝜋𝐶 and 𝜋𝐷are cooperative and defecting policies respectively. The long-term payoff 𝑉 for
player 𝑖 when the joint policy 𝜋⃑ = (𝜋1, 𝜋2) is followed from an initial state 𝑠0 is:
𝜋⃑⃑ (𝑠0) = Ε𝑎⃑ 𝑡∽𝜋⃑⃑ (𝑂(𝑠𝑡)), 𝑠𝑡+1∽𝑇(𝑠𝑡, 𝑎⃑ 𝑡) [∑ 𝛾𝑡 𝑟𝑖(𝑠𝑡, 𝑎 𝑡)
𝑉𝑖
]
𝑡=0
∞
with the temporal discount factor 𝛾 ∈ [0,1]. The social dilemma inequalities as previously
defined are 𝑅 > 𝑃 (mutual cooperation is preferred to mutual defection), 𝑅 > 𝑆 (mutual
59
cooperation is preferred to being exploited by a defector), 2𝑅 > 𝑇 + 𝑆 (mutual cooperation is
preferred to an equal probability of unilateral cooperation and defection), and either greed 𝑇 >
𝑅 or fear 𝑃 > 𝑆 (mutual defection is preferred over being exploited).
As discussed in the SSD section, we can define what a cooperation versus defection
policy is by thresholding a continuous social behavior metric 𝛼 ∶ Π → ℝ with values 𝛼𝑐 and 𝛼𝑑
such that 𝛼(𝜋) < 𝛼𝑐 ↔ 𝜋 ∈ Π𝐶 and 𝛼(𝜋) > 𝛼𝑑 ↔ 𝜋 ∈ Π𝐷. An obvious candidate for this
metric would be invasions per hundred moves; if we set the threshold to 𝛼𝑐 = 5 and 𝛼𝑑 = 15,
then plugging in the Q-Learning and HQ-Learning policies learned after 𝑇 = 250𝑘 steps, 𝜋𝑄 and
𝜋𝐻𝑄, we have 𝜋𝑄 ∈ Π𝐷 and 𝜋𝐻𝑄 ∈ Π𝐶. Having shown that the standard Q-Learning policy is a
defecting policy and the HQ-Learning policy is cooperative, we can now play pairs of these
policies against one another and calculate the long-term payoff 𝑉 and thus the matrix payoff
values. For example, we can find the mutual cooperation payoff 𝑅 = 𝑉0
𝜋𝐶,𝜋𝐶
(𝑠0) by playing two
HQ-Learning agents against one another. With 𝑇 = 100𝑘 game steps and the same game
dynamics and payoffs as before, we get the payoff matrix:
Figure 12: The Civilization Game SSD matrix game with long-term payoff 𝑉𝑖
𝜋⃑⃑ (𝑠0) divided by
𝑇 = 100𝑘. These values characterize the embedded MGSD within the Game.
In this run, by calculating 𝐹𝑒𝑎𝑟 = 𝑃 − 𝑆 = 0.029 and 𝐺𝑟𝑒𝑒𝑑 = 𝑇 − 𝑅 = −0.013, we see that
the Civilization Game, and, to the degree that it conceptually resembles it, the Hobbesian State of
Nature, is a Stag Hunt MGSD. However, the matrix payoffs change each trial run because of the
existence of stochasticity in the discovery parameter, 𝜀. The parameter is retained in order to
prevent play from being "stuck" in a single state-action cycle, somewhat in the spirit of the
60
trembling hand perfect equilibrium123 that also accounts for some randomness. Consequently, 15
trials are run to calculate different payoff matrices.
Figure 13: Civilization matrix game analysis with 𝑡𝑟𝑖𝑎𝑙𝑠 = 15 runs where each run consists of
three match-ups: HQL vs HQL, HQL vs QL, and QL vs QL with 𝑇 = 100𝑘 steps. The resulting
𝜋⃑⃑ (𝑠) long-term payoff values are divided by 𝑇 for scale, then used to calculate 𝐹𝑒𝑎𝑟 and 𝐺𝑟𝑒𝑒𝑑.
𝑉𝑖
The results for the greed and fear calculations differ by around 5% and two-thirds of runs end up
as Stag Hunts. The fact that almost all runs have at least some fear factor while only one-third
have a positive greed factor can be seen in the game reward structure: players are only rewarded
10 points for an invasion while being invaded incurs a -25-point penalty that is over twice as
large. In addition, the existence of alternative channels for reward (i.e. farming and deferral
bonuses) means that an invasion penalty only consists of about a third of the maximum possible
reward on a given turn.
123 Bielefeld, R. S. A Reexamination of the Perfectness Concept for Equilibrium Points in Extensive Games. 1975.
25 -- 55.
61
IV.
Conclusion
Discussion
The central goal of this thesis has been to offer a new, interdisciplinary solution to the
problems involved in producing cooperation in multi-agent reinforcement learning by looking to
the way in which humans learn to cooperate in political society in the presence of incentives to
defect. After implementing a new SSD and learning mechanisms inspired by that comparison,
we see a surprisingly large improvement in game performance and convergence to a joint
cooperative policy when compared to standard learning algorithms. Individually, there has been
theoretical work in the field of MAS proposing frameworks similar to opponent learning
awareness124, learning sharing125, reward shaping126, and voting127, but approaching the problem
from a Hobbesian perspective merges and motivates them in a way that produces real
experimental results. Specifically, the addition of an opponent learning awareness term ∆𝑡
𝑖 to
each player's Q-update helps share information about how the behavioral intentions of other
players changes and enables stable policy convergence. Secondly, the institution of a binding
majoritarian voting procedure reduces the threshold of cooperative players needed to achieve a
joint cooperative policy and thus increases the speed of convergence. Finally, when agents
successfully vote to defer their actions, the Sovereign is empowered to disburse reward and
punishment in a way that shapes the learning of defecting players.
The interdisciplinary application of solutions from Hobbesian political philosophy to the
problem of cooperation in MAS is also unprecedented. While some philosophers interested in a
computational theory of mind have seen connections to Hobbes's comment that "when a man
124 Supra, Foerster.
125 Hwang, K. S. Model Learning and Knowledge Sharing for a Multiagent System with Dyna-Q Learning. 2015.
126 Grzes, Marek. Reward Shaping in Episodic Reinforcement Learning. 2017.
127 Pitt, Jeremy. Voting in Multi-Agent Systems. 2005.
62
reasoneth, he does nothing else but conceive a sum total, from addition of parcels; or conceive a
remainder, from subtraction of one sum from another,"128 no attempt has been made to
instantiate his insights in an experimental setting. In order to motivate that application, I've also
offered a new argument that applies Hobbes's natural and moral philosophy, specifically his
materialist, determinist, morally subjectivist, rationally self-interested, individualist, and
egalitarian understanding of human nature, to artificially intelligent agents. This falls in line
with, although certainly doesn't justify, Haugeland's dramatic assertion that Hobbes was
"prophetically launching Artificial Intelligence"129 when he published Leviathan. The argument
raises questions about the degree to which AI agents and humans share the same nature and
where differences might lie. Importantly, Hobbes also emphasizes the significance of the
passions like vainglory, contempt, courage, and benevolence that don't fit neatly into existing
computational frameworks.130 This is certainly an exception to the otherwise striking
comparison, but I will note that, for Hobbes, the passions are merely components of a
psychology that is still materialist and completely determined by sense perception.
Consequently, there is theoretically no reason why they couldn't be incorporated into a learning
agent's computational decision process.
The Civilization Game SSD introduced in this thesis also offers a new blend of incentives
and punishment meant to reflect the social dynamics that exist in the State of Nature and a
unique opportunity to test Hobbes's philosophical framework. This experimental analysis
contributes to contemporary Hobbes scholarship that understands it as a Stag Hunt, otherwise
known as the Assurance Game. Moehler famously claimed that: "the situation of prudent
128 Supra, Leviathan at V.
129 Haugeland, J. Artificial intelligence: the very idea. 1985. 23.
130 Supra, Leviathan at VI.
63
individuals in Hobbes' State of Nature is best modeled by an assurance game, [because] the
highest payoff for her is not achieved by unilateral defection, as suggested by the one-shot
Prisoner's Dilemma game, but by mutual cooperation."131 Skyrms also argued that if the
shortsighted Foole were to consider the 'shadow of the future' in a repeated game, the alleged
Prisoner's Dilemma game would be transformed into an assurance game.132 Gauthier, also,
believes that the adequate long-term representation of the game that rational individuals play in
Hobbes' State of Nature is an assurance game, although he does not call the game by its name.133
Fascinatingly, however, we can see from this thesis that it isn't always or necessarily an
Assurance Game, but rather, depending on the way one adjusts the ratio between how tempting
the invasion bonus is and how painful the invasion penalty is, the game might transform into a
Prisoner's Dilemma instead.
Importantly, the matrix game analysis presented here is the first attempt, to my
knowledge, to go beyond a close exegesis of Hobbes to an SSD analysis of the game-theoretic
dynamics of the State of Nature. While scholars have studied Hobbes quantitatively via an
iterated matrix game analysis134, those investigations do not account for the fact that 1) the
complexity of implementing cooperative versus defecting policies may be unequal, 2)
successfully implementing a policy often requires solving coordination sub-problems, and 3)
cooperativeness is a gradated quantity, not an atomic choice of action. Utilizing the Civilization
Game SSD enables us to understand how agents in a realistic setting learn to choose and
implement policies, and with the help of Hobbesian mechanisms, achieve a cooperative
equilibrium.
131 Supra, Moehler at 315.
132 Supra, Skyrms at 1-13.
133 Gauthier, D. The Logic of Leviathan. 85 -- 86.
134 Palumbo, A. Playing Hobbes: The Theory of Games and Hobbesian Political Theory. 1996.
64
Future Work
This thesis illustrates the promising practical value of combining knowledge from the
fields of computer science and political philosophy in understanding the evolution of cooperation
and lays out some of the experimental groundwork to make that possible. Even so, a great deal
remains for future work. Within just the bounds of the research question considered here, there
would be great value in taking the time to implement a more state-of-the-art RL algorithm like
deep Q-networks that utilize the same theoretical framework as Q-Learning but offers scalability
to larger state spaces. This would open the door to testing more complicated games with more
players and a bigger grid-world to explore. The dynamics of an 8 player Civilization Game, for
example, may look very different from the 4 player and 2 player scenarios tested here.
There are also additional ideas in Hobbes that could be translated into promising
mechanisms, like the detailed process for deriving and enforcing binding Covenants between
different players and between players and the Sovereign. Implementing the Sovereign as a
separate agent itself instead of a component of the game environment might also allow a
researcher to analyze its interactions with other players and ask, for example, how good the
Sovereign must be at punishing defection before the MAS devolves back to the low payoff
equilibrium. Finally, varying the reward structures within the Civilization Game including the
farming bonus, invasion bonus, and invasion penalty as well as the Sovereign reward-shaping
incentives may likely result in different embedded MGSDs and consequently, different learning
behavior.
Although here the three Hobbesian political mechanisms are considered together as a
unified strategy, further MAS research may analyze the individual merits of each considered
separately. Whether individually or taken as a whole, it would also be of great interest to observe
65
the performance of modified Hobbesian Q-Learning in other popular SSDs as well like the Wolf
Pack and Gathering games from Leibo135, or especially the Stag Hunt-inspired Markov games
like Harvest and Escalation from Peysakhovich and Lerer136. We would expect to see similar
improvements in performance, especially for those games that preserve high level properties of
the Stag Hunt. The unique asynchronous turn-based dynamic of the Civilization Game might
also offer an opportunity to contrast experimentally considerations of player memory length and
complexity cost required to compute equilibria versus in the standard synchronous model. 137
Generally, my hope is to encourage research in the field of AI or MAS to look beyond traditional
methodologies and search out interdisciplinary solutions, even in fields as unconventional as
political philosophy, to interdisciplinary problems.
Likewise, scholars of Hobbes, in line with his thoroughly empirical method, have at their
disposal a powerful new experimental tool that models the State of Nature in many important
respects, although admittedly simplified in others, and deploys Hobbesian, intelligent agents to
play that game. By varying the incentive structure in the Civilization Game, we can see how
varying certain underlying assumptions that Hobbes makes might affect his political conclusions.
I have already shown that increasing the invasion bonus / invasion penalty ratio transforms the
embedded MGSD in the Civilization Game from an Assurance game to a Prisoner's Dilemma.
Further research might also examine the consequences of reducing the effectiveness of the
Sovereign by either reducing the size of the reward or punishment or by making it apply only
once every 𝑛 times and observing whether agents still learn to cooperate. The results of such an
experiment might inform our perspective on Hobbes's infamous position that life under a
135 Supra, Leibo et al.
136 Supra, Peysakhovich et al.
137 Bhaskar, V. Asynchronous Choice and Markov Equilibria. 1998. 1.
66
Sovereign, no matter how harsh, is always better than life in the State of Nature. This thesis also
offers the first argument for the applicability of Hobbes's natural and moral philosophy to
modern computational artificial intelligence. The obvious exception that has been highlighted is
the role of the passions in directing human action that finds no direct corollary in mechanical RL.
That being said, in Hobbes's mechanistic materialist psychology, there should almost certainly
exist a way to mechanize the passions in his account in a way that makes them feasible to model
or implement in computers.
In conclusion, it's clear that the evolution of cooperation is a fascinating and difficult
problem of great practical importance for both humans and AI. Hobbes's own answer profoundly
influenced the way in which humans organize our modern, liberal societies, and the solutions we
develop to enable cooperation amongst artificially intelligent agents will similarly affect what
technology in the 21st century will look like and how it will interface with us. There is good
reason to be optimistic about a near future in which humans and computers work hand-in-hand to
solve the biggest challenges we face, and my hope is that the work presented here might
represent a small contribution to that larger project.
67
Works Cited
Ale, S. B., Brown, J. S., & Sullivan, A. T. (2013). Evolution of cooperation: combining kin
selection and reciprocal altruism into matrix games with social dilemmas. PloS one, 8(5),
e63761.
Aristotle. Aristotle's Politics. Oxford :Clarendon Press.
Arulkumaran, K., Deisenroth, M. P., Brundage, M., & Bharath, A. A. (2017). A brief survey of
deep reinforcement learning. arXiv preprint arXiv:1708.05866.
Aubrey, J., & Dick, O. L. (1949). Brief lives (p. 157). London: Secker and Warburg.
Augustine, S. (2008). The city of God. Hendrickson Publishers.
Beckers, R., Holland, O. E. and Deneubourg J_L (1994). "From Local Actions to Global Tasks:
Stigmergy in Collective Robotics," in R. Brooks and P. Maes eds. Artificial Life IV,
Cambridge, Mass.: MIT Press.
Bhaskar, V., & Vega-Redondo, F. (2002). Asynchronous choice and Markov equilibria. Journal
of Economic Theory, 103(2), 334-350.
Bielefeld, R. S. (1988). Reexamination of the perfectness concept for equilibrium points in
extensive games. In Models of Strategic Rationality (pp. 1-31). Springer, Dordrecht.
Broom, M., Cannings, C., & Vickers, G. T. (1997). Multi-player matrix games. Bulletin of
mathematical biology, 59(5), 931-952.
Calo, R. (2017). Artificial Intelligence policy: a primer and roadmap. UCDL Rev., 51, 399.
Chamberlin, E. H. (1949). Theory of monopolistic competition: A re-orientation of the theory of
value. Oxford University Press, London.
Chantemargue, F., Lerena, P., & Courant, M. (1999, July). Autonomy-based multi-agent
systems: statistical issues. In Proceedings of Third World Multiconference of Systemics,
68
Cybernetics and Informatics (SCI'99) Fifth International Conference of Information
Systems Analysis and Synthesis (ISAS'99).
Curtis Eaton, B. (2004). The elementary economics of social dilemmas. Canadian Journal of
Economics/Revue canadienne d'économique, 37(4), 805-829.
De Tocqueville, A. (2003). Democracy in America (Vol. 10). Regnery Publishing.
Doran, J. E., Franklin, S. R. J. N., Jennings, N. R., & Norman, T. J. (1997). On cooperation in
multi-agent systems. The Knowledge Engineering Review, 12(3), 309-314.
Ferber, J., & Weiss, G. (1999). Multi-agent systems: an introduction to distributed artificial
intelligence (Vol. 1). Reading: Addison-Wesley.
Foerster, J., Chen, R. Y., Al-Shedivat, M., Whiteson, S., Abbeel, P., & Mordatch, I. (2018, July).
Learning with opponent-learning awareness. In Proceedings of the 17th International
Conference on Autonomous Agents and MultiAgent Systems (pp. 122-130). International
Foundation for Autonomous Agents and Multiagent Systems.
Forrest, S. (1990). Emergent computation: self-organizing, collective, and cooperative
phenomena in natural and artificial computing networks: introduction to the proceedings
of the ninth annual CNLS conference. Physica D: Nonlinear Phenomena, 42(1-3), 1-11.
Franklin, S., & Graesser, A. (1996, August). Is it an Agent, or just a Program?: A Taxonomy for
Autonomous Agents. In International Workshop on Agent Theories, Architectures, and
Languages (pp. 21-35). Springer, Berlin, Heidelberg.
Fudenberg, D., Drew, F., Levine, D. K., & Levine, D. K. (1998). The theory of learning in games
(Vol. 2). MIT press.
Galbraith, J. (1956). American capitalism : The concept of countervailing power (Sentry edition ;
18). Boston: Houghton Mifflin Company.
69
Gauthier, D. (1977). The social contract as ideology. Philosophy & Public Affairs, 130-164.
Gauthier, D. P. (1969). The logic of Leviathan: the moral and political theory of Thomas
Hobbes. Oxford University Press.
Grosz, B. J. (2013, May). A multi-agent systems Turing challenge. In Proceedings of the 2013
international conference on Autonomous agents and multi-agent systems(pp. 3-4).
International Foundation for Autonomous Agents and Multiagent Systems.
Groves, T. (1973). Incentives in teams. Econometrica, 41(4), 617-631.
Grześ, M. (2017, May). Reward shaping in episodic reinforcement learning. In Proceedings of
the 16th Conference on Autonomous Agents and MultiAgent Systems (pp. 565-573).
International Foundation for Autonomous Agents and Multiagent Systems.
Hamilton, A., Madison, J., & Jay, J. (2008). The federalist papers. Oxford University Press.
Hamilton, J. (2009). Hobbes the royalist, Hobbes the republican. History of Political Thought,
30(3), 411-454.
Hampton, J. (1988). Hobbes and the social contract tradition. Cambridge University Press.
Haugeland, J. (1989). Artificial intelligence: The very idea. MIT press.
Hobbes, T. (1991). Man and Citizen: De homine and De cive. Hackett Publishing.
Hobbes, T. (1996). Leviathan. Richard Tuck, ed. Cambridge, Cambridge UP, 87.
Hobbes, T. (2013). Elements of law, natural and political. Routledge.
Hont, I., Kapossy, B., & Sonenscher, M. (2015). Politics in commercial society : Jean-Jacques
Rousseau and Adam Smith. Cambridge, Massachusetts: Harvard University Press.
Hume, D. (2003). A treatise of human nature. Courier Corporation.
70
Hwang, K. S., Jiang, W. C., & Chen, Y. J. (2015). Model learning and knowledge sharing for a
multiagent system with Dyna-Q learning. IEEE transactions on cybernetics, 45(5), 978-
990.
Kandori, M., Mailath, G. J., & Rob, R. (1993). Learning, mutation, and long run equilibria in
games. Econometrica: Journal of the Econometric Society, 29-56.
Kleiman-Weiner, M., Ho, M. K., Austerweil, J. L., Littman, M. L., & Tenenbaum, J. B. (2016,
January). Coordinate to cooperate or compete: abstract goals and joint intentions in social
interaction. In CogSci.
Kleiman-Weiner, M., Saxe, R., & Tenenbaum, J. B. (2017). Learning a commonsense moral
theory. cognition, 167, 107-123.
Kollock, P. (1998). Social dilemmas: The anatomy of cooperation. Annual review of sociology,
24(1), 183-214.
Leibo, J. Z., Zambaldi, V., Lanctot, M., Marecki, J., & Graepel, T. (2017, May). Multi-agent
reinforcement learning in sequential social dilemmas. In Proceedings of the 16th
Conference on Autonomous Agents and MultiAgent Systems (pp. 464-473). International
Foundation for Autonomous Agents and Multiagent Systems.
Loetscher, F. W. (1935). St. Augustine's conception of the state. Church History, 4(1), 16-42.
Macpherson, C. B., & Cunningham, F. (1962). The political theory of possessive individualism:
Hobbes to Locke (p. 331145263). Oxford: Clarendon Press.
Macy, M. W., & Flache, A. (2002). Learning dynamics in social dilemmas. Proceedings of the
National Academy of Sciences, 99(suppl 3), 7229-7236.
71
Mao, A., Parkes, D. C., Procaccia, A. D., & Zhang, H. (2011, August). Human computation and
multiagent systems: an algorithmic perspective. In Proceedings of the twenty-fifth AAAI
conference on artificial intelligence.
Melo, F. S. (2001). Convergence of Q-learning: A simple proof. Institute Of Systems and
Robotics, Tech. Rep, 1-4.
Mnih, V., Kavukcuoglu, K., Silver, D., Graves, A., Antonoglou, I., Wierstra, D., & Riedmiller,
M. (2013). Playing atari with deep reinforcement learning. arXiv preprint
arXiv:1312.5602.
Moehler, M. (2009). Why Hobbes' state of nature is best modeled by an assurance game. Utilitas,
21(3), 297-326.
Nwana, H. S., & Ndumu, D. T. (1999). A perspective on software agents research. The
Knowledge Engineering Review, 14(2), 125-142.
Olson, M. (2009). The logic of collective action (Vol. 124). Harvard University Press.
Ossowski, S., & García-Serrano, A. (1997, December). Social co-ordination among autonomous
problem-solving agents. In Australian Workshop on Distributed Artificial
Intelligence (pp. 134-148). Springer, Berlin, Heidelberg.
Ostrom, E. (1990). Governing the commons : The evolution of institutions for collective action
(Political economy of institutions and decisions). Cambridge ; New York: Cambridge
University Press.
Pakaluk, Michael. (2005). Aristotle's Nicomachean Ethics (Cambridge introductions to key
philosophical texts). Cambridge University Press - M.U.A.
Palumbo, A. (1996). Playing Hobbes. The Theory of Games and Hobbesian Political Theory.
72
Pitt, J., Kamara, L., Sergot, M., & Artikis, A. (2006). Voting in multi-agent systems. The
Computer Journal, 49(2), 156-170.
Przeworski, A. (1985). Capitalism and social democracy (Studies in Marxism and social theory).
Cambridge ; New York : Paris: Cambridge University Press ; Editions de la Maison des
sciences de l'homme.
Rapoport, A. (1974). Prisoner's Dilemma -- Recollections and observations. In Game Theory as a
Theory of a Conflict Resolution (pp. 17-34). Springer, Dordrecht.
Rousseau, J. J. (1984). A discourse on inequality. Penguin.
Schultz, W., Dayan, P., & Montague, P. R. (1997). A neural substrate of prediction and reward.
Science, 275(5306), 1593-1599.
Schumacher, M. (2001). Objective coordination in multi-agent system engineering: design and
implementation. Springer-Verlag.
Shoham, Y., & Tennenholtz, M. (1995). On social laws for artificial agent societies: off-line
design. Artificial intelligence, 73(1-2), 231-252.
Silver, D., Schrittwieser, J., Simonyan, K., Antonoglou, I., Huang, A., Guez, A., ... & Chen, Y.
(2017). Mastering the game of go without human knowledge. Nature, 550(7676), 354.
Skyrms, B. (2004). The stag hunt and the evolution of social structure. Cambridge University
Press.
Strauss, L. (2017). What is political philosophy?. In Plato and Modern Law (pp. 71-96).
Routledge.
Sutton, R. S., & Barto, A. G. (2018). Reinforcement learning: An introduction. MIT press.
Thorndike, E. L. (1911). Animal intelligence: Experimental studies. Macmillan.
73
Turing, A. M. (1937). On computable numbers, with an application to the
Entscheidungsproblem. Proceedings of the London mathematical society, 2(1), 230-265.
Weizenbaum, J. (1976). Computer power and human reason: From judgment to calculation.
74
|
1109.0601 | 1 | 1109 | 2011-09-03T07:43:09 | Application of distributed constraint satisfaction problem to the agent-based planning in manufacturing systems | [
"cs.MA"
] | Nowadays, a globalization of national markets requires developing flexible and demand-driven production systems. Agent-based technology, being distributed, flexible and autonomous is expected to provide a short-time reaction to disturbances and sudden changes of environment and allows satisfying the mentioned requirements. The distributed constraint satisfaction approach underlying the suggested method is described by a modified Petri network providing both the conceptual notions and main details of implementation. | cs.MA | cs | Application of distributed constraint satisfaction problem
to the agent-based planning in manufacturing systems
S. Kornienko, O. Kornienko, P. Levi
Institute of Parallel and Distributed High-Performance Systems,
University of Stuttgart, Universitatsstr. 38, 70569 Stuttgart, Germany. ∗
1
1
0
2
p
e
S
3
]
A
M
.
s
c
[
1
v
1
0
6
0
.
9
0
1
1
:
v
i
X
r
a
Abstract
Nowadays, a globalization of national markets re-
quires developing flexible and demand-driven pro-
duction systems. Agent-based technology, being
distributed, flexible and autonomous is expected to
provide a short-time reaction to disturbances and
sudden changes of environment and allows satis-
fying the mentioned requirements. The distributed
constraint satisfaction approach underlying the sug-
gested method is described by a modified Petri net-
work providing both the conceptual notions and
main details of implementation.
1 Introduction
An internationalization of market outlets, an individualiza-
tion of consumer needs, a rapid implementation of technical
innovation become a key factor of success in modern eco-
nomic market. In order to survive in international competi-
tion, enterprises are forced to react dynamically to new re-
quirements, to make permanent modifications and adaptation
of own structures.
In particular this concerns the planning
processes.
A planning in manufacturing systems is traditionally orga-
nized top-down. The strategical level of planning transmits
the results to the tactical level, which in turn triggers the op-
erational level of planning process. The final result of the
planning process is a detailed schedule of manufacturing to
be implemented on the shop floor. Every encountered dis-
turbance, unforeseen in the schedule, triggers a new planning
cycle. Efforts, costs and time required for replanning can be
essentially reduced by making the planning process adaptive
to disturbances. In this way a modern flexible manufactur-
ing requires a new approach that introduces elements of self-
organization into operational control. Taking into account a
spatial distribution of manufacturing elements and require-
ment of flexibility to the whole system, the concept of au-
tonomous agents has found some applications in this field [1].
This approach seems to be very promising to guarantee the re-
quired robustness, fault tolerance, adaptability and agility in
the field of transformable manufacturing systems.
Application of agents to manufacturing requires also a
development of new and adaptation of known approaches
∗Post-Proceeding Version 2004. Appeared in proceedings of
the International Scientific Congress "Intelligent Systems (IEEE
AIS'03)" and "Intelligent CAD's (CAD-2003)", p.124-140, Di-
vnomorsk, Russia, 2003
towards typical problems of multi-agents technology, like
distributed problem solving, planning or collective decision
making [2]. This paper deals with the distributed constraint-
based short-term planning (assignment) process supported by
an multi-agent system (MAS).
2 Assignment problem
The assignment problem is often encountered in manufactur-
ing, it is a part of Operations Research / Management Sci-
ence (OR/MS). It can be classified into scheduling, resources
allocation and planning of operations order (e.g. [3]). This
is a classical N P -hard problem, there are known solutions
by self-organization [4; 5], combinatorial optimization [6],
evolutionary approaches [7], constraint satisfaction and opti-
mization [8], discrete dynamic programming [9]. However
these methods are developed as central planning approaches,
the distributed or multi-agents planning for the assignment
problem is in fact not researched (overview e.g. in [10]).
Generally, this problem consists in assigning a lot of low-
level jobs (like "to produce one piece with defined specifica-
tion") to available machines so that all restrictions will be sat-
isfied. The solution consists of four steps. The first step is to
prove whether the machine is technological able to manufac-
ture, whereas the second step is to prove whether the machine
is organizational available, e.g. it is without prearrangements.
The first two steps formalize the constraint problem, where
the following criteria should be taken into account [11]:
• Technical criteria determine necessary features of a
piece and on this basis it can be decided whether a ma-
chine is able to manufacture this kind of feature e.g. the
drilling feature.
• Technological criteria determine whether the machine
can operate with a necessary quality or determine a tech-
nologically necessary order, e.g.
the statutory toler-
ances.
• Geometrical criteria result from a geometrical descrip-
tion of the workpiece, e.g. whether a necessary chucking
is possible.
• Organizational criteria are a set of specifications of pro-
duction orders and machines. Firstly, it defines whether
a machine has an available time slot and, secondly,
whether this time slot is suitable to manufacture the
given production order.
• Optimization criteria like a cost or delivery time.
All these criteria determine the agent-based process plan-
ning in the form of corresponding constraints, which reduce
the decisions space in the assignment problem. The third
and fourth steps of solution are the distributed constraint-
satisfaction problem (CSP) and composition/optimization
(COP) correspondingly. In the considered example it needs
to manufacture a multitude of parts and variants of produc-
tion orders. Totalling there are different types of workpieces
(5-20 pieces of each type, see Fig. 1) that have to be manu-
Figure 1: Example of a workpiece to be manufactured.
factured on available machines. Table 1 shows an exemplary
sequence of working steps, where all mentioned technologi-
cal constraints are already considered.
WS L/M 1 L/M 2 L/M 3 Order
1
2
3
4
5
6
7
8
9
10
11
1
2
1
3
0
2
1
3
2
0
1
1
2
0
3
1
2
0
3
2
1
1
1
2
2
2
2
2
3
4
4
4
4
0
0
1
0
1
2
1
0
0
1
1
Table 1: Technological table for a workpiece, WS - working step,
L/M - length/machine. Zero in a length (of a working step) at cor-
responding machine means that this machine cannot perform the re-
quested operation. Order of working steps means, that e.g. the steps
2,3,4,5,6 should be produced after the step 1 and before the step 7.
It is natural to assume these steps cannot be performed at the same
time on different machines.
Processing of each workpiece consists of several working
steps (defined by a technological process), all these working
steps cannot be processed on one machine. Each from the
working steps has different length and also cost. Moreover
each type of the pieces has own technology, i.e. a processing
consists of different working steps. For simplification it is as-
sumed that available machines are of the same type, therefore
the cost and length of the same working step do not differ on
these machines (in general case they are different). The aim
is to generate a plan of how to manufacture these workpieces
Let us denote a working step as W Si
with minimal cost, minimal time (or other optimization crite-
ria), taking into account restrictions summarized in Table 1.
j, where i is a type of
workpieces and j a number of the working step, an available
machine is denoted as Mk, where k is a number of machine.
We need also to introduce a piece P m
n , where m is a priority
of production and n is a number of this piece. In this way
j)) denote a start and a final po-
st(P m
sitions of the corresponding working step that belongs to the
corresponding piece (st(W Si
j) for all pieces). We
start with the definition of these values
n∈[1−20] (W Si∈{A,B,C,D,E}
P m∈[1−20]
j), f n(W Si
) = o ∈ operation,
j)), f n(P m
j∈[1,...,11]
n (W Si
n (W Si
Mk∈{1,2,3,4} = {o ∈ operation},
st(P m
f n(P m
j)) = {t ≥ 0, t ∈ R},
j)) = {st(P m
n (W Si
n (W Si
n (W Si
j)) +
n (W Si
n (W Si
+ length(P m
j), o2 ∈ Mk, o1 = o2}.
j))}.
The first constraint determines a correspondence between op-
erations of working step and of the k-machine
C1 = {(o1, o2)o1 ∈ P m
The technological restrictions given by the Table 1 can be
rewritten in the following form
C2 = {(f n(W SA
j × W SA
j },
j },
j × W SA
C3 = {(f n(W SA
C4 = {(f n(W SA
j × W SA
j },
[2−6] (for all pieces) cannot be performed at the
where W SA
same time
C5 = {(j ∈ [st(W SA
[2−6])) ⊂ W SA
[7])) ⊂ W SA
[8−11])) ⊂ W SA
[1]) < st(W SA
[2−6]) < st(W SA
[7]) < st(W SA
[w]), ..., f n(W SA
(cid:54)= j ∈ [st(W SA
⊂ W SA
[8−11]
j × W SA
and also W SA
C6 = {(j ∈ [st(W SA
(cid:54)= j ∈ [st(W SA
⊂ W SA
j × W SA
[w])] (cid:54)=
[w(cid:48)])]) ⊂
[w(cid:48)]), ..., f n(W SA
j ; w, w(cid:48) = 2, 3, 4, 5, 6; w (cid:54)= w(cid:48)}
[w])] (cid:54)=
[w(cid:48)])])
[w]), ..., f n(W SA
[w(cid:48)]), ..., f n(W SA
j ; w, w(cid:48) = 8, 9, 10, 11; w (cid:54)= w(cid:48)}.
C7 = {(m ∈ P m
Priority of production can be expressed by
n(cid:48) st(P m
n × P m
n > m ∈ P m
j ))) ⊂ P m
> st(P m
n(cid:48) (W SA
n (W SA
j )) >
n , n (cid:54)= n(cid:48)}.
As soon as the variable, the domains of values and constraints
are defined, a propagation approach can be started. The aim
is to restrict the values of variables (or to find such values of
variables) that will satisfy all constraints. This propagation
can be represented in the way shown in Fig. 2.
All working steps that belong to the same workpiece build
a sequence. Every node in this sequence gets a "finish"-
position of a working step from the previous node. Using this
value, a current node looks for "start"-positions of the next
working step that satisfy local constraints, calculates "finish"-
positions and propagates them to the next node. If no position
satisfying local constraint can be found, the node requests an-
other "finish"-position from the previous node. In this way
the network can determine locally consistent positions of all
working steps. After that the obtained values should be tested
for a global consistence.
key problem of multi-agent technology. On the one hand
if the system is hard restricted in the behaviour, the advan-
tage of MAS is lost. On the other hand, if the system has
too many degrees of freedom it can communicate an in-
finitely long time. In other words only several combinations
of agents states have a sense and the point is how to achieve
and to manage these states. This is a hard problem arising in
many branches of science and engineering and correspond-
ingly there are several ways to solve it. The suggested here
solution is based on a hierarchic software architecture that
supports agent's autonomy.
Before starting to describe an approach, it needs to men-
tion one methodological point concerning decentralization of
multi-agent system, shown in Fig. 3. The MAS solves a prob-
Figure 3: Methodological approach towards agent-based applica-
tions.
lem by using some methodological basis. For example the
CSP and COP approaches basically underlie the solution of
constraint problems. The point is that a methodological ba-
sis, in almost all cases, is formulated in a centralized way.
It looks like a "battle plan", where all agents and their inter-
actions are shown. Therefore this global description is often
denoted an interaction pattern.
However the agents do not possess such a global point of
view and the interaction pattern has to be distributed among
agents. This decentralization concerns global information,
messages transfer, synchronization, decision making and so
on. The decentralized description of the chosen method
should determine an individual activity of an agent as well
as its interaction with other agents. It is also important that
all agents behave in ordered way, i.e. to include cooperation
mechanisms (protocols) into this distributed description [13].
In order to enable a transition from the interaction pattern to
the cooperation protocol (see Fig. 3) a notion of a role is in-
troduced [14]. A role is associated with a specific activity
needed to be performed (according to a methodological ba-
sis). Agent can "play" one role or a sequence of roles. In this
way interactions are primarily determined between roles, an
agent (with corresponding abilities) handles according to the
role playing at the moment. An advantage of this approach is
that the centralized description (familiar for human thinking)
is preserved whereas the roles in the interaction pattern are "in
fact" already distributed, i.e. a mapping "agent-on-role" may
be performed in a formalized way by a program. Thus, an in-
Figure 2: Constraint network for the assignment problem.
3 Application of the autonomous agents
The CSP approach described in the previous section is nec-
essary and sufficient in solving the discussed kind of assign-
ment problem. Being implemented by one of programming
techniques, it will generate the required plan. However work-
ing in a presence of disturbances (like machine failure, tech-
nological change and so on) requires additional efforts to
adapt the planning approach to these changes. The princi-
ples of such an adaptation are not contained in the plan it-
self, an additional mechanism is needed. As mentioned in the
introduction, the multi-agent concept can be used as such a
mechanism that lends to manufacturing system more flexibil-
ity to adapt to disturbances. But what is the cause and cost
of this additional feature ? There is a long discussion of this
point based e.g. on the decentralization (e.g. [12]) or several
dynamics properties of MAS (e.g in [1]). We would like to
add the following argument into this discussion.
The multi-agent system can be considered from a view-
point of theory of finite-state automata. Transition of m-states
automaton (with or without memory, it does not change the
matter) from one state to another is determined by some rules
(by a program), therefore the automaton behaves in com-
pletely deterministic way. If a control cycle is closed (see e.g.
[1]) the automaton is autonomous, i.e. behaves independently
of environment (other automata). Now consider a few such
automata coupled into a system in the way that keeps their
autonomy. Forasmuch as each automaton behaves according
to own rules, there is no a central program that determines
a states transition of the whole system. In the "worst case"
coupling n automatons with m states, the coupled system can
demonstrate nm states.
Evidently this "worst case" has never to arise in the system,
but how to control a behaviour of the distributed system with-
out a central program (without a centralized mediator) ? The
point is that all automata are continuously communicating in
order to synchronize own states in regard to environment, to
the solving task, etc. (in this case the notion of an automaton
is replaced by the notion of an agent). The agents during com-
munication "consider" all possible states and then "choose"
such a state that is the most suitable to a currently solving
problem. This is a main difference to the "centralized pro-
gramming" approach. The central program can react only in
such a way that was preprogrammed. For example 10 agents
with 10 states can demonstrate 1010 different combinations.
However no programmer is able to predict all situations to
use all these states. Thus, the "centralized programming" ap-
proach restricts the multi-agent system although there are es-
sentially more abilities to react.
The sufficient number of degrees of freedom represents a
oped. Using this approach, the roles executed by agents are
described in a formal way by the Perti network. Details of the
RoPE system as well as description of cooperations protocols
in [11], [17]. As al-
via Perti networks can be found e.g.
ready mentioned, the primary algorithm consists of two parts,
parameterization and propagation, that represent a linear se-
quence of activities. The parameterization part, shown in
Fig. 4 has three phases p0, p1, p2 whose main result consists
Figure 4: Primary algorithm: Parameterization part.
in determining a structure, neighbourhood relations and pa-
rameterization of nodes of the constraint network. The roles
γ0, γ1 are "Initializers" of WS-order and WS-nodes corre-
spondingly. The role γ0 is activated by the first production
order, this role reads resource-objects and determines how
much nodes (WS-roles) are required. The transition t0 proves
whether the result of j.returnEN D() is true (action is suc-
cessful) and activates γ1 with parameter n as a number of
required nodes. The γ1 initializes each node according to
all restrictions (technology, propagation rules, number of ma-
chines and so on). If this activity is also successful (transition
t1), the third role γ2 is activated. It connects the created nodes
(return a pointer to previous node), composing in this way a
network. This interaction plan is finished (transition t3) if
there exists no next node needed to be connected.
The propagation part, shown in Fig. 5, consists of three
teraction pattern is a "mosaic image" that from afar looks like
a common picture (method), but at a short distance is a set of
separate fragments (roles). Moreover a concept of roles al-
lows decoupling the structure of cooperation processes from
agents organization, so that any modification of agents does
not affect the cooperation process and vice versa [14].
The interaction pattern determines a primary activity (pri-
mary algorithm) of multi-agent system [15]. The primary al-
gorithm includes also some parameters whose modifications
can be commonly associated with disturbances. Variation of
these parameters does not disturb an activity of agents.
In
this case these are the expected disturbances, a reaction of the
system on them is incorporated into the primary algorithm.
However due to specific disturbances every agent can reach
such a state that is not described by a primary algorithm and
where a performing of the next step is not possible. In this
case the agent is in emergency state and tries to resolve the
arisen situation all alone or with an assistance of neighbour
agents (secondary activity). If the abilities of an agent are not
sufficient or it requires additional resources it calls a rescue
agent. The rescue agent is an agent that possesses specific
(usually hardware) abilities. Anyway, the aim of agents in
emergency state is to change a part of the primary algorithm
so that to adapt it to disturbances. The disturbances causing
local emergency are expected (predicted) but not introduced
into the primary algorithm.
The primary algorithm as well as its parameterization
is optimal only for specific conditions (e.g.
combinato-
rial/heuristic methods for solutions of combinatorial prob-
lems, CSP/COP for constraints, etc.). If disturbances change
these conditions the primary algorithm became non optimal
and it has no sense to repair it. All agents have collectively
to recognize such a global change and to make a collective
decision towards replacement of the primary algorithm. This
change corresponds to a global emergency. The disturbances
causing the global emergency are not expected (predicted),
however they influence the conditions of primary algorithms
and in this way can be recognized. Finally, there are such
disturbances that cannot be absorbed by any changing of an
algorithm, they remain irresolvable. Forasmuch as all these
points cannot be considered in details in the framework of the
paper, we restrict ourselves only by treating the mentioned
primary algorithm in the language of cooperative processes
by the modified Petri nets. The secondary activity as well as
emergency states and rescue agents are not considered here.
3.1 The primary algorithms
In the case of an assignment planning, the primary algorithm
is determined by the CSP approach described in Sec. 2 (gen-
erally usage of constraint-based approaches for MAS is not
new, see e.g. [16]). Each working step in the approach is rep-
resented by a node in the constraint network shown in Fig. 2.
These nodes are separated from one another, moreover their
behaviour is determined by propagations. Therefore it is nat-
ural to give a separate role (R) to each node. However, before
starting a propagation, this network has to be created and pa-
rameterized by technology, machines, number of workpieces
and so on. These two steps (parameterization and propaga-
tion) will be described by interaction patterns using corre-
sponding roles.
For description of agent's activities the RoPE (Role ori-
ented Programming Environment) methodology is devel-
Figure 5: Primary algorithm: Propagation part.
blocks:
local (the phases p3, p4, p5), global (the phase p6)
propagations and an activity (the phase p7) in the case of
empty sets. The roles γ3, γ5 determine the propagation in
the first and last nodes whereas γ4 does the same for all other
nodes. The transition t7 proves whether the local propaga-
tion was successful for all nodes and activates then the global
propagation in γ6. We emphasize the local propagation re-
quires a sequential executing of roles whereas in global prop-
agation all roles can be in parallel executed. Finally, the tran-
sition t9 proves whether the values set (WS-positions) of each
node is empty. In the case of empty sets the role γ7 tries to in-
crease initial areas of values, first locally in neighbour nodes,
then globally by restart of the local propagation.
Thus, agents, executing the roles described in the param-
eterization and propagation parts, "know how to solve" the
CSP problem. Therefore all disturbances associated with a
change of resources and constraints can be absorbed by a
change of parameters in the interaction patterns. In this way
the MAS has enough degrees of freedom to be adaptive to
disturbances in a framework of the primary algorithm.
4 Agent-based optimization
The steps described in the previous sections allow generat-
ing the sequence of working steps that satisfies all local con-
straints. However such global characteristics of a plan as cost,
manufacturing time and so on are not considered. Therefore,
as pointed out by some authors, the next step consists in op-
timizing the obtained sequences. Generally speaking, con-
straint satisfaction and optimization cannot be separated into
two different steps, rather, it represents a sui generis combina-
tion. Before to start a discussion of agent-based optimization
it needed to mention two features of such an approach.
The first feature of agent-based optimization consists in a
local character of used data. Combinatorial or heuristic ap-
proaches assume the data, required to be optimized, are glob-
ally available. Optimization in this case looks like a "chess
play" where all pieces are visible and it needs to find some
combination of pieces positions. In the multi-agent variation
there is no this central viewpoint, each agent makes only a lo-
cal decision about to occupy a positions or not (see Fig. 6). In
this way the agent performs optimization of local decisions
instead of global positions of the working steps. Moreover,
from agents viewpoint, any of their decisions has not foresee-
able perspectives for a global optimum.
guarantee a global optimum. Therefore the agent has to com-
pute what will happen if the next processing step will begin
not immediately after the previous step. It can be achieved
by shifting a manufacturing of a workpiece on some steps
that increase a local cost of a plan (e.g. intermediate storage)
but reduce global costs (see Figs. 7, 8). This approach (fore-
casting) is similar to a decision tree in distributed form. As
known, an increasing of the depth of tree rapidly increases the
search space.
After discussing the features of agents-based optimization,
one can focus on the problem of assignment plan. There are
two important steps, that the optimization needs to be per-
formed on. Firstly, an order of the working steps in the group
2 and 4 (see Fig. 2). Forasmuch as there are only 2881 com-
bination between W S1-W S11, this optimization step can be
performed by exhaustive search. The second point of opti-
mization concerns the local decisions (concerning machine
and position) made by agents. However search space (taking
into account the forecasting effect) grows in this case expo-
nentially and e.g. even for 22 agent (2 production workpieces,
forecast for next 5 positions) comes to ∼ 1010. Therefore
exhaustive search methods like constraints optimization are
inefficient even on very fast computer. The search space can
be essentially reduced if to take into account the following
observation.
(a)
(c)
(b)
(d)
Figure 6: Example of the plan making for the minimal time and
minimal transportation cost. There are three pieces to be manufac-
tured (P1 grey, P2 white, P3 black) with three working steps (with
length 1, 2, 1). The W S2 cannot be processed on M2. (a) Deci-
sions W S2(P3) → M1 in position 5, W S3(P2) → M3 in position
4; (b) Decisions W S2(P3) → M3 in position 4, W S3(P2) → M2
in position 4; (c) Final plan of (a); (d) Final plan of (b).
The second feature of agent-based optimization is caused
by the local nature of optimization problem. Each agent dur-
ing the CSP phase tries to occupy a position immediately after
the previous working step. This strategy is motivated from the
manufacturing side in trying to avoid a waiting time at pro-
cessing elements (machines). Evidently, this strategy cannot
Figure 7: The "forecasting" effect in assignment planning.
(a)
Each working step begins immediately after the previous step. The
length of a whole plan is equal to 47; (b) The start of the working
step 8 (3th piece) is delayed on one step, that allows reducing the
common length to 43 steps.
The assignment planning for different workpieces repre-
sents an iterative process where all iterations are very sim-
ilar to one another. In this way the whole assignment plan
represents a periodic pattern, that can be observed in Fig. 7.
Here there are two main patterns shown by black and white
colors (order of the working steps as well as their positions
on machines) that however differ in the last workpieces. It
means that in case the optimal (or near optimal) scheme for
the first iteration is found, next iteration can use the same
scheme. The distributed approach being able to treat this kind
of pattern-like problem is known as the ant colony optimiza-
tion algorithm (ACO) [18]. This method originated from ob-
servation of ants in the colony. Going from the nest to the
food source, every ant deposits a chemical substance, called
pheromone, on the ground. In the decision point (intersection
between branches of a path) ants make a local decision based
on the amount of pheromone, where a higher concentration
means a shorter path. The result of this strategy represents
a pattern of routes where thick line points to a shorter path.
Similar strategy can be applied to local decisions of agents,
participating in the plan making.
5 Conclusion
The presented approach enables to react reasonably to dis-
turbances in manufacturing by using the constraint-based ap-
proach in a multi-agent way. It does not require any central-
ized elements, that essentially increases a reliability of com-
mon system.
References
[1] G. Weiss. Multiagent systems. MIT Press, 1999.
[2] T. Sandholm. Negotiation among self-interested computation-
ally limited agents. PhD thesis, University of Massachusetts,
Amherst, 1996.
[3] M. Pinedo.
Scheduling: Theory, Algorithms and Systems.
Prentice Hall, 1995.
[4] S. Kornienko O. Kornienko and P. Levi. Collective decision
making using natural self-organization in distributed systems.
In Proc. of CIMCA'2001, pages 460 -- 471, Las Vegas, USA,
2001.
[5] P. Levi, M. Schanz, S. Kornienko, and O. Kornienko. Ap-
plication of order parameter equation for the analysis and the
control of nonlinear time discrete dynamical systems. Int. J.
Bifurcation and Chaos, 9(8):1619 -- 1634, 1999.
[6] S. Graves, A.H.G. Rinnooy Kan, and P. Zipkin. Logistics of
Production and Inventory. Volume 4 of Handbooks in Op-
erations Research and Management Science, North Holland,
1993.
J. Blazewicz, W. Domschke, and E. Pesch. The job shop
scheduling problem. European Journal of Operational Re-
search, 93:1 -- 33, 1996.
[7]
[8] K. Alicke. Modellierung und Optimierung von mehrstufigen
Umschlagsystemen. PhD thesis, University of Karlsruhe, Karl-
sruhe, 1999.
[9] R. Bellman and S.E. Dreyfus. Applied dynamic programming.
Princeton, New Jersey, 1962.
[10] E. H. Durfee. Distributed problem solving and planing.
In
G. Weiss, editor, Multiagent Systems, pages 121 -- 164. MIT
Press, 1999.
[11] S. Kornienko, O. Kornienko, and J. Priese. Application of
multi-agent planning to the assignment problem. Computers
in Industry, 54(3):273 -- 290, 2004.
[12] H.K. Tonshoff, P.-O. Woelk, I.J. Timm, and O. Herzog. Flexi-
ble process planning and production control using co-operative
agent systems. In Proc. of COMA' 01, pages 442 -- 449, South
Africa, 2001. Stellenbosch.
[13] C. Constantinescu, S. Kornienko, O. Kornienko,
and
U. Heinkel. An agent-based approach to support the scalabil-
ity of change propagation. In Proc. of ISCA04, pages 157 -- 164,
San-Francisco, USA, 2004.
[14] M. Muscholl. Interaction und Kooperation in Multiagentsys-
temen. PhD thesis, University of Stuttgart, Stuttgart, 2001.
[15] S. Kornienko, O. Kornienko, and P. Levi. Multi-agent repairer
of damaged process plans in manufacturing environment. In
Proc. of the 8th Conf. on Intelligent Autonomous Systems (IAS-
8), Amsterdam, NL, pages 485 -- 494, 2004.
[16] A. Nareyek. Constraint-Based Agents, volume 2062 of Lecture
Notes in Computer Science. Springer-Verlag, 2001.
[17] S. Kornienko, O. Kornienko, and P. Levi. Flexible manufactur-
ing process planning based on the multi-agent technology. In
Proc. of Int. Conf. AIA'03, Innsbruck, Austria, pages 156 -- 161,
2003.
[18] D. Corne, M. Dorigo, and F. Glover (eds.). New ideas in opti-
mization. McGraw-Hill, 1999.
Figure 8: Non optimal assignment plans with different number of
jumps that result in different length and transportation costs.
Agents after the CSP approach choose several assignment
plans from the generated set of them and form an optimiza-
tion pool. These assignment plans can represent also only
segments of plans (these connected working steps represent
independent parts of assignment plan) that satisfy all formu-
lated constraints. These segments/plans can be combined into
a common plan so that to satisfy the postulated optimization
criterion. Thus, the more optimal segments are included into
this pool, the more optimal common plan will be obtained.
The ACO algorithm marks (like a pheromone rate) the opti-
mal segments obtained on the previous step. The fragments
with the highest pheromone rate are included into the top of
pool. In this way agents consider first the ACO-obtained se-
quence and try to modify it (e.g. using forecasting effect).
Thus, an optimization pool has always solutions with a high
pheromone rate, from them the most optimal one will be then
chosen.
The optimality of a plan is also influenced by a number of
transportations of a workpiece from one machine to another.
These transportations are represented by so-called "jumps"
in the plan making, as shown in Fig. 8. The minimal num-
ber of jumps for a workpiece is defined by technological re-
quirements and e.g. for a plan shown in Fig. 7 is equal to
2. However the number of jumps can be increased that wors-
ens a cost but improves other characteristics of an assignment
plan. This mechanism is utilized in combined optimization
criteria, e.g. the minimal cost at defined length (constant de-
livery date). Dependence between the number of jumps and,
for example, the length of generated plans is shown in Fig. 9.
Figure 9: Dependence between the number of jumps and the length
of generated plans. The curves 1, 2, 3 represent the cases without
forecasting, with one-position forecasting for only the first work-
piece, and with two-positions forecasting for all workpieces.
|
1002.0170 | 2 | 1002 | 2010-02-02T18:24:34 | Spectral Analysis of Virus Spreading in Random Geometric Networks | [
"cs.MA",
"cs.CE",
"cs.DM",
"nlin.AO"
] | In this paper, we study the dynamics of a viral spreading process in random geometric graphs (RGG). The spreading of the viral process we consider in this paper is closely related with the eigenvalues of the adjacency matrix of the graph. We deduce new explicit expressions for all the moments of the eigenvalue distribution of the adjacency matrix as a function of the spatial density of nodes and the radius of connection. We apply these expressions to study the behavior of the viral infection in an RGG. Based on our results, we deduce an analytical condition that can be used to design RGG's in order to tame an initial viral infection. Numerical simulations are in accordance with our analytical predictions. | cs.MA | cs | Spectral Analysis of Virus Spreading in Random Geometric Networks
Victor M. Preciado and Ali Jadbabaie
0
1
0
2
b
e
F
2
]
A
M
.
s
c
[
2
v
0
7
1
0
.
2
0
0
1
:
v
i
X
r
a
Abstract -- In this paper, we study the dynamics of a viral
spreading process in random geometric graphs (RGG). The
spreading of the viral process we consider in this paper is
closely related with the eigenvalues of the adjacency matrix
of the graph. We deduce new explicit expressions for all the
moments of the eigenvalue distribution of the adjacency matrix
as a function of the spatial density of nodes and the radius of
connection. We apply these expressions to study the behavior of
the viral infection in an RGG. Based on our results, we deduce
an analytical condition that can be used to design RGG's in
order to tame an initial viral infection. Numerical simulations
are in accordance with our analytical predictions.
I. INTRODUCTION
The analysis of spreading processes in large-scale complex
networks is a fundamental dynamical problem in network
science. The relationship between the dynamics of epi-
demic/information spreading and the structure of the under-
lying network is crucial in many practical cases, such as
the spreading of worms in a computer network, viruses in a
human population, or rumors in a social network. Several
papers approached different facets of the virus spreading
problem. A rigorous analysis of epidemic spreading in a
finite one-dimensional
linear network was developed by
Durrett and Liu in [3]. In [10], Wang et al. derived a sufficient
condition to tame an epidemic outbreak in terms of the
spectral radius of the adjacency matrix of the underlying
graph. Similar results were derived by Ganesh et al. in [4],
establishing a connection between the behavior of a viral
infection and the eigenvalues of the adjacency matrix of the
network.
In this paper, we study the dynamics of a viral spreading
in an important type of proximity networks called Random
Geometric Graphs (RGG). RGG's consist of a set of vertices
randomly distributed in a given spatial region with edges
connecting pairs of nodes that are within a given distance
r from each other (also called connectivity radius). In this
paper, we derive new explicit expressions for the expected
spectral moments of the random adjacency matrix associated
to an RGG. Our results allow us to derive analytical condi-
tions under which an RGG is well-suited to tame an infection
in the network.
The paper is structured as follows. In Section II, we
describe random geometric graphs and introduce several
useful results concerning their structural properties. We also
present the spreading model in [10] and review an important
This work was supported by ONR MURI N000140810747, and AFOR's
The
authors
complex networks program.
and Sys-
tems Engineering, University of Pennsylvania, 3451 Walnut Street,
{preciado,jadbabai}@seas.upenn.edu
are with the Department of Electrical
result that relates the behavior of an initial infection with the
spectral radius of the adjacency matrix. In Section III, we
study the eigenvalue spectrum of random geometric graphs.
We derive explicit expressions for the expected spectral
moments in the case of one- and two-dimensional RGG's.
In Section IV, we use these expressions to study the spectral
radius of RGG's. Our results allow us to design RGG's
with the objective of taming epidemic outbreaks. Numerical
simulations in Section IV validate our results.
II. VIRUS SPREADING IN RANDOM GEOMETRIC GRAPHS
In this section, we briefly describe random geometric
graphs and introduce several useful results concerning their
structural properties (see [7] for a thorough treatment). We
then describe the spreading model introduced in [10] and
show how to study the behavior of an infection in the network
from the point of view of the adjacency eigenvalues.
A. Random Geometric Graphs
Consider a set of n nodes, Vn = {v1, ...,vn}, respectively
c n = {x1, ...,xn}, where xi
located at random positions,
are i.i.d. random vectors uniformly distributed on the d-
dimensional unit torus, Td. We use the torus for convenience,
to avoid boundary effects. We then connect two nodes vi,v j ∈
xi − x j(cid:13)(cid:13) ≤ r, where r is the so-called
Vn if and only if (cid:13)(cid:13)
connectivity radius. In other words, a link exists between
vi and v j if and only if v j lies inside the sphere of radius
r (n) centered at vi. We denote this spherical region by Si (r),
and the resulting random geometric graph by G (c n;r). We
define a walk of length k from v0 to vk as an ordered set of
(possibly repeated) vertices (v0,v1, ...,vk) such that vi ∼ vi+1,
for i = 0,1, ...,k− 1; if n k = n 0 the walk is said to be closed.
is the number of edges
The degree di of a node vi
connected to it. In our case, the degrees are identical random
variables with expectation [7]:
E [di] = nV (d)rd,
(1)
where V (d) is the volume of a d-dimensional unit sphere,
V (d) = p d/2(cid:14)G (d/2 + 1), and G (·) is the Gamma function.
The clustering coefficient is a measure of the number of
triangles in a given graph, where a triangle is defined by
the set of edges {(i, j) , ( j,k) , (k,i)} such that i ∼ j ∼ k ∼ i.
For one- and two-dimensional RGG's we can derive an
explicit expression for the expected number of triangles,
E [ti], touching a particular node vi (details are provided in
Section III).
The adjacency matrix of an undirected graph G, denoted
by A(G) = [ai j], is defined entry-wise by ai j = 1 if nodes
i and j are connected, and ai j = 0 otherwise. (Note that
aii = 0 for simple graphs.) Denote the eigenvalues of a n× n
symmetric adjacency matrix A(G) by l 1 ≤ ... ≤ l n. The k-th
order moment of the eigenvalue spectrum of A(G) is defined
as:
1
N
l k
i
mk(G) =
n(cid:229)
i=1
(which is also called the k-th order spectral moment).
We are interested in studying asymptotic properties of the
[7], two particularly interesting regimes are introduced: the
sequence G(c n;r (n)) for some sequence {r (n) : n ∈ N}. In
thermodynamic limit with nr (n)d → a ∈ (0,¥ ), so that the
connectivity regime with r (n) → g (cid:16) log n
expected degree of a vertex tends to a constant, and the
with a constant
g , so that the expected degree of the nodes grows as clog n.
In this paper, we focus on studying the spectral moments
in the connectivity regime. In Section III, we derive explicit
expressions for the expected spectral moments of G (c n;rn)
for any network size n. We then use this information to bound
the spectral radius of the adjacency matrix of G(c n;r (n)).
B. Spectral Analysis of Virus Spreading
n (cid:17)1/d
In this section, we briefly review an automaton model
that describes the dynamics of a viral infection in a spe-
cific network of interactions. This model was proposed and
analyzed in [10], where a connection between the growth of
an initial infection in the network and the spectral radius of
the adjacency matrix was established. This model involves
several parameters. First, the infection rate b
represents the
probability of a virus at an infected node i spreading to
another neighboring node j during a time step. Also, we
denote by d
the probability of recovery of any infected node
at each time step. For simplicity, we consider b and d
to be
constants for all the nodes in G. We also denote by pi [k] the
probability that node i is infected at time k. The evolution
of the probability of infection is modeled by means of the
following system of non-linear difference equation:
pi [k + 1] = [1− (cid:213)
j∈Ni
(1− b p j [k])] + (1− d ) pi [k] ,
(2)
for i = 1, ...,n, where Ni denotes the set of nodes connected
to node i. We are interested in studying the dynamics of the
system for a low-density level of infection, i.e., b p j [k] ≪
1. In this regime, a sufficient condition for a small initial
infection to die out is [10]:
l max (A(G)) <
d
b
.
(3)
One can prove that (3) is a sufficient condition for local
stability around the disease-free state. Thus, we can use
condition (3) to design networks with the objective of taming
initial low-density infections.
III. SPECTRAL ANALYSIS OF RANDOM GEOMETRIC
GRAPHS
where
In this paper, we study the eigenvalue distribution of the
random adjacency matrix associated to G(c n;r (n)) for n →
. In this section, we characterize eigenvalue distribution
using its sequence of spectral moments. In our derivations,
we use an interesting graph-theoretical interpretation of the
spectral moments [1]: the k-th spectral moment of G is
proportional to the number of closed walks of length k in G.
This result allows us to transform the algebraic problem of
computing spectral moments of the adjacency matrix into the
combinatorial problem of counting closed walks in the graph.
In the following subsection, we compute the expected value
of the number of closed walks of length k in G(c n;r (n)).
A. Spectral Moments of One-Dimensional RGG's
As we mentioned above, we can compute the k-th spectral
moment of a graph by counting the number of closed walks
of length k. In the case of an RGG G(c n;r (n)), this number
is a random variable. In this subsection, we introduce a novel
technique to compute the expected number of closed walks
of length k. For clarity, we introduce our technique for the
first three expected spectral moments k = 1,2,3. We then use
these results to induce a general expression for higher-order
moments in one-dimensional RGG's.
The first-order spectral moment is equal to the number
of closed walks of length k = 1. Since G(c n;r) is a simple
graphs with no self-loops, we have that m1 (G(c n;r)) is a
deterministic quantity equal to 0.
the
We
expected
now study
second moment,
E [m2 (G(c n;r))], by counting the number of
closed
walks of length two. In simple graphs, the only possible
closed walks of length two are those that start at a given
node vi, visit a neighboring node v j ∈ Ni, and return back
to vi. Hence, the number of closed walks of length two
starting at vi is equal to di. Thus, from (1), we have
E [m2] =
1
n
n(cid:229)
i=1
E [di] = nV (d)rd,
where this result is valid for any dimension d ≥ 1.
The third spectral moment is proportional to the number
of closed walks of length three in the graph. We now derive
an expression for the expected number of triangular walks
starting at a given node vi in a one-dimensional RGG. Since
all nodes are statistically equivalent, our result is valid for
any other starting node. For simplicity in our calculations,
we consider that vi is located at the origin. A triangular walk
starting at node vi exists if and only if there exist two nodes
v j anv vk such that (cid:12)(cid:12)
x j(cid:12)(cid:12) ≤ r, xk ≤ r, and (cid:12)(cid:12)
since the random distribution of vertices on T1 is uniform
(with density n), the probability of nodes v j and vk being
respectively located in the differential lengths [x j + dx j) and
[xk + dxk) is equal to n2 dx jdxk. Hence, one can compute the
expected number of triangular walks starting at node vi as
xk − x j(cid:12)(cid:12) ≤ r. Also,
E [ti] =Z Z(x j ,xk)∈H2(r(n))
n2 dx jdxk,
H2 (r) =(cid:8)(x j,xk) ∈ T2 s.t. (cid:12)(cid:12)
x j(cid:12)(cid:12) ≤ r,
xk − x j(cid:12)(cid:12) ≤ r,xk ≤ r(cid:9) .
(cid:12)(cid:12)
(4)
¥
our derivation, due to space limitations, an explicit expres-
sion for the volume of Hk (1) is given by [9]:
Vol (Hk (1)) =
2
k!
k−1
j=1(cid:18) k
j− 1(cid:19) Ek, j,
(7)
where Ed,k denotes the Eulerian numbers. Substituting (7) in
(6) we obtain the statement of our lemma.
In [6], Lasserre proposed an algorithm to compute the
volume of a polyhedron defined by a set of linear inequali-
ties. We can use this algorithm to verify the validity of (5).
Applying this algorithm to the set of inequalities in (5), we
compute the following volumes for k = 1, ...,10:
H1 = 2, H2 = 3, H3 = 5.333..., H4 = 9.58333...,
H5 = 17.6000..., H6 = 32.70555..., H7 = 61.3587...,
H8 = 115.947..., H9 = 220.3238..., H10 = 420.825...
as
These numerical values match perfectly with our analytical
expression in Theorem 1.
If nr (n) = W
logn, or
(log n) (i.e.,
faster), one
the average degree grows
can prove
that E [mk] =
]. Hence, from (6) and (7), we
have the following closed-form expression for the asymptotic
expected spectral moments:
(cid:0)1 + O(cid:0)log−1 n(cid:1)(cid:1) E[W (k)
i
E [mk] ≍ (nr)k−1
1
2 (k− 1)!
k−2
j=1(cid:18)k− 1
j− 1(cid:19) Ek−1, j.
(8)
In the following table we compare the analytical result
in (8) with numerical realizations of the empirical spectral
moments. In our simulations, we distribute n = 1000 nodes
uniformly in T1 and choose a connectivity radius r = 0.01
(which results in an average degree E[di] = 20). The second,
third, and forth column in the following table represent
the analytical expectations of the spectral moments,
the
empirical average of the spectral moments from 10 random
realizations of the RGG, and the corresponding empirical
typical deviation, respectively.
(5)
k E [mk] Empirical Average Typical Deviation
1
2
3
4
1.38e-16
19.9326
297.284
5,956.30
1.3e-15
0.0976
4.3598
196.94
0
20
300
5,733
Thus, E [ti] can be computed as n2Vol[H2 (r (n))] (where
Vol(H) denotes the volume contained by the polyhedron H.)
Notice that H2 (r) can be defined by a set of linear inequalies;
hence, H2 (r) is a convex polyhedron that depends on r.
Furthermore, the set of linear inequalities in (4) presents a
homogeneous dependency with respect to the parameter r.
Therefore, we can write Vol(H2 (r)) as r2Vol(H2 (1)). Finally,
one can easily compute the volume of H2 (1) to be equal
to 3. Thus, the expected third spectral moment of a one-
dimensional RGG is given by
n(cid:229)
E [ti] = 3n2r2.
E [m3] =
1
n
i=1
In the following, we extend the above technique to com-
pute higher-order expected spectral moments. Denote by
W (k)
the number of closed walks of length k starting at node
i
vi in G(c n;r (n)). Regarding W (k)
, we derive the following
result.
i
Theorem 1: The expected number of closed walks of
, in a random geometric graph, G(c n;r), on
length k, W (k)
T1 is given by
i
k−2
1
Proof:
2 (k− 1)!
EhW (k)
i i = (nr)k−1
j− 1(cid:19) Ek−1, j,
j=1(cid:18)k− 1
where Ek−1, j are the Eulerian numbers 1.
Consider a particular closed walk, wk =
(v1,v2,v3, ...,vk,v1), of length k starting and ending at node
v1 (which we locate at zero for computational convenience).
A walk wk exists if and only if there exists a set of k− 1
x j+1 − x j(cid:12)(cid:12) ≤ r for
nodes, {v2,v3, ...,vk} , such that x1 ≤ r, (cid:12)(cid:12)
j = 2, ...,k− 1, and xk ≤ r. Since the distribution of vertices
on T1 is uniform (with density n) one can compute the
expectation of W (k)
as
i
where
nk−1 dx2...dxk,
i i =Z(x2,...,xk)∈Hk−1(r(n))
EhW (k)
Hk−1 (r) =n(v2,v3, ...,vk) ∈ Tk−1 s.t. v2 ≤ r,
x j+1 − x j(cid:12)(cid:12) ≤ r for j = 2, ...,k− 1,
(cid:12)(cid:12)
xk ≤ r} .
i
Thus, E[W (k)
] can be computed as nk−1Vol[Hk−1 (r)], where
Hk−1 (r) is a convex polyhedron defined by a set of linear
inequalities. Finally, note that the homogeneous structure of
the system of linear inequalities defining Hk−1 (r) allows us
to write Vol(Hk−1 (r)) = rk−1Vol(Hk−1 (1)). Therefore,
EhW (k)
i i = (nr)k−1 Vol (Hk−1 (1)) .
(6)
The volume of Hk−1 (1) is a particular number, independent
of the RGG parameters, i.e., n and r. Furthermore, we have
found an explicit analytical expression for the volume of
Hk (1) for any k ≥ 1. Although we do not provide details of
1The Eulerian number E (n,k) gives the number of permutations of
{1,2,...,n} having k permutation ascents [5].
Our numerical results present an excellent match with our
analytical predictions.
B. Spectral Moments of Two-Dimensional RGG's
In this subsection, we derive expressions for the first three
expected spectral moments of G(c n;r (n)) when the nodes
are uniformly distributed in T2. The expressions for the
first and second expected spectral moments are m1 = 0 and
E [m2] = p nr2. The third spectral moment is proportional to
the number of closed walks of length three in the graph. In
the two-dimensional case, we count the number of triangular
walks using a technique that we illustrate in Fig. 1. In this
figure, we plot two nodes vi and v j. The parameters r and
f
in Fig. 1 denote the distance and angle between these
(cid:229)
(cid:229)
(cid:229)
Fig. 1. This figure illustrates the technique proposed in Section III.B to
count the number of triangular walks in a two-dimensional RGG.
x j − xi(cid:13)(cid:13)
two nodes, i.e., r ,(cid:13)(cid:13)
and f = ∡ (x j − xi). An edge
between vi and v j exists if an only if v j is located inside the
circle Si (r). In this setting, the probability of existence of a
triangle touching both vi and v j is equal to the probability of
a third node vk being in the shaded area Al (see Fig. 1). This
area is the result of intersecting the circles Si (r) and S j (r),
and the resulting probability is equal to n Al. The intersecting
region Al is a symmetric lens which area can be computed
as a function of r and r as follows:
Al (r ;r) =(cid:26) 2r2 cos−1(cid:0)
2r(cid:1)−
0,
r
r
2p4r2 − r 2,
(9)
Therefore, we can compute the expected number of triangles
by integrating over the set of all possible positions of v j, i.e.,
h ∈ [0,r] and f ∈ [0,2p ), as follows
for r ≤ r,
for r > r.
n2Al (r ;r) r dr df .
(10)
E [ti] =Z r
r =0Z 2p
f =0
(11)
After substituting (9) in (10), we can explicitly solve the
resulting integral to be
3√3
2
2
E [ti] = p −
4 !p (cid:0)nr2(cid:1)
≈ 5.78(cid:0)nr2(cid:1)
.
(cid:229) n
Consequently, we have the following expression for the third
expected spectral moment E [m3] = 1
n
i=1 E [ti] = E [ti].
In the following, we extend the technique introduced above
to compute closed walks of arbitrary length. Denote by W (k)
the number of closed walks of length k starting at node v1
in G(c n;r (n)). The idea behind our technique is illustrated
in Fig. 2, where we represent a particular closed walk of
length 6. We denote this walk by wk = (v1,v2, ...,vk−1,vk,v1).
We define the following set of relative distances and angles
between every pair of connected vertices: r i , kxi+1 − xik
and f i = ∡ (xi+1 − xi) for i = 1, ...,k− 2. We also define the
i
following parameter
k−2
j=1
r =(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
r
jeia
,
j(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
(12)
Fig. 2. This figure illustrates the technique proposed in Section III.B to
count the number of closed walks of length k in a two-dimensional RGG.
(i = √−1) which is the resulting distance between nodes
vk−1 and v1 given a particular set of distances and angles
{(ri,f i)}i=1,...,k−2 (see Fig. 2). In this setting, the conditional
probability of existence of a walk wk = (v1,v2, ...,vk−1,vk,v1)
given the set of relative positions, {(ri,f i)}i=1,...,k−2, is equal
to the probability of vk being in the shaded area Al in Fig.
2. We have an expression for this area in (9), where r
is
defined in (12). Finally, we can compute the expectation of
W (k)
by performing an integration over the set of all possible
i
positions (i.e., r
as follows
j ∈ [0,r] and f j ∈ [0,2p ) for j = 2, ...,k− 1),
EhW (k)
i i = nk−1Z(h ,j )∈Ck−2
Al (r ;r)
k−1
h
j=2
j dh dj ,
i
] ≈ 14.2511(cid:0)nr2(cid:1)3.
where h = (r 2, ...,r k−1),
j = (f 2, ...,f k−1), and Ck−2 =
{(h ,j ) : h ∈ [0,r]k−2 and j ∈ [0,2p )k−2}. Although a
closed-form for the above expression can only be computed
for k ≤ 3, we can always find a good approximation via
numerical integration. For example, the integration for k = 4
gives us E[W (4)
In the following table, we compare our analytical results
with numerical realizations of the empirical spectral mo-
ments of a two-dimensional RGG. In our simulations, we
distribute n = 1000 nodes uniformly on T2 and choose a
connectivity radius r =p50/p n ≈ 0.1784 (which results in
an average degree E[di] = 50). The second, third, and forth
columns in the following table represent the analytical expec-
tation of the spectral moments, the empirical average from 10
random realizations, and the corresponding empirical typical
(cid:229)
(cid:213)
deviation, respectively.
0
50
k E [mk]
1
2
3
4
1,464.1
59,452
Empirical Average Typical Deviation
-9.2e-16
50.0820
1,475.8
60,127
1.1e-15
0.3908
37.3777
2,955.3
Our numerical results present an excellent match with our
analytical predictions.
In the following section, we use the results introduced in
this section to study the spreading of an infection in a random
geometric network.
IV. SPECTRAL ANALYSIS OF VIRUS SPREADING
In this section, we use the expressions for the expected
spectral moments to design random geometric networks to
tame an initial viral infection in the network. In our design
problem, we consider that the size of the network n and
the parameters in (2), i.e., b and d , are given. Hence, our
design problem is reduced to studying the range of values of
r for which the RGG is well-suited to tame an initial viral
infection.
A sufficient condition for
local stability around the
disease-free state was given in (3). Thus, we have to find
the range of values of r for which the associated spectral
radius l max is smaller than the ratio d /b . In the following
subsection, we show how to derive an analytical upper
bound for the spectral radius based on the expected spectral
moments.
A. Analytical Upper Bound for the Spectral Radius
In order to upper-bound the spectral radius, we use
Wigner's high-order moment method [11]. This method
provides a probabilistic upper bound based on the asymptotic
behavior of the k-th expected spectral moments for large k.
We present the details for a one-dimensional RGG, although
the same technique can be applied to RGG's in higher
dimensions. For a one-dimensional RGG in the connectivity
regime, we derived an explicit expression for the expected
spectral moments in (8). A logarithmic plot of Vol(Hk (1))
for k = 1,2, ...,9 unveils that Vol(Hk (1)) → b 1ck
1 for large-
order moments (a line in logarithmic scale), where, from a
numerical fitting, we find that b 1 = 0.35 and c1 = 1.9192.
Therefore, from (8) we have
E [mk] ≍ b 1 (c1nr)k ,
for large k.
For even-order expected spectral moments (i.e., k = 2s for
s ∈ N), the following holds
n(cid:229)
E [m2s] =
1
n
i=1
E[l 2s
i
1
n
] ≥
E[l 2s
max].
Define f (n) = n1−d log n; thus, for any e ,d > 0 (and c1 =
1.9192), we can apply Markov´s inequality as follows
P(cid:0)l 2s
max ≥ (c1nr + e r f (n))2s(cid:1) ≤
≤
E[l 2s
max]
(c1nr + e r f (n))2s
n E [m2s]
(c1nr + e r f (n))2s ,
Fig. 3.
Comparison between the empirical spectral radius of an RGG
(circles in the plot) and the values of our analytical upper bound (solid
line) for n = 1000 and r (n) = ¯d/2n, with expected degrees ¯d = [10:1:100].
For large s, one can prove that [8]
e
c1
sn−d logn(cid:19) .
P (l max ≥ c1nr + e r f (n)) ≤ nb 1 exp(cid:18)−
Assuming that s grows as b 2nd , for b 2,d > 0, we have
P (l max ≥ c1nr + e r f (n)) ≤ nb 1 exp(cid:18)−
for all sufficiently large e . Thus,
logn(cid:19) = o (1) ,
b 2e
c1
lim
n→¥ P(cid:16)l max < c1nr + e rn1−d logn(cid:17) = 1.
(13)
In other words, l max is upper-bounded by cnr +e rn1−d logn
with probability 1 for n → ¥
. In practice, for a large (but
finite) n, we can use 1.9192 nr as an upper bound of l max.
In Fig. 4, we plot the empirical spectral radius of an RGG
with n = 1000 and r (n) = ¯d/2n, with expected degrees ¯d =
[10:1:100] (circles in the figure). We also plot the values of
our analytical upper bound, 1.9192 nr, in solid line.
The technique introduced in this subsection is also valid
for RGG's in higher-dimensions. In general, one can prove
that for a d-dimensional RGG that the expected spectral
moment grows as E [mk] → b d(cid:0)cdnrd(cid:1)k. Applying Wigner's
high-order moment method to this sequence, one can derive
a probabilistic upper bound similar to (13). In particular, we
have that l max < cdnrd for large n with high probability. In
the following subsection, we use our results to design the
connectivity radius of an RGG in order to tame an initial
viral infection.
B. Spectral Radius Design
Once the spectral radius is upper-bounded, our design
problem becomes trivial. Since (3) represents a sufficient
condition for local stability around the disease-free state, we
have the following condition to tame an initial viral infection
for a d-dimensional RGG:
l max (G(c n;r)) < cdnrd <
d
b
,
Fig. 4. Color map representing the evolution of the probabilities of infection
pi [n] for i = 1,...,1000 in an RGG with n = 1000 nodes, connectivity
radius r = 0.005, rate of infection b = 0.020, and recovery rate d = 0.018.
Each horizontal line represents the value of pi [n] for a particular i. In this
color map, blue represents a zero value, green and yellow tones represent
intermediate values, and red represents values close to one. In this case, we
observe an epidemic outbreak.
which implies the following design condition for the con-
nectivity radius:
r <(cid:18) d
b cdn(cid:19)1/d
,
(14)
where cd is a positive constant that depends on the dimension
of Td. For example, in the one-dimensional case, we have
c1 = 1.9192; hence, (14) becomes r < d / (1.9192 b n). We
now validate this result with several numerical simulations
of a viral infection in a one-dimensional RGG.
Consider an RGG with n = 1000 nodes and a connectivity
radius of r = 0.005 (which implies an average degree of
10). The resulting spectral radius in this RGG is l max =
17.2629. In our numerical simulations, we choose the initial
probability of infection to be pi [0] ∼ 0.01Unif[0,1]; hence,
approximately 1% of the nodes in the network are initially
infected. In our first experiment, we choose a rate of infection
b = 0.020, and a recovery rate d = 0.018. Since the sufficient
condition for viral control in (14) is not satisfied, we cannot
guarantee an initial infection to be tamed. In Fig. 5 we show
an image of the evolution of the probability of infection for
this case. This figure is a color map for the simultaneos
evolution of pi [n] for i = 1, ...,1000. Each horizontal line
represents the value of pi [n] for a particular i. In this color
map, blue represents a zero value, green and yellow tones
represent intermediate values, and red represents values close
to one. On the other hand, if we increase the recovery rate to
d = 0.35 keeping the rest of parameters fixed, we have that
d /b = 17.50 > l max and we satisfy condition (3). Hence,
the probability of infection of every node is guaranteed to
converge towards zero. In Fig. 6, we observe the color map
for the evolution of the probability of infection in this case,
where we clearly observe how pi [n] → 0 for all i. Hence,
this latter RGG is well-suited to tame initial viral infections.
V. CONCLUSIONS
In this paper, we have studied the spreading of a viral
infection in a random geometric graph from a spectral point
Fig. 5. Color map representing the evolution of the probabilities of infection
pi [n] when we increase the recovery rate to d = 0.35 (the rest of parameters
are the same as we used for Fig. 5). We observe how the probability of
infection of every node converges towards zero in this case.
of view. We have focused our attention on studying the
eigenvalue distribution of the adjacency matrix. We have
derived, for the first time, explicit expressions for the spectral
moments of the adjacency matrix as a function of the density
of nodes and the connectivity radius. We have then applied
our results to the problem of viral spreading in a network
with a low-density infection. Using our expressions, we have
derived upper bounds for the spectral radius of the adjacency
matrix. Finally, we have applied this upper bound to design
random geometric graphs that are well-suited to tame an
initial low-density infection. Our numerical results match our
predictions with high accuracy.
REFERENCES
[1] N. Biggs, Algebraic Graph Theory, 2nd Edition. Cambridge University
Press, 1993.
[2] P. Blackwell, M. Edmondson-Jones, and J. Jordan, "Spectra of Adja-
cency Matrices of Random Geometric Graphs," Preprint.
[3] R. Durrett and X.-E. Liu, "The Contact Process on a Finite Set,"
Annals of Probability, vol. 16, pp. 1158-1173, 1988.
[4] A. Ganesh, L. Massoulie, and D. Towsley, "The Effect of Network
Topology on the Spread of Epidemics," Proc. IEEE INFOCOM '05,
pp. 1455-1466, 2005.
[5] R.L. Graham, D.E. Knuth, and O. Patashnik, Concrete Mathematics:
A Foundation for Computer Science, Second Edition, Addison-Wesley,
1994.
[6] J.B. Lasserre, "An Analytical Expression and an Algorithm for the
Volume of a Convex Polyhedron in Rn," J. Optim. Theor. Appl., vol.
39, pp. 363 -- 377, 1983.
[7] M. Penrose, Random Geometric Graphs, Oxford University Press,
2003.
[8] V.M. Preciado, Spectral Analysis for Stochastic Models of Large-Scale
Complex Dynamical Networks, Ph.D. dissertation, Dept. Elect. Eng.
Comput. Sci., MIT, Cambridge, MA, 2008.
[9] V.M. Preciado and A. Jadbabaie, "Moment-Based Spectral Analysis
of Random Geometric Graphs," in preparation.
[10] Y. Wang, D. Chakrabarti, C. Wang, and C. Faloutsos, "Epidemic
Spreading in Real Networks: An Eigenvalue Viewpoint," Proc. Int.
Symp. Reliable Distributed Systems, pp. 25-34, 2003.
[11] E.P. Wigner, "On the Distribution of the Roots of Certain Symmetric
Matrices," Ann. Math., vol. 67, pp. 325 -- 327, 1958.
|
1510.02225 | 1 | 1510 | 2015-10-08T08:16:59 | Comparison between purely statistical and multi-agent based ap-proaches for occupant behaviour modeling in buildings | [
"cs.MA"
] | This paper analyzes two modeling approaches for occupant behaviour in buildings. It compares a purely statistical approach with a multi-agent social simulation based approach. The study concerns the door openings in an office. | cs.MA | cs | Comparison between purely statistical and multi-agent based ap-
proaches for occupant behaviour modeling in buildings
Conférence IBPSA France-Arras-2014
Khadija Tijani∗1,2,Ayesha Kashif1,3,Quoc Dung Ngo1,Stéphane Ploix1,Benjamin
Haas2,Julie Dugdale3
1 G-SCOP Sciences pour la Conception l'Optimisation et la Production à Greno-
ble
46 avenue Félix Viallet 38031 Grenoble France
2 CSTB Centre Scientifique et Technique du Bâtiment
84 avenue Jean Jaurès 77420 France
3 LIG Laboratoire d'Informatique de Grenoble
110 avenue de la chimie Domaine Universitaire de Saint Martin d'hères 38041 Greno-
ble France
∗[email protected]
RESUME. Ce papier analyse deux approches de modélisation du comportement d'occupants dans
le bâtiment. Il compare une approche purement statistique avec une approche basée sur la simu-
lation sociale dans un environnement multi-agent. L'étude concerne les ouvertures de porte dans
un bureau.
MOTS-CLÉFS. bâtiment, simulation d'occupants, approche statistique, simulation sociale, sys-
tème multi-agent
ABSTRACT. This paper analyzes two modeling approaches for occupant behaviour in buildings.
It compares a purely statistical approach with a multi-agent social simulation based approach.
The study concerns the door openings in an office.
KEYWORDS. building, occupant simulation, statistical approach, social simulation, multi-agent
system
1 Introduction and context
Because of the reduction of energy consumptions, the relative impact of occupants is becoming
more important. Thus, the design and the operation of building systems have to take into account
the occupant behaviours to improve the ratio between services provided to occupants and the
required energy: this is the concept of usage efficiency proposed in (Chenailler, 2012). Regarding
solutions driven by numerical models, occupant behaviours have to be modelled properly as the
main function of a building is to provide services to its users. Occupant behaviours have to be
considered in the study of building energy efficiency by modelling needs in terms of comfort,
energy and health to deduce how these affect the indoor environment.
Furthermore, Building Energy Management Systems (BEMS) help to optimize energy con-
1
5
1
0
2
t
c
O
8
]
A
M
.
s
c
[
1
v
5
2
2
2
0
.
0
1
5
1
:
v
i
X
r
a
Conférence IBPSA France-Arras-2014
sumption and also allow occupants to take better decisions regarding energy use. The way it
operates involves interactions with the occupants. The BEMS receives signals from the smart
grid and gives information about the availability of energy, the price details and energy con-
sumption. Therefore, the occupants are reactive because they may adapt their behaviours and
interact with the BEMS to adapt the proposed energy strategy.
The purpose of this paper is to show that a multi-agent based model can do what a statistical
model does and even more by comparing these two approaches: purely statistical approach and
multi-agent based design of occupant models. To carry out this comparison, the study focuses on
air quality and in particular on occupants' interactions with door openings in an office setting.
Such human behaviour depends on several parameters and constraints arising from the external
and social environment. A statistical model based on Markov chains is first developed to predict
the average state of the door (open or closed) each hour of the day for two months. These results
are validated by sensor data. Then, a model of human behaviour focusing on how occupants
interact with doors is proposed. The model has been developed using the BRAHMS multi-agent
software platform.
It is pointed out that a global Markov chain model can be implemented
directly in an agent. Then, it is shown that using social simulation with multi-agent systems,
the statistic model can be enriched to model interactions between occupants and equipments
that can be captured by field study.
2 State of the art
The literature suggests that occupant behaviour strongly influences energy consumption pat-
terns and is an important factor for energy waste reduction in buildings (R.V. Andersen and
Olesen, 2009). Models of human behaviour in building simulation tools are usually based on
statistical algorithms that predict the probability of an action or event. (Dong and Andrews,
2009) developed an event based pattern detection algorithm for sensor-based modelling and pre-
diction of user behaviour. They have connected behavioural models based on a Markov model
to building energy and comfort management through the EnergyPlus simulation tool for energy
calculations. Building simulation tools are based on heat transfer, thermodynamic equations and
a human model. The latter is traditionally based on fixed schedules and predefined rule; this
does not reflect the actual human behaviour complexity nor reactive and deliberative behaviours.
In the scientific literature, two different kinds of approaches of occupant behaviour can be
found: stochastic approaches, usually based on Markov chains, and multi-agent system ap-
proaches.
A first attempt (C.A.Roulet and P.Cretton, 1991) to develop a statistical model to predict
the state of windows was based on a discrete-time Markov process model to predict transitions
between angles of openings. They used Markov chains with six states, each corresponding to
a class of opening angles.(J.Page, 2007) built a time series of presence/absence from the data
collected from single person offices and used a Markov chain to reproduce the presence profiles
through simulations. (D.Robinson and F.Haldi, 2009) have developed a hybrid stochastic model
of window opening, based on three modelling approaches:
logistic probability distributions,
Markov chains and continuous-time random processes.
The multi-agent approach allows more complex reactive behaviours to be modelled but more
parameters must be customized. (S.Abras and M.Jacomino, 2010) gave the control of appliances
and sources to the software agents that are used in a home automation system.
(A.Kashif,
2014) describes a detailed inhabitant model that represents cognitive, reactive and deliberative
behaviours.
2
Conférence IBPSA France-Arras-2014
3 Problem statement
3.1 Study case
3.1.1 The field survey
In this section, the experiment, which yields data for model design, is presented. Data have
been collected from the Grenoble Institute of Technology that contains an engineering school
and a research laboratory. The building has been equipped with 165 ENOCEAN sensors on an
installation area of 1500 m2, which is divided into three distinct patterns of use:
• Administration (offices, meeting room, hall, etc)
• Teaching (classroom, computer room, corridors, etc)
• Research (offices, meeting room, cafeteria, open-space, etc)
This paper focuses on a particular office occupied by researchers because it is equipped
with many sensors. An air quality sensor is used for measuring CO2, VOC (Volatile organic
compounds), humidity (relative and absolute) and temperature. A presence sensor detects the
movement of a person in the room. This type of sensor is useful to validate the presence of a
person in the office. This sensor does not return a signal of presence if someone is sitting behind
a computer, or if someone is not in the detection area. The contact sensors give the state of doors
or windows (open=1/closed=0), the data from these sensors translate the interactions between
the occupants and the environment. These sensors provide data using the ENOCEAN radio
protocol: information may be lost during communication.
Only the data related to October and November 2013 have been used. All data from the
sensors are transmitted to a hub. These data are transmitted at random times, which are different
for each sensor. Therefore, each set of data has a variable size, depending on the day and given
data. Each sensor provides two vectors, a « time » vector and a « value » vector. Time vector
provides the dates in hours that corresponds to the values in the same position in the « value »
vector.
3.2 Study objective
This paper proposes a common framework to simulate both Markov chains at the group occupant
level, and a fine reactive modelling at the individual occupant level with a multi-agent system.
The proposed approach focuses firstly on the occupant actions on doors. A group model is de-
signed and simulated and within a multi-agent system using Markov chains. Secondly, the model
is enriched by modelling each occupant independently taking into account their interactions with
the door.
4 Modelling of the group
4.1 Purely statistical model
The Markov chain model is used to predict the door states at each hourly time step. Data
processing is carried out to standardize the contact sensor data in setting the data time step to
one hour and computing the door states in terms of the ratio of opening time within an hour.
Three states of the door are created:
• door is considered open when the opening duration percentage ≥ 80%
• door is considered as moving, if the door state changes many times within the considered
hour, when 20% ≤ opening duration percentage ≤ 80%
3
4.2 Multi-agent system implementation
Conférence IBPSA France-Arras-2014
Figure 1. Comparison between door states for real data and two Markov simulations
• door is considered closed when the opening duration percentage ≤ 20%
In the data processing, it assumed that the door is closed on weekends and during week days
from 8pm to 8am. Two time slots per day have been taken:
• 1st time slot (working time): 8am → 12pm and 2pm → 8pm
• 2nd time slot (lunch time): 12pm → 2pm
The next step is to build the transition matrix for each time slot. The transitions from one
state to another have been counted. Since there are 3 distinct states, the matrix is a 3 * 3 square
matrix, which models 9 transitions:
Too
T M =
Tom Toc
Tmo Tmm Tmc
Tcm Tcc
Tco
(1)
To get the door state for each hour, two steps are required. The first multiplies the transition
matrix by the vector representing the previous state. The second one selects a random number at
each time step and compare it with the probabilities obtained from the previous step to determine
the current state. The vector of door state probabilities is written as: P (t) = (Po(t), Pm(t), Pc(t))
with Po, the probability to have the state open, Pm, the probability to have the state move and
Pc, the probability to have the state close.
Assume the initial state of the door is closed: S(0) = (0, 0, 1). The next sample time t = 1h
is computed by: S(1) = D (S(0) × T M ) where the function D(.) stands for selecting a unified
random number r and comparing it with each probability element of P (1) = S(0) × T M:
• if r (cid:54) Po(1) then state is Open
• if Po(1) (cid:54) r (cid:54) Po(1) + Pm(1) then state is Move
• if Po(1) + Pm(1) (cid:54) r (cid:54) Po(1) + Pm(1) + Pc(1) then state is Close
Because of random processes, it has been simulated several times to check whether these
simulations are close to the recorded data. Figure 1 shows a comparison between the recorded
data and two simulation results for the 2 considered months.
4.2 Multi-agent system implementation
In the above section the actions of occupants on the door are simulated using Markov processes.
It can also be implemented using a multi agent system approach. The design process consists of
agent's perception from the outside environment and internal physical comfort. This perception
4
4.2 Multi-agent system implementation
Conférence IBPSA France-Arras-2014
Figure 2. Design process to select the next state of the door
of the environment are modelled as agents' beliefs. These beliefs lead the agent to go through the
cognition phase where the agent makes some desires based on the beliefs. Finally, based on the
social and environmental constraints, the desires are transformed into an agent's intention. This
finally leads the agent to take some actions on the environment. A change in the environment
leads the agent to revise its previous beliefs about the environment and based on the new beliefs
repeat the above process.
In a first step, all of the occupants in the office are considered as one global group agent, that
means that the behaviour of the group agent is actually the behaviour of the Markov process.
This group agent perceives some limited information from the outside environment, e.g. the
current day and time, the location and the current state of the door which are transformed into
agent's beliefs (fig.2). The door could be OPEN, CLOSE or in a MOVE state. If the current
state of the door is open then it has a set of probabilities for the next possible states, that means
that the group agent has desires for the door to be in a particular state. Some constraints convert
these desires into an intention of the agent to select the next state of the door. This constraint
states that the probability for the door to be open at next time step is higher than 0.8. In case
of probabilities between 0.2 and 0.8, a random process decides the selection of the next state of
the door. Based on this process, the group agent performs the action on the door and changes
its state for the next hour.
Figure 3 shows the screen shot of simulation results from BRAHMS simulation environment.
Only 2 out of 60 days are shown in the figure with actions of the group agent at each hour.
The object Door's state when changed is displayed by different colours, e.g. the red colored
workframe shows that the door is closed.
From the design process and the simulation results, it can be seen that the next state of the
door depends on some simple decision making variables, such as the current state of the door,
the time, etc. However, for individual agents that represent actual humans, some additional
knowledge, to that of Markov process, is required to predict the future actions on the door. This
additional knowledge represents the decisions based on the comfort levels, the influence of other
agents around, the social and group behaviours, etc. In the next section a scenario that takes
into account more complex behaviour of inhabitants and their resulting actions to change the
door state is explained. This shows that not only Markov processes can be implemented using
5
Conférence IBPSA France-Arras-2014
Figure 3. The state of the door at each hour due to actions by the group agent
a multi agent approach but also more sophisticated cognitive elements of occupants' behaviours
can be introduced in the simulation.
5 Modelling of individuals: application of a multi-agent based
design approach
5.1 Field study
In this section, the office occupants are modelled more precisely. The office is occupied by three
persons, Stephane, Khadija and Audrey. Stephane often goes for lectures at the university.
Audrey comes to the office one week out of two. Khadija comes to the laboratory every day.
In the morning, Khadija usually arrives first, then Stephane and then Audrey. The agent that
arrives first opens the door and then either leaves it open or closes it. The three agents have
different door opening and closing behaviours during different times of the day. Khadija mostly
closes the door after opening it in the morning. However, sometimes, she leaves it open. Audrey
always closes the door as she sits very close to it, it disturbs her. Stephane's behaviour is mostly
dependent upon the presence of Audrey in the office and he mostly leaves the door open if Audrey
is not in the laboratory, otherwise he closes the door if Audrey is present. While Stephane is in
the office, visitors sometimes come to see him. Visitors mostly leave the door open while they
are in the office and when they leave. Audrey, if present, closes the door after their departure,
otherwise it remains open. The agents, however, close the door while going to lunch. In the
afternoon, Khadija and Audrey usually go to the cafeteria for a coffee break. Khadija uses to
ask Stephane if he wants to go for a coffee. Sometimes he accepts Khadija's proposal but when
he is busy, he prefers Khadija to bring him a coffee from cafeteria. If Khadija has to bring coffee
for Stephane, and Audrey is not in the university, Khadija leaves the door open as she leaves as
she believes that it would be difficult on the way back to open the door with a coffee in each
hand. However, if Audrey is in the office and if she is accompanying Khadija, she closes the door
before going to cafeteria to get coffee. Stephane sometimes has meetings in a nearby meeting
room and he usually leaves the door open when leaving, except if Audrey is in the office: in that
case, he closes the door when leaving. Finally, the door is closed at night.
5.2 Simulation and results
Each actor is represented by an agent in the environment. This environment monitors the
movements of the agent, the activities that the agent performs and its thought processes.
Figure 4 shows a screen shot from the simulation where agent Audrey is present in the office.
The state of the door in the presence of agent Audrey is kept mostly closed. When the visitors
arrive at around 11am, they leave the door open but as soon as they leave, agent Audrey closes
the door. Figure 4 also shows the communication between the agents Khadija and Stephane,
where agent Khadija asks agent Stephane to have a coffee and agent Stephane replies. As agent
6
Conférence IBPSA France-Arras-2014
Audrey is in the office, agent Stephane closes the door before leaving to the nearby meeting
room.
Figure 4. Impact of occupants' behaviour on the state of the door in the presence of Audrey agent
Figure 5 shows a comparison between the recorded data and the multi-agent approach model
results.
6 Analysis of the results
The previous sections show that a multi-agent model provides the same results as a purely
statistical model. Therefore, theoretically speaking, a multi-agent model could be implemented
as a purely statistical model. Multi-agent based social simulation makes it possible to easily
implement the behaviours captured during field studies, to model the reasons behind an agent's
actions i.e. cognition and reactive behaviours, and to model the interactions between individuals.
Figure 6 shows a comparison between the two approaches with the recorded data. This shows
that a multi-agent based approach can model the complex behaviours and multiple interactions
between occupants.
7 Conclusion and future works
Multi-agent approaches are able to capture the same level of complexity as Markov chain pro-
cesses. Combined with fields studies, multi-agent approach can propose models which goes
Figure 5. Comparison between the real data and the multi-agent approach model results
7
REFERENCES
Conférence IBPSA France-Arras-2014
Figure 6. Comparison between Multi-Agent Approach results and the recorded data for 2 months
beyond Markov chain statistical approaches. However, the complexity of current multi-agent
description make it difficult to apply to building energy and indoor air quality simulation. The
future work will focus on devising a simplified multi-agent approach for building simulation. A
first step will be a connection with C02 modelling for an integrated evaluation of indoor air
quality and actions on doors and windows.
This work is funded by Agence Nationale de la Recherche project MAEVIA under contract
ANR-12-VBDU-0005. Julie Dugdale would like to acknowledge the support of the University of
Adger, Norway, to which she is affiliated.
References
A.Kashif (2014). Modélisation du comportement humain réactif et délibératif avec une approche
multi-agent pour la gestion énergétique dans le bâtiment. PhD thesis, Université de Grenoble.
C.A.Roulet, R.Fritsch, J. and P.Cretton (1991). Stochastic model of inhabitant behavior with
regard to ventilation. Technical report.
Chenailler, H. (2012). L'efficacité d'usage énergétique : pour une meilleure gestion de l'énergie
électrique intégrant les occupants dans les bâtiments. PhD thesis, Université de Grenoble.
Dong, B. and Andrews, B. (2009). Sensor based occupancy behaviour pattern recognition for
energy and comfort management in intelligent buildings. 11th Int. Building Perfor- mance
Simulation Association (IBPSA) Conf. (Glasgow, Scotland; 2009),, pages 1444 -- 1451.
D.Robinson and F.Haldi (2009). Interactions with window openings by office occupants. Energy
and Buildings, 44:2378 -- 2395.
J.Page, D.Robinson, J. (2007). Stochastic simulation of occupant presence and behaviour in
buildings. Proc. Tenth Int. IBPSA Conf : Building Simulation, pages 757 -- 764.
R.V. Andersen, J. Toftum, K. A. and Olesen, B. (2009). Survey of occupant behaviour and
control of indoor environment in danish dwellings. Energy and Buildings, 41:11 -- 16.
S.Abras, S.Ploix, S. and M.Jacomino (2010). Advantages of mas for the resolution of a power
management problem in smart homes, in advances in intelligent and soft computing. Springer,
Berlin, Heidelberg, pages 269 -- 278.
8
|
1904.04007 | 1 | 1904 | 2019-04-08T12:38:05 | Coupling agent based simulation with dynamic networks analysis to study the emergence of mutual knowledge as a percolation phenomenon | [
"cs.MA"
] | The emergence of mutual knowledge is a major cognitive mechanism for the robustness of complex socio technical systems. It has been extensively studied from an ethnomethodological point of view and empirically reproduced by multi agent simulations. Whilst such simulations have been used to design real work settings the underlying theoretical grounding for the process is vague. The aim of this paper is to investigate whether the emergence of mutual knowledge (MK) in a group of co-located individuals can be explained as a percolation phenomenon. The followed methodology consists in coupling agent-based simulation with dynamic networks analysis to study information propagation phenomena: after using an agent-based simulation we generated and then analysed its traces as networks where agents met and exchanged knowledge. Deep analysis of the resulting networks clearly shows that the emergence of MK is comparable to a percolation process. We specifically focus on how changes at the microscopic level in our agent based simulator affect percolation and robustness. These results therefore provides theoretical basis for the analysis of social organizations. | cs.MA | cs | Coupling agent based simulation with dynamic networks analysis to study the
emergence of mutual knowledge as a percolation phenomenon
Julie Dugdale(1,2), Narjès Bellamine Ben Saoud(3,4), Fedia Zouai3, Bernard Pavard5
(1) Université Grenoble Alpes; LIG, Grenoble, France
(2) University of Agder, Norway
(3) Laboratoire RIADI -- ENSI Université de La Manouba, Tunisia
(4) Institut Supérieur d'Informatique, Université Tunis el Manar, Tunisia
(5) Université P. Sabatier, CNRS, IRIT, Toulouse, France
Abstract
The emergence of mutual knowledge is a major cognitive mechanism for the
robustness of complex socio technical systems. It has been extensively studied from
an ethnomethodological point of view and empirically reproduced by multi agent
simulations. Whilst such simulations have been used to design real work settings the
underlying theoretical grounding for the process is vague. The aim of this paper is to
investigate whether the emergence of mutual knowledge (MK) in a group of co-
located individuals can be explained as a percolation phenomenon. The followed
methodology consists in coupling agent-based simulation with dynamic networks
analysis to study information propagation phenomena: after using an agent-based
simulation we generated and then analysed its traces as networks where agents met
and exchanged knowledge. Deep analysis of the resulting networks clearly shows that
the emergence of MK is comparable to a percolation process. We specifically focus
on how changes at the microscopic level in our agent based simulator affect
percolation and robustness. These results therefore provides theoretical basis for the
analysis of social organizations.
Keywords:
agent-based simulation, complex network dynamics, Percolation, social networks,
mutual knowledge, emergence
Background
1.
The aim of this paper is to propose a theoretical model for emergent organisations
such as those often encountered in complex or degraded real-world cooperative
systems.
Usually, organisations such as those in emergency control rooms, space control
centres, and nuclear power plants are composed of a group of people interacting in a
proximal space (real or virtual). In addition to verbal interactions, people also interact
in an informal way through gestures and unobtrusive observations of the actions of
others.
Such informal organisations are highly paradoxical; whilst there are many rules and
procedures that constrain how the group should handle critical situations, the way that
the activities unfold in dealing with an event is mainly non deterministic and
unstructured. What is interesting is that this paradox is only apparent if we analyse
the situation from a systemic point of view. There are many examples of this apparent
paradox, for example in early field studies of Air Traffic Control (ATC) settings,
Mell observed that even if verbal exchanges between air traffic controllers are fully
1
constrained lexically and syntactically, in the real situation only 20% of exchanges
follow the rules [18]. In a study concerning incident management in ATC, non-verbal
communication and the use of informal artefacts were found to strongly structure
coordination processes within the team [14].
The intuition behind these mechanisms is that mutual knowledge emerges more
'easily' with informal organisations than with normalised exchanges. This is largely
due to the unobtrusive nature of an informal organisation where actors are gathering
information as they need it and when their interlocutor seems available. Likewise,
seemingly adhoc and informal broadcasting of information may also be selective and
modulated by the context of the situation [5].
We are particularly interested in social cooperation and understanding collective
behaviour where agents in a complex social system may rapidly share information.
We have seen that mutual knowledge emerges when people are spatially close
together and are willing to communicate. In such situations, information can
propagate very rapidly with a minimal perturbation to on-going cognitive processes.
Mutual knowledge has also been shown to contribute to the exceptional robustness of
socio-technical systems [17] [19]. However there are many factors that can adversely
affect emergent behaviours and are detrimental to cooperation. For example, if
interactions between agents are impaired by noise, or if there are too many
interlocutors, etc. the emergence of mutual knowledge may be drastically and rapidly
reduced without actors being aware of the situation. Likewise, if people working in a
group setting are too involved in their own individual activity, they are no longer able
to overhear broadcasted communications and, as a consequence, group efficiency is
drastically reduced (e.g. [17] [19]).
Despite some analytical studies that have examined information flows in
organisational settings, there is no particular theory that can explain the advantages of
such an informal organisation. Our own previous works in the design of such
organisations, e.g. Air Traffic Control, emergency medical control room, and space
control centres, used a multi agent simulation approach in order to empirically study
the advantages and disadvantages of complex emergent organisations [24]. From
these studies we were able to use these multi-agent models to design complex control
rooms [23]. Whilst these works employed the general properties of complex systems
theory, such as emergence and self-organisation, the underlying processes that led to
advantageous proximal cooperation remained unclear. In this paper we suggest the
percolation model as a good candidate for increasing our understanding of emergent
processes in complex organisations.
Therefore the aim of this paper is:
• To confirm that the percolation mechanism is a relevant model for explaining
the emergence of mutual knowledge in a group of people interacting locally in
a non coordinated way,
• To understand what are the most important factors that affect the percolation of
mutual knowledge (e.g. effect of population density, overhearing),
In section 2, we briefly introduce percolation as well as the two types of
percolation processes (site and link percolation). A more in-depth discussion on
mutual knowledge, as being generated as part of a complex socio-technical system, is
given in section 3. Section 4 describes the methodological approach that couples both
agent-based simulation and network analysis. The experiments performed and their
results are given in section 5. Here we specifically focus on how changes at the
microscopic level in our agent based simulator affect percolation and robustness.
2
Finally, section 6 draws some conclusions and discusses the implications of the work.
2. Percolation and its modelling process
2.1. Percolation and its types
The percolation mechanism was introduced by Broadbent and Hammersley and is
a long studied phenomenon in the domains of physics and mathematics [3]. A classic
example in physics is the study of porous material. Here the porosity of the material is
modelled in terms of a probability that an open space exists between two sites of
material. Above a certain probability threshold the material will be porous;
conversely, below the threshold, it will be impermeable. Percolation is a non-linear
process that can thus explain the emergence of connected clusters; clusters of empty
space in the case of porous material. What is interesting in this concept is its non
linear characteristic with singularities which explains how a process, above certain
threshold, can drastically change its characteristics following universal rules.
Furthermore these rules are independent of the domain of the process. Outside of
mathematics, physics and materials science, the percolation mechanism has been
observed in domains such as economics, ecology, biology, computer networks,
epidemiology, and social science [6]. In social science and economics this concept
has been used to better understand the interplay between local and global actors [30].
In the marketing domain, a social percolation model has been developed [28] where
agents represent consumers situated in a social network with the aim of understanding
potential markets for products.
The percolation problem considers a network in which each node is occupied with
probability p and links are present only between occupied nodes. As the probability p
increases, connected components, called clusters, emerge. Thus the percolation
problem studies the properties of the clusters, and in particular their sizes, as a
function of the occupation probability p. It is indeed intuitively clear that if p is small,
only small clusters can be formed, while a large p will eventually engulf the structure
of the original network. As a practical example to see the difference between site and
link percolation, consider a network of people (agents) that communicate in the
mountains through optical devices (such as a torch or laser). Here the agents will be
represented as nodes and the links will be the optical signals. If the weather is
perfectly clear and all agents are efficient, we will have a probability p of 100% of
communication and the network will be very efficient in propagating the information.
However, if the agents are totally efficient but with a low level of communication due
to bad weather, the information will not propagate very far (we have link
percolation). Alternatively, if the weather is perfectly fine, but the agents are
inefficient (e.g. not very attentive) then the lack of efficiency in the network is related
to the site's behaviour (not the links); we are then in a situation of site percolation.
Finally, if both the agents and the weather are not efficient, we will have a situation of
mixed percolation. From this simple example, we can better understand the difference
between site and link percolation [27].
2.2. Modelling site and link percolation processes
Let us first consider what happens in site percolation for a two-dimensional lattice
such as the one depicted in Figure 1. In Fig 1.a, the probability that a site is active is
0.4. We can see that some sites or nodes are isolated, whilst others are contiguous,
3
forming clusters1 yet there is no cluster that fills the entire network. In Fig 1b, we
reach the critical probability (p=0.6) when the network is almost filled by connected
sites (if a porous material were being modelled, we would say that we have reached
the probability threshold that makes the material porous). In Fig 1.c, the entire
network is connected.
Figure 1: An example of site percolation for a square network. Each site is occupied,
shown as black squares, with a probability p. Fig 1.a: when p is small (p=0.4), only
little clusters of occupied sites are formed. Fig 1.b: At percolation probability (p=
0.6), a large cluster starts to emerge. Fig 1.c: Above the percolation threshold, the
cluster invades the entire space. Note that if the dimension of the network is infinite,
the cluster will also be infinite above the threshold [22]
Figure 2 shows the same phenomena but for a link network. In this type of network,
only the links between sites are considered.
Figure 2: The same percolation phenomena in a link network [22]
To study percolation theoretically, we usually consider infinite networks that exhibit
interesting properties such as:
● There is a critical p (denoted by pc) below which the probability of having an
●
infinite cluster is always 0 and above which the probability is always 1
In networks of more than two dimensions, only simulation can approximate
the percolation threshold pc, it is not possible to calculate it
● The model has a singularity at the critical point p = pc believed to be of power-
law type
If P(p) is the probability of percolation, we could say that:
1The concept of clustering refers to the tendency observed in many natural networks to form cliques in the
neighborhood of any given link.
2 We adopt the usual network terminology where an 'edge' refers to a link in a non-directed network (i.e. the
meeting network) and where an 'arc' refers to a link in a directed network (i.e. the knowledge network). We will
4
P(p) =0 if p< pc (all clusters have a finite size)
P(p) >0 if p> pc (a giant cluster appears)
P(p) is a usually an increasing function with an exception point at the
percolation threshold
Figure 3: Probability P(p) for a node to belong to the infinite percolating cluster as a
function of the occupation probability p. We can see a singularity at the percolation
threshold Pc [15].
Above the percolation point, the system exhibits invariant behaviour. The exact
value of the critical exponents does not depend on the fine details of the percolation
model. In general, they just depend on the system's dimensionality and symmetries of
the order parameter. Thus, while the exact value of Pc depends on the lattice
geometry, the critical exponents do not. This universality also means that for the same
dimension independent of the type of the lattice or type of percolation (e.g., link or
site) the fractal dimension of the clusters at Pc is the same. If we call PG, the
probability for a node to belong to the infinite percolating cluster, we have [2, p. 125]:
This means that PG follows a power law scaling from close to Pc. The scaling
law expresses the insensibility of the characteristic quantities in a percolation process
to the local and microscopic details around the critical value Pc.
The study of the percolation transition as a function of the connectivity properties of
generalised random graphs finds a convenient formulation in the generating functions
technique [7], [20].
Barrat & al. [2] report conditions for a giant cluster to arise in graphs that have a local
tree structure with no cycles. They consider an uncorrelated network with degree
distribution P(k) and compute the probability q that a randomly chosen edge leads to a
vertex of degree k. This probability is written as the average over all possible degrees
k of the products of two probabilities: (i) the probability that the randomly picked
edge leads to a vertex of degree k and (ii) the probability that none of the remaining
edges lead to a vertex connected to a giant cluster. This leads to the condition for the
heterogeneity parameter (K) of the network [2] :
5
For a directed graph, the percolation phenomenon is also shown by the emergence of
a large cluster in a network. Such a network is a giant cluster if:
These are the criteria used to assess percolation in our generated dynamic
networks.
3. Mutual knowledge and complex socio-technical systems
Mutual knowledge (MK) is knowledge that communicating parties share in common
and that they know they share [16]. Mutual knowledge is also broadly referred to as
'common ground' and is an integral part in coordinating actions and collaborative
decision-making [8, 9, 10].
Whilst MK is a very important concept it is also an ambiguous notion because it
depends on the observer's capability and the richness of the media that people use to
communicate. If we consider people interacting through email messages, the MK will
depend, not only on the explicit messages exchanged, but also on the inferences that
each agent may make when they receive the message.
In more interactive situations like face to face communications, MK will not only
depend on verbal exchanges but also on non verbal ones such as gesture and posture.
Physical constraints (such as the distance between agents) and the artefacts that
mediate the communication can also affect MK.
It is important to understand that MK, like all emergent processes, needs an observer
to identify it [1]. Thus the emergence of social structures in animal societies needs a
human-being in order for it to be described. The actors themselves cannot see the
global picture. In addition, agents are usually not conscious of the richness of their
communication processes and an external observer is needed to assess the propagation
of information as well as the structure of the information itself.
MK is therefore an abstract concept that may be far removed from real agents real
representation. Nevertheless, in some ways it represents the knowledge that is
accessible at a certain time (analogous to potential energy in physical systems).
Extensive analysis of work situations may lead to an acceptable understanding of the
parameters that determine MK. If we consider a group of people interacting verbally
in a room, we may first imagine that communication content, distance, noise,
background knowledge or the goals of each agent are good candidates for MK
parameters. In real situations the efficiency of proximal cooperation may depend on
very subtle parameters such as how to direct information to a specific group of people
without bothering others, or how to broadcast information dynamically to different
groups of people without interfering with their on-going cognitive processes.
In real situations we can also observe that group efficiency behaves in some situations
like a percolation process. Below a certain threshold of activity (or noise, workload,
etc.), the group 'efficiency' is 'boosted' by its proximal local interaction. Above this
6
threshold the group may experience a drastic loss of performance, usually without
understanding the reason for it. In our previous works this situation was often
observed in emergency control rooms. If the workload is acceptable, the room is not
too noisy and overhearing process is efficient. We can then observe the 'percolation'
phenomena: everybody is aware of everything and the network is efficient. However,
when the workload increases, the noise increases and the overhearing capabilities are
low. The same group of people may no longer be aware of other activities in the
group and the efficiency of the group is low [4].
In order to understand better this process we previously developed empirically based
simulators using a multi agent approach. The approaches varied from using a very
detailed cognitive model of interaction [11] to more analytic approaches taking into
account a limited number of parameters (such as the distance between actors, the
radius of communication, the type of knowledge, and the rate of information
exchange).
In one of these models, agents where moving randomly in their environment and each
time they met they exchanged all their knowledge about the group to which they had
initially belonged. MK was defined as the total amount of knowledge that was shared
by each agent at each instant. We observed that the emergence of MK varied in a non-
linear way with the size of overhearing capabilities (Fig. 4). However we were not
able to formally identify this process as a percolation phenomenon. The aim of the
next section is to explain our methodology in order to identify this process as a
percolation process.
Figure 4: Evolution of MK (Time to reach 50% of Knowledge) in relation to the
overhearing capability. M= Mobility of agents, N = number of agents
4. Methodological approach
4.1. Overview
7
The approach to the study of percolation was conducted in 4 phases, as shown in
figure 5.
Figure 5: Workflow of our percolation study approach.
The agent-based model characterises the behaviour of the agents in their
environment. The model was implemented in the Repast toolkit [26] and data from
each time step was generated and stored in a database. Then, the data is used to
construct a series of networks using Pajek [21], which is then analysed and visualized
in R, which is a software package for statistical computation and graphics (R software
[25]).
We generate a set of networks where each network represents one iteration of
the simulation. The number of nodes in each network is equal to the number of agents
in the simulation run, which is kept constant for each experiment.
The changes from iteration to iteration of the simulation are thus reflected in
set of generated networks. Hence, we can see the dynamics of the network over time
and specifically how the links between the nodes change. Graphs showing the
evolution of the networks are generated using R [25].
4.2. Agent-based model and simulator
In this section we describe how the percolation mechanism has been modelled using
an agent-based approach. Agent-based simulation is based on the idea that it is
possible to represent computationally the behaviour of entities interacting in a world
and that emergent phenomena can emerge as a result of these interactions. This
approach therefore offers us a powerful tool in investigating macroscopic behaviours
that result from interactions at the microscopic level. The model simulates the case
where populations of agents, belonging to different groups, interact within an
environment. When an agent meets another agent within its perception radius, they
exchange information concerning their groups.
We are interested in measuring the level of MK over time. Intuitively this social
phenomenon arises through the propagation of information within a population. The
evolution of two artificial social networks (a Meeting network and an Exchanged
Knowledge network) was studied to see if these networks exhibit percolation. As
mentioned in section 1, the percolation phenomenon is characterised by the
emergence of a large cluster in a network with the following property:
8
K = (<k2>/2<k>) > 1
where k is the number of mean links between the nodes.
If a network exhibits this condition at time t, then it is in a percolation phase.
We also test how local factors impact this phenomenon at the macroscopic level. The
factors taken into account are: the size of population; the individual properties of the
agents (such as their ability to overhear, their propensity to forget information, and
their mobility); environmental properties such as its dimension, and the nature of the
exchanged information, such as the frequency of group changes are also considered.
The model consists of N agents (minimum 103) moving randomly in an environment
represented as a grid. Each cell of the grid is the same size and may contain one or
several agents. Agents are initially randomly assigned membership of a specific
group, which may change over time. Each time an agent meets another agent within
its neighbourhood, it provides information concerning its own group as well as the
group names of agents that it knows. An agent A can therefore know the agents that
agent B knows without having met them. If there is conflicting information, e.g. agent
A believes that agent C belongs to group 1, whereas agent B believes that it belongs
to group 2, then the most recent information is used for updating. Each agent is
characterized by the following information:
ID: Each agent is assigned a number which uniquely identifies that agent
●
● Group membership: Each agent is randomly assigned to a group at the start of
the simulation. An agent may change group randomly over time; a simulator
parameter is considered for this and is set to false by default.
● List of agents met: each agent keeps a list of all of the agents that it has met.
Each element of the list is composed of three fields: the ID of the agent that
has been met, the group membership of the agent that has been met, the
number of times that the two agents have met. Initially the list contains only
one item (the ID and the group membership of the agent itself and the number
1 - signifying that the agent has met itself once). If we assume that we have 2
agents: A and B, each time A meets B there are two possible cases: A is
meeting B for the first time, in this case A adds a new element to its list
containing the ID and group of B, and the number 1. If A has already met B, it
will simply increment the frequency.
● List of known agents: each agent keeps a list of all the agents that it knows
either directly or indirectly. Again each element of the list is composed of
three fields: the ID and group of the agent, and a timestamp indicting when
this information was obtained. As with the list of agents met, this list initially
contains information only about the agent itself. When the agent meets another
agent, say agent B, it adds details of the agents that B knows to its own list and
updates any incorrect information, such the change of group of an agent. Thus
if there is an element in B's list that is not in A's list, it will be added to A's
list (without changing the time). Otherwise, if the element is already in A's
list, A checks to see if the group membership is the same in both lists and if it
is, A uses the most recent time. If the group is different, A checks the time in
both lists and uses the group corresponding to the most recent time.
In addition each agent has the following abilities:
● Move: agents move randomly in the grid according to a certain speed that was
specified at the start of the simulation.
9
● Meet: Agent A meets Agent B if they are within each other's perception
radius. This radius is the same for all agents and is specified at the start of the
simulation. The radius represents the 'overhearing range' of an agent.
● Talk (to agents they meet): Agent A talks to Agent B means that A gives a list
of all the agents and their groups that it knows to B. An agent can talk to
several agents that it meets at the same time.
● Listen (to agents they meet): Agent A listens to Agent B means that A
receives the list of all the agents and their groups from B.
● Forget: A forgets B means that A forgets what group B is a part of. Practically
this corresponds to B being deleted from A's list of agents that it knows. The
probability of forgetting is a variable set at the beginning of the simulation.
● Update incorrect information: since agents can change groups over time it is
likely that an agent will, at some stage, have incorrect information about
another agent's group. Therefore each time two agents meet, they compare
lists and update incorrect information.
Table 1 summarizes the parameters and values that were used during the experiments
Abbreviation
Name
Variables
Evolution functions
d
ng
N
m
oh
pforg
chgr
Dimension/density
Number of Groups
Number of Agents
Mobility
Overhearing
Probability of
forgetting
Change
group/changing
information
Speed of diffusion
(knowledge network)
Meeting frequency
(meeting network)
Values
10002, 50002,
100002
2
103, 104, 105
100, 300, 600, 1000
0, 1, 2, 3, 4
0.001, 0.1, 0.5, 0.7
True, False
Table 1: Parameters and values of the agent-based percolation simulator
10
Figure 6 below shows the simulator interface.
Figure 6: Agent based simulator interface at time t. The tab 'Parameters' in the
bottom-left of the figure allows the user to enter the values for the parameters. The
icons at the top of the figure allow the user to drive the simulation (e.g. initialize the
model, start or stop the simulator or see a step-by-step iteration of the simulation,
etc.). Once the simulation is complete, other buttons allow the user to send the results
to external software packages, such as Pajek, R or even Excel to analyse the structural
properties of the two networks generated by the simulation.
4.3 Networks
The interaction between agents in the environment is represented by two networks: a
meeting network and an exchanged knowledge network. The meeting network is a
weighted non-oriented graph where the nodes represent the agents. An edge between
two agents with a weight x indicates that one agent has met the other x times since the
start of the simulation. Conversely, the knowledge network is a directed graph where
nodes represent the agents and where the arc2 from agent Ai to Aj indicates that Ai
knows Aj in the sense that Ai has received, through previously meeting Aj at time t,
the group membership information about Aj. Note that because it is a directed graph,
whilst Ai may know Aj, Aj does not necessarily know Ai.
2 We adopt the usual network terminology where an 'edge' refers to a link in a non-directed network (i.e. the
meeting network) and where an 'arc' refers to a link in a directed network (i.e. the knowledge network). We will
use the term 'link' when we are referring to both networks.
11
We are interested in studying the impact of local factors and the structure of the
network on the percolation phenomenon. At the beginning of the simulation we set
the parameter values, e.g. the size of the population, the overhearing range of the
agents, etc. At the end of each simulation we obtain two sets of networks: a set
showing how the meeting network has evolved over time, and another one, showing
how the knowledge network has evolved.
5. Experiments and Results
5.1 Knowledge network: analysing the percolation
The first objective is to look for a percolation process in knowledge network where
the arcs between the sites indicate that agent Ai knows agent Aj (directed graph). The
percolation phenomenon is shown by the emergence of a large cluster in a network.
Such a network is a giant cluster if:
If Ki = input arcs (number of agents that know Ai) and Ko = output arcs (number of
agents that Aj knows)
with the percolation condition :
PsG (p) = the probability that a site belongs to the infinite cluster of the network.
12
Figure 7: Evolution of the K parameter over time for a knowledge network of size 103
If the network verifies this condition at time t, we will say that it is in a percolation
phase. Figure 7 shows the evolution of K over time with a knowledge network of size
103. The figure shows that K > 1 from t =700.
We will now use condition 2 to compute if our site network shows percolation
characteristics. The expectation is that above a certain value of Ps (probability that one
node is connected i.e. it is linked to at least one other node) most of the sites will be
connected and a giant cluster will emerge; the network will percolate.
In order to visualize site percolation, we draw PsG, which is the probability that a site
belongs to the infinite cluster of the network, in relation to Ps. Our aim is to find the
point t that shows the percolation threshold (Fig. 8, A).
In figure 8, the values of PsG are largely greater than zero below the percolation
threshold (shown by the red line) and the meeting network does not exhibit site
percolation phenomenon. Concerning the knowledge network, the values of PbG are
close to zero below the percolation threshold, showing that arc percolation exists.
As we can see, in knowledge networks, the percolation condition is not reached for
site percolation (K>1 but Ps >0). Conversely we can observe arc percolation (K=1,
PbG ≈ 0). Figure 8, B shows that PbG begins to be positive at Pb=0.0006 (critical
point). Thus, in the knowledge network if arc percolation is considered, PbG (i.e. the
probability that an arc between agents belongs to a giant arc network) meets both the
first and second conditions (Fig. 8).
13
Figure 8 (A): Probability that a site belongs to the infinite cluster of a network (PsG)
in relation to Ps (probability that a site is active all over the network). The red line
shows Ps when K=1 (the condition for the existence of a cluster that percolates). (B):
Probability that an arc belongs to the infinite cluster of a network (PbG) in relation to
Pb(probability that an arc is active all over the network). The insert in figure 8, B,
shows a magnified view at the percolation threshold. The size of the network = 103.
Thus knowledge networks exhibit a arc percolation but no site percolation. In the next
section we perform the same analysis with meeting networks.
5.2 Meeting networks: Analysing the percolation phenomenon
The same reasoning can be applied to meeting networks and the calculation of
percolation condition becomes:
Figure 9 shows the graph Pbs = f(Ps) for a meeting network of 103 nodes. Following
the same steps, we can see that the meeting network exhibits a mixed percolation
phenomenon (node and edge percolation). This result holds for all of the studied
meeting networks (independent of initial variables).
14
Figure 9 (A): Probability that a site belongs to the infinite cluster of the meeting
network (PsG) in relation to Ps (probability that a site is active). (B): Probability that
an edge belongs to the infinite cluster of meeting network (PbG) in relationship to Pb
(probability that an edge is active). The red line shows Ps for where K=1 which is the
condition for the existence of a cluster that percolates. Size of the network = 103.
5.3 Comparison between the knowledge network and the meeting network
In order to see the similarities and differences between the knowledge network and
the meeting network we can compare the respective graphs shown in figure 10.
15
Figure 10: Evolution of Mutual Knowledge (red curve) and meeting rate (black curve)
over time (logarithmic scale). The vertical red line shows the time of percolation (Tc).
Percentage on the y-axis is the percentage of MK relation to the maximal MK where
every agent knows everything about all of the other agents.
As we can see, below the percolation point Tc, the knowledge is not shared; agents
may exchange some information but we do not have any propagation of this
information. Above the threshold (Tc), the percentage of shared knowledge grows
much more rapidly than the agents that meet. This means that even before all agents
have met, every agent knows everything and this process has the properties of a
percolation. This can be explained by the fact that when two agents meet, at
maximum one edge is added to the meeting network (if the two agents have not met
before). Conversely, up to 2(n-1) arcs can be added to the knowledge network since
the two agents exchange their information.
The common points of the two networks are:
● The two curves have the same appearance (the knowledge level and the
meeting proportion are close to zero at the start); only a few agents have met
and information has not been propagated. From Tc (the percolation threshold)
the curves rapidly increase and become stable and equal to 1 signifying that all
the agents have met and all the information has been diffused throughout the
population.
● This observation confirms our previous results: the propagation of information
and the frequency of meeting are governed by a percolation process; the link
percolation threshold is the same in the two networks, i.e. 0.001 for 103
agents.
The differences are:
● The speed of information propagation is quicker than the meetings. The time
necessary to reach full mutual knowledge is a lot shorter than the time for all
the agents to meet. As mentioned previously, when two agents meet, a
maximum of one edge is added to the meeting network (if the two agents have
not met before). Conversely, up to 2(n-1) arcs can be added to the knowledge
network since the two agents exchange their information.
● The time necessary to reach the percolation threshold is shorter in the meeting
network, but we cannot currently explain this difference, however the time
taken for the two networks to be totally connected is negligible.
● The link percolation threshold is the same in the two networks (knowledge
and meeting networks), i.e. 0.001 for 1000 agents.
In the following section we analyse how percolation is sensitive to network
parameters.
5.4 Communities structure
In order to detect the structure of communities in both studied series of networks (the
meeting and the knowledge network) (size 103) we used Pajek visualization. Figure
11 shows the result before, during and after the percolation threshold.
16
Figure 11: The knowledge network (up) / meeting network (down) (A) at the
beginning of the simulation, (B) at the percolation time Tc and (C) after the
percolation time. (N = 103).
For each of the networks, at the beginning of the simulation, the network is composed
of small clusters (of which the majority are isolated nodes). When we reach the
percolation threshold a large cluster appears, and in advancing the simulation all small
clusters disappear and the large cluster envelops the entire network. These results
show the presence of a percolation phenomenon.
5.5 Effect of the number of agents
In order to study the effect of the number of agents (N), we performed simulations
with N= 103, 104 and 105, d = 5000, m = 1, overhearing = 0 and forgetting = 0.
Following table 2, we note that for the knowledge, results show that the value for the
percolation threshold pc vary with 1/N. Indeed it is exactly the probability at which
the phase transition leads to the emergence of a large cluster appearing in random
graphs, as shown by Erdos and Renyi (1959).
The percolation threshold (link or node) is reached more rapidly when N increases.
Table 2 : Percolation threshold values (Nb) and the proportion of active arcs (Pbc)
and time (Tc) in knowledge networks of sizes 103, 104 and 105.
The emergence time of a large cluster (tc) is shorter when N is larger and we reach the
percolation threshold more quickly when N increases.
5.6 Effect of density
17
We note that the denser the population, the higher the meeting frequency (figure 12
B) and thus information propagation is more rapid (figure 12 A).
Figure 12: Information propagation (A) and meeting frequency (B) for d =
10002,50002 and 100002. Percentage = percentage of MK in relation to the maximal
MK.
We can see that density does not influence the percolation threshold value in the
meeting network (node and edge percolation) or in the knowledge network (node and
arc percolation). However it does influence the time needed to reach the threshold;
this being shorter for a higher density environment (Table 3).
Table 3: Percolation threshold values of the proportion of links (Pbc) and active nodes
(Psc) and time (Tc) in knowledge networks (RC) and in meeting networks (RR) for
different values of d (d=10002, d=50002 and d=100002)
5.7 Effect of overhearing
In order to observe this effect we ran a series of simulations, each time changing the
extent of the overhearing (overhearing = 0, 1, 2, 3, 4) whilst keeping the other
variables stable (N = 103, d = 50002, m = 1, forgetting = 0).
Figure 13 shows the effect of agents overhearing on the emergence of mutual
knowledge. We note that when overhearing is higher, the propagation of information
is faster and the agents produce mutual knowledge more quickly.
18
Figure 13: Evolution of mutual knowledge as a function of overhearing. Percentage of
MK = percentage of MK in relation to the maximal MK (ef = overhearing
distance).
Table 4: Percolation threshold values of the proportion of links (Pbc), active nodes
(Psc) and time (Tc) in knowledge networks (RC) and meeting networks (RR) for
different values of overhearing (overhearing = 0, 1, 2, 3 and 4).
In both networks the percolation threshold is reached more rapidly when overhearing
is higher, but the threshold value is always the same.
Concerning the structural properties of the networks, overhearing has no influence on
the shape of the representative curves. However, there is a difference in the number of
iterations that it takes to produce the curve, this shows that mutual knowledge
emerges more quickly when overhearing is higher.
In the two following sections, we try to assess the robustness properties of mutual
knowledge processes. We have already seen that MK follows a percolation process
with universal percolation singularities, as characterized by very fast information
propagation and threshold values, etc. but we found worthwhile to investigate how
19
such process is robust to destructive processes such as probability to forget, or
unexpected information modifications.
Figure 14: Meeting frequency as a function of overhearing distance (ef) and time.
5.8 Effect of the probability to forget on information propagation
Studying the effect of forgetting allows us to analyse network robustness against the
random destruction of some of its links (which is a way to topologically simulate the
probability to forget). The study is restricted to the knowledge network since
forgetting concerns knowledge and not meeting. Figure 15 shows that as the
probability to forget rises, the level of knowledge is weaker and the agents no longer
produce mutual knowledge.
20
Figure 15: Evolution of mutual knowledge as a function of the forgetting probability
(oub). Overhearing= 3, Density= 5000x5000, Size of population= 1000.
To better assess this result we calculated the knowledge level obtained in the same
time interval according to the probability of forgetting (figure 16). The graph shows a
rapid decrease as the probability of forgetting increases.
21
Figure 16 - Incidence of forgetting (Probability to forget) on the emergence of mutual
knowledge (MK). Overhearing= 3, Density= 5000x5000, Size of population= 1000.
These results allow us to conclude that the network is weakly resistant to the removal
of some arcs (low forgetting probability). It does not support a frequent removal of
arcs and becomes disconnected; the information remains local and does not
propagate. The robustness of the network is therefore not very strong.
5.9 Effect of changing information
Agents' group memberships are updated during the simulation. We have measured
the gap between the knowledge of agents and that of the 'real-world' ('real-world' in
this case is the list of true information at each instant. The agents' knowledge is the
information held by agents that may disagree with the real world).
We first studied the effect of the frequency of changing information. As intuitively
expected, the gap closes when the frequency of changing information is lower (figure
17).
Figure 17: Influence of the frequency of changing information (cght) on the
perception of the environment. Delta MK = the gap between agent MK and real MK.
Overhearing= 3, Density= 5000x5000, Size of population= 1000.
We can see that even a very weak probability of changing information induces a
permanent gap between the real knowledge held by agents and the mutual knowledge.
The process is therefore very fragile to loss of agent memory.
We then investigate if this process of loosing memory depends on the size of the
population. From figure 18, we can see that increasing the size of the population
increases the gap between agents' knowledge and that of the 'real-world'. Thus, the
22
higher number of individuals that an agent knows, the harder it is to update incorrect
information.
Figure 18 - Influence of population size (N) on on the gap between the knowledge of
agents and that of the 'real-world' (Delta MK). Overhearing= 3, Density= 5000x5000,
Size of population= 1000.
With a low population size (N=1000), the loss of individual memory has almost no
effect on the quality of mutual knowledge; agents update their knowledge more
rapidly than they forget their knowledge.
Finally we analyse how the population density affects mutual knowledge. Figure 19
demonstrates the importance of the environment where knowledge evolves over time.
In situations where information must be regularly updated, the simulation shows that
one of the most influential variables is population density; the denser the population,
the faster the propagation of false information.
23
Figure 19: Gap between agent's mutual knowledge and the real-world mutual
knowledge (Delta MK) for different environmental dimensions. Overhearing= 3, Size
of population= 1000)
Contrary to what was expected, overhearing increases the gap between agents'
knowledge and the real-world (figure 20). However, this gap starts to decrease when
the network becomes fully connected, i.e. when all agents are known. So instead of
improving the capacity of agents to update and correct false information, overhearing
favours the spread of false information, but after a certain time interval, which is
shorter when overhearing is higher. This effect will be reversed by playing an
important role in updating false knowledge.
24
Figure 20: Gap between mutual knowledge and that of the real world (Delta MK). A
small overhearing abilities (ef= 1) affects the mutual knowledge process more than an
larger overhearing ability (ef=4).
The study of robustness properties of social networks is very important because, as
we frequently see in real systems, security issues of complex socio-technical networks
are often related to the emergence of mutual knowledge.
These results show that the robustness of the social network depends on several
factors, such as the size of the population, radius of overhearing, and the density of
the population.
We investigate this process through two mechanisms: the probability of forgetting
agent knowledge and modifying agents' internal knowledge.
We have seen that:
● The network is robust to forgetting as soon as the probability of forgetting
does not exceed 0.1
● Randomly changing agents' internal information, if the probability of change
is low (<0.01) and the population density is small, does not impact mutual
knowledge
● Contrarily to expectations, a low overhearing ability (ef= 1) has a more
important effect than a high overhearing ability (ef-4), on mutual knowledge.
This result was interpreted by assuming that a higher overhearing ability more
greatly affects the propagation of false information than repairing it through
agent's meeting.
Following these results, it appears that social networks that rely on MK to share their
knowledge are robust but only if false information is marginal. We intend by deleter
information, the processes of forgetting or random agent information transformation.
25
If not, the process of sharing information through meeting is more favourable to the
propagation of false information than to the stabilisation of a true MK.
5.10 Summary of results
The meeting networks show a mixed (nodes and link) percolation phenomenon,
whereas the knowledge network only shows the arc percolation phenomenon.
At the start of their evolution, networks are composed of small isolated clusters and at
the percolation threshold a large cluster appears that eventually envelops the entire
network.
The value for the link percolation threshold is the same in the two networks and does
not depend on the size of the network.
The probability at the percolation threshold for link percolation is inversely
proportional to the size of the network; this result has also been demonstrated by
Erdos and Renyi for random graphs.
In both networks, the degree distribution follows a power law; this is one of the
principal characteristics of scale-free networks.
6 Conclusions
The aim of this paper was to question the theoretical nature of the emergence of MK.
Emergent behaviour usually refers to spontaneous outcome due to the interaction
between many actors in critical situations. Such emergent behaviours allow people to
efficiently cooperate in complex socio technical systems such as Air Traffic Control
and regulation centres, etc. Multi-agent simulations have been extensively used both
to reproduce such emergent behaviours and as tools to design robust social networks.
Nevertheless, identifying MK as a percolation process has never been strictly proved.
Percolation can be seen as a specific and interesting type of emergence because it
exhibits very specific properties that are independent of the network's characteristics.
As examples, we have seen that at the percolation threshold, the size of the connected
network (also called giant network) grows as a power law; that giant connected
networks show fractal dimensions, and that the robustness of percolated networks can
be assessed.
From a social theory point of view, considering percolation as a specific cooperative
property in social networks is very interesting since it provides a structural framework
of the emergence of global properties that go beyond individual representations. Thus,
it gives us a theoretical framework to understand emergence in real social networks.
We therefore investigate how percolation can also be seen as a mark of optimization.
Optimization is often considered as a driving force for the evolution of biological and
social structures. We can therefore consider that the emergence of MK through
communication processes is an evolution towards very efficient collective structures.
Our comparison was based on the work of Barratt and his colleagues [2] where they
propose criteria for the appearance of a giant cluster in graphs that have a local tree
structure with no cycles. Results clearly show that the dynamics of the emergence of
MK conform to the critical percolation condition. Conditions on heterogeneity
parameters are respected and non-linear behaviour is characteristic of emergent
systems.
26
Concerning the robustness, a network's robustness was tested with the random
destruction of some of its arcs (simulating the process of forgetting) as well as with
changing node information (simulating the process of cheating). Results confirm what
has often been observed in real situations; that the emergence of robust MK is more
easily obtained with networks of small population with no deterrent phenomena such
as forgetting or false information propagation. The emergence of MK appears to be
very sensitive to deterrent processes. If we view this in light of communication
theory, we could say that the emergence of MK (or efficient cooperation) may occur
very rapidly in a cooperative network, but this MK can drop quickly if actors do not
follow the Grice's maxims of good cooperation (specifically the sincerity condition)
[13]. These results are coherent with our empirical field observations that showed that
the efficiency of team cooperation drastically falls as soon as overhearing is reduced
(e.g. due to a noisy working environment) or as soon as actors hide information [23].
References
[1] Barr, D.J. (2004). Establishing conventional communication systems: Is
common knowledge necessary? Cognitive Science 28, 937-962.
[2] Barrat A., Barthelemy M. and Vespignani A., (2008) 'Dynamical Processes on
Complex Networks', Cambridge University Press.
[3] Broadbent S.R. and Hammersley J.M., (1957) 'Percolation processes. I. Crystals
and Mazes', Proceedings of the Cambridge Philosophical Society 53, 629-641.
[4] Benchekroun H., 1992. Modelisation des mecanismes d'interlocution. These de
doctorat. CNAM, Paris.
[5] Bressolle, M.C., Pavard, B. & Leroux, M., 1995. The role of multimodal
communication in cooperation and intention recognition : the case of air traffic
control, Proceedings of the International Conference on Cooperative Multimodal
Communication, Theory and Applications, Eindhoven, The Netherlands, 24-26
May 1995.
[6] Bunde A. & Havlin, S. (Eds) (1999). Percolation and disordered systems: theory
and applications? 266: Physica A.
[7] Callaway, D. S., Newman, M. E. J., Strogatz, S. H. and Watts, D. J. (2000),
Network robustness and fragility: Percolation on random graphs, Phys. Rev.
Lett. 85, 5468-5471.
[8] Clark, H. H., and Carlson, T. (1982). Hearers and speech acts. Language, 2, 332-
393.
[9] Clark, H. H., and Marshall, C. R. (1981). Definite reference and mutual
knowledge. In A. K. Joshi, B. Webber, & I. A. Sag (Eds.), Elements of discourse
understanding (pp. 10-63). Cambridge, United Kingdom: Cambridge University
Press.
[10] Crampton, C. (2001). The Mutual Knowledge Problem and its Consequences for
Dispersed Collaboration, Organization Science, Vol. 12, No.3, pp. 346-371.
[11] Dugdale J., Pavard B., Pallamine N., Bellamine N. (2008) Simulation and
Emergency Management. Information Systems for Emergency Management. Ed.
B. Van de Walle, M. Turoff and S. Starr Roxanne Hiltz.Advances in
Management Information Systems . Vladimir Swass Series Editor.
[12] Erdos, P.; Renyi, A. (1959). On Random Graphs. I. Publicationes Mathematicae
6: 290-297.
[13] Grice, Paul (1975). Logic and conversation. In Cole, P.; Morgan, J. Syntax and
semantics. New York: Academic Press. pp. 41-58.
[14] Hutchins, E., 1990. The technology of team navigation. In Intellectual
27
Teamwork. Eds. J. Galegher., R.E. Kraut and C. Edigo, Hillsdale, N.J. :LEA.
[15] Kesten H., (1987) 'Percolation Theory and First-Passage Percolation', Annals of
Probability.Royal Statistical Society, (1954) 'Symposium on Monte Carlo
Methods', Journal of the Royal Statistical Society B 16, 23-75.
[16] Krauss, R. and S. Fussell. 1990. Mutual knowledge and communicative
effectiveness. In Intellectual teamwork: The social and technological bases of
cooperative work, ed. J. Galegher, R.E. Kraut,and C. Egido. Hillsdale, NJ:
Erlbaum.
[17] Lalouette, C., Pavard, B. (2008, October). Enhancing interorganizational
resilience by loose coupling concept and complexity paradigm. In Proceedings of
the third resilience engineering symposium.
[18] Mell, J. (1992). Study of verbal communication between pilot and airtraffic
controller in standard and non-standard situations. Doctoral thesis. Paris: Ecole
Nationale de l'Aviation Civile.
[19] Moffat, J. (2007). Modelling human decision-making in simulation models of
conflict. The International C2 Journal, 1(1), 31-60.
[20] Newman MEJ. 2003. The structure and function of complex networks. SIAM
Rev. 45:167-256.
Nantes.
[21] Pajek. http://pajek.imfm.si/doku.php
[22] Pajot S., (2001) Percolation et economie, these de doctorat de lUniversite de
[23] Pavard, B., Dugdale, J., Saoud, N. B.-B., Darcy, S. & Salembier, P (2007)
Design of Robust Sociotechnical Systems. In : Resilience Engineering.:
Remaining sensitive to the possibility of failure. Ashgate.
[24] Rateb, F., Pavard, B., Bellamine-Bensaoud, N., Merelo, J. J., Arenas, M.G.
(2005) Modelling malaria with multi-agent systems. International Journal of
Intelligent Information Technologies, 1(2), 17-27, April-June 2005. ISSN: 1548-
3657, eISSN: 1548-3665.
[25] R software. http://www.r-project.org/
[26] Repast Suite http://repast.sourceforge.net/
[27] Roussenq J. (1992), Percolation. in Encyclopaedia Universalis, Paris, vol. 17, pp.
838-840.
[28] Solomon S. and WeisbuchG., (1999) 'Social Percolation Models'.
[29] Zouai, F. (2011) Etude de la dynamique des réseaux complexes. Cas de la
percolation dans les reseaux sociaux. Mémoire de Master Recherche. Université
de la Manouba, Ecole nationale des Sciences de l'Informatique
[30] S. Cantono and S. Solomon, (2010) New J. Phys.
28
|
1306.5166 | 1 | 1306 | 2013-06-21T15:15:22 | A variant of the multi-agent rendezvous problem | [
"cs.MA",
"cs.CG",
"cs.DS",
"cs.RO",
"math.PR"
] | The classical multi-agent rendezvous problem asks for a deterministic algorithm by which $n$ points scattered in a plane can move about at constant speed and merge at a single point, assuming each point can use only the locations of the others it sees when making decisions and that the visibility graph as a whole is connected. In time complexity analyses of such algorithms, only the number of rounds of computation required are usually considered, not the amount of computation done per round. In this paper, we consider $\Omega(n^2 \log n)$ points distributed independently and uniformly at random in a disc of radius $n$ and, assuming each point can not only see but also, in principle, communicate with others within unit distance, seek a randomised merging algorithm which asymptotically almost surely (a.a.s.) runs in time O(n), in other words in time linear in the radius of the disc rather than in the number of points. Under a precise set of assumptions concerning the communication capabilities of neighboring points, we describe an algorithm which a.a.s. runs in time O(n) provided the number of points is $o(n^3)$. Several questions are posed for future work. | cs.MA | cs |
A VARIANT OF THE MULTI-AGENT RENDEZVOUS PROBLEM
PETER HEGARTY, ANDERS MARTINSSON, DMITRY ZHELEZOV
Abstract. The classical multi-agent rendezvous problem asks for a deterministic algorithm
by which n points scattered in a plane can move about at constant speed and merge at a
single point, assuming each point can use only the locations of the others it sees when making
decisions and that the visibility graph as a whole is connected. In time complexity analyses
of such algorithms, only the number of rounds of computation required are usually considered,
not the amount of computation done per round. In this paper, we consider Ω(n2 log n) points
distributed independently and uniformly at random in a disc of radius n and, assuming each
point can not only see but also, in principle, communicate with others within unit distance,
seek a randomised merging algorithm which asymptotically almost surely (a.a.s.) runs in time
O(n), in other words in time linear in the radius of the disc rather than in the number of points.
Under a precise set of assumptions concerning the communication capabilities of neighboring
points, we describe an algorithm which a.a.s. runs in time O(n) provided the number of points
is o(n3). Several questions are posed for future work.
Let g, h : N → R+ be any two functions. We will employ the following notations throughout,
0. Notation
all of which are quite standard:
(i) g(n) ∼ h(n) means that limn→∞
g(n)
h(n) = 1.
g(n)
h(n) ≤ 1.
(ii) g(n) . h(n) means that lim supn→∞
(iii) g(n) & h(n) means that h(n) . g(n).
(iv) g(n) = O(h(n)) means that lim supn→∞
(v) g(n) = Ω(h(n)) means that h(n) = O(g(n)).
(vi) g(n) = Θ(h(n)) means that both g(n) = O(h(n)) and h(n) = O(g(n)) hold.
(vii) g(n) = o(h(n)) means that limn→∞
g(n)
h(n) < ∞.
g(n)
h(n) = 0.
n=1 are two sequences of random variables. We write
Now suppose instead that (g(n))∞
g(n) ∼ h(n) if, for all ε1, ε2 > 0 and n sufficiently large,
n=1, (h(n))∞
(0.1)
(0.2)
P(cid:18)1 − ε1 <
g(n)
h(n)
< 1 + ε1(cid:19) > 1 − ε2.
P(cid:18) g(n)
h(n)
< 1 + ε1(cid:19) > 1 − ε2.
Similarly, we write g(n) . h(n) if, for all ε1, ε2 > 0 and n sufficiently large,
We will employ the standard phrase "asymptotically almost surely (a.a.s.)" when considering
a sequence of events (An)∞
n=1 such that P(An) → 1 as n → ∞. We use the notation n ≫ 0 to
denote "n sufficiently large".
Finally, if p is a point in R2 and ε > 0, we denote by Bε(p) the open ball of radius ε about
p.
One day while performing the mathematical equivalent of sitting at a bar, drinking beer
and philosophising - that is, browsing the day's listings on arxiv.org - one of the three authors
1. Introduction
Date: October 16, 2018.
2000 Mathematics Subject Classification. 68W20, 68M14, 68T40, 60D05.
1
was somehow reminded of a classic scene from the movie Terminator 2 [CW]. At one point
toward the end of the film, the evil Terminator becomes liquified after an explosion. Blobs of
liquid metal are scattered on the ground and he appears to have been "terminated". However,
as if guided by some mysterious superior intelligence, the blobs suddenly start moving toward
one another, eventually merging and reforming the intact Terminator, who then sets off on the
rampage again.
At the time, we were completely unaware of the extensive literature on the subject of ren-
dezvous problems. The movie scene got us thinking, and the results presented in this article
are the result of those thoughts. Only afterwards, when we circulated a draft paper to a col-
league who is an expert in computational geometry, were we alerted to the existing literature.
Having examined the latter, it seems to us that the kind of multi-agent rendezvous problem
we ended up considering has two important differences from what is studied in the literature.
Firstly, we imagined that agents which could see each other could also, in principle, commu-
nicate and thus exchange information. Our agents are thus more anthropomorphised than the
robots normally imagined. Secondly, we took a "probabilist's approach", and sought randomised
algorithms which would work well, for generic configurations of agents, and in the limit as both
the number and the spatial distribution of agents tended to infinity. These facts probably render
our approach of less practical significance, though we will try to convince the reader that it is,
at the very least, still an interesting thought-experiment and involves some elegant mathematics.
Rendezvous problems (RPs) originated in work of Steven Alpern, who considered the prob-
lem faced by two people who are placed randomly in a known, bounded search region in R2
and move about at unit speed to find each other in the least expected time. Alpern originally
imagined that there were a finite number of possible meeting points, but later formalised the
continuous version of the problem, and even generalised it to other compact metric spaces [A].
A variety of models have been proposed in the case of an arbitrary number of agents, which are
then usually thought of as autonomous robots, rather than fully-fledged humans. An elegant,
and classical model, makes the following assumptions:
RP-1: Each robot is idealised as a mobile point in R2. Rendezvous means the merging of
all the robots at a single point. The robots are assumed to be identical.
RP-2: The robots can move at constant speed.
RP-3: There is some fixed constant ε > 0 such that, at all times, each robot can only see those
others which are within a distance ε of itself. For a given configuration of point robots, this
gives rise to a geometric graph G whose vertices are the points, and where an edge is placed
between any two points at distance at most ε from each other. Usually G is called the visibility
graph corresponding to the point configuration. Any two points connected by an edge we shall
refer to as neighbors.
RP-4: The initial configuration is such that the visibility graph is connected. However, the
robots have no a priori knowledge that they all lie within some specific region of R2. This is in
contrast to Alpern's original formulation, where the search region was known1.
RP-5: Robots do not communicate explicitly with each other, even when they are neighbors.
Each robot is equipped with a sensor which allows it to determine the exact locations of all its
neighbors at any instant. This is the only input it has from its neighbors when deciding how to
1Note that, given RP-3, any finite number of points can almost surely merge, even if the visibility graph G
consists entirely of isolated vertices and there is no a priori knowledge of a search region. For example, the points
could perform independent Brownian motions, and since, as is well-known (see [Du] for example), the trajectory
of a Brownian motion in R2 is almost surely dense, any finite number of points will most surely be able to merge
in this manner. However, as is also well-known, the expected running time for this procedure will always be
infinite, even in the case of two points whose initial separation is any positive constant greater than the visibility
range ε. Also note that the procedure will not work at all in higher dimensions, as Brownian motions are then
no longer almost surely dense.
2
move.
Under these assumptions, one seeks a deterministic algorithm which guarantees merging. It
is natural to seek an algorithm where the actions of the robots are synchronised. What this
means is that the algorithm should consist of rounds.
In each round, every robot notes the
locations of its neighbors, performs some computation and determines a point to which it then
moves, in a straight line, from its current location. All the robots execute these tasks before
the next round begins.
The classical solution to this problem was provided by Ando, Suzuki and Yamashita [ASY],
see also [AOSY], whose algorithm utilises a well-known concept in computational geometry. Let
k be a positive integer and let S be a set of k points in the plane, say S = {p1, . . . , pk}, where
pi = (xi,yi). For each point p ∈ R2, let
(1.1)
p − pi,
f (p) := max
1≤i≤k
where · denotes Euclidean distance. There is a unique point pS at which the function
f attains its minimum value, namely the center of the unique closed disc of minimum radius
which includes all the points of S. The point pS is called the center of the smallest enclosing
circle (CSEC), with respect to the points in S. In each round of the ASY-algorithm, a robot
moves in the direction of the CSEC of the points in its viewing range (including itself), but
not necessarily to exactly the CSEC because one must ensure that the visibility graph remains
connected. Indeed, the main technical challenge for the algorithm is to specify how to satisfy
this constraint. Note that, in the last round before merging, all the robots must be visible to
one another and then they all compute the same CSEC and move to it. By definition of the
CSEC, and given RP-2, this is the optimal solution to the multi-agent Rendezvous Problem
when there is global visibility.
We found a number of papers which investigated the time complexity of the ASY and similar
rendezvous algorithms, see for example [MBCF] and [De]. Two things struck us about these
analyses. Firstly, the complexity is defined in terms of the number of rounds. The time taken to
execute computations within each round is not considered. Secondly, the analyses tend to focus
on worst-case scenarios, in other words, the primary goal is to obtain an upper bound for the
number of rounds which is valid for any connected visibility graph. Hence the bounds tend to be
expressed in terms of the number of robots. A remark on page 2221 of [MBCF] hints that, if one
begins by assuming that the robots are confined to some fixed bounded region in R2, then for
"generic" initial configurations, the size and shape of the region may be what really determine
the time complexity rather than the number of points. This viewpoint means abandoning RP-4,
of course, though note that it is less restrictive than in Alpern's original formulation, since one
is not assuming that the initial search region is known to the agents, only that such a bounded
region exists. We have not seen any paper which follows up on this idea, however.
As already stated, we began thinking about Rendezvous-type problems well before we became
aware of the existing literature on the subject2. With hindsight, the point of view we took
addresses the two issues raised above about existing time-complexity analyses. However, to
do so and yet obtain the result we were looking for, we had to abandon RP-5, and allow our
robots certain abilities to communicate with their neighbors. Furthermore, we had to foucs on
asymptotic results and randomised rather than fully deterministic algorithms. We now describe
our viewpoint.
The simplest kind of closed, bounded region in R2 is a disc, so suppose the points are initially
confined to a disc of radius n. The disc radius is our primary parameter, and we will be
interested in asymptotic results, hence in letting n → ∞. We are also interested in "generic"
configurations, so we imagine that each point is placed uniformly at random in the disc, and
2Indeed, we didn't even know the term "rendezvous problem", and had instead invented our own term termi-
nator problem, in acknowledgement of our source of inspiration.
3
independently of all other points. It is well-known - see [P] for example - that if the number N
of points satisfies N = Ω(n2 log n), then the visibility graph will a.a.s. be connected, whereas
if N = o(n2 log n), then it will a.a.s. be disconnected. So we suppose the former holds. If we
run the ASY-algorithm, then in the last step each robot will have to compute the CSEC for
some set of N points in the plane. Trivially, any procedure for doing this will require time
Ω(N ) to execute. Hence, if we include this time in our analysis, we have a trivial lower bound
of Ω(n2 log n) for the time to rendezvous. Taking all the rounds of the procedure into account
will make things even worse, though perhaps not significantly since
(a) during earlier rounds, each robot will have far fewer than N neighbors, hence most of the
computations are done only towards the end. Since the average density of points is Ω(log n)
initially, and a robot moves distance O(1) per round, what we can be certain of is that the extra
contribution to the running time coming from earlier rounds is Ω(n log n).
(b) it is a classical result that computation of a CSEC can indeed be solved in time linear
in the number of points. Megiddo [M] was the first to describe a deterministic linear-time
algorithm. Later, Welzl [W] developed an alternative procedure which is considered the state-
of-the-art solution. His algorithm is probabilistic, with expected linear running time, but it is
much simpler to describe and to implement that Megiddo's.
To repeat, given that the initial visibility graph G is a generic, connected geometric graph
inside a disc of radius n, the actual running time of the ASY-algorithm under conditions RP 1-5
above is Ω(n2 log n). On the other hand, if the points somehow "knew" where to rendezvous,
then RP-2 means they could do so in time O(n). The goal of our study was to find a probabilistic
algorithm which a.a.s. led to rendezvous in time O(n). It seems clear, though we have not proven
it rigorously (see Section 3), that this is impossible under RP-5. So we are forced to allow some
kinds of communication between points, which is perhaps a more radical departure from the
classical multi-agent Rendezvous Problem than some a priori assumption about the geometry
of the point configuration. Part of the goal then becomes to find an algorithm which contains
as simple and as few as possible assumptions about how neighboring points can communicate.
This is admittedly a subjective requirement, but as long as we can make all assumptions precise
we will at least have a well-defined mathematical problem. There is also a conceptual problem
with, say, the ASY-algorithm as n → ∞, namely that each robot would need unlimited capacity
to store the results of the computation of a CSEC. We will thus also have a preference for
algorithms which overcome this problem.
Section 2 is the heart of the paper. Having formalised our assumptions about how points
can communicate we will prove our main result, Theorem 2.4. Informally, it asserts that there
is a randomised rendezvous algorithm which a.a.s.
runs in time O(n) provided the initial
configuration of points is not too dense. Significantly, our algorithm consists of two main steps,
the first and more difficult of which involves the choice of a leader amongst the points. Indeed,
it may make more sense to think of our algorithm as being for this purpose, rather than for
the purpose of rendezvous. We will have a lot more to say about this matter in Section 3,
which contains a critical analysis of our alternative assumptions, plus suggestions for further
developing the ideas of this paper. A sceptical reader may choose to only skim through Section
2, ignoring detailed proofs, before reading Section 3.
2. Rendezvous in a disc with local communication
We start with two lemmas which will be used in the proof of the main theorem below.
Lemma 2.1. Let f : N → N be an increasing function. For each n ∈ N suppose f (n) points are
placed uniformly and independently in the interior of a disc D in R2 of radius n. Let G = Gn
be the geometric graph whose vertices are these points, and with an edge between any two points
the Euclidean distance between whom is at most one. Set λn := f (n)
πn2 , the average density of
points in the disc. There is an absolute constant C1 > 0 such that, if λn > C1 log n, then a.a.s.
(i) the degree of every vertex in G lies between π
(ii) the graph diameter of G is at most 6n.
3 λn and 2πλn,
4
Proof. There is a rich literature on random geometric graphs - see [P] - and the above state-
ments certainly follow from well-known (stronger) ones. We sketch proofs here for the sake of
completeness. Choose n and let p be any point in D. The number of vertices of Gn which are at
distance less than one from p is distributed as Bin(f (n), aλn), where a is the area of B1(p) ∩ D.
Hence a ∈(cid:0) π
ability that the degree of any particular vertex of Gn lies outside the interval (cid:0) π
2 , π(cid:3), depending on how close p is to the boundary of D. It follows that the prob-
3 λn, 2λn(cid:3) is at
most e−C2λn, for some absolute constant C2 > 0. Thus (i) follows by a simple union bound.
Indeed, note that (i) holds if we replace the factors 1
2 and
greater than 1 respectively.
3 and 2 by any constants less than 1
To prove (ii), consider two vertices p and q in Gn. No matter where they are located in D,
we can connect them by a piecewise rectangular tube of width 1
3 and of length at most 2n (see
Figure 1). We can divide this tube into square sections of side-length 1
3 and observe that any
two vertices located in adjacent sections are joined by an edge in Gn. Hence, if no section of
the tube is empty, then the graph distance from p to q is at most 6n. The probability that any
section is completely empty of vertices is at most e−C3λn for some absolute constant C3 > 0.
The claim of part (ii) follows by some simple union bounds.
p
q
Figure 1. A tube connecting two points in the disc.
Lemma 2.2. Let n ∈ N and let k = k(n) be a positive integer such that k → ∞ as n → ∞.
Suppose n binary strings s1, . . . , sn, each of length k, are generated independently and uniformly
at random. Consider a fixed string si. Suppose it compares itself with each other string sj, j 6= i,
by reading each string bit-by-bit from left to right until it encounters a bit where the string differs
from itself (if sj = si then the whole of sj is read). Let Xi be the total number of bits read by
si and let X = maxi Xi. Then X . 2n.
Proof. Xi =Pj6=i Xij, where Xij is the number of bits of sj that are read by si. We have
k
k
Xt=1
Xt=1
5
(2.1)
E[Xij] =
t · 2−t ∼ 2,
(2.2)
E[X 2
ij] =
t2 · 2−t ∼ 6.
It
Hence E[Xi] ∼ 2n and since, for a fixed i, the Xij are independent, Var(Xi) ∼ 2n also.
follows from the Central Limit Theorem that, for any ε > 0, there exists cε > 0 such that
P(Xi > (2 + ε)n) < e−cεn. The lemma then follows from a union bound.
In order to be able to prove a rigorous mathematical result, Theorem 2.4 below, we need
to specify precisely our assumptions about the capabilities of the points that are tasked with
merging. A reader may variously complain that the following list of 11 assumptions is either
too long, too ad hoc or dubious from the point of view of physics. We accept such criticisms as
valid, but nevertheless think the thought experiment we are engaged in is worth pursuing, for
two reasons. On the one hand, we think our result is mathematically interesting since, as will
become clear from the proof of Theorem 2.4, our algorithm very much relies on the geometry
of the point configuration. On the other hand, none of our 11 assumptions seems completely
ridiculous from an anthropomorphic standpoint, that is, if we imagine our "points" as being
closer to intelligent human agents rather than much more primitive robots. The fact that our
algorithm involves choosing a leader gives greater justification for this anthropomorphic view-
point. One suggestion to a potential reader is to skip the list of assumptions and go directly to
Theorem 2.4 and its proof, returning to the list only if one encounters anything in our algorithm
that seems completely implausible. Otherwise, we shall return to this discussion in Section 3.
Henceforth, we assume a fixed choice of length and time units. All implicit constant factors in
the following list, and indeed throughout the remainder of Section 2, are positive and absolute.
We consider the first five assumptions to be minimal requirements if we wish to adhere to the
spirit of the classical multi-agent RP, as expressed by RP 1-5, but allow local communication
in principle.
Assumption 1: Each point can move at speed at most one. That this constant is the same
for all points corresponds, intuitively, to the assumption that all the points are identical, and in
particular have the same "mass". Consequently, we could further assume that if, at some stage
of the merging process, two points became stuck together, then this new "heavier point" could
subsequently only move at some maximum speed less than one. However, since in our algorithm
a leader is first chosen and then all the other points move to it, this last issue is not relevant.
See Questions 3.3 and 3.8 below, however.
Assumption 2: Each point can only directly communicate (by transmission or reception of
electromagnetic or chemical signals, say, though the precise details don't matter) with other
points that are within a distance one of itself. As in Section 1, two points which can commu-
nicate directly will be called neighbors. Henceforth, what was referred to in Section 1 as the
visibility graph will now be called the communication graph.
Assumption 3: All signals travel at a fixed speed, which we can think of as being determined
by the laws of physics (and maybe chemistry).
Assumption 4: If a point broadcasts a signal, then any neighbor which receives it can locate, in
time O(1), the exact point source of the broadcast.
Assumption 5: Each point is immortal
in the sense that it can carry on the various activi-
ties desired of it at the same constant rate indefinitely. Note that this assumption is necessary
to even make sense of any asymptotic result in which the diameter of the initial configuration
tends to infinity. Here it is natural to think of the points as representing biological agents, who
can "eat" to replenish their energy stores.
Our next two assumptions regard the types of signals that a point can broadcast and how
they are processed. We assume there are two types of signals.
6
Assumption 6: Each point can broadcast simoultaneously to all its neighbors. There are a
bounded, if perhaps large, number of such signals, which we will think of as being different
colors. Any color signal can be generated, turned off or recognised in time O(1). In addition,
we assume that every point can both isolate and filter received color signals. By isolating we
mean that, if a point is receiving signals in the same color from multiple sources, then it can
identify and locate individual sources at a rate of Ω(1) sites per time unit. By filtering we mean
that, if some set C of colors are presently being broadcast amongst a point's neighbors, but it
is only interested in some subset C′ of colors, then in time O(1) it can "put on an appropriate
pair of goggles" and henceforth scan only for colors in C′, and not be disturbed in any way by
interference from colors in C\C′.
Assumption 7: Each point can also generate single bits and send them to individual neigh-
bors. A bit can be generated, an individual neighbor identified, and the bit sent to the neighbor
all in time O(1). The receiving point can process the bit and (see Assumption 4) identify its
exact source in time O(1).
Remark 2.3. Assumption 6, together with the last sentence of Assumption 11 below, is a
powerful tool. To get a feeling for this, suppose all the points are initially inside an unspecified
disc of diameter one, so we have global visibility but no universal point of reference. Then, for
N points, a.a.s. they could rendezvous in time O(log N ). For example, suppose each point is red
by default. Each point can start generating random bits, and turn blue as soon as it generates a
zero. If, at some step, all the remaining red points turn blue, then these "last men standing" go
back to red and try again. It is clear that, almost surely, within O(log N ) rounds there will be
a time at which exactly one point is red. This point then becomes the leader. Since it is visible
to all other points, they can all merge at its location. By comparison, if we only assumed RP
1-5, then the computation of a CSEC would require time Ω(N ), and that is only if we ignore
the problem of storage capacity.
Finally, we make explicit four additional assumptions which our algorithm will exploit. They
concern the abilities of the points to perform certain tasks or manouevers. Note that Assump-
tion 9 will only be used to deal with the fact that each point has a finite storage capacity - see
Remark 2.7 below.
Assumption 8: If one point receives a color signal from another and then the sender, after
waiting time O(1) so that the receiver locates it, starts to move while still transmitting the
color, then the receiver can track its movements in real time, and hence follow it if necessary in
such a way that the vector separation between the two points remains constant. If the sender
remains stationary, then the receiver can move toward it in a straight line at speed one.
Assumption 9: Given three points p1, p2, p3 which are pairwise mutual neighbors, p1 can
point out p3 to p2 and p2 can process this information, all within time O(1). We can imagine
the actual "pointing" being done by, for example, p1 shining a laser at p3. A more "low-tech"
solution would be for p1 to walk toward p3, do a little dance around it and then walk back to
where it came from. This would work given Assumption 8, and also assuming each point can
leave a beacon (which transmits a color reserved for beacons), so that it can return to its exact
starting point after a walk within a radius of one.
Assumption 10: Given any fixed ε ∈ (0, 1], a point can sweep its ε-neighborhood in such a
way that it identifies the individual points in it at a rate of Ω(1) points per time unit and does
not miss any points. In fact, our algorithm will only require this capacity for some finite number
of predetermined values of ε, namely ε ∈n 1
10C15
will appear in the proof of Theorem 2.4. Note that, what we're assuming here is more than
just the ability to determine, in time O(1), whether an identified neighbor is within a distance
, 1
2 , 1o, where C15 is an absolute constant that
7
ε or not. Rather, we are assuming that all neighbors at distance greater than ε can be blotted
out as the scan is performed, perhaps by tuning a receiver so that it blocks out signals which
are weaker than a certain threshold. We're also assuming that a point can physically perform
a sweep, for example by rotating on an axis.
Assumption 11: Following on from the previous assumption, given a point p, a value of ε
and any ninety-degree sector of Bε(p), the point can determine in time O(1) whether that sec-
tor is empty of neighbors or not. Also, given a color, it can determine in time O(1) whether or
not anyone inside Bε(p) is currently broadcasting that color.
This completes our list of asssumptions. One thing that might strike the reader as surprising
is that we do not require the points to possess clocks, for example for the purpose of synchro-
nising their actions. In fact, as we shall see, our algorithm only requires a very rudimentary
synchronisation which can be achieved without perfect clocks, given the above assumptions. We
are ready to state our main result.
Theorem 2.4. There is a randomised algorithm A for which the following holds: There are
absolute positive constants C4, C5 such that, if f : N → N is a function satisfying C4n2 log n <
f (n) = o(n3) then, under Assumptions 1-11 above, if f (n) points are placed uniformly and
independently at random in the interior of a closed disc D = Dn of radius n in R2 and proceed
to execute the algorithm A, they will a.a.s. merge in time at most C5n.
Proof. Throughout the proof there will appear a sequence of absolute, positive constants which
will be denoted by Ci, for i = 6,7, . . . , 16. Some of these constants will be related to one another,
as well as to the constants C4, C5 appearing in the statement of the theorem. We will not bother
with making these dependencies explicit, however.
As in Lemma 2.1 we will denote the average point density by λn, i.e.: λn = f (n)
πn2 . We will
denote the boundary of the disc D by δD.
Our algorithm A will consist of two main steps:
Step 1: Choose a leader.
Step 2: Everyone move to the leader's location.
More precisely, the idea is that, in Step 1, the f (n) points should perform a sequence of
operations at the end of which, a.a.s. exactly one point will be in possession of information
which identifies it as "leader", whereas every other point will possess information which allows
them to rule themselves out as leader. In fact, Step 2 can begin once one point believes itself
to be the leader, the crucial thing being that a.a.s. no other point will subsequently reach the
same conclusion and muddy the waters. Step 1 is the trickier part of the algorithm and we will
go into the details below.
In Step 2, the leader signals its identity to all its neighbors by broadcasting the color red,
this being the color reserved specifically for the signal "I am the leader" (see Assumption 6).
Once a point receives a red signal and identifies its source, it broadcasts red in turn to all its
neighbors and then moves towards the location from which it received the signal. If it received
a red signal from multiple sources, it chooses one of these at random and follows it. Our various
assumptions (in particular, Assumption 8) guarantee that Step 2 will result in all f (n) points
merging at the leader's location in time O(n), if and only if the original red broadcast reaches
all f (n) points in time O(n). It follows from Lemma 2.1(ii) that this will a.a.s. be the case,
provided f (n) > C6n2 log n for a sufficiently large C6. Note, in particular, that Step 2 works for
arbitrarily dense configurations of points, the upper bound on f (n) in Theorem 2.4 is not needed.
It thus remains to describe the implementation of Step 1. There are two crucial ingredients
and both rely on the upper bound f (n) = o(n3).
8
The first ingredient is that, if f (n) = o(n3) then, by Lemma 2.1(i), a.a.s. every point has
o(n) neighbors. Thus, by Assumption 10, every point can count its neighbors in time o(n).
There is one subtlety here, however. Recall from Section 1 that we prefer to think of each point
as possessing a finite memory capacity. Hence, for n ≫ 0, it will in general not be able to
store internally the result of a count of its neighbors. We'll present our solution to this problem
further down, but it makes our algorithm a good deal more clunky than it would be otherwise.
See also Remark 2.7.
The second crucial ingredient is that the "boundary" of the communication graph will a.a.s.
contain O(n) points. We need a precise definition:
Definition 2.5. Let G be the communication graph of a collection of points distributed in a
disc. Let v be one of these points.
If v has a set of neighbors v1, . . . , vk such that, setting
vk+1 := v1,
(i) vi and vi+1 are also neighbors, for each i = 1, . . . , k,
(ii) reading clockwise, v1, . . . , vk are the vertices of a simple polygon in the plane which
encloses v,
then v is said to be a non-boundary point of G. If no such set of neighbors of v exists, we say
it is a boundary point of G. We denote by δG the set of boundary points of G.
Claim 2.6. Suppose f (n) satisfies the assumptions of Theorem 2.4. Then
(i) there are absolute positive constants C7, C8 such that, a.a.s., C7n ≤ δG . C8n.
(ii) a.a.s. every point in δG is at distance at most C9
from δD, where C9 is another
log n
λn
absolute constant.
Proof of Claim. These kinds of statements may also follow from "well-known facts" about
geometric graphs, but we choose to give complete proofs.
For a given n, let D1 denote the closed disc with the same center as D, but of radius n − 1
n .
Set D2 := D\D1 and, for each i = 1, 2, let δiG := δG ∩ Di.
Let p be a point of D, and let r denote its distance from δD. Let o denote the center of D
and let p1p2 be the chord through p which is perpendicular to the line through o and p (see
Figure 2 on page 10). It is easy to check that ppi ≥ 1
n and
n ≫ 0.
2 , for i = 1, 2, whenever r > 1
First consider points in D2. The total number of such points in the configuration is distributed
as Bin(cid:0)f (n), a
such points is o(n), and hence that δ2G = o(n) also.
πn2(cid:1), where a is the area of D2, hence a ∼ 2π. It follows that a.a.s. the number of
Next consider a point p in the configuration at distance r > 1
n from δD. If p is to lie in δG,
then at least one of the regions Ri, i = 1, . . . , 4, in Figure 3 on page 11 must be empty. By a
simple union bound, the probability of this is at most 4 · exp(−C10λn · max(cid:8)r, 1
C10 > 0. Part (ii) of the claim now follows. Note that this immediatetely implies in turn the
lower bound in part (i), since δG must be connected, as an induced subgraph of G. For the
upper bound in part (i), let us consider the random variable X which is the number of points
in the configuration at distance r > 1
n from δD for which at least one of the four regions in
Figure 3 is empty. By definition, X stochastically dominates δ1G, so it suffices to prove that
X . C11n. For the first moment we immediately have an upper bound
2(cid:9)), for some
(2.3)
2π(n − r)e−C10λnr dr ≤ C13n.
E[X] ≤ C12λnZ n
0
We will now show that Var(X) = O(n log n), which will suffice to complete the proof. We
can write X = P Xp, a sum of indicator variables, one for each of the f (n) points in the
configuration. Let Ap denote the event for which Xp = 1, that is, dist(p, δD) > 1
one of the four regions in Figure 3 is empty. There are O(n4λ2
so it suffices to prove that, for any pair of points,
n and at least
n) pairs of distinct points {p, q},
(2.4)
nn3(cid:19) .
P(Ap ∧ Aq) − P(Ap) · P(Aq) = O(cid:18) log n
λ2
9
p1
o
p
r
p2
Figure 2.
First of all, let us define three auxiliary events Wi, i = 1, 2, 3. Let W1 be the event that the
Euclidean distance between p and q is at least two. Let W2 be the event that at least one of p
from δD. Finally, let W3 be the complement of W1 ∪ W2. A priori,
and q is at least 10C9
we can decompose the left-hand side of (2.4) as
log n
λn
(2.5)
(cid:2)P(Ap ∧ AqW1) · P(W1) − P(Ap) · P(Aq)(cid:3) + P(Ap ∧ AqW2) · P(W2) + P(Ap ∧ AqW3) · P(W3).
The main idea here is that, if W1 occurs, then the events Ap and Aq are almost negatively
correlated. Intuitively, if say Ap occurs, what we then know is that at least one of the four
regions in Figure 3, for the point p, is empty. In other words, we just know that some region
of D is empty, which must make it less likely that any disjoint region is also empty. Since q
is at distance greater than two from p, each of its four associated regions is disjoint from the
corresponding regions for p. There is one small flaw with this reasoning, namely the knowledge
that q is far away from p slightly increases the probability of the event Ap to begin with,
and vice versa. Namely, we have already ruled out q as a close neighbor of p, and hence when
calculating the probability of Ap we can imagine starting with a configuration of f (n)− 1 rather
than f (n) points. In summary,
(2.6)
P(Ap ∧ AqW1) ≤ P(A′
p) · P(A′
q),
where A′
f (n) − 1 points (and similarly for q). Clearly,
p is the same event as Ap, but calculated with respect to an intitial configuration of
P(A′
p) ≤ P(Ap) ·(cid:16)1 −
a
πn2(cid:17)−1
,
(2.7)
where a is area of any of the four regions in Figure 3, hence a = π/4. Hence,
(2.8)
P(Ap ∧ AqW1) ≤ P(Ap) · P(Aq) ·(cid:18)1 +
10
1
2n2 + O(cid:18) 1
n4(cid:19)(cid:19) .
o
R1
R4
R2
p
R3
Figure 3. The diameter of the smaller disc equals one, so that any two points
inside it are neighbors.
But recall that W1 is the event that the distance between p and q is at least two, so clearly
P(W1) ≤ 1 − 2
n2 (the right constant is 2 rather than 22 = 4 because we have to consider points
close to δD).
It follows that the first square-bracketed term in (2.5) will be negative for all
n ≫ 0, and it just remains to bound the positive contributions coming from W2 or W3. The
definition of W2 immediately implies, however, by the same argument used to obtain part (ii)
of the Claim, that it contributes negligibly. Hence, it remains to show that
(2.9)
n(cid:19) .
P(Ap ∧ AqW3) · P(W3) = O(cid:18) log n
λn (cid:17) inside the disc boundary
But W3 occurs if and only if p is placed in a strip of width O(cid:16) log n
and then q is subsequently also placed inside this strip and at distance O(1) from q. Since the
points are placed independently and uniformly at random,
n3λ2
(2.10)
P(W3) = O n log n
n2 ×
λn
log n
λn
n2 ! = O(cid:18) log2 n
n (cid:19) .
n3λ2
This already suffices to prove that Var(X) = O(n log2 n) and hence to prove part (i) of the
Claim. To get rid of another log n factor, it suffices to show that P(Ap ∧ AqW3) = O(cid:16) 1
and hence to show that P(Ap) = O(cid:16) 1
log n(cid:17),
log n(cid:17), conditioned on the assumption that p is at distance
at most 10C9
this annulus and we already know that there are a.a.s. order n points in δG, so we are done.
from the disc boundary. But there are a.a.s. on the order of n log n points in
log n
λn
11
We now return to the description of Step 1, which we break down into three substeps:
Step 1A: Each point performs, in time O(1), some tests in an attempt to rule out that it
belongs to δG. If all these tests fail, then it turns blue to signal "I believe I might belong to δG".
The idea here is that each point does something very similar to checking the four regions as in
Figure 3, and turns blue if and only if at least one of those four regions is empty. A point cannot
test exactly this condition, since it does not know where the centre o of the disc is. However it
can, for example, fix some large number K, rotate a half turn and, at equal intervals of π/K,
scan the four quadrants in its 1
2 -neighborhood, as seen from its current orientation. Each time
it scans, it just wants to decide if each of the four quadrants is empty or not, and Assumption
11 implies that this can be done in time O(1). Hence all K tests can be performed in time
OK (1). It is clear that, for a sufficiently large but now fixed K, the set of blue points will have
the properties identified in Claim 2.6, that is, there will at least C14n and a.a.s. at most C15n
,
blue points. Furthermore, for C4 ≫ 0, the blue points will a.a.s. all lie within distance
say, of the disc boundary.
100C15
1
As preparation for Steps 1B and 1C, the points which do not turn blue also have to make a
choice:
(a) turn green if you can see at least one blue point at distance at most
10C15
Since C15 is an absolute constant, this can be incorporated into the algorithm.
1
from yourself.
(b) turn yellow if you see no blue point at distance less than
, but you do see a blue
1
10C15
point at distance less than 1
2 ,
(c) if you see no blue point at distance less than 1
2 , do nothing.
There is an issue of synchronisation here, but since there is an absolute constant time in which
every point can decide whether to turn blue or not, we can also ensure that every point has
decided blue/not blue before the choices (a)-(c) are made, without needing perfectly reliable
clocks. Assumptions 10 and 11 also guarantee that the latter choices can all be made within an
absolute constant time. Hence Step 1A runs in an absolute constant time.
To complete Step 1, the idea is that the leader should come from among the points which
are blue after Step 1A. Since there are a.a.s. Θ(n) such points, if each of them were to generate
at least C16 log n random bits, independent of all the others, then for C16 ≫ 0, a.a.s. there
would be a unique point which generates the largest binary number. There are basically three
problems to be solved in order to turn this into an algorithm:
(i) how do the blue points know how many bits to generate ?
(ii) how do they store the bits ?
(iii) how do they check their numbers against those generated by all other blue points ?
Step 1B will deal with (i) and (ii), whereas Step 1C will deal with (iii). As already mentioned,
problem (ii) could be ignored if we allowed each point to possess unlimited memory, and to
overcome this is where the algorithm becomes most technical.
C4
Step 1B: Each blue point scans all its green neighbors. Lemma 2.1 implies that, for C4 ≫ 0,
log n (say) and at most o(n) green neighbors.
a.a.s. every blue point will scan at least
As explained in Assumption 10, a blue point can actually scan its surroundings in such a way
that it doesn't miss any green points and identifies them at a rate of Ω(1) points per second,
and hence can complete the scan in time o(n). Now, since the total number of blue points is
. C15n, and C15 is an absolute constant, if every blue point generated as many random bits as
it had green neighbors, then a.a.s. there would be a unique largest binary number, provided C4
is sufficiently large.
1000C15
Each time a green point is scanned, the blue scanner generates a random bit. These bits now
need to be stored somewhere, and since their number a.a.s. goes to infinity, we cannot assume
the blue point stores them in its own internal memory. This is where the yellow points enter
the picture.
12
A blue point will choose points amongst its yellow neighbors to store two copies of the
random number it generates, which we call the S-copy (S for "stationary") and the M-copy (M
for "mobile"). The reason for two copies and for our curious terminology will become clear in
Step 1C. For present purposes, the basic idea is that, each time a green point is scanned then a
random bit is generated and two yellow points selected to store it. Each selected yellow point
receives two bits, the first is the random bit generated by blue, the second determines whether
it belongs to the S-copy or the M-copy (say 0 for S and 1 for M). As soon as a point accepts a
storage request then it turns purple, to indicate that it is no longer available for such requests.
Thus each storage point belongs unambiguously to either the S- or the M-copy of a unique
number. There is one more issue to deal with, namely the bits of (a copy of) a blue chief's
number must be stored in such a way that they form an unambiguous binary number, which
can be "read from left to right" unambiguously in Step 1C. This is achieved as follows. The first
time a blue point generates a random bit and finds two yellow points to store it, it also signals
to them that they are its headmen. The S-headman turns brown and the W-headman turns
orange. The headmen now also reposition themselves so that
(i) each remains within distance 1
(ii) the line segment from the headman to the chief is approximately at right angles to the
2 of its blue chief
boundary of the disc and directed outwards from the disc
(iii) the W-headman is to the right of the S-headman, seen from the center of the disc3.
Since all the points in question are a.a.s. within distance 3
5 of the disc boundary, they can make
good estimates of the various directions involved and, together with Assumptions 8 and 9 in
particular, it is clear that they can reposition themselves so as to satisfy (i)-(iii) in time O(1).
Their blue chief tracks their movements (Assumption 8) and so is aware of their exact resting
locations. Now it is time to scan the second green neighbor, generate the second random bit and
select two yellow points to store it. As well as storing their respective bits, these two hitherto
yellow (and now purple points) now walk toward their chief and reposition themselves somewhere
on the line segment between their chief and the appropriate headman. Using Assumptions 8-9,
this manoeuvre can be successfully accomplished in time O(1). Once in position, these points
take over the role of headman, whereas the previous headmen turn new colors to indicate that
they are now tailmen. In subsequent steps, the selected storage points reposition themselves
somehere on the line segment between their chief and the current appropriate headman. Once
they have done so, they take over the role of headman, and the previous headmen turn some
neutral color to indicate that they are now middlemen.
There is one final subtlety. Since the total number of blue points is . C15n, on average
any yellow point will be able to see no more than C15
π blue points. Putting it another way, on
average no more than C15
π blue points will be competing for the services of any yellow point as
storage space. Since the total number of yellow points will be close to (5C15)2 times the total
number of green ones, on average there will be enough storage space to go round. However,
we do not see how to rule out the possibility that there may locally be much denser clusters of
blue points. A priori, it follows from Claim 2.6 that up to O(log n) blue points may be visible
from any yellow point. In that case, it can happen that a blue point runs out of storage space
before it has scanned all its green neighbors. If that is the case, we shall let the blue point
"drop out of contention", i.e.: it abandons the generation of its random number. It then turns
pink to indicate that it is out of contention for leadership, and this information is relayed to all
the current members of its S- and W-strings, who subsequently revert to white (we let this be
the default color of a point that isn't doing anything). Note that, because the points in these
strings lie on a straight line from their chief, they cannot receive signals from the latter directly,
so information has to be relayed along the string. This can still be accomplished in time o(n),
3Actually, (ii) and (iii) are unnecessary requirements, they are merely of aesthetic value. We imagine the
points of each string lining up at right angles to the disc boundary. This "looks nice", but will not be needed for
the execution of Step 1C to follow. Indeed, all that's important is that each point along the string knows where
its two neighbors are, the shape of the string as a whole is irrelevant.
13
however.
Step 1C: Once a blue point has completed Step 1B, and if it has not turned pink, it signals to
the headman of its M-string to "start walking". The idea here is that the M-string will now walk
around the boundary of the disc such that the interior of the disc is on its right4. The headman
leads the way and the other points in the string follow (see Assumption 8). As it walks, it must
follow the trail of blue and pink points, and for each blue point it must consult the S-copy of
that point's number and compare it with its own. The two numbers are compared bit-by-bit
(we specify the exact protocol below) and the comparison is aborted once a bit is found where
the two numbers differ. If the S-number has a 1 in this position, the M-headman immediately
decides that its chief is out of contention for leadership. It stops walking once it returns to its
starting point, which it recognises by the fact that the S-string it just read is identical to its
own (it knows when it's finished reading a string since it recognises a tailman by the particular
color reserved for tailmen). If it returns without having encountered any S-number greater than
its own, it signals to its chief that it is leader. The following considerations ensure that this
procedure a.a.s. achieves what we want.
Firstly, because of Claim 2.6, a.a.s. all the chiefs are located very close to the disc boundary
and hence a wandering headman can make sure it doesn't miss any blue or pink points while
keeping the interior of the disc on its right. Secondly, the lower bound on f (n) ensures that
a.a.s. exactly one chief will be declared leader, provided C4 ≫ 0. Note that it doesn't matter
if some chiefs already dropped out by turning pink in Step 1B, since there will a.a.s. be Ω(n)
of them left in the game. Thirdly, by Lemma 2.2, a.a.s. each M-string will complete its walk
in time O(n), provided it does not does not waste any time "queueing". This is the only subtle
issue here. Since an M-string may read anything from one to Ω(λn) bits of an S-string, there
may be many M-strings reading the same S-string simoultaneously. To avoid queues developing,
we need to have an appropriate reading protocol. One solution is to have the M-headman read
the S-bits one by one:
it is no problem for it to follow the trail of S-bits, since they lie in a
straight line. Alternatively, each S-bit could keep a laser shining on its successor to point it
out, see Assumption 9. Simoultaneously, the M-headman requests bits from its own string to
compare with.
Imagine that each point in the string maintains two copies of its bit, one of
which is permanent and the other in short-term memory. The headman requests bits from the
first middleman. Whenever a middleman receives a request for a bit, it empties the contents
of its short-term memory and then requests the contents of the short-term memory of the next
point along the string. In this way, bits can be passed along the M-string to the headman at
a rate of Ω(1) bits per time unit, who can then compare them one-by-one with the trail of
S-bits. This protocol ensures that the S-strings are completely "passive" and hence can be read
simoultaneously by arbitrarily many M-headmen without any queues developing.
One final comment: In steps 1B and 1C we have not bothered about trying to synchronise the
activities of different actors. I think it is clear that this is not a problem. A.a.s. steps 1B and
1C will, as described, lead to one chief identifying itself as leader in time O(n). Once it does so,
it can initiate Step 2 by turning red. Note that, during Step 1, some points in the configuration
will have changed their locations. However, a.a.s. all these points were initially within distance
3
5 of the disc boundary and hence their movements will not affect the connectedness of the
communication graph. Hence, a.a.s. Step 2 will subsequently still succeed and the whole
algorithm terminate in time O(n).
Remark 2.6. The above algorithm would also work if f (n) ≤ κn3 and the constant κ were
somehow known in advance. When f (n) = Θ(n3), then the blue points will generate Θ(n)
random bits, but this is not a problem. If κ is not specified, then the difficulty is rather that the
constant we denoted C15 will now depend on κ, since it depends on the size of δG via C8 and
4or its left, it doesn't matter as long as each headman maintains a consistent orientation. Indeed, there is no
problem if different headmen head in opposite directions.
14
C11. In fact, it is only the size of δ2G that is problematic, as this will now be Ωκ(n), whereas
we can see from (2.3) that δ1G will a.a.s. remain bounded by an absolute constant times n.
As explained in the proof, the constant C15 determines the amount of competition, on average,
for yellow storage space. To be sure there is enough storage space to go round on average, the
ratio of yellow to green points must be sufficiently large, in other words the search radius for
green points must be sufficiently small, depending on κ. We do not see how to get around
this problem. Amusingly, though, if the points somehow knew that their average density was
Θ(n), then they would realise that generating Θ(n) random bits is extremely wasteful, since it
would suffice with Ω(log n) bits. The issue of whether there is a better alternative than counting
neighbors for the task of estimating how many random bits need to be generated by a blue point
will be taken up in Question 3.7 below.
Remark 2.7. If we allowed each point to possess unlimited storage capacity, then the descrip-
tion of Steps 1B and 1C could be simplified considerably. There would be no need for the colors
grren and yellow. Each blue point could just count all its neighbors, generate one random bit
per neighbor and store the entire binary number. It could then choose a headman from amongst
its neighbors and write a copy of the number to the headman's memory. The headman would
then walk around the boundary, comparing its number with that stored in each blue point. It
would a.a.s. know it has returned to its own blue chief when it reads a number equal to its own.
The fact that our algorithm does not utilise unlimited storage capacity per point seems
important, however. Another interesting observation is that the kinds of computations done in
Steps 1B and 1C are very primitive, basically only counting and comparing strings. Of course,
the sophistication of the procedure lies in the execution of "higher-level" tasks such as scanning,
pointing and following. These are the kinds of abilities a sceptical reader might object to.
3. Comments and Questions
In this section, whenever we formulate a precise question it should be understood that the
11 assumptions made in Section 2 are valid. However, just as important an issue going forward
is whether there are algorithms which work just as well under some weaker set of assumptions
about how points can interact. This should be kept in mind at all times.
For the task of merging at a single point to be strictly meaningful, one must assume from the
outset that one is dealing with point particles which are capable of locating other point particles
with infinite precision. This is true in both the classical multi-agent Rendezvous setting (RP-5)
and in ours (Assumption 4 in Section 2). The points are idealisations and each particle has,
in "reality" a fixed, if small size. In this paper, we have considered "generic" configurations of
points in a disc of radius n in R2. In order to ensure that the communication graph would be
a.a.s. connected, it was required that the average density of particles be Ω(log n), hence goes
to infinity with n. What this implies is that, once the idealisation of point particles is removed,
then generic configurations of particles will a.a.s. not be connected and RP-4 fails. This seems
like a serious obstacle to making practical sense of the whole project of studying Rendezvous
for generic configurations of agents. So, if you didn't already consider Theorem 2.4 just an
intellectual curiosity, then that seems even more apparent now. However, it is not clear that
all is in vain, especially if one is satisfied with a randomised algorithm that a.a.s. succeeds,
rather than a fully deterministic procedure. Suppose the average point density is Θ(1), this
obviously being the most "realistic" setting, from what we have just said. Almost surely, there
will be isolated points in this regime, but there will also be large connected components, so an
isolated point does not necessarily need to perform a Brownian motion in order to make contact
with other points, something which (as stated earlier) would on average take an infinite time to
succeed. This leads to our first and most important question:
Question 3.1. In the notation of Theorem 2.4, suppose f (n) = o(n2 log n). Does there exist
a randomised merging algorithm which a.a.s. runs in finite time and, if so, how quickly as a
function of n? In particular, consider these issues when f (n) = Θ(n2). The same questions
15
can be asked in the classical setting, i.e.: assuming RP 1-5, at least as long as we ignore the
problem of storage capacity.
We suspect nevertheless that the above questions have negative answers. Hence, perhaps a
better idea is to ask the same questions, but conditioned on the communcation graph being
connected:
Question 3.2. Same question as above, but conditioned on the initial communication graph
being chosen uniformly at random from among all connected such graphs on f (n) nodes. Even
more "realistically", one could condition on the graph being connected and the number of points
per unit area being bounded.
Once one accepts that each particle has a finite size, a second obvious conclusion is that,
in reality, Rendezvous means that all the particles come to occupy some sufficiently small
region of the plane, rather than merge at a single point5. An intermediate step, which is
more mathematically appealing, is to retain the assumption of point particles but redefine the
Rendezvous condition in this way, and see if it leads to a significant reduction in the run-times
of algorithms. In Theorem 2.4, the run-time is already linear in n, so relaxing the definition
of Rendezvous cannot improve performance significantly, at least as long as we want some
non-trivial convergence of the particle swarm, that is to a disc of radius o(n). We think this
emphasises the fact that our algorithm is really a procedure for choosing a leader, rather than for
merging. Our algorithm for choosing a leader can in turn be broken down into two main steps.
In the first step, the graph boundary δG is identified approximately. In the second step, the
points which think they might be in δG assign representatives to walk around the disc boundary
comparing randomly generated binary strings. This second step seems much more contrived
than the first. In addition, the eventual merging will take place at the leader's location, which
is a.a.s. very close to the disc boundary. In contrast, classical merging procedures involve some
kind of repeated "averaging", which means that, for a generic configuration of points in a disc,
those closer to the boundary will gradually move inwards, and the eventual merging will take
place somewhere close to the center of the disc.
This leads to at least two possible lines of further questioning. On the one hand, we can seek
an alternative to our algorithm which more resembles classical merging algorithms:
Question 3.3. In the setting of Section 2, is there a linear-time algorithm which does not have
the two-step character of ours, in which first a leader is chosen and then all the points move to
its location?
On the other hand, we can seek alternative linear-time algorithms after relaxing the definition
of Rendezvous so that the points are only required to come sufficiently close together. Since
part of the problem is to specify exactly how close, we will not formulate a precise question,
though at the very least, they should all be required to move inside some disc of radius o(n). In
this relaxation it is also natural to seek an algorithm which involves less sohpisticated communi-
cation between agents than that allowed by the assumptions of Section 2. Some communication
is probably still necessary, however. If we consider the ASY-algorithm, for example, and again
ignore storage issues, it was already noted in Section 1 that the time taken to execute any non-
trivial convergence is Ω(n log n). Indeed, extending a comment made in Section 1, we conjecture
that the same is true of any algorithm which assumes RP 1-5. It would also be interesting to
determine the actual (expected) rate of convergence for such algorithms, for example ASY, for
generic connected configurations. As already mentioned in Section 1, we are not aware of any
rigorous treatment of this problem in the literature.
If, instead of questioning either the assumptions made in Section 2 or the philosophy of con-
sidering generic configurations, we accept these principles, then there are still many unanswered
5The robustness of the ASY-algorithm to removal of unrealistic idealisations was tested numerically in [AOSY].
In their simulations, they replaced each point robot by a disc of fixed area and considered n robots to have
rendezvoued once they were all inside a disc of radius 3pn/2.
16
questions. What jumps out immediately is the upper bound on f (n) assumed in Theorem 2.4.
This played two crucial roles:
(i) it implied that the size of the graph boundary was a.a.s. O(n)
(ii) it implied that each point a.a.s. had O(n) neighbors, indeed o(n) neighbors, though see
also Remark 2.6. Thus, by counting its neighbors, a blue point had a way to estimate how many
random bits it needed to generate.
First consider (i). Here it is obviously crucial that the points are distributed in a disc, that
is, a bounded region of R2 with a "nice" boundary. This leads us to our next two questions.
The first is a bit vague:
n=1 of Lebesgue measurable compact regions in R2,
Question 3.4. For which sequences (Dn)∞
satisfying Area(Dn) → ∞ as n → ∞, does an analogue of Theorem 2.4 hold ? The analogue we
have in mind here is that f (n) points are distributed uniformly and independently in Dn, where
f (n) grows sufficiently fast so that the communication graph is a.a.s. connected, but not so fast
that any point is likely to have more than O(n) neighbors.
An alternative track, which we find more appealing, is to consider the multi-agent rendezvous
problem on a compact 2-dimensional manifold without boundary. The simplest question, to
which we have no answer, is the following:
Question 3.5. Let Sn denote the 2-sphere in R3 of radius n. Suppose f (n) points are distributed
uniformly and independently on Sn, where f (n) satisfies the same conditions as in Theorem 2.4.
Under Assumptions 1-11, does there exist a merging algorithm which a.a.s. runs successfully in
time O(n) ?
We have not seen the latter question asked even in the classical setting, where RP 1-5 are
assumed. Perhaps this is just our ignorance, or perhaps it is because, if one thinks of a sphere as
representing the Earth, then a compass provides a universal point of reference and rendezvous
can trivially be accomplished in time linear in the diameter. There are two further things to
note about the problem on a 2-sphere:
(a) A Brownian motion confined to Sn will a.a.s. arrive within distance one of any point in
finite time. Hence there is certainly some merging procedure on Sn which a.a.s. runs in finite
time. For example, two points could merge once they see each other, with a point choosing a
neighbor at random to merge with if it has more than one. Once points become isolated they
could perform a Brownian walk. The expected running time of even this rather stupid algorithm
is unclear to us, however, especially in light of Assumption 1 in Section 2.
(b) Something close to Question 3.5 arises if we try to extend our algorithm to higher dimen-
sions. Consider an initial configuration of points inside a ball in R3. Step 1A of our procedure
would identify a subset of blue points close to the boundary of the ball, hence close to a 2-sphere.
We are not quite left with Question 3.5, since these points can also move through the interior
of the ball now. However, these observations suggest that a different approach may also be
necesary in higher dimensions.
Now suppose we turn instead to point (ii). There is another obvious question:
Question 3.6. Can Theorem 2.4 be extended to even denser configurations of points ? In other
words, is there a linear-time merging algorithm on the disc which succeeds even when the average
point density is super-linear ?
An additional observation here is that the method for generating random numbers described
in Step 1B of our algorithm is very inefficient when f (n) ≫ n2 log n since, as long as f (n) grows
polynomially in n, it would suffice for each blue point to generate Ω(log n) bits, whereas in fact
each blue point generates on the order of f (n)/n2 bits. An alternative procedure we considered
is to have the blue points estimate n, the diameter of the disc. We considered a specific, and
rather complicated, signalling procedure, whereby the blue points send signals to their neighbors
17
which are relayed inwards in such a manner that, a.a.s., the signals bounce back only once they
have reached very close to the center of the disc. The details are not important as we could not
prove that our procedure worked, but we can state another question:
Question 3.7. As an alternative to Step 1B, is there a procedure by which the blue points can
estimate the diameter n of the disc, up to an absolute multiplicative factor say, a.a.s. in time
O(n) ?
We conclude with a couple more questions which seem interesting, though are perhaps less
important. One striking aspect of our "choose a leader then move to it" algorithm is that all
the points merge at one place. This is also true of classical rendezvous procedures. Noting also
Assumption 1, we can ask
Question 3.8. In the setting of Section 2, is there a linear-time algorithm which includes
merging of groups of points at intermediate steps and at different locations, rather than all
having all the points merge only at the end at a single location ?
We pose our last question as it may be interesting in its own right, as a problem in compu-
tational geometry:
Question 3.9. In the setting of Section 2, is there a linear-time algorithm for identifying the
graph boundary exactly?
Beyond the discussion above, several other possible lines of investigation present themselves
naturally, though they take us into even less well-defined territory. For example, one might
consider initial configurations of points which are not uniform i.i.d. Ultimately, one can question
the various assumptions listed in Section 2, and try to formulate an interesting problem under
some other set of assumptions. Last but not least, in the setting of Section 2, is there a really
simple linear-time algorithm which we have completely missed, which would render most of this
manuscript unnecessary ?
[A]
[AOSY] H. Ando, Y. Oasa, I. Suzuki and M. Yamashita, Distributed memoryless point convergence algotirhm for
S. Alpern, The rendezvous search problem, SIAM J. Control Optim. 33 (1995), No.3, 673 -- 683.
mobile robots with limited visibility, IEEE Trans. Robotics Automation 15 (1999), No.5, 818 -- 828.
References
[CW]
[De]
[ASY] H. Ando, Y. Suzuki and M. Yamashita, Formation and agreement problems for synchronous mobile
robots with limited visibility, in: Proceedings of the 1995 IEEE International Symposium on Intelligent
Control (ISIC 1995), pp. 453 -- 460.
J. Cameron and W. Wisher Jr., Terminator 2: Judgement Day, TriStar Pictures (1991).
B. Degener, B. Kempkes, T. Langner, F. Meyer auf der Heide, P. Pietrzyk and R. Wattenhofer, A tight
runtime bound for synchronous gathering of autonomous robots with limited visibility, in: Proceedings
of the 23rd ACM Symposium on Parallellism in Algorithms and Architectures (SPAA '11), pp. 139 -- 148
(2011).
R. Durrett, Probability: Theory and Examples (3rd edition), Belmont: Thomsen Brooks/Cole (2006).
N. Megiddo, Linear-time algorithms for linear programming in R3 and related problems, SIAM J. Com-
puting 12 (1983), No.4, 759 -- 776.
[Du]
[M]
[MBCF] S. Martinez, F. Bullo, J. Cortes and E. Frazzoli, On synchronous robotic networks - Part II: Time
complexity of rendezvous deployment algorithms, IEEE Trans. Automat. Control 52 (2007), No.12,
2214 -- 2226.
M. Penrose, Random Geometric Graphs, Oxford University Press (2007).
E. Welzl, Smallest enclosing discs (balls and ellipsoids), Lecture Notes Comp. Sci. 555 (1991), 359 -- 370.
[P]
[W]
Department of Mathematical Sciences, Chalmers University Of Technology and University of
Gothenburg, 41296 Gothenburg, Sweden
E-mail address: [email protected], [email protected], [email protected]
18
|
1601.07011 | 1 | 1601 | 2016-01-26T13:23:06 | Distributed Detection over Adaptive Networks: Refined Asymptotics and the Role of Connectivity | [
"cs.MA",
"cs.IT",
"cs.IT"
] | We consider distributed detection problems over adaptive networks, where dispersed agents learn continually from streaming data by means of local interactions. The simultaneous requirements of adaptation and cooperation are achieved by employing diffusion algorithms with constant step-size {\mu}. In [1], [2] some main features of adaptive distributed detection were revealed. By resorting to large deviations analysis, it was established that the Type-I and Type-II error probabilities of all agents vanish exponentially as functions of 1/{\mu}, and that all agents share the same Type-I and Type-II error exponents. However, numerical evidences presented in [1], [2] showed that the theory of large deviations does not capture the fundamental impact of network connectivity on performance, and that additional tools and efforts are required to obtain accurate predictions for the error probabilities. This work addresses these open issues and extends the results of [1], [2] in several directions. By conducting a refined asymptotic analysis based on the mathematical framework of exact asymptotics, we arrive at a revealing and powerful understanding of the universal behavior of distributed detection over adaptive networks: as functions of 1/{\mu}, the error (log-)probability curves corresponding to different agents stay nearly-parallel to each other (as already discovered in [1], [2]), however, these curves are ordered following a criterion reflecting the degree of connectivity of each agent. Depending on the combination weights, the more connected an agent is, the lower its error probability curve will be. Interesting and somehow unexpected behaviors emerge, in terms of the interplay between the network topology, the combination weights, and the inference performance. The lesson learned is that connectivity matters. | cs.MA | cs |
Distributed Detection over Adaptive Networks:
1
Refined Asymptotics
and the Role of Connectivity
Vincenzo Matta, Paolo Braca, Stefano Marano, Ali H. Sayed
Abstract
We consider distributed detection problems over adaptive networks, where dispersed agents learn
continually from streaming data by means of local interactions. The requirement of adaptation allows the
network of detectors to track drifts in the underlying hypothesis. The requirement of cooperation allows
each agent to deliver a performance superior to what would be obtained if it were acting individually.
The simultaneous requirements of adaptation and cooperation are achieved by employing diffusion
algorithms with constant step-size µ. In [1], [2] some main features of adaptive distributed detection
were revealed. By resorting to large deviations analysis, it was established that the Type-I and Type-II
error probabilities of all agents vanish exponentially as functions of 1/µ, and that all agents share the
same Type-I and Type-II error exponents. However, numerical evidences presented in [1], [2] showed
that the theory of large deviations does not capture the fundamental impact of network connectivity on
performance, and that additional tools and efforts are required to obtain accurate predictions for the
error probabilities. This work addresses these open issues and extends the results of [1], [2] in several
directions. By conducting a refined asymptotic analysis based on the mathematical framework of exact
asymptotics, we arrive at a revealing and powerful understanding of the universal behavior of distributed
detection over adaptive networks: as functions of 1/µ, the error (log-)probability curves corresponding
V. Matta and S. Marano are with DIEM, University of Salerno, via Giovanni Paolo II 132, I-84084, Fisciano (SA), Italy
(e-mail: [email protected]; [email protected]).
P. Braca is with NATO STO Centre for Maritime Research and Experimentation, La Spezia,
Italy (e-mail:
[email protected]).
A. H. Sayed is with the Electrical Engineering Department, University of California, Los Angeles, CA 90095 USA (e-mail:
[email protected]).
A short version of this work appeared in the conference publication [3].
October 28, 2018
DRAFT
2
to different agents stay nearly-parallel to each other (as already discovered in [1], [2]), however, these
curves are ordered following a criterion reflecting the degree of connectivity of each agent. Depending
on the combination weights, the more connected an agent is, the lower its error probability curve will
be. The analysis provides explicit analytical formulas for the detection error probabilities and these
expressions are also verified by means of extensive simulations. We further enlarge the reference setting
from the case of doubly-stochastic combination matrices considered in [1], [2], to the more general and
demanding setting of right-stochastic combination matrices; this extension poses new and interesting
questions in terms of the interplay between the network topology, the combination weights, and the
inference performance. The potential of the proposed methods is illustrated by application of the results
to canonical detection problems, to typical network topologies, for both doubly-stochastic and right-
stochastic combination matrices. Interesting and somehow unexpected behaviors emerge, and the lesson
learned is that connectivity matters.
Index Terms
Distributed detection, adaptive network, diffusion strategy, large deviations analysis, exact asymp-
totics.
I. INTRODUCTION AND MOTIVATION
Adaptive networks consist of spatially dispersed agents, learning continually from streaming
data by means of distributed processing algorithms. With a proper form of cooperation, each
agent is able to deliver an inference performance superior to what would be obtained if it
were acting individually. When called to operate in complex and dynamical scenarios (e.g., in
the presence of drifts in the statistical conditions, in the environmental conditions, and in the
network topology, among other possibilities), the agents must be further endowed with strong
adaptive capabilities, in order to respond in real-time to these variations.
Several useful distributed inference solutions are available that meet these requirements. Par-
ticularly relevant to our setting are the diffusion implementations based on adaptive algorithms
with constant step-size [4] -- [7]. The use of a constant step-size (as opposed to the decaying
step-size employed in the case of consensus algorithms [8] -- [19]) is key to enable continuous
learning, e.g., to meet the fundamental requirement of tracking. The interplay between adaptation
and learning is critical for guaranteeing the successful network operation and to produce reliable
inference.
October 28, 2018
DRAFT
3
Such an interplay has been examined rather deeply in the framework of estimation problems,
while less attention has been devoted to detection problems. Distributed detection over adaptive
networks can be succinctly described as follows. A network of dispersed agents, linked together
by a given topology, monitors a certain physical phenomenon. As time elapses, the agents gather
from the environment streaming data, whose statistical properties depend upon an unknown state
of nature, formally represented by a pair of hypotheses, say, H0 and H1. At each time instant,
each individual agent must produce a decision inferring the current state of nature, using its own
available observations and the local exchange of information obtained from consultation with its
neighbors. Due to the requirement of adaptation, the agents must be able to react promptly to
drifts in the current state of nature, while guaranteeing an adequate performance level (i.e., low
detection error probabilities) at the steady-state, namely, when a given hypothesis is in force for
sufficiently long time.
With reference to the above setting, in the recent works [1], [2] several interesting results were
derived that allowed the authors to establish fundamental scaling laws for adaptive distributed
detection by multi-agent networks. In particular, it was shown there that for diffusion strategies
with constant step-size µ, the steady-state error probabilities exhibit an exponential decay, as
µ → 0, as functions of 1/µ. By resorting to a detailed large deviations analysis, the exact
scaling law was fully characterized in [1], [2] in terms of a rate function Φ(γ) that can be
evaluated analytically. Notably, the results of [1], [2] showed that all network agents share the
same error exponent so that their error probabilities are asymptotically equivalent to the leading
exponential order as µ → 0. This is a remarkable feature of adaptive distributed detection
solutions. Readers may consult the introductory remarks of [1], [2], which contain a detailed
and motivated summary of these results.
One known limitation of large deviations analysis resides in the fact that it focuses only on the
leading exponential order, thus neglecting all sub-exponential terms. The practical implication of
this fact can be easily illustrated by a simple example. Assume network agents 1 and 2 exhibit
asymptotic error probabilities P1 and P2 of the form:
P1 = e
(1)
where o(1) stands for any correction such that o(1) → 0 as µ → 0. These two probabilities have
the same error exponent multiplying −1/µ (and is equal to one), but the error probability at
P2 = 2 e
− 1
µ = e
µ [1+o(1)],
− 1
µ ,
− 1
October 28, 2018
DRAFT
4
agent 2 is always twice that of agent 1. This is because the factor 2 is a sub-exponential term.
The above consideration is particularly relevant in the context of adaptive distributed detection
since numerical experiments reported in [1], [2] show that, depending on the particular network
structure, different agents have different error probabilities, while exhibiting the same scaling
law to the leading exponential order. Even more remarkably, the experimental results of [1], [2]
suggested that the differences in the error probabilities appear to be related to the degrees of
connectivity of the various agents. Accordingly, the main purpose of this paper is to perform a
refined asymptotic analysis overcoming the limitations of large deviations, in order to capture the
fundamental dependence of the error probabilities at different agents upon the specific network
connectivity. In this way, we will be able to show that the partial empirical evidences in [1], [2]
are in fact representative of a universal behavior of distributed detection over adaptive networks.
Another relevant contribution provided in this work is that, differently from what was done
in [1], [2], we shall not limit the analysis to doubly-stochastic combination matrices and will
consider instead the broader class of right-stochastic matrices. This latter class is relevant in
practical applications. Indeed, while doubly-stochastic matrices might look preferable in detection
applications in view of the asymptotic equipartition of the combination weights, they are not
always realizable in practice. This happens, for instance, due to physical limitations in the
topology and/or communication constraints. This generalization in the nature of the combination
policy poses new and interesting questions in terms of the interplay between the network
topology, the combination weights, and the inference performance.
In summary, as a result of the refined analysis presented in this work, we will not only be
able to evaluate in quantitative terms how network connectivity reflects on the performance of
different agents, but we will also be able to clarify how different network structures (i.e., different
combination matrices and network topologies) globally impact the network performance.
A. Related Work
Distributed detection is a classical topic, and the pertinent literature is therefore extensive. Any
set of references would be by-no-means exhaustive, so that we refer the reader to [20] -- [31] as
fundamental entry points on the subject. In this work we consider fully-decentralized detection
problems, i.e., fully-flat network architectures without fusion center, where the agents are only
allowed to interact locally. Several recent works address this scenario and, in particular, solutions
October 28, 2018
DRAFT
5
based on decentralized consensus strategies with decaying step-size have been successfully
proposed in [8] -- [13], and the detection performance of these algorithms has been accurately
characterized in different asymptotic frameworks [8] -- [13]. However, as already observed in
the introduction, a distinguishing feature of our work resides in the emphasis on adaptive
solutions. To enable adaptation, it has been shown that diffusion algorithms with constant step-
size are superior to consensus implementations due to an inherent asymmetry in the consensus
update that has been shown to be a source of potential instability in the consensus dynamics
when constant step-sizes are used [4] -- [7]. Several performance results are already available for
diffusion strategies in connection to their mean-square-error (MSE) estimation behavior [4] -- [7].
The corresponding results for detection applications are relatively limited. In [32] the problem
of using diffusion algorithms for detection purposes has been considered, with reference to
a Gaussian problem. More recently, the general problem of distributed detection over adaptive
networks has been posed in [1], [2]. By means of a large deviations analysis, the Type-I and Type-
II error exponents, for doubly-stochastic combination matrices, were characterized in closed-form
in these works. It was shown that the detection performance of the network solution is equivalent
to the fully-connected solution to the first-leading order in the exponent. However, numerical
and simulation results in [1], [2] showed that the network connectivity and the overall structure
of the combination weights do matter, and they influence the performance of the individual
agents. Analytical formulas for accurate evaluation of the detection error probabilities, and for
elucidating the relationship between the network structure and the expected performance, are
currently missing. Filling this important gap is the main theme of this work.
B. Summary of Main Result
In order to introduce the main result, we refer to the steady-state (i.e., as time goes to infinity)
output of the diffusion algorithm with constant step-size µ. The steady-state output at the k-
th agent is denoted by y(cid:63)
k,µ tends
to concentrate in the close proximity of the expected value of the local statistics, denoted by
E[x]. In order to characterize the error probabilities, we shall evaluate the probability that y(cid:63)
k,µ
deviates significantly from this expected behavior. Without loss of generality, we shall focus on
the following probability:
k,µ. It was shown in [1], [2] that, for small step-sizes, y(cid:63)
October 28, 2018
P[y(cid:63)
k,µ > γ],
γ > E[x].
(2)
DRAFT
With reference to the case of doubly-stochastic combination matrices, it was established in [1],
[2] that
µ ln P[y(cid:63)
k,µ > γ] = −Φ(γ),
lim
µ→0
where Φ(γ) is the so-called rate function. Equivalently, we can rewrite (3) as
P[y(cid:63)
k,µ > γ] = e
− 1
µ [Φ(γ)+o(1)].
6
(3)
(4)
This last form of representation highlights the fact that sub-exponential terms are neglected by
large deviations analysis.
A refined analysis can be pursued by seeking an asymptotic approximation, Pk,µ(γ), that
ensures the much stronger conclusion:
i.e.,
P[y(cid:63)
k,µ > γ] = Pk,µ(γ)[1 + o(1)],
P[y(cid:63)
k,µ > γ]
Pk,µ(γ)
lim
µ→0
= 1.
(5)
(6)
This framework is commonly referred to as exact asymptotics, and has been originally studied
in [33] with reference to the simplest case of normalized sums of independent and identically
distributed (i.i.d.) random variables -- see also [34], [35]. In the following, we shall often write
P[y(cid:63)
k,µ > γ] ∼ Pk,µ(γ)
to denote an asymptotic equivalence of the kind (6). It is immediately seen that (6) implies
lim
µ→0
µ ln P[y(cid:63)
k,µ > γ] = lim
µ→0
µ ln Pk,µ(γ),
(7)
(8)
which means that any exact asymptotic Pk,µ(γ) is able to reflect the leading exponential term.
The main result established in this paper can now be formally stated as follows:
Pk,µ(γ) =
µ
γ φ(cid:48)(cid:48)(θγ)
2πθ2
e
− 1
µ[Φ(γ)+k,µ(θγ )]
(9)
The main quantities necessary to evaluate the asymptotic approximation Pk,µ(γ) in the above
expression are now briefly introduced. The function φ(t) will be described in closed-form, and
depends on the underlying statistical model through the moment generating function of the local
October 28, 2018
DRAFT
(cid:114)
7
statistics, and on the network topology only through the limiting vector of combination weights
(aka the Perron eigenvector, see, e.g., [7]). The quantity θγ is the solution to the equation:
φ(cid:48)(θγ) = γ.
(10)
The function Φ(γ), which was the main object of study in [1], [2], is the so-called rate function,
and is computed directly from φ(t), namely, it is the Fenchel-Legendre transform of φ(t) [34],
[35].
Finally, the (sub-exponential) correction term k,µ(θγ) depends on the underlying statistical
model through the moment generating function of the local statistics, and on the network topology
through the actual (not only the limiting) network combination weights. This correction satisfies:
k,µ(θγ)
(11)
In particular, the ratio k,µ(θγ)/µ stays bounded as µ → 0. Loosely speaking, this means that the
overall correction appearing at the exponent in (9) plays, asymptotically, the role of a constant
correction.
µ→0−→ 0.
Despite its apparent complexity, Eq. (9) possesses a well defined structure, revealing important
connections with the physical behavior of the adaptive distributed system under consideration.
Let us elucidate some of these features. We start by the leading order in the exponent. It is easy
to see that:
µ ln Pk,µ(γ) = −Φ(γ) − k,µ(θγ) +
ln(cid:2)2πθ2
γ φ(cid:48)(cid:48)(θγ)(cid:3)
µ
2
ln µ − µ
2
µ→0−→ −Φ(γ),
(12)
which easily follows from (11). This means that the approximation Pk,µ in (9) can be regarded
as
Pk,µ(γ) = e
− 1
µ [Φ(γ)+o(1)].
(13)
This is consistent with result (3), which was established in [1], [2] for the case of doubly-
stochastic combination matrices. The terms of order o(1) in (13) collect all the sub-exponential
corrections that appear in (9). They can be separated into two categories. The first correction
in (9). This term is a typical sub-exponential refinement arising in
the framework of exact asymptotics, and is a consequence of a local Central Limit Theorem
is the term (cid:113) µ
γ φ(cid:48)(cid:48)(θγ )
2πθ2
October 28, 2018
DRAFT
8
(see [33] -- [35]). Observe that this correction, which is related to the network topology only
through the Perron eigenvector, is independent of the agent index k, and is therefore applicable
to all agents. In contrast, the second correction k,µ(θγ) depends on the agent index k and, as
it will be detailed in the exact statement of the main theorems, takes into account the entire
network topology and combination weights.
The above considerations lead to the important conclusion that (9) provides a detailed and
revealing assessment of the universal behavior of distributed detection over adaptive networks:
as functions of 1/µ, the error (log-)probability curves corresponding to different agents not only
stay nearly-parallel to each other, but they are also ordered following a criterion dictated by
the correction term k,µ(θγ). As we shall see later -- see Fig. 1 for an example, this criterion
reflects the degree of connectivity of each agent. Depending on the combination weights, the
more connected an agent is, the lower its error probability will be, and the correction term
k,µ(θγ) is sufficiently rich to capture this behavior.
Notation. We use boldface letters to denote random variables, and normal font letters for their
realizations. Capital letters refer to matrices, small letters to both vectors and scalars. Sometimes
we violate this latter convention, for instance, we denote the total number of sensors by S. The
symbols P and E are used to denote the probability and expectation operators, respectively. The
notation Ph and Eh, with h = 0, 1, means that the pertinent statistical distribution corresponds
to hypothesis H0 or H1.
II. PROBLEM FORMULATION
We consider a sensor network that collects observations about a physical phenomenon of inter-
est. Data are assumed to be spatially and temporally independent and identically distributed. From
the observation measured at time n, the k-th agent computes its local statistic (the observation
itself, or a suitable function thereof), which is denoted by xk(n), k = 1, 2, . . . , S. The mean and
variance of xk(n) will be denoted by E[x] and σ2
x, respectively. To avoid trivialities, throughout
the paper it is assumed that the random variable xk(n) is non-degenerate.
A. Diffusion Strategy
Following the framework developed in [1], [2], we focus on the class of diffusion strategies
for adaptation over networks [6], [7], [32], and in particular on the ATC (Adapt-Then-Combine)
October 28, 2018
DRAFT
implementation due to some inherent advantages in terms of a slightly improved mean-square-
error performance relative to other forms [6]. Extensions to other diffusion implementations, as
well as to consensus implementations, are certainly possible. In the ATC algorithm, each node
k updates its state from yk(n − 1) to yk(n) through local cooperation with its neighbors as
follows:
9
vk(n) = yk(n − 1) + µ[xk(n) − yk(n − 1)],
(14)
S(cid:88)
(cid:96)=1
ak,(cid:96)v(cid:96)(n),
yk(n) =
(15)
where 0 < µ (cid:28) 1 is a small step-size parameter. It is seen that node k first uses its locally
available statistic xk(n), to update its state from yk(n − 1) to an intermediate value vk(n).
The other network agents simultaneously perform similar updates using their local statistics.
Subsequently, node k aggregates the intermediate states of its neighbors using nonnegative convex
combination weights {ak,(cid:96)} that add up to one. Again, all other network agents perform a similar
calculation. Collecting the combination weights into a square matrix A = [ak,(cid:96)], then A is a right-
stochastic matrix, namely, the entries on each row add up to one. Formally:
ak,(cid:96) ≥ 0, A1 = 1,
(16)
with 1 being a column-vector with all entries equal to 1. We denote the n-th power of A by
Bn = [bk,(cid:96)(n)] (cid:44) An.
(17)
Throughout this article, we assume that A has second largest eigenvalue magnitude strictly less
than one, which yields [15], [36]:
where the limiting combination weights {p(cid:96)} satisfy, for all (cid:96) = 1, 2, . . . , S:
bk,(cid:96)(n) n→∞−→ p(cid:96) ⇔ Bn
S(cid:88)
pA = p,
p(cid:96) > 0,
n→∞−→ 1p
p(cid:96) = 1
(18)
(19)
and the row vector p = [p1, p2, . . . , pS] is usually referred to as the Perron eigenvector of A --
see, e.g., [7]. We remark that the condition on A is automatically satisfied by network topologies
that are strongly-connected [7], i.e., when there is always a path with nonzero weights between
(cid:96)=1
October 28, 2018
DRAFT
10
any pair of nodes, and at least one node in the network has a self-loop (ak,k > 0 for some agent
k).
B. Steady-State Distribution
In order to design and characterize an inference system based upon the sensor output yk(n),
knowledge of the distribution of yk(n) is crucial. However this knowledge is seldom available,
except for very special cases (e.g., Gaussian observations). A common and well-established
approach in the adaptation literature [6], [37] to address this difficulty is to focus on i) the
steady-state properties (as n → ∞), and ii) the small step-size regime (µ → 0). Accordingly,
throughout the paper, the term steady-state refers to the limit as the time-index n goes to infinity,
while the term asymptotic refers to the slow adaptation regime where µ → 0.
We start by considering the steady-state behavior of yk(n) for a given step-size µ. To this
aim, it is useful to recast the pair of equations given by (14) and (15) into the following single
equation, which is obtained by straightforward algebra:
yk(n) = (1 − µ)n
bk,(cid:96)(n)y(cid:96)(0)
+
S(cid:88)
(cid:123)(cid:122)
(cid:96)=1
transient term
(cid:124)
n(cid:88)
S(cid:88)
(cid:125)
µ(1 − µ)i−1bk,(cid:96)(i)x(cid:96)(n − i + 1).
i=1
(cid:96)=1
(20)
Since the random variables xk(n) are i.i.d. across time, and since we shall be only concerned
with the distribution of partial sums involving these terms, it is convenient to define the following
random variable:
µ(1 − µ)i−1bk,(cid:96)(i)x(cid:96)(i),
(21)
k(n) (cid:44) n(cid:88)
y(cid:63)
S(cid:88)
i=1
(cid:96)=1
n(cid:88)
S(cid:88)
which shares the same distribution of the second term on the RHS of (20) -- see also the
discussion in [1], [2]. Formally:
k(n) d=
y(cid:63)
µ(1 − µ)i−1bk,(cid:96)(i)x(cid:96)(n − i + 1),
where the notation d= denotes equality in distribution.
i=1
(cid:96)=1
October 28, 2018
(22)
DRAFT
In Theorem 1 of [1], [2], the existence of a steady-state random variable characterizing the
diffusion output has been established. This can be summarized by the following statement (the
symbol (cid:32) means convergence in distribution):
∞(cid:88)
S(cid:88)
yk(n) n→∞(cid:32) y(cid:63)
k,µ
(cid:44)
µ (1 − µ)i−1bk,(cid:96)(i)x(cid:96)(i)
11
(23)
(24)
(25)
where the first two moments of y(cid:63)
k,µ are given by
i=1
(cid:96)=1
E[y(cid:63)
k,µ] = E[x],
VAR[y(cid:63)
k,µ] = σ2
x
∞(cid:88)
S(cid:88)
µ2(1 − µ)2(i−1)b2
k,(cid:96)(i).
i=1
(cid:96)=1
Actually, the proof in [1], [2] focused on the case of doubly-stochastic combination matrices, but
it is immediate to verify that the same argument holds for right-stochastic combination matrices
and leads to (23) -- (25).
C. The Inference Problem
In the distributed detection formulation, each agent in the network must perform a binary
hypothesis test, in an adaptive and fully decentralized manner. In this setting, the agents in the
network continually collect an increasing amount of streaming data, whose statistical properties
depend upon an unknown binary state of nature, which is represented by a pair of hypotheses, say,
H0 and H1. The statistics xk(n) are spatially and temporally i.i.d., conditioned on the hypothesis
that gives rise to them. In what follows, we shall always assume that E0[x] (cid:54)= E1[x]. To get some
intuition about the meaning of this condition, consider that, when the local statistic x is chosen
as the log-likelihood of the local observation, the inequality E0[x] (cid:54)= E1[x] is simply a way to
state that the detection problem is identifiable, namely, that it is not singular [38]. Furthermore,
and without loss of generality, we assume that:
E0[x] < E1[x].
(26)
At time n, the k-th sensor needs to produce a decision about the state of nature, based upon
its state value yk(n). As discussed in [1], [2], the computation of yk(n) via algorithm (14)
and (15) is motivated by the fact that this implementation essentially results in a value yk(n) that
corresponds to a weighted average of the local statistics xk(n). Such additive constructions for
October 28, 2018
DRAFT
12
the state variable are not only convenient from an implementation point of view, but they are also
meaningful from a theoretical standpoint. Indeed, in the classical, centralized and non-adaptive
theory with i.i.d. data (where the optimal detection statistic is the sum of the log-likelihoods), as
well as in more general frameworks such as locally optimum detection or universal hypothesis
testing [38], [39], using additive detection statistics is the best choice. Moreover, the decision
regions employed by the detector are often in the form of single-threshold rules, which, for a
variety of detection problems, exhibit asymptotic optimality properties also in our adaptive and
distributed setting, as already shown in [1], [2]. Motivated by these considerations, in this work
the test implemented by agent k at time n is therefore chosen to be of the form:
yk(n)
(27)
The performance of the test is typically expressed in terms of the Type-I (choose H1 when
H0 is true) and Type-II (choose H0 when H1 is true) error probabilities. With reference to the
steady-state performance, the Type-I and Type-II error probabilities are defined as, respectively:
H0(cid:81)
H1
γ.
αk,µ (cid:44) P0[y(cid:63)
k,µ > γ],
βk,µ (cid:44) P1[y(cid:63)
k,µ ≤ γ].
(28)
III. MAIN THEOREMS
We now introduce the basic quantities necessary to characterize the system performance. As
we shall see, it is important to understand the behavior of the Logarithmic Moment Generating
Function (LMGF) of the steady-state variable y(cid:63)
k,µ. In Appendix A we state and prove a theorem
(Theorem 1) that establishes several useful properties of the LMGF, of its derivatives, and of
its limiting behavior as µ → 0. In the following description we shall mention and use some of
these properties, referring the reader to Appendix A for a more detailed explanation.
• Local LMGF.
The LMGF of the local statistics xk(n) is defined as:
ψ(t) (cid:44) ln E[etxk(n)],
(29)
and is independent of k. A fundamental role in our results will be played by the following
averaged version of the LMGF ψ(t), which has already been used in [1], [2]:
ω(t) (cid:44)
October 28, 2018
dτ.
(30)
DRAFT
(cid:90) t
ψ(τ )
τ
0
• Steady-state LMGF.
The LMGF of the steady-state variable y(cid:63)
k,µ is defined as:
φk,µ(t) (cid:44) ln E[ety(cid:63)
k,µ],
and admits the following representation [Theorem 1, Eq. (88)]:
∞(cid:88)
S(cid:88)
ψ(cid:0)µ(1 − µ)i−1bk,(cid:96)(i)t(cid:1) .
φk,µ(t) =
• Limiting properties of the steady-state LMGF.
i=1
(cid:96)=1
We will be primarily concerned with the limiting normalized LMGF:
φ(t) (cid:44) lim
µ→0
µ φk,µ(t/µ),
where the above limit exists, and is given by [Theorem 1, Eq. (89)]:
S(cid:88)
(cid:90) p(cid:96)t
S(cid:88)
φ(t) =
ω(p(cid:96)t) =
(cid:96)=1
(cid:96)=1
0
ψ(τ )
τ
dτ
13
(31)
(32)
(33)
(34)
Equation (34) emphasizes that φ(t) depends on the underlying statistical model through
the LMGF ψ(t) of the local statistics xk(n), and on the network topology only through
the Perron eigenvector p, i.e., on the limiting combination weights. For doubly-stochastic
matrices we have p(cid:96) = 1/S, so that the above formula gives
φ(t) = Sω(t/S) = S
ψ(τ )
τ
dτ,
(35)
which is consistent with the results of [1], [2].
It is of interest to consider an alternative representation for (34). To this aim, we introduce
(cid:90) t/S
0
the LMGF of the averaged random variable(cid:80)S
¯ψ(t) (cid:44) S(cid:88)
(cid:90) t
and by straightforward calculations we get from (34):
(cid:96)=1
ψ(p(cid:96)t),
φ(t) =
¯ψ(τ )
dτ
τ
0
(cid:96)=1 p(cid:96) x(cid:96)(n), namely:
(36)
(37)
• Property of the LMGF derivatives.
In Theorem 1, part ii), we establish that the derivatives of φk,µ(t) and of the limiting
October 28, 2018
DRAFT
function φ(t) can be evaluated by interchanging the differential and limit operators, yielding,
in particular [Theorem 1, Eq. (90)]:
φ(cid:48)
k,µ(t) = µ
i=1
(cid:96)=1
(1 − µ)i−1bk,(cid:96)(i) ×
S(cid:88)
∞(cid:88)
ψ(cid:48)(cid:0)µ(1 − µ)i−1bk,(cid:96)(i)t(cid:1) ,
S(cid:88)
1
t
(cid:96)=1
ψ(p(cid:96)t).
14
(38)
(39)
and [Theorem 1, Eq. (91)]
lim
µ→0
• Convergence errors.
φ(cid:48)
k,µ(t/µ) = φ(cid:48)(t) =
As we shall see, the convergence errors corresponding to (33) and (39) will play an important
role in characterizing the error probabilities. The following rates of convergence [Theorem
1, Eq. (93)] hold:
φ(t) − µ φk,µ(t/µ) = O(µ)
φ(cid:48)(t) − φ(cid:48)
k,µ(t/µ) = O(µ),
where the notation fµ = O(µ) means that the ratio fµ/µ stays bounded as µ → 0.
• Fenchel-Legendre transforms.
The Fenchel-Legendre transform of the function φ(t) is defined by [34], [35]:
Φ(γ) (cid:44) sup
t∈R
[γt − φ(t)].
(40)
(41)
(42)
We shall use capital letters to denote Fenchel-Legendre transforms, as done in (42). It is
further useful to introduce the domain where Φ(γ) is finite, namely:
DΦ = {γ ∈ R : Φ(γ) < ∞}.
(43)
The notation Do
Φ adopted in the sequel will denote the interior of the set DΦ.
We can now state our second theorem, which generalizes Theorem 3 from [1], [2] to handle the
case of right-stochastic matrices.
THEOREM 2 (Large deviations of y(cid:63)
that ψ(t) < +∞ for all t ∈ R. Then, for all k = 1, 2, . . . , S:
k,µ as µ → 0, for right-stochastic matrices). Assume
October 28, 2018
DRAFT
i) The steady-state variable y(cid:63)
k,µ obeys a Large Deviation Principle (LDP) with rate function
given by the Fenchel-Legendre transform Φ(γ) defined by (42), namely, for any Borel
measurable region Γ ∈ R:
15
µ ln P[y(cid:63)
k,µ ∈ Γ] = − inf
γ∈Γ
(44)
ii) φ(cid:48)(cid:48)(t) > 0 for all t ∈ R, implying that φ(t) is strictly convex. Moreover, the rate function
Φ, and attains its unique minimum at γ = E[x], with Φ(E[x]) =
Φ(γ).
lim
µ→0
Φ(γ) is strictly convex in Do
0.
Proof: By Theorem 1, part i), Appendix A, we can conclude that the function φ(t) in (33) exists
and is finite for all t ∈ R. Since, by definition, φ(t) is a normalized limiting LMGF, claim i) of
the present theorem follows by application of the Gartner-Ellis Theorem [34], [35].
Claim ii) is a direct extension to the case of right-stochastic combination matrices of the
results proved for doubly-stochastic combination matrices in Appendix C of [1].
(cid:3)
k,µ obeys a LDP with
According to property i) in Theorem 2, the steady-state random variable y(cid:63)
rate function Φ(γ). In view of the convexity properties of Φ(γ) stated in ii), for any γ ∈ Do
Φ,
with γ > E[x], the infimum over an interval of the form (γ,∞) always lies on the boundary
point γ. The same conclusion is reached for the infimum over an interval of the form (−∞, γ)
when γ < E[x]. Formally, for any γ ∈ Do
Φ, we have:
µ ln P[y(cid:63)
µ ln P[y(cid:63)
k,µ > γ] = −Φ(γ),
k,µ ≤ γ] = −Φ(γ),
lim
µ→0
lim
µ→0
γ > E[x]
γ < E[x].
(45)
(46)
Note also that, according to Theorem 2, part ii), the choice γ = E[x] yields Φ(γ) = Φ(E[x]) = 0,
that is, a null exponent. This is the uninteresting case where the error probability does not
vanish exponentially. Accordingly, this situation will be ruled out from the forthcoming analysis.
Relationships (45) and (46), along with the latter observation, have an immediate implication as
regards the choice of the detection threshold. Indeed, in the light of (28), one must ensure that
E0[x] < γ < E1[x],
(47)
DRAFT
October 28, 2018
16
in order to guarantee the exponential decay of both error probabilities αk,µ and βk,µ.
The exact asymptotics of y(cid:63)
k,µ are now characterized in the following theorem.
THEOREM 3 (Exact asymptotics of y(cid:63)
that ψ(t) < +∞ for all t ∈ R. Let γ ∈ Do
the stationary equation:
k,µ as µ → 0). Assume that xk(n) is not lattice, and
Φ, with γ > E[x], and let θγ be the unique solution to
Then, θγ > 0 and, for k = 1, 2, . . . , S:
φ(cid:48)(θγ) = γ.
P[y(cid:63)
k,µ > γ] ∼ Pk,µ(γ),
Pk,µ(γ) (cid:44)(cid:114)
µ
γ φ(cid:48)(cid:48)(θγ)
2πθ2
e
− 1
µ[Φ(γ)+k,µ(θγ )]
where
with
k,µ(t) = φ(t) − µφk,µ(t/µ).
The correction term k,µ(t) can be refined to:
k,µ(t) = [φ(t) − µφk,µ(t/µ)] +
[φ(cid:48)(t) − φ(cid:48)
k,µ(t/µ)]2
2 φ(cid:48)(cid:48)(t)
(48)
(49)
(50)
(51a)
(51b)
.
Proof: See Appendix B.
(cid:3)
REMARK I. The key ingredients to computing Pk,µ(γ) in (50) are the moment generating
function ψ(t) of the local statistics xk(n), and the combination matrix A. Indeed, the quantities
Φ(γ) and θγ depend on the function φ(t), which in turn depends on ψ(t) and on the limiting
combination weights p(cid:96). The correction term k,µ(t) (in both versions) depends on ψ(t) and on
the actual combination weights bk,(cid:96)(i).
(cid:3)
REMARK II. It is useful to comment on the reason for reporting two expressions for k,µ(t).
First, note that, from (41), the quantity
[φ(cid:48)(t) − φ(cid:48)
k,µ(t/µ)]2
2 φ(cid:48)(cid:48)(t)
=
µ
2 φ(cid:48)(cid:48)(t)
1
µ
October 28, 2018
(cid:20)φ(cid:48)(t) − φ(cid:48)
(cid:21)2
k,µ(t/µ)
µ
(52)
DRAFT
17
vanishes as µ → 0, implying that, asymptotically, using (51a) or (51b) in (50) makes no
difference. This equivalence is not surprising because, in principle, one can construct an ar-
bitrary number of distinct approximations that are asymptotically equivalent. The relevant fact
is that different forms for the correction correspond to different approximations of the true error
probability, which will perform differently for finite values of 1/µ. We shall see in the proof of
Theorem 3 why (51b) is a refined version of (51a). From now on, unless otherwise stated, we
shall make reference to (51b).
(cid:3)
REMARK III. Applying (40) and (41), it is immediately seen that:
(53)
meaning that the overall correction appearing at the exponent in (50) remains bounded as µ → 0.
(cid:3)
k,µ(θγ) = O(µ),
REMARK IV. The theorem is stated with reference to large deviations of the type P[y(cid:63)
k,µ > γ],
with γ > E[x]. We notice that the main formulas (50), (51a) and (51b), for the complementary
k,µ ≤ γ] remain unchanged. The only difference in the claim is that θγ < 0.
case γ < E[x] and P[y(cid:63)
These facts can be verified by repeating the proof of the theorem for this complementary case.
Alternatively, they can be verified by directly applying the claim of Theorem 3 to the random
variable −y(cid:63)
k,µ, and by observing that the difference between < and ≤ is immaterial in the proof
of the theorem.
(cid:3)
REMARK V. The proof of Theorem 3 assumes that the local statistic xk(n) is not of lattice
type. We recall that the distribution of a lattice random variable with span ∆ is concentrated
at the points d, d ± ∆, d ± 2∆, . . . for a certain real number d -- see, e.g., [40]. The use of
the non-lattice assumption in our proof is discussed in the Remark VI at the end of Appendix
B. It is useful to observe that, when dealing with the classical and simplest case of normalized
sums of i.i.d. random variables, the exact asymptotics for the lattice case must take into account
a further correction term that is related to the lattice span [34]. However, as already observed,
our asymptotic setting with vanishing step-size is markedly different from that addressed in the
literature for the problem of normalized sums of i.i.d. random variables. It is therefore not easy
to anticipate if the results of Theorem 3 hold as they are also for the lattice case, if they hold
October 28, 2018
DRAFT
as they are under additional conditions, or if further corrections are needed.
18
(cid:3)
Before ending this section it is useful to collect the steps needed to evaluate (50). Depending
on the particular application, the formulas in this listing might need to be evaluated numerically.
For practical purposes, the infinite summations appearing in k,µ(·) must be obviously truncated.
Evaluation of Pk,µ(γ) in (50).
1) Find the solution θγ to the stationary equation:
φ(cid:48)(θγ) =
1
θγ
2) Compute the rate function:
S(cid:88)
(cid:96)=1
ψ(p(cid:96)θγ) = γ.
Φ(γ) = sup
t∈R
[γt − φ(t)] = γθγ − φ(θγ).
3) Compute the second derivative:
φ(cid:48)(cid:48)(θγ) =
1
θ2
γ
4) Compute the convergence errors (40) and (41) by using (32) and (38):
(cid:96)=1
S(cid:88)
∞(cid:88)
∞(cid:88)
i=1
[(p(cid:96)θγ)ψ(cid:48)(p(cid:96)θγ) − ψ(p(cid:96)θγ)].
C1 = φ(θγ) − µ
C2 = φ(cid:48)(θγ) − µ
(cid:1) ,
S(cid:88)
S(cid:88)
ψ(cid:48)(cid:0)(1 − µ)i−1bk,(cid:96)(i)θγ
(cid:96)=1
ψ(cid:0)(1 − µ)i−1bk,(cid:96)(i)θγ
(cid:1) .
(1 − µ)i−1bk,(cid:96)(i) ×
(cid:96)=1
i=1
5) Compute the correction term in (51b):
k,µ(θγ) = C1 +
6) Using the above quantities, evaluate Pk,µ(γ).
C2
2
2 φ(cid:48)(cid:48)(θγ)
.
October 28, 2018
DRAFT
19
IV. IMPORTANCE SAMPLING AND CRAM ´ER'S TRANSFORM
Real-world detectors are usually required to be high-performing, i.e., they must exhibit very
low error probabilities. Unfortunately, standard Monte Carlo techniques to estimate their perfor-
mance become unfeasible for error probability values in the order of 10−6. To overcome this
issue, we shall resort to importance sampling techniques [42], which can dramatically reduce the
number of runs needed to reach a prescribed level of estimation accuracy. We start by illustrating
briefly the importance sampling philosophy. Then, in the next section, we show how it should
be applied to the adaptive distributed detection problem.
A. Cram´er's Transform
Let us refer to a random variable y, assumed continuous for ease of description. We shall
denote by f (y) its probability density function (pdf). Consider now another pdf f (y) that does
not vanish (except for zero-measure sets) when f (y) > 0, and introduce the following weighting
function:
w(y) =
,
(54)
(55)
where IE is the indicator of an event E, and E f [·] denotes expectation computed over the
transformed pdf f (y). The above equation shows that the quantity to be estimated can be regarded
as the expectation, under the transformed pdf, of the indicator of the event {y > γ}, weighted by
the function w(y). The rationale behind importance sampling is that, by an appropriate choice of
the weighting function, it is possible to map an event that is rare under the original sampling pdf
f (y), into an event that is not rare under the new sampling pdf f (y). In this way, the number of
Monte Carlo iterations needed to estimate the expectation is reduced, because (important) samples
are generated around the body (not the tail) of the new distribution. An accurate estimate of the
probability tails is enabled by the weighting function w(y).
When working with random variables obeying a LDP, there is a classical way to select the
transformed pdf f (y). This is usually referred to as exponential twisting of f (y), and amounts
October 28, 2018
DRAFT
that is, the likelihood ratio between f (y) and f (y). It then holds that:
P[y > γ] =
w(y) f (y)dy
f (y)
f (y)
(cid:90) ∞
(cid:90) ∞
(cid:2)w(y)I{y>γ}(cid:3) ,
f (y)dy =
γ
γ
= E f
to selecting [34], [35]:
f (y) = eηy−ln E[eηy] f (y) ⇔ w(y) = e−ηy+ln E[eηy].
20
(56)
When y is not a continuous random variable, the exponential twisting can be rephrased in terms
of probability measures m and m as:
m(dy) = eηy−ln E[eηy] m(dy).
(57)
The results presented in this section hold, mutatis mutandis, for this setting.
The aforementioned change of measure was originally proposed by Cram´er [41] to compute
large deviations exponents, and is accordingly also known as Cram´er's transform. The choice
of a given exponential twisting (i.e., the choice of the parameter η) is critical in determining
the accuracy of the estimates produced by the importance sampling algorithm. Interestingly,
theoretical studies suggest to use for importance sampling in general exactly the same exponential
twisting needed to compute the error exponents -- see, e.g., [42]. For the classical and simplest
case of summation of i.i.d. random variables, the latter kind of exponential twisting is well-known
-- see, e.g., [34], [35]. For our specific problem of adaptive distributed detection, the solution
is more involved, and will be discussed in the next section. In particular, it will be shown that
the theoretical results established in this paper are crucial to enable an accurate design of the
importance sampling simulations.
B. Importance Sampling for Adaptive Distributed Detection
Since we are interested in evaluating the steady-state performance of the adaptive distributed
algorithm, it is sufficient to examine the behavior, for n sufficiently large, of the random variable
k(n) introduced in (21), which, according to (22), has the same distribution of the diffusion
y(cid:63)
output with null transient.
In order to implement the importance sampling recipe, we need to perform the exponential
twisting (56). As already mentioned, the parameter η will be chosen as that value corresponding
to the change of measure used to compute the error exponents. For the specific case of adaptive
distributed detection, this exponential twisting is extensively discussed and employed in Appendix
B -- see, e.g., (143) and (178), and amounts to selecting η = θγ/µ, where θγ is the solution to
October 28, 2018
DRAFT
the stationary equation (48) in Theorem 3. Denoting by
φk,µ(t; n) (cid:44) ln E[ety(cid:63)
k(n)] =
n(cid:88)
S(cid:88)
i=1
(cid:96)=1
ψ(cid:0)µ(1 − µ)i−1bk,(cid:96)(i)t(cid:1) ,
21
(58)
the LMGF of the random variable y(cid:63)
assumption on the {x(cid:96)(i)}), the choice η = θγ/µ applied in (56) then yields:
k(n) (the additive form above comes simply from the i.i.d.
(cid:16) θγ
(cid:17)
w(y) = e
− θγ
µ y+φk,µ
µ ;n
.
(59)
Unfortunately, in order to generate samples according to the transformed pdf f (y) in (56), the
weighting function w(y) is not sufficient, since one needs to know also the pdf f (y) of the
random variable y(cid:63)
k(n). As already observed, knowledge of this distribution is seldom available.
To overcome this issue, one may consider running first a Monte Carlo simulation by generating
random instances of the local statistics x(cid:96)(i), and then evaluating y(cid:63)
k(n) through (21). However,
recall that we are interested in implementing importance sampling. This means that we must
k(n)) that would produce
find the appropriate change of measure applied to x(cid:96)(i) (and not to y(cid:63)
the desired exponential change of measure (59) on the random variable y(cid:63)
k(n). To this aim, let
us denote by p(x) the pdf of x(cid:96)(i). We now show that the desired goal can be achieved by
drawing the (i, (cid:96))-th sample x(cid:96)(i) from the pdf
with
pi,(cid:96)(x) = eηi,(cid:96)x−ψ(ηi,(cid:96))p(x),
ηi,(cid:96) (cid:44) (1 − µ)i−1bk,(cid:96)(i) θγ.
(60)
(61)
All these samples are still generated independently, but now they are no longer identically
distributed. Note also that the above transformation depends upon the index k of the agent under
consideration, even if the subscript has been suppressed for ease of notation.
To see why the choice (60) will correspond to (59), let us introduce the joint ensemble
X = {x(cid:96)(i)}, for i = 1, 2, . . . , n and for (cid:96) = 1, 2, . . . , S. The expectation in (55) can then be
rewritten in terms of the distribution of X as follows:
k(n)>γ}] = Ep
k(n) > γ] = E[I{y(cid:63)
(cid:20)p(X)
k(n)>γ}
I{y(cid:63)
P[y(cid:63)
(62)
(cid:21)
.
p(X)
October 28, 2018
DRAFT
But since the x(cid:96)(i) are spatially and temporally i.i.d., we have from (60) and (59):
= e−(cid:80)n
i=1
p(X)
p(X)
(cid:80)S
(cid:80)S
(cid:96)=1 ηi,(cid:96)x(cid:96)(i)+(cid:80)n
(cid:17)
(cid:16) θγ
i=1
(cid:96)=1 ψ(ηi,(cid:96))
− θγ
µ y(cid:63)
k(n)+φk,µ
µ ;n
= e
= w(y(cid:63)
k(n)),
22
(63)
where, in the last equality, we applied definitions (21) and (58). This result shows that (62)
corresponds to the expectation in (55) with the pdf f (y) chosen as in (59).
Before ending this section, we stress that the above considerations show one further important
benefit: our large deviations results about distributed detection over adaptive networks are also
very useful in performing a careful design of a Monte Carlo simulator based on importance
sampling.
A. Network Topology and Combination Weights
V. ILLUSTRATIVE DESIGN
We consider a network made of S = 10 sensors, arranged so as to form the topology in the
inset of Fig. 1. Given the topology, two different combination matrices will be tested. The first
one is defined by the so-called Metropolis rule [7]. Denoting by Nk the neighborhood of the
k-th agent (including k itself), and by nk the cardinality Nk (aka the degree of the k-th agent),
the Metropolis rule is defined by:
ak,(cid:96) =
1/ max{nk, n(cid:96)},
1 − (cid:88)
ak,m,
m∈Nk\{k}
0,
(cid:96) ∈ Nk \ {k},
(cid:96) = k,
(cid:96) /∈ Nk.
(64)
This choice provides a doubly-stochastic A, and, hence, the corresponding Perron eigenvector
has uniform entries, p(cid:96) = 1/S for all (cid:96) = 1, 2, . . . , S.
The second combination policy is the uniform averaging rule [7]:
ak,(cid:96) =
October 28, 2018
1/nk,
0,
(cid:96) ∈ Nk,
(cid:96) /∈ Nk.
(65)
DRAFT
This choice provides a right-stochastic A, whose Perron eigenvector is available in closed form,
and has entries given by [7]:
p(cid:96) =
,
(cid:96) = 1, 2, . . . , S.
(66)
n(cid:96)(cid:80)S
m=1 nm
23
B. Hypothesis Test, Local Statistics and Simulation
We examine the following canonical shift-in-mean detection problem with noise distributed
according to a Laplace distribution, which is considered in [1], [2] as well. The Laplace pdf
(with scale parameter set to 1, without loss of generality) will be denoted by:
The hypothesis test can then be formulated as follows:
L (d) =
e−d.
1
2
H0
H1
: dk(n) ∼ L (d),
: dk(n) ∼ L (d − ρ),
(67)
(68)
(69)
where dk(n) denotes the measurement collected by agent k at time n, and ρ > 0 is the shift-in-
mean parameter. The local statistics xk(n) are chosen as the local log-likelihood ratios:
xk(n) = ln
= dk(n) − dk(n) − ρ.
(70)
Even if the above relationship shows clearly how to obtain the random variable xk(n) from the
knowledge of dk(n), it is useful, for later use, to evaluate explicitly the distribution of xk(n)
under the two hypotheses. To this aim, we rewrite (70) as:
(cid:19)
L (dk(n))
(cid:18)L (dk(n) − ρ)
−ρ,
+ρ,
2dk(n) − ρ,
xk(n) =
dk(n) < 0,
dk(n) > ρ,
dk(n) ∈ [0, ρ],
(71)
which is obtained by using, in the three ranges considered in (71), the explicit definition of the
absolute values appearing in (70). We see then that xk(n) is a random variable of mixed type,
taking values in the range [−ρ, ρ], and with two atoms located at ±ρ. For ease of description,
we find convenient to use, for random variables of mixed type, the generalized pdf written using
the Dirac-delta function δ(x).
Accordingly, let p0(x) and p1(x) denote the generalized pdfs of xk(n) under H0 and H1,
respectively. For a shift-in-mean with respect to a symmetric pdf (as L (d) is), it is well-known
October 28, 2018
DRAFT
that the log-likelihood ratio exhibits the symmetry property: p1(x) = p0(−x) -- see, e.g., [44].
Thus, it suffices to focus on p0(x). To this aim, we observe that, in view of (71), the cumulative
distribution function of xk(n) is
24
(cid:20)
dk(n) ≤ x + ρ
2
(cid:21)
0,
P0
1,
x < −ρ,
, x ∈ [−ρ, ρ),
(72)
x ≥ ρ,
P0[xk(n) ≤ x] =
which corresponds to the following generalized pdf:
p0(x) =
(cid:18) x
(cid:19)
(cid:18) x + ρ
(cid:19)
P0[dk(n) < 0]δ(x + ρ) + P0[dk(n) > ρ]δ(x − ρ) +
1
L
2
1
2
2ρ
δ(x − ρ) +
(cid:18) x
Π
e−ρ
2
δ(x + ρ) +
(cid:19)
e− x+ρ
2 Π
1
4
2ρ
2
,
=
(73)
where Π(x) is a unit-width rectangular window centered at 0. The corresponding LMGF of
xk(n) is computable in closed form:
(cid:18)(cid:90) ∞
(cid:19)
ψ0(t) = ln E0[etxk(n)] = ln
e(t−1)ρ
(cid:18) e−tρ
= ln
+
2
2
+
2
etxp0(x)dx
−∞
e−ρ/2ρ
sinch[ρ(t − 1/2)]
(cid:19)
,
(74)
where
sinch(x) (cid:44) sinh(x)
,
x
sinch(0) = 1.
(75)
Since, as observed, p1(x) = p0(−x), the LMGF under H1 is easily obtained as ψ1(t) = ψ0(−t).
We note in passing that the above explanation and the following derivations can be restated
in a more formal language by using, for the mixed-type random variable xk(n), a probability
measure made of the superposition of two singular, atomic measures (with masses located at
±ρ), and an absolutely continuous measure with density given by the third term in (73).
Before concluding this section, it remains to show how to implement, for the considered
Laplace example, the importance sampling method described in Sec. IV. We shall focus on
October 28, 2018
DRAFT
hypothesis H0, and, again, the results for H1 can be simply obtained from the relationship
p1(x) = p0(−x). Applying an exponential twisting with parameter η to the generalized pdf
in (73), we get:
25
p0(x) = eηx−ψ0(η)p0(x)
=
e−ηρ
2eψ0(η) δ(x + ρ) +
e(η−1)ρ
(cid:18) x
2eψ0(η) δ(x − ρ) +
e−ρ/2
4eψ0(η) ex(η−1/2)Π
2ρ
(cid:19)
.
Introducing the definitions:
p− =
e−ηρ
2eψ0(η) ,
p+ =
e(η−1)ρ
2eψ0(η) ,
and using (74), by simple algebra relation (76) becomes:
p0(x) = p−δ(x + ρ) + p+δ(x − ρ) + [1 − p− − p+] ×
(cid:18) x
(cid:19)
ex(η−1/2)
1
2ρ
sinch[ρ(η − 1/2)]
Π
2ρ
.
(76)
(77)
(78)
Generating a random variable xk(n) according to the distribution p0(x) is now an easy task. As
a matter of fact, (78) reveals that p0(x) is a mixture of three components such that xk(n) takes
on the value −ρ with probability p−, the value +ρ with probability p+, and that otherwise it
must be sampled from the pdf
(cid:18) x
(cid:19)
2ρ
.
(79)
ex(η−1/2)
sinch[ρ(η − 1/2)]
1
2ρ
Π
C. A Normal Approximation
In the following analysis, we shall compare the error probabilities estimated empirically, to
the refined asymptotic formulas obtained in the present work. As a further term of comparison,
we would like to add a normal approximation that will follow from the asymptotic normality
result proved in [1], [2]. Actually, this result was obtained there for doubly-stochastic connection
matrices, but the generalization to the case of right-stochastic matrices comes essentially at no
cost and can be stated as:
k,µ − E[x]
y(cid:63)
(cid:112)µ σ2
lim
µ→0(cid:32) N (0, 1)
October 28, 2018
(80)
DRAFT
where the limiting variance σ2
(i.e., the variance) of y(cid:63)
lim can be obtained by applying result (92) to the second cumulant
k,µ, which yields:
VAR[y(cid:63)
k,µ]
µ
S(cid:88)
(cid:96)=1
µ→0−→ σ2
x
2
(cid:44) σ2
lim.
p2
(cid:96)
(81)
26
We emphasize that this result is consistent with previous findings obtained in the context of
mean-square-error estimation -- see, e.g., [6].
We see from (81) that the ratio VAR[y(cid:63)
lim) converges to one as µ goes to zero. In
view of Slutsky's Theorem [47], this fact implies that the following alternative version of the
convergence in distribution in (80) holds:
k,µ]/(µσ2
(cid:113)
k,µ − E[x]
y(cid:63)
VAR[y(cid:63)
k,µ]
µ→0(cid:32) N (0, 1)
(82)
While the two formulations (80) and (82) are asymptotically equivalent, it is expected that (82)
offers a better performance since it replaces the asymptotic variance with the actual one. The
relationship shown in (82) suggests the following way to approximate the probability P[y(cid:63)
k,µ > γ]:
γ − E[x]
(cid:113)
VAR[y(cid:63)
k,µ]
,
P[y(cid:63)
k,µ > γ] ≈ Q
(83)
where Q(·) denotes the complementary cumulative distribution function of a standard normal
distribution.
D. Analysis of the Results
Let us now examine the adaptive distributed network of detectors in operation, by reporting
the evidence arising from our Monte Carlo analysis. We refer to a sufficiently large time horizon,
such that the steady-state assumption applies, and evaluate the error probabilities for different
values of the step-size.
The exact asymptotics provided by Theorem 3 will be computed by implementing the six-
steps recipe described at the end of Sec. III. Clearly, in doing so, we must use the LMGF ψ0(t)
if we are working under H0, and the LMGF ψ1(t) if we are working under H1. The normal
approximation will be instead obtained as described in the previous section -- see (83).
In the two examples that we are going to discuss we choose the detection threshold as detailed
in [1], [2], obtaining γ = 0. This implies, by the symmetry property p1(x) = p0(−x), that the
October 28, 2018
DRAFT
27
Fig. 1.
Laplace example discussed in Sec. V-B, with ρ = 0.6. The network topology is depicted in the inset plot, and the
combination weights ak,(cid:96) follow the Metropolis rule (64). The performance of agents 2, 4 and 5 is displayed. Dots refer to the
empirical steady-state error probabilities αk,µ = βk,µ at different sensors, obtained via Monte Carlo simulation with importance
sampling, as described in IV. Solid curves refer to the exact asymptotics provided by Theorem 3. Dashed curves refer to the
normal approximation (83).
error probabilities of first and second kind defined by (28) are equal, namely:
αk,µ = βk,µ.
(84)
Consistently, in the following description, the terminologies "error probability" and "error ex-
ponent" refer to any of these errors.
We start by considering the doubly-stochastic combination matrix obtained with the Metropolis
rule (64). In Fig. 1, the performance of the agents is displayed as a function of 1/µ, and
different agents are marked with different colors. The main system features, which were already
commented in [1], [2], are here summarized.
October 28, 2018
DRAFT
1020304050!14!12!10!8!6!4!21ΜErrorprobabilitySolid:Pk,ΜΓDashed:GaussianDots:Simulation1234567891028
Fig. 2.
Laplace example discussed in Sec. V-B, with ρ = 0.6. The network topology is depicted in the inset plot, and the
combination weights ak,(cid:96) follow the averaging rule (65). The performance of agents 2, 4 and 5 is displayed. Dots refer to the
empirical steady-state error probabilities αk,µ = βk,µ at different sensors, obtained via Monte Carlo simulation with importance
sampling, as described in IV. Solid curves refer to the exact asymptotics provided by Theorem 3. Dashed curves refer to the
normal approximation (83).
The first evidence is that the different curves pertaining to different agents stay nearly parallel
for sufficiently small values of the step-size µ, i.e., the detection error probabilities at different
sensors vanish exponentially as functions of 1/µ, sharing the same detection error exponent.
This was the main result revealed by the large deviations analysis performed in [1], [2].
However, as already noticed in [1], [2], the large deviations tool is not powerful enough to
capture an important feature of the distributed behavior. Indeed, the second evidence emerging
from the simulations is that the error probability curves in Fig. 1 are basically ordered, and
the ordering is closely related to the network connection structure. Comparing the detection
performance of three specific agents, namely, agents 2, 4, 5, we see that the ordering reflects the
October 28, 2018
DRAFT
1020304050!14!12!10!8!6!4!21ΜErrorprobabilitySolid:Pk,ΜΓDashed:GaussianDots:Simulation1234567891029
degree of connectivity of each agent. For instance, agent 4 has the highest number of neighbors,
and its performance is the best one, while agent 2 is the most isolated, and its error probability
curve appears consistently as the highest one. According to what one expects, agent 5 is in an
intermediate position. The new fact here is that, using the results of the current manuscript, we
are now able to provide a systematic analysis of the above features, as well as of the exact
interplay with network connectivity.
First of all, what in [1], [2] was only a partial evidence arising from a particular numerical
experiment, emerges now, thanks to the refined asymptotic analysis, as the universal behavior
of adaptive distributed detection.
Moreover, the refined asymptotic approximations provided by Theorem 3 can be used to obtain
quantitative predictions of the actual system performance, as we proceed to explain. The refined
formulas are represented by the solid curves in Fig. 1. We see that the empirical probability
points (the dots) converge toward the theoretical solid curves as the step-size µ decreases (i.e.,
as we move to the right in the plot). Remarkably, the theoretical formulas provided by our
theorems are able to embody the dependencies between the network connection structure and
the detection performance at different sensors, as it is witnessed by the correct ordering of
the curves. In addition, a gap between the exact asymptotics (solid curves) and the normal
approximation (dashed curves) is clearly observed. This should come as no surprise, since the
normal approximation is expected to be accurate when working with small deviations, and must
accordingly provide a wrong prediction in the large deviations regime -- see also the discussion
in [1], [2].
We now switch to the analysis of the right-stochastic combination matrix provided by the
uniform averaging rule (65). The corresponding results are reported in Fig. 2. First, we note
that, as in the doubly-stochastic case, the error probability curves vanish exponentially fast as
functions of 1/µ, and stay nearly parallel as µ goes to zero. This is consistent with the prediction
that they share the same error exponent, as dictated by Theorem 2 for the general case of right-
stochastic combination matrices. Also in this example, we are able to appreciate the goodness
of the refined approximations obtained with Theorem 3, and the fact that the empirical points
depart from the normal approximation.
To get further insights, we now compare the detection performance of the two aforementioned
October 28, 2018
DRAFT
combination matrices. To begin with, we compute the error exponents pertaining to the two
systems. For the particular example considered, we obtain (recall that the threshold is set to
γ = 0):
ΦDS(0) ≈ 0.75 > ΦRS(0) ≈ 0.7,
30
(85)
for the doubly-stochastic and the right-stochastic case, respectively. These values appear to
suggest that that the doubly-stochastic combination policy asymptotically outperforms the right-
stochastic combination policy. This conclusion may somehow be expected because, asymptoti-
cally, a doubly-stochastic combination policy weights the local statistics equally, while a right-
stochastic combination policy does not. In the presence of i.i.d. observations, the former strategy
seems to be preferable. To see if this first-order analysis suffices, let us now apply the refined
asymptotic formulas.
Accordingly, in Fig. 3 we display the theoretical error probability curves obtained with
Theorem 3, for the Metropolis combination matrix (doubly-stochastic case, line and markers) and
for the uniform averaging combination matrix (right-stochastic case, solid curves). An interesting
behavior arises. We observe that the relative performance of the two different combination policies
depends strongly on the connectivity of the individual agent. For instance, for the well-connected
agent 4, the doubly-stochastic combination policy delivers superior performance, while exactly
the converse is true for the scarcely connected agent 2. Moreover, if we consider as network
performance the arithmetic average of the error probabilities (black curves), we see that the
right-stochastic combination policy is globally superior.
An explanation for this behavior is as follows. Denoting by λDS
2
the second largest
magnitude eigenvalues of the doubly-stochastic and right-stochastic combination matrices, re-
spectively, we see that
and λRS
2
2 ≈ 0.83 > λRS
λDS
2 ≈ 0.7,
(86)
implying that the right-stochastic weights will converge to the corresponding Perron eigenvector
faster than the doubly-stochastic weights. Examining the detection performance, we see from
here that the slower convergence of the doubly-stochastic combination matrix has a detrimental
effect on the less connected agents. We could say that the benefits of the higher (doubly-stochastic
case) exponent are more than compensated by the faster (right-stochastic case) convergence to
the steady-state behavior.
October 28, 2018
DRAFT
31
Fig. 3.
Laplace example discussed in Sec. V-B, with ρ = 0.6. The network topology is depicted in the inset plot, and the
performance corresponding to two combination matrices is compared, namely, the doubly-stochastic matrix obtained with the
Metropolis rule (64), and the right-stochastic matrix obtained with the uniform averaging rule (65). The performance of agents
2 and 4 is displayed, along with the average network performance, namely, the arithmetic mean of the error probabilities of all
agents (black). All curves are computed by using the exact asymptotics provided by Theorem 3.
Notice that the observed behavior is not in contrast with what is predicted by (85). Based on an
analysis at the first leading order in the exponent, the doubly-stochastic combination policy are
asymptotically superior to the right-stochastic one. This means that the two curves corresponding
to sensor 2 in the figure must cross for a certain vanishingly small µ. What the refined analysis
is able to tell is that this value might be too small for a given regime of analysis.
Before concluding, we would like to stress that the above comparison between combination
policies should be considered preliminary, in that: i) the comparison has been made for two
systems operating with the same value of the step-size µ, and, for a more complete view,
the analysis should be complemented by examining also the transient behavior of the two
October 28, 2018
DRAFT
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!1020304050!14!12!10!8!6!4!21ΜErrorprobability!!!:DoublyStochasticSolid:RightStochastic1234567891032
combination policies; ii) the evidences are obtained with reference to a particular doubly-
stochastic matrix and a particular right-stochastic matrix. This notwithstanding, while no general
conclusions can be drawn at this stage regarding the relative advantages of the two kinds of
combination strategies for individual agents, a general trend seems to emerge: connectivity
matters. Since the connectivity features are embodied in the higher-order corrections, the simplest
large deviations analysis is not sufficient, and the refined exact asymptotics provided by Theorem
3 are crucial in assessing the performance of adaptive distributed detection over networks.
APPENDIX A
In the following, the r-th derivative of a function f (t) will be denoted by f (r)(t), with the
convention that f (0)(t) = f (t). When convenient, the first three derivatives will be alternatively
denoted by f(cid:48)(t), f(cid:48)(cid:48)(t), and f(cid:48)(cid:48)(cid:48)(t). Moreover, the notation fµ = O(µ) means that the ratio fµ/µ
stays bounded as µ → 0.
THEOREM 1 (Fundamental properties of φ(r)
introduce the quantity:
k,µ(t)). Assume that ψ(t) < ∞ for all t ∈ R, and
ξi,(cid:96) (cid:44) µ(1 − µ)i−1bk,(cid:96)(i).
Then, the following facts hold:
i) The LMGF of y(cid:63)
k,µ can be computed as:
φk,µ(t) =
∞(cid:88)
S(cid:88)
i=1
(cid:96)=1
ψ(ξi,(cid:96)t)
and the limiting LMGF φ(t) is:
S(cid:88)
(cid:96)=1
ω(p(cid:96)t)
φ(t) =
ii) For r = 1, 2, . . . , it holds that:
φ(r)
k,µ(t) =
∞(cid:88)
S(cid:88)
i=1
(cid:96)=1
ξr
i,(cid:96)ψ(r)(ξi,(cid:96)t)
and
October 28, 2018
φ(r)
k,µ(t/µ)
µr−1 = φ(r)(t)
lim
µ→0
(87)
(88)
(89)
(90)
(91)
DRAFT
In particular, the r-th cumulant, φ(r)
k,µ(0), of the steady-state random variable y(cid:63)
k,µ satisfies:
φ(r)
k,µ(0)
µr−1 = φ(r)(0) =
lim
µ→0
ψ(r)(0)
r
pr
(cid:96)
(92)
S(cid:88)
(cid:96)=1
33
where ψ(r)(0) is the r-th cumulant of the local statistic xk(n).
iii) With reference to the convergence in (89) and (91), the following refined estimate of the
convergence error holds for r = 0, 1, . . . :
φ(r)
k,µ(t/µ)
µr−1 = φ(r)(t) + O(µ).
(93)
(cid:3)
In order to establish the validity of Theorem 1, we start by proving a couple of useful lemmas.
Our first lemma is a simple generalization of Lemmas 1 and 2 from [1], [2]. We shall focus on
a function f (t) twice differentiable in R, with f (0) = 0. For such a function, we have that:
• The function f (t)/t is continuous for all t ∈ R. For any t (cid:54)= 0, the result follows from
the continuity of f (t). For t = 0, the result is easily verified by recalling that f (0) = 0,
yielding:
f (t)
= f(cid:48)(0).
lim
t→0
(94)
• The derivative (d/dt)(f (t)/t) is continuous for all t ∈ R. For any t (cid:54)= 0, this result follows
immediately from the assumed smoothness properties of f (t). For t = 0, the result is easily
verified by recalling that f (0) = 0, and observing that
f(cid:48)(t)t − f (t)
f(cid:48)(cid:48)(0)
f (t)
t
lim
t→0
d
dt
= lim
t→0
t
=
,
2
(95)
where we used L'Hospital's rule [43].
We introduce the auxiliary functions:
h1(t) =
×
t2
2
t2
(cid:12)(cid:12)(cid:12)(cid:12) ,
(cid:12)(cid:12)(cid:12)(cid:12) ,
f (τ )
τ
f (τ )
τ
f(cid:48)(τ ),
f(cid:48)(τ ),
dτ
max
τ∈[0,t]
(cid:12)(cid:12)(cid:12)(cid:12) d
(cid:12)(cid:12)(cid:12)(cid:12) d
max
τ∈[0,t]
max
τ∈[t,0]
max
τ∈[t,0]
dτ
h2(t) = t ×
and
October 28, 2018
t ≥ 0,
t < 0.
t ≥ 0,
t < 0.
(96)
(97)
DRAFT
We can easily show that:
34
∀t ∈ R.
0 ≤ h1(t) < ∞,
0 ≤ h2(t) < ∞,
(98)
Indeed, h1(t) ≥ 0 and h2(t) ≥ 0 by definition. Finiteness of both functions follows from
Weierstrass extreme value theorem [43] since, by the properties for f (t) and f (t)/t discussed
above, the maxima appearing in (96) and (97) are maxima of continuous functions over compact
sets for any finite t.
LEMMA 1. Let f (t) be twice continuously differentiable in R, with f (0) = 0. Let, for all i ∈ N:
0 ≤ bi ≤ 1,
i→∞−→ p > 0,
bi
with bi − p ≤ Cλi
for some C > 0 and 0 < λ < 1. Then, we have, for all t ∈ R:
(99)
(100)
(101)
∞(cid:88)
n(cid:88)
where:
i=1
(cid:90) µpt
0
f (µ(1 − µ)i−1bit) =
1
µ
f (τ )
τ
dτ + R(t)
R(t) ≤ h1(µpt)
2 − µ
+
Cλh2(µt)
1 − λ(1 − µ)
Proof. First, note that the integral in (100) is well-posed, since the function f (t)/t is continuous
for all t ∈ R. Then, for the case t = 0, Eq. (100) is trivially verified, since f (0) = 0 by
assumption, and h1(0) = h2(0) = 0 by definitions (96) and (97). We now prove the lemma for
the case t > 0, and the proof for t < 0 will follow similarly.
Let us introduce the infinite partition of the interval [0, µpt]:
τi = µ(1 − µ)i−1pt,
i = 1, 2, . . .
(102)
By using a first-order Taylor expansion we can write:
i=1
=
October 28, 2018
n(cid:88)
n(cid:88)
f (µ(1 − µ)i−1bit)
f (τi) +
i=1
i=1
µ(1 − µ)i−1f(cid:48)(ti)(bi − p)t.
(103)
DRAFT
We then obtain from (104) that
(cid:90) µpt
µ(1−µ)npt
δi = τi − τi+1 = µ τi.
g(τ )dτ =
=
i=1
τi+1
g(τ )dτ
(cid:90) τi
n(cid:88)
n(cid:88)
g(τi)δi − n(cid:88)
f (τi) − n(cid:88)
n(cid:88)
i=1
i=1
i=1
i=1
= µ
g(cid:48)(¯ti)
δ2
i
2
g(cid:48)(¯ti)
δ2
i
2
,
(104)
(105)
(106)
(107)
for a value ti that is certainly contained in the interval [0, µt], because so are the points µ(1 −
µ)i−1bit and τi. Let us focus on the first term on the RHS of (103), and let g(t) = f (t)/t. A
second-order Taylor expansion of the function G(t) =(cid:82) τi
t g(τ )dτ around the point τi gives:
35
G(τi+1) = G(τi) + g(τi)δi − g(cid:48)(¯ti)
δ2
i
2
for a certain ¯ti ∈ (τi+1, τi) and where
= g(τi)δi − g(cid:48)(¯ti)
δ2
i
2
,
Computing now(cid:80)n
n(cid:88)
where
i=1
i=1 f (τi) from (106), and substituting into (103), we have
f (µ(1 − µ)i−1bit) =
1
µ
f (τ )
dτ + rn(t),
µ(1−µ)npt
τ
(cid:90) µpt
rn(t) (cid:44) 1
µ
g(cid:48)(¯ti)
δ2
i
2
+
n(cid:88)
n(cid:88)
i=1
(108)
Both series on the RHS of (108) are absolutely convergent as n → ∞. Indeed, using the definition
of the auxiliary function h1(t) in (96), we see that the first series satisfies:
i=1
µ(1 − µ)i−1f(cid:48)(ti)(bi − p)t.
n(cid:88)
i=1
1
µ
g(cid:48)(¯ti) δ2
i
2
=
µ
2
≤ µ
(µpt)2
∞(cid:88)
n(cid:88)
g(cid:48)(¯ti)(1 − µ)2(i−1)
i=1
October 28, 2018
i=1
(1 − µ)2(i−1)h1(µpt) =
h1(µpt)
2 − µ
.
(109)
DRAFT
n(cid:88)
µ(1 − µ)i−1f(cid:48)(ti)(bi − p)t
i=1
≤ h2(µt)
(1 − µ)i−1bi − p
n(cid:88)
∞(cid:88)
i=1
[λ(1 − µ)]i−1
≤ Cλh2(µt)
Cλh2(µt)
1 − λ(1 − µ)
i=1
=
.
(110)
Convergence of the first term on the RHS in (107) follows by the definition of integration. If
we now denote by R(t) the limit of rn(t) as n → ∞, we have in fact proved (100) along with
the upper bound in (101).
(cid:3)
The next lemma establishes some useful properties of the function ω(t) defined in (30).
LEMMA 2 (Derivatives of ω(t)). Let ψ(t) be the LMGF of the local statistic xk(n), and assume
that ψ(t) < ∞ for all t ∈ R. Then, the function ω(t) in (30) is infinitely differentiable in R,
and, for all r ∈ N:
ω(r)(t) =
ψ(r)(τ )τ r−1dτ
(111)
(112)
Similarly, using the definition of h2(t) in (97), and the assumption bi − p ≤ Cλi, we see that
the second series obeys:
36
(cid:90) t
0
1
tr
(cid:90) t
0
where, for t = 0, the above equation should be read as:
ω(r)(0) = lim
t→0
1
tr
ψ(r)(τ )τ r−1dτ =
ψ(r)(0)
r
.
Proof. We prove the lemma by induction. Let us consider first the case t (cid:54)= 0. Property (111)
holds for r = 1:
ω(cid:48)(t) =
ψ(t)
t
=
1
t
ψ(cid:48)(τ )dτ,
(113)
having used ψ(0) = 0 since ψ(t) is a LMGF. Now we show that if (111) holds for some r, then
it must hold for r + 1. Indeed, note that
(cid:90) t
0
(cid:18) 1
(cid:90) t
tr
0
(cid:19)
ψ(r)(τ )τ r−1dτ
ω(r+1)(t) =
d
dt
ω(r)(t) =
d
dt
October 28, 2018
.
(114)
DRAFT
Applying the rule of integration by parts we have:
(cid:90) t
0
1
tr
ψ(r)(τ )τ r−1dτ
(cid:20)
=
ψ(r)(τ )
τ r
r
− 1
rtr
Differentiating the above expression yields:
1
tr
ψ(r)(t)
=
r
(cid:90) t
0
ψ(r+1)(τ )
τ r
r
dτ
− 1
tr
ψ(r+1)(τ )τ rdτ.
(cid:21)t
(cid:90) t
0
0
ω(r+1)(t) =
ψ(r+1)(t)
− ψ(r+1)(t)
r
(cid:90) t
r
0
+
1
tr+1
ψ(r+1)(τ )τ rdτ.
This proves the claim for t (cid:54)= 0. Now, since ω(r)(t) exists for all t (cid:54)= 0, we have [43]:
provided that the above limit exists. By applying L'Hospital's rule [43] we have in fact:
ω(r)(0) = lim
t→0
ω(r)(t),
(cid:90) t
0
ψ(r)(τ )τ r−1dτ =
ψ(r)(0)
r
ω(r)(0) = lim
t→0
1
tr
and the proof is complete.
We are now ready to prove Theorem 1.
37
(115)
(116)
(117)
(118)
(cid:3)
(119)
(120)
Proof of Theorem 1. Recalling the definition of ξi,(cid:96) in (87), the finite-horizon random variable
k(n) in (21), and its LMGF φk,µ(t; n) in (58) can be written as, respectively:
y(cid:63)
and
φk,µ(t; n) =
S(cid:88)
(cid:96)=1
y(cid:63)
k(n) (cid:44) n(cid:88)
S(cid:88)
n(cid:88)
i=1
ψ(ξi,(cid:96)t) =
i=1
(cid:96)=1
ξi,(cid:96)x(cid:96)(i),
S(cid:88)
n(cid:88)
(cid:96)=1
i=1
ψ(ξi,(cid:96)t).
We now apply Lemma 1 to each of the S inner summations, with the choices f (t) = ψ(t),
bi = bk,(cid:96)(i), and p = p(cid:96). Note that the hypotheses of the lemma are satisfied. Indeed ψ(t) is a
LMGF, implying that ψ(0) = 0 and that ψ(t) is infinitely differentiable in R. By assumption, we
October 28, 2018
DRAFT
have ψ(t) < ∞ for all t ∈ R. As to the conditions in (99), by Perron's theorem [36, Theorem
8.5.1], there exist C > 0 and 0 < λ < 1 such that:
38
bk,(cid:96)(i) − p(cid:96) ≤ Cλi.
By Lemma 1 we conclude that
lim
n→∞ φk,µ(t; n) =
=
ψ(ξi,(cid:96)t)
∞(cid:88)
S(cid:88)
(cid:90) p(cid:96)µt
S(cid:88)
(cid:96)=1
i=1
1
µ
(cid:96)=1
0
ψ(τ )
τ
dτ +
(121)
(122)
S(cid:88)
(cid:96)=1
R(cid:96)(t),
where we made explicit the dependence of the remainder terms upon (cid:96) = 1, 2, . . . , S.
In view of the continuity theorem for the moment generating functions [45], and since by
k,µ, the limit of φk,µ(t; n) (i.e., the limit of the
definition y(cid:63)
LMGF of y(cid:63)
k(n) converges in distribution to y(cid:63)
k(n)) represents φk,µ(t) (i.e., the LMGF of y(cid:63)
k,µ). Formally, we have:
φk,µ(t) = lim
n→∞ φk,µ(t; n) =
ψ(ξi,(cid:96)t),
and claim (88) is proved. For the same reason we can rewrite (122) as:
and
φk,µ(t) =
1
µ
µ φk,µ(t/µ) =
ψ(τ )
τ
dτ +
ψ(τ )
dτ + µ
R(cid:96)(t),
R(cid:96)(t/µ),
where, from (101), the remainder term is bounded by:
S(cid:88)
(cid:96)=1
µ
R(cid:96)(t/µ) ≤ µ
2 − µ
h1(p(cid:96)t) +
µ SCλh2(t)
1 − λ(1 − µ)
.
∞(cid:88)
i=1
(cid:96)=1
S(cid:88)
S(cid:88)
S(cid:88)
(cid:96)=1
(cid:96)=1
(cid:90) p(cid:96)µt
S(cid:88)
(cid:90) p(cid:96)t
S(cid:88)
(cid:96)=1
0
(cid:96)=1
0
τ
S(cid:88)
(cid:96)=1
n(cid:88)
S(cid:88)
(123)
(124)
(125)
(126)
(127)
(128)
DRAFT
We conclude from (124) that claim (89) and claim (93) for the case r = 0 hold.
To establish the remaining claims, we start by noting from (120) that, for all r = 1, 2, . . . :
φ(r)
k,µ(t; n) =
i,(cid:96)ψ(r)(ξi,(cid:96)t).
ξr
Now, recalling the definition of ξi,(cid:96) from (87), we have:
i=1
(cid:96)=1
0 ≤ ξi,(cid:96) ≤ µ(1 − µ)i−1,
t ∈ [−a, a] ⇒ ξi,(cid:96)t ∈ [−a, a].
October 28, 2018
Thus, for all t ∈ [−a, a] we can write:
ξr
i,(cid:96)ψ(r)(ξi,(cid:96)t) ≤ µr(1 − µ)r(i−1) max
τ∈[−a,a]
ψ(r)(τ ).
But since
µr
(1 − µ)r(i−1) =
µr
1 − (1 − µ)r ,
∞(cid:88)
i=1
39
(129)
(130)
we conclude that φ(r)
k,µ(t; n) is majorized by an absolutely convergent series. In view of Weierstrass
theorem about uniform convergence [43, Theorem 7.10, p. 148], this result implies that φ(r)
k,µ(t; n)
converges uniformly as n → ∞ in any compact interval [−a, a]. Since this holds for all r =
1, 2, . . . , and since we already showed that φk,µ(t; n) → φk,µ(t) in (88), the results about uniform
convergence and differentiability [43, Theorem 7.17, p. 152] allow us to conclude that the
derivative of the limit function equals the limit of the series of derivatives, namely, that (90)
holds true. Moreover, using (127) for n → ∞, we can write for any t (cid:54)= 0:
∞(cid:88)
S(cid:88)
i=1
(cid:96)=1
φ(r)
k,µ(t) =
1
tr
(ξi,(cid:96)t)rψ(r)(ξi,(cid:96)t).
(131)
Applying Lemma 1 to the function f (t) = trψ(r)(t), with the same choices done before for bi
and p, Eq. (100) gives:
which implies:
φ(r)
k,µ(t) =
1
µtr
φ(r)
k,µ(t/µ)
µr−1 =
1
tr
(cid:90) p(cid:96)µt
(cid:90) p(cid:96)t
0
S(cid:88)
S(cid:88)
(cid:96)=1
(cid:96)=1
0
ψ(r)(τ )τ r−1dτ +
R(cid:96)(t),
ψ(r)(τ )τ r−1dτ +
R(cid:96)(t/µ),
1
tr
S(cid:88)
S(cid:88)
(cid:96)=1
(cid:96)=1
µ
tr
(cid:90) p(cid:96)t
S(cid:88)
(cid:96)=1
0
(cid:90) p(cid:96)t
S(cid:88)
and, using (101), the remainder term vanishes as µ → 0, implying that
φ(r)
k,µ(t/µ)
µr−1
µ→0−→ 1
tr
ψ(r)(τ )τ r−1dτ.
S(cid:88)
Now, in view of Lemma 2, and by the definition of φ(t) in (89), we have:
φ(r)(t) =
(135)
Comparing (134) and (135) we arrive at (91) for all t (cid:54)= 0. It remains to consider the case t = 0,
namely, to show that:
(cid:96) ω(r)(p(cid:96)t) =
pr
(cid:96)=1
(cid:96)=1
0
ψ(r)(τ )τ r−1dτ.
1
tr
φ(r)
k,µ(0)
µr−1
µ→0−→ φ(r)(0) =
ψ(r)(0)
S(cid:88)
r
(cid:96)=1
pr
(cid:96),
(136)
DRAFT
October 28, 2018
(132)
(133)
(134)
ξr
i,(cid:96)
i=1
(cid:96)=1
∞(cid:88)
S(cid:88)
S(cid:88)
∞(cid:88)
∞(cid:88)
S(cid:88)
∞(cid:88)
S(cid:88)
(cid:96)=1
(cid:96)=1
i=1
i=1
i=1
(cid:96)=1
φ(r)
k,µ(0)
(90)
= ψ(r)(0)
(87)
= ψ(r)(0)µr
(1 − µ)r(i−1)br
k,(cid:96)(i)
= ψ(r)(0)µr
ψ(r)(0)µr
(cid:124)
= ψ(r)(0)
µr
1 − (1 − µ)r
k,(cid:96)(i) − pr
(cid:125)
(cid:96))
(1 − µ)r(i−1)(br
(cid:96)(1 − µ)r(i−1) +
pr
(cid:123)(cid:122)
S(cid:88)
S(cid:88)
pr
(cid:96) + R,
(cid:44)R
(cid:96)=1
φ(r)
k,µ(0)
µr−1 = ψ(r)(0)
µ
1 − (1 − µ)r
pr
(cid:96) +
R
µr−1 .
(cid:96)=1
br
k,(cid:96)(i) − pr
(cid:96) ≤ rbk,(cid:96)(i) − p(cid:96),
40
(137)
(138)
(139)
where the last equality follows from (112). This equality is established as follows:
or
Using the inequality1
and (121) we can write
R
µr−1 ≤ rSCλψ(r)(0)
µ
(140)
Therefore, the second term on the RHS of (138) vanishes as µ → 0, and by application of
L'Hospital's rule [43] to the first term we get (136). Finally, examining (133) and (140) shows
that the O(µ) error estimate in (93) holds true.
1 − [λ(1 − µ)r]
.
1The inequality follows from the factorization, holding for r ∈ N:
r−1(cid:88)
ar − br = (a − b)
akbr−1−k,
and from the fact that bk,(cid:96)(i) and p(cid:96) are not greater than one.
k=0
October 28, 2018
DRAFT
APPENDIX B
41
The proof relies on some properties of moment generating functions, which are collected in
Sec. B-A, and on a technical lemma, whose proof is deferred to Sec. B-B.
Proof of Theorem 3. By definition, θγ solves the stationary equation
(141)
Since φ(cid:48)(cid:48)(t) > 0, it follows that φ(cid:48)(t) is strictly increasing, and, hence, θγ is unique. Moreover,
from (92) used with r = 1 we obtain:
φ(cid:48)(θγ) = γ.
φ(cid:48)(0) = ψ(cid:48)(0) = E[x],
(142)
recalling that the first derivative of the LMGF, evaluated at the origin, gives the expectation
of the random variable [34], [35]. The equality φ(cid:48)(0) = E[x] implies that θγ > 0, because by
assumption γ > E[x], and φ(cid:48)(t) is strictly increasing.
For ease of notation, in the following we shall suppress the subscript γ, and we shall use
the symbol θ to denote the unique solution of (141). Let us denote by m(dy) the probability
measure associated with y(cid:63)
k,µ, and introduce the following measure transformation, namely, an
exponential translation in the form:
m(dy) = e
θ
µ y−φk,µ( θ
µ)m(dy).
(143)
The use of a similar transformation for large deviations analysis was originally proposed by
Cram´er [41], and then used, e.g., in [33], to find the exact asymptotics in the simplest case of
normalized sums of i.i.d. random variables -- see also [34], [35]. We will explain how this
transformation is also helpful in our more general case, where the asymptotic parameter µ is
not simply the index of a summation of i.i.d. random variables.
Denoting by IE the indicator of an event E, and by E m[·] the expectation operator under the
October 28, 2018
DRAFT
measure m(dy), some straightforward algebra allows us to write:
(cid:90) ∞
γ
k,µ>γ}] =
m(dy)
P[y(cid:63)
(cid:90) ∞
k,µ > γ] = E[I{y(cid:63)
− θ
e
µ y+φk,µ( θ
=
γ
µ y(cid:63)
k,µ+φk,µ( θ
− θ
= E m[e
− 1
µ [γθ−φ(θ)] e
k,µ−φ(cid:48)
= e
µ [y(cid:63)
− θ
k,µ( θ
µ) m(dy)
µ) I{y(cid:63)
E m[e
− 1
E m[e
= e
µ [Φ(γ)+k,µ(θ)] e
− θ
k,µ−φ(cid:48)
µ [y(cid:63)
k,µ( θ
k,µ>γ}]
µ)] ×
θ
µ)] I{y(cid:63)
µ[γ−φ(cid:48)
k,µ( θ
µ)] I{y(cid:63)
k,µ>γ}],
k,µ>γ}]
µ)] e
− 1
µ[φ(θ)−µφk,µ( θ
θ
µ[γ−φ(cid:48)
k,µ( θ
µ)] ×
where we used definition (51a) for k,µ(θ), and the fact that
Φ(γ) = sup
t∈R
[γt − φ(t)] ⇔ Φ(γ) = γθ − φ(θ),
which holds true because φ(t) is strictly convex and θ solves the stationary equation (141). It is
now useful to introduce the normalized random variable
For ease of notation, we introduce the quantity
where the convergence follows from (91). With this definition, the expression for w(cid:63)
rewritten as:
k,µ can be
It is also convenient to introduce the normalized threshold:
42
(144)
(145)
(146)
(147)
(cid:44) y(cid:63)
w(cid:63)
k,µ
(cid:113)
k,µ − φ(cid:48)
φ(cid:48)(cid:48)
k,µ(θ/µ)
k,µ(θ/µ)
.
(cid:115)
sk,µ (cid:44)
φ(cid:48)(cid:48)
k,µ(θ/µ)
µ
µ→0−→(cid:112)φ(cid:48)(cid:48)(θ),
w(cid:63)
k,µ =
k,µ − φ(cid:48)
y(cid:63)
√
µsk,µ
k,µ(θ/µ)
.
k,µ(θ/µ)
µsk,µ
,
γk,µ (cid:44) γ − φ(cid:48)
√
(cid:20)
E m
− θsk,µ√
e
µ (w(cid:63)
k,µ−γk,µ) I{w(cid:63)
k,µ>γk,µ}
(cid:21)
.
(148)
(149)
(150)
DRAFT
and the normalized expectation:
Ck,µ (cid:44) 1√
µ
October 28, 2018
Using the above definitions, Eq. (144) can be rewritten as:
P[y(cid:63)
k,µ > γ] =
µ Ck,µ e
− 1
µ [Φ(γ)+k,µ(θ)].
√
43
(151)
Examining expression (50) for Pk,µ(γ), it is immediate to recognize that the theorem will be
established if we are able to show that:
µ→0−→
Ck,µ
1(cid:112)2πθ2φ(cid:48)(cid:48)(θ)
(152)
The key for proving the above claim is the asymptotic normality of the random variable w(cid:63)
k,µ
under the transformed measure m(dy). To see this, let us exploit the fundamental properties of
k,µ. First, according to property P2 in Sec. B-A, and since the first three central moments of
w(cid:63)
a random variable coincide with its first three cumulants [48], under the considered transformed
measure we have:
k,µ] = φ(cid:48)
E m[y(cid:63)
k,µ(θ/µ))2] = φ(cid:48)(cid:48)
k,µ(θ/µ))3] = φ(cid:48)(cid:48)(cid:48)
k,µ(θ/µ),
k,µ(θ/µ),
k,µ(θ/µ).
E m[(y(cid:63)
E m[(y(cid:63)
k,µ − φ(cid:48)
k,µ − φ(cid:48)
(153)
(154)
(155)
Accordingly, from (146) and (147), we conclude that w(cid:63)
third moment is:
k,µ is zero-mean, unit-variance, and its
E m[(w(cid:63)
k,µ)3] =
φ(cid:48)(cid:48)(cid:48)
k,µ(θ/µ)
µ3/2s3
k,µ
.
(156)
A crucial step consists now in finding an asymptotic expansion for the cumulative distribution
function of the random variable w(cid:63)
k,µ under the transformed measure. To this aim, we follow the
procedure employed for deriving the Berry-Esseen and Edgeworth expansions -- see, e.g., [40],
and we introduce the function:
Gk,µ(w) (cid:44) N (w) − E m[(w(cid:63)
k,µ)3]
(w2 − 1) n(w)
= N (w) − φ(cid:48)(cid:48)(cid:48)
6
k,µ(θ/µ)
6 µ3/2s3
k,µ
(w2 − 1) n(w),
(157)
where N (w) and n(w) = N(cid:48)(w) are, respectively, the cumulative distribution function and
the probability density function of a standard normal. Denoting by Fk,µ(w) the cumulative
October 28, 2018
DRAFT
distribution function of the random variable w(cid:63)
establish that (Lemma 3):
k,µ under the transformed measure, in B-B we
1√
µ
sup
w∈R
Fk,µ(w) − Gk,µ(w) µ→0−→ 0.
(158)
44
This implies that w(cid:63)
k,µ is asymptotically normal under the transformed measure m(dy). More
importantly, Eq. (158) provides a refined, uniform estimate of the convergence error, a property
that we shall exploit soon to prove (152). To this aim, we evaluate explicitly the expectation
in (150). Using integration by parts, we obtain:
(cid:90) ∞
Ck,µ =
1√
µ
(cid:20)
=
1√
µ
θsk,µ
µ
1√
µ
=
γk,µ
− θsk,µ√
e
(cid:90) ∞
(cid:90) ∞
γk,µ
0
− θsk,µ√
e
µ (w−γk,µ)dFk,µ(w)
µ (w−γk,µ) [Fk,µ(w) − Fk,µ(γk,µ)]
(cid:21)∞
+
γk,µ
− θsk,µ√
µ (w−γk,µ)[Fk,µ(w) − Fk,µ(γk,µ)]dw
e
e−x [Fk,µ(pk,µ(x)) − Fk,µ(γk,µ)] dx,
(159)
(160)
(161)
(162)
(163)
(164)
DRAFT
where the last equality follows from the change of variable
(w − γk,µ) → x,
θsk,µ√
µ
and from the definition:
pk,µ(x) (cid:44)
√
µ
θsk,µ
x + γk,µ.
Let us also introduce the analogue of (159) for the normal approximation Gk,µ(w) in (157),
namely,
(cid:90) ∞
e−x [Gk,µ(pk,µ(x)) − Gk,µ(γk,µ)] dx.
Dk,µ (cid:44) 1√
µ
By using Lemma 3, we can write:
0
(cid:90) ∞
Ck,µ − Dk,µ ≤ 2√
µ
2√
µ
=
sup
w∈R
sup
w∈R
Fk,µ(w) − Gk,µ(w)
Fk,µ(w) − Gk,µ(w) µ→0−→ 0.
0
e−xdx
By virtue of this result, and in order to prove (152), it is enough to show that
µ→0−→
Dk,µ
October 28, 2018
1(cid:112)2πθ2φ(cid:48)(cid:48)(θ)
.
Substituting definition (157) for Gk,µ(w) into (162), we have:
(cid:90) ∞
Dk,µ =
0
e−x [N (pk,µ(x)) − N (γk,µ)] dx +
1√
µ
φ(cid:48)(cid:48)(cid:48)
k,µ(θ/µ)
6 µ2s3
[n(γk,µ)(γ2
(cid:90) ∞
k,µ − 1) − n(pk,µ(x))(p2
e−x ×
k,µ
0
k,µ(x) − 1)]dx.
Consider first the second term on the RHS. By (93) we can write (recall from (141) that φ(cid:48)(θ) =
γ):
k,µ(θ/µ) = φ(cid:48)(θ) + O(µ) = γ + O(µ),
φ(cid:48)
45
(165)
(166)
(167)
which, in view of (149), implies that
lim
µ→0
γk,µ = 0.
We therefore conclude that limµ→0 pk,µ(x) = 0 from (161) and (147). Accordingly, we have:
k,µ − 1) − n(pk,µ(x))(p2
k,µ(x) − 1)] = 0,
lim
µ→0
[n(γk,µ)(γ2
(168)
and, hence, by dominated convergence [46] (note that the function n(w)(w2 − 1) is bounded),
the second term on the RHS in (165) vanishes as µ → 0, having further used the fact that the
ratio φ(cid:48)(cid:48)(cid:48)
converges in view of (91) and (147).
k,µ(θ/µ)
6 µ2s3
k,µ
With regards to the first term on the RHS of (165), by using a second-order Taylor expansion
of N (w) around the point γk,µ we obtain, for an intermediate point qk,µ(x):
N (pk,µ(x)) = N (γk,µ) + n(γk,µ) (pk,µ(x) − γk,µ) +
n(cid:48)(qk,µ(x))
(pk,µ(x) − γk,µ)2
√
2
µ
θsk,µ
x +
= N (γk,µ) + n(γk,µ)
n(cid:48)(qk,µ(x))
µx2
2(θsk,µ)2 ,
(169)
DRAFT
October 28, 2018
where we used (161). The above expansion then gives:
The second term on the RHS of (170) vanishes because
(cid:90) ∞
1√
µ
=
0
n(γk,µ)
θsk,µ
√
µ
2(θsk,µ)2
(cid:12)(cid:12)(cid:12)(cid:12)(cid:90) ∞
0
x2e−xn(cid:48)(qk,µ(x))dx
(cid:90) ∞
n(γk,µ)
θsk,µ
e−x [N (pk,µ(x)) − N (γk,µ)] dx
0
xe−xdx +
(cid:90) ∞
(cid:90) ∞
(cid:12)(cid:12)(cid:12)(cid:12) ≤ sup
w∈R
0
= 2 sup
w∈R
x2e−xn(cid:48)(qk,µ(x))dx.
(cid:90) ∞
x2e−xdx
n(cid:48)(w)
n(cid:48)(w) < ∞.
0
46
(170)
(171)
On the other hand, the first term on the RHS of (170) satisfies:
1(cid:112)2πθ2φ(cid:48)(cid:48)(θ)
xe−xdx =
µ→0−→
n(γk,µ)
θsk,µ
0 xe−xdx = 1, and sk,µ converges to (cid:112)φ(cid:48)(cid:48)(θ)
2π, (cid:82) ∞
(172)
,
√
since γk,µ vanishes by (167), n(0) = 1/
by (147). The proof of (51a) is now complete.
0
It remains to justify the alternative expression (51b). The rationale behind our choice is as
follows. Examining (172), it is seen that the term n(γk,µ) is replaced by its limiting constant
√
2π. In order to get a better approximation for finite values of 1/µ, we can decide to
value of 1/
retain the dependence on µ by including n(γk,µ) in the main formula. This amounts to replacing
Ck,µ in (151), not with the limiting value in (152), but rather with
√
2π n(γk,µ)
1(cid:112)2πθ2φ(cid:48)(cid:48)(θ)
.
(173)
By making explicit the definition of γk,µ in (149), and of the Gaussian pdf, the additional term
is:
√
2π n(γk,µ) = e
− [γ−φ(cid:48)
k,µ(θ/µ)]2
2µs2
k,µ
∼ e
− 1
µ
[φ(cid:48)(θ)−φ(cid:48)
k,µ(θ/µ)]2
2φ(cid:48)(cid:48)(θ)
,
(174)
where, in the last step, we have used γ = φ(cid:48)(θ), and, to be consistent with the approximations
k,µ with its limiting value φ(cid:48)(cid:48)(θ). Examining the correction at
adopted so far, we have replaced s2
the exponent of (174) we recognize exactly the second term in (51b).
October 28, 2018
(cid:3)
DRAFT
47
A. Some general properties of moment generating functions
Consider a random variable x with Moment Generating Function (MGF), Logarithmic Moment
Generating Function (LMGF), and Characteristic Function (CF) defined respectively, as:
ν(t) (cid:44) E[etx], ψ(t) (cid:44) ln ν(t), ϕ(u) (cid:44) E[ejux].
(175)
We stress that, in this specific subsection, x is intended to be a generic random variable, and
there is no need here to give it any particular meaning in terms of a local or a global network
statistic. We assume that ν(t) exists for all t ∈ R. Under this assumption, we can also define
the MGF relative to a complex argument z, namely:
ν(z) (cid:44) E[ezx], z ∈ C,
(176)
which is the analytic continuation of ν(t) over the complex plane [46]. Note that, for z = t + ju:
ν(z) = E[ezx] ≤ E[ezx] = ν(t).
(177)
In this section, we focus on the following measure transformation (exponential measure trans-
lation):
m(dx) = eηx−ψ(η)m(dx) =
eηx
ν(η)
m(dx),
(178)
and establish several important properties characterizing the statistical behavior of x under the
transformed measure m(dx).
• Property P1. The MGF under the transformation is:
ν(t) =
ν(η + t)
ν(η)
Indeed, by definition:
ν(t) (cid:44) E m[etx] =
E[e(η+t)x]
ν(η)
=
ν(η + t)
ν(η)
.
• Property P2. The r-th cumulant χ(r) of the variable x under the transformation is
χ(r) = ψ(r)(η)
Again, from property P1, the LMGF of x under the transformed measure is:
ψ(t) (cid:44) ln ν(t) = ln ν(η + t) − ln ν(η) = ψ(η + t) − ψ(η).
October 28, 2018
(179)
(180)
(181)
(182)
DRAFT
Accordingly, the r-th cumulant of the variable x under the transformation is
(cid:12)(cid:12)(cid:12)(cid:12)t=0
χ(r) =
dr
dtr
ψ(t)
= ψ(r)(η).
• Property P3. The CF of the random variable x under the transformation is
ϕ(u) =
ν(η + ju)
ν(η)
48
(183)
(184)
where ν(z), for a complex z, was defined by (180). This result follows from an argument
similar to the proof of Property P1.
• Property P4. Consider the shifted random variable
x = x − ψ(cid:48)(η).
Since the CF of the shifted-and-scaled random variable ax + b is
E[ejt(ax+b)] = ϕ(at)ejbt,
(185)
(186)
the CF of the shifted variable x under the transformed measure is readily computed as:
ϕ(u) = ϕ(u)e−jψ(cid:48)(η)u =
ν(η + ju)
ν(η)
e−jψ(cid:48)(η)u.
(187)
Assume that the parameter η ruling the measure transformation lies in a bounded interval,
say, η ≤ ηmax. Then, for sufficiently small δ > 0, a positive constant M = M (δ, ηmax)
exists such that for u ≤ δ, and for any choice of η ≤ ηmax, the following expansion
holds for the CF of the shifted random variable x:
log ϕ(u) = −ψ(cid:48)(cid:48)(η)
u2
2
+ ψ(cid:48)(cid:48)(cid:48)(η)
(ju)3
6
+ R(u)
with the remainder bounded as:
R(u) ≤ M
u4
24
.
(188)
(189)
In order to prove the above property, let us introduce the logarithm of a complex number
z:
For z < 1, it can be alternatively defined by the Taylor series [46]:
log z = lnz + j arg(z).
∞(cid:88)
n
n=1
(−1)n+1
zn.
log(1 + z) =
October 28, 2018
(190)
(191)
DRAFT
49
We shall now consider conditions under which the function log ϕ(u) can be represented by
a Taylor series.
Since ϕ(u) is the CF of a zero-mean random variable, the following known bound is obtained
from the Taylor expansion of the complex exponential [40, Eq. (4.14), p. 514]:
ϕ(u) − 1 ≤ E m[ x2]
u2
2
= ψ(cid:48)(cid:48)(η)
u2
2
,
(192)
where in the last equality we used property P2. We now select a parameter δ > 0 such that
δ2 <
2
ψ(cid:48)(cid:48)(η)
max
η≤ηmax
,
(193)
where the above choice is meaningful because ψ(η) is a LMGF, which implies that ψ(cid:48)(cid:48)(η) >
0, and that ψ(cid:48)(cid:48)(η) is a continuous function, and thus admits a maximum within the interval
[−ηmax, ηmax]. Therefore, over the range u ≤ δ, Eqs. (192) and (193) give:
ϕ(u) − 1 < 1.
(194)
This allows representing, in the considered range for u, the function log ϕ(u) via its Taylor
series. By the definition of cumulants, this series can be written as [48, Eq. (6.8), p. 45]:
n(cid:88)
r=2
log ϕ(u) =
χ(r) (ju)r
r!
+ o(un),
(u → 0).
(195)
Note that, in the above formula, the series coefficients should be given by the cumulants
of x (computed under the transformed measure). As it can be seen, we used instead the
cumulants χ(r) of x. This is because x is a shifted version of x, and so its cumulants are
(but for the first one, which is zero) the same as those of x.
Consider now the three-term series. Using the explicit formulas for the cumulants under the
transformed measure provided by (181), we get:
log ϕ(u) = −ψ(cid:48)(cid:48)(η)
+ ψ(cid:48)(cid:48)(cid:48)(η)
(ju)3
u2
2
+ r(¯u)
6
where ¯u ∈ (−δ, δ), and the function r(u) can be expressed as:
(cid:20)ν(η + ju)
d4
du4 log ϕ(u)
d4
du4 log
ν(η)
(cid:21)
,
e−jψ(cid:48)(η)u
r(u) =
=
October 28, 2018
u4
24
,
(196)
(197)
DRAFT
50
which leads to (the argument η + ju is omitted for ease of notation):
r(u) =
(cid:2)−6(ν(cid:48))4 + 12ν(ν(cid:48))2ν(cid:48)(cid:48) − 4ν2ν(cid:48)ν(cid:48)(cid:48)(cid:48)−
3ν2(ν(cid:48)(cid:48))2 + ν3ν(4)(cid:3) .
1
ν4
(198)
We now show that r(u) is bounded for η ≤ ηmax and u ≤ δ. To this aim, it is useful to
introduce the region of the complex plane:
A = {Re(z) ∈ [−ηmax, ηmax], Im(z) ∈ [−δ, δ]}.
(199)
First, note that, since all the derivatives of ν(z) are analytic (and, hence, continuous) in
C [46], the term between brackets in (198) is bounded within the bounded and closed set
A. In addition, for z ∈ A, Eq. (194) implies that ν(z) > 0. Indeed, if we had ν(z) = 0
for a certain z ∈ A, then there would exist η and u, with η ≤ ηmax and u ≤ δ, such that
ν(η + ju) = 0, implying:
ϕ(u) − 1 =
e−jψ(cid:48)(η)u − 1
(200)
and this condition would violate (194). We can accordingly write, for all η ≤ ηmax and
u ≤ δ:
ν(η)
(cid:12)(cid:12)(cid:12)(cid:12) ν(η + ju)
(cid:12)(cid:12)(cid:12)(cid:12) ≤ max
z∈A
(cid:12)(cid:12)(cid:12)(cid:12)
1
ν(η + ju)
(cid:12)(cid:12)(cid:12)(cid:12) = 1,
(cid:12)(cid:12)(cid:12)(cid:12) < ∞,
(cid:12)(cid:12)(cid:12)(cid:12) 1
ν(z)
(201)
where finiteness follows since ν(z) is analytic (and, hence, continuous) in C, and it does
not vanish within the set A. We have in fact shown that r(u) is bounded for η ≤ ηmax
and u ≤ δ, namely, that a constant M = M (δ, ηmax) exists such that r(¯u) ≤ M. In the
light of (196), this completes the proof of (188) and (189).
B. Technical lemma relevant to Theorem 3
Let us introduce the main quantities involved in the forthcoming derivation.
• The measure transformation:
m(dy) = e
θ
µ y−φk,µ( θ
µ)m(dy).
• The random variable introduced in (148):
k,µ − φ(cid:48)
y(cid:63)
√
w(cid:63)
k,µ =
k,µ(θ/µ)
,
µsk,µ
October 28, 2018
(202)
(203)
DRAFT
51
whose cumulative distribution function under the transformed measure has been denoted by
Fk,µ(w). Using property P3 and applying (186), it is easily seen that the CF of w(cid:63)
k,µ under
the transformed measure is:
(cid:16) θ
(cid:17)
−ju
e
φ(cid:48)
k,µ(θ/µ)
√
µsk,µ ,
(204)
νk,µ
ϕk,µ(u) =
µ + j
µsk,µ
u√
(cid:16) θ
(cid:17)
νk,µ
µ
where νk,µ(·) denotes the MGF (of real or complex argument) of the random variable y(cid:63)
under the original measure.
k,µ
• The normal approximation Gk,µ(w) defined by (157):
k,µ(θ/µ)
6 µ3/2s3
Gk,µ(w) = N (w) − φ(cid:48)(cid:48)(cid:48)
k,µ
(w2 − 1) n(w).
(205)
The following lemma shows that Fk,µ(w) converges to Gk,µ(w) as µ goes to zero. From (91)
and (147), we conclude that the second term on the RHS of (205) vanishes as µ → 0. This
result will imply that w(cid:63)
k,µ is asymptotically normal. In addition, regarding Gk,µ(w) as a higher-
order approximation for Fk,µ(w) (namely, including a correction with respect to the crudest
approximation N (w)) the lemma provides the useful information that the (worst-case) rate of
µ. This observation is critical for
convergence of the approximation error is in the order of
the proof of Theorem 3.
√
LEMMA 3 (Asymptotic normality of w(cid:63)
of the convergence error). Under the same hypotheses of Theorem 3:
k,µ under the transformed measure (202): Estimate
1√
µ
sup
w∈R
Fk,µ(w) − Gk,µ(w) µ→0−→ 0.
(206)
Proof. The following classical result [40, page 538] is used in our proof.
Let F be a probability distribution with zero mean and characteristic function ϕ. Suppose that
F − G vanishes at ±∞ and that G has a derivative g such that g ≤ m. Finally, suppose that
g has a continuously differentiable Fourier transform ζ such that ζ(0) = 1 and ζ(cid:48)(0) = 0. Then,
for all w and for all T > 0:
(cid:90) T
−T
(cid:12)(cid:12)(cid:12)(cid:12) ϕ(u) − ζ(u)
u
(cid:12)(cid:12)(cid:12)(cid:12) du +
F (w) − G(w) ≤ 1
π
October 28, 2018
24m
πT
.
(207)
DRAFT
(cid:34)
φ(cid:48)(cid:48)(cid:48)
k,µ(θ/µ)
6 µ3/2s3
k,µ
(cid:34)
(cid:35)
(cid:35)
It is now immediate to verify that the functions Fk,µ(w) and Gk,µ(w) introduced above meet the
conditions required for (207) to hold. Indeed, Gk,µ(w) → 0 as w → −∞, and Gk,µ(w) → 1 as
w → +∞, implying that the difference Fk,µ(w) − Gk,µ(w) vanishes at ±∞ because Fk,µ(w) is
a cumulative distribution function. Moreover,
d
dw
Gk,µ(w) = n(w)
1 − w
φ(cid:48)(cid:48)(cid:48)
k,µ(θ/µ)
3 µ3/2s3
k,µ
−
(w2 − 1) n(cid:48)(w).
(208)
From (91) used with r = 3, we conclude that the quantity φ(cid:48)(cid:48)(cid:48)
vanishes as µ → 0 and,
hence, it is bounded for sufficiently small values of µ. The required boundedness condition on
dw Gk,µ(w)(cid:12)(cid:12) then follows by the boundedness of the functions n(w), w n(w), and (w2−1)n(cid:48)(w).
(cid:12)(cid:12) d
k,µ(θ/µ)
µ3/2s3
k,µ
Finally, the Fourier transform of (208) is given by [40]:
ζk,µ(u) (cid:44) e− u2
2
1 +
φ(cid:48)(cid:48)(cid:48)
k,µ(θ/µ)
6 µ3/2s3
k,µ
(ju)3
.
(209)
It is seen that ζk,µ(u) is continuously differentiable, and that ζk,µ(0) = 1, ζ(cid:48)
k,µ(0) = 0.
In order to use the above lemma, let us select, for a given > 0, a constant a such that:
and set
a >
24m
,
T =
a√
µ
⇒ 24m
πT
√
≤
µ.
With these particular choices, application of (207) yields:
52
(210)
(211)
(212)
(213)
DRAFT
Due to arbitrariness of , the claim (206) will be proved if we show that the first term on the
RHS of (212) vanishes as µ → 0. To get this result, we split the integral as follows:
1√
µ
≤ 1√
µ
(cid:90) a√
µ
− a√
µ
Fk,µ(w) − Gk,µ(w)
u
µ
µ
− a√
(cid:90) a√
(cid:12)(cid:12)(cid:12)(cid:12) ϕk,µ(u) − ζk,µ(u)
(cid:12)(cid:12)(cid:12)(cid:12) ϕk,µ(u) − ζk,µ(u)
(cid:12)(cid:12)(cid:12)(cid:12) du + .
(cid:12)(cid:12)(cid:12)(cid:12) du = I1 + I2,
u
1√
µ
October 28, 2018
where
and
I1 =
(cid:90) δ√
µ
− δ√
µ
1√
µ
(cid:90)
(cid:12)(cid:12)(cid:12)(cid:12) ϕk,µ(u) − ζk,µ(u)
(cid:12)(cid:12)(cid:12)(cid:12) du,
(cid:12)(cid:12)(cid:12)(cid:12) ϕk,µ(u) − ζk,µ(u)
(cid:12)(cid:12)(cid:12)(cid:12) du,
u
u
I2 =
1√
µ
µ <u< a√
δ√
µ
53
(214)
(215)
for a sufficiently small δ whose choice will be carefully addressed in the following. We start by
proving that I1 vanishes as µ → 0.
Part i (I1 → 0 as µ → 0). From (88) we know that the MGF (with real argument t) of the
random variable y(cid:63)
k,µ under the original measure can be represented as:
∞(cid:89)
S(cid:89)
ν(cid:0)µ(1 − µ)i−1bk,(cid:96)(i)t(cid:1) ,
νk,µ(t) =
where ν(t) = E[etxk(n)] is the MGF of the local statistic xk(n). We also know that the MGF
νk,µ(t) can be extended to the complex plane by considering
i=1
(cid:96)=1
νk,µ(z) = E[ezy(cid:63)
k,µ]
(217)
for complex z. It would be useful to have the same infinite-product representation as in (216)
for νk,µ(z), namely:
∞(cid:89)
S(cid:89)
i=1
(cid:96)=1
ν(cid:0)µ(1 − µ)i−1bk,(cid:96)(i)z(cid:1) .
νk,µ(z) =
This turns out to be true, and can be justified by an argument similar to that used in [45], which
is now illustrated in detail. Consider the sequence of functions, for n = 1, 2, . . .
(216)
(218)
n(cid:89)
S(cid:89)
ν(cid:0)µ(1 − µ)i−1bk,(cid:96)(i)z(cid:1) .
fn(z) =
(219)
First, fn(z) is analytic in C, since it consists of the product of functions ν(·) that are analytic
in C. Moreover, by (177), we can write, for z = t + ju:
(cid:96)=1
i=1
fn(z) ≤ n(cid:89)
S(cid:89)
ν(cid:0)µ(1 − µ)i−1bk,(cid:96)(i)t(cid:1) = fn(t).
(220)
i=1
(cid:96)=1
For any n, the RHS is a MGF and, hence, its second derivative over t is strictly positive, which
implies that the maximum of the RHS within an interval t ≤ tmax is attained at either one or
both endpoints of the interval, namely, that:
October 28, 2018
fn(z) ≤ max{fn(−tmax), fn(tmax)} .
(221)
DRAFT
But since fn(t) converges to νk,µ(t) < ∞ as n → ∞, we have that, for any > 0, a certain n0
exists such that, for all n ≥ n0:
54
fn(−tmax) ≤ νk,µ(−tmax) + , fn(tmax) ≤ νk,µ(tmax) + ,
(222)
which shows that the sequence fn(z) is uniformly bounded, at least for n ≥ n0, in the closed
strip {z ∈ C : Re(z) ≤ tmax}. Moreover, since the sequence fn(t) (t ∈ R) admits a limit, we
can say that fn(z) (z ∈ C) admits a limit at each point of the real-axis, namely, of the interval
{z ∈ C : Re(z) ≤ tmax, Im(z) = 0}. This allows invoking Vitali's convergence theorem [49],
which asserts that fn(z) converges, namely:
fn(z) n→∞−→ f (z) =
∞(cid:89)
S(cid:89)
i=1
(cid:96)=1
ν(cid:0)µ(1 − µ)i−1bk,(cid:96)(i)z(cid:1) ,
uniformly in each bounded closed subregion of the open strip {z ∈ C : Re(z) < tmax}, and
the limit function f (z) is therein analytic. Since we are free to choose tmax, we conclude that
f (z) is analytic in C. Moreover, on the real axis
∞(cid:89)
S(cid:89)
ν(cid:0)µ(1 − µ)i−1bk,(cid:96)(i)t(cid:1) = νk,µ(t),
f (t) =
i=1
(cid:96)=1
and since νk,µ(z) is analytic and equals νk,µ(t) on the real axis, by [46, Corollary, p. 209] we
finally get (218).
ηi,(cid:96) (cid:44) (1 − µ)i−1bk,(cid:96)(i) θ,
√
ui,(cid:96) (cid:44) (1 − µ)i−1bk,(cid:96)(i)
µu
sk,µ
,
and used (90) to compute φ(cid:48)
k,µ(θ/µ). Now, from property P4 it is seen that the function
ν(ηi,(cid:96) + jui,(cid:96))
ν(ηi,(cid:96))
e−jψ(cid:48)(ηi,(cid:96))ui,(cid:96)
October 28, 2018
In the light of the above finding, we are allowed to use (218) into (204). This yields, after
some manipulations:
ϕk,µ(u) =
where we introduced
i=1
(cid:96)=1
∞(cid:89)
S(cid:89)
ν(ηi,(cid:96) + jui,(cid:96))
ν(ηi,(cid:96))
e−jψ(cid:48)(ηi,(cid:96))ui,(cid:96),
(223)
(224)
(225)
(226)
(227)
(228)
DRAFT
can be regarded as the CF, evaluated at the point ui,(cid:96), of the shifted random variable x(cid:96)(i)−ψ(cid:48)(ηi,(cid:96))
under the measure transformation
m(dx) =
eηi,(cid:96)x
ν(ηi,(cid:96))
m(dx).
(229)
55
We shall denote this CF by ϕηi,(cid:96)(ui,(cid:96)), having made explicit the dependence upon ηi,(cid:96), thus
getting:
ϕk,µ(u) =
ϕηi,(cid:96)(ui,(cid:96)).
(230)
∞(cid:89)
S(cid:89)
i=1
(cid:96)=1
√
µu
sk,µ
From (227) we get:
We also know from (147) that limµ→0 sk,µ =(cid:112)φ(cid:48)(cid:48)(θ). By applying the definition of limit, this
ui,(cid:96) ≤
(231)
.
implies that, for any > 0, and for sufficiently small values of µ:
ui,(cid:96) ≤ √
µu
(cid:32)
1(cid:112)φ(cid:48)(cid:48)(θ)
(cid:33)
(cid:32)
+
≤ δ
1(cid:112)φ(cid:48)(cid:48)(θ)
(cid:33)
+
(cid:44) ¯δ,
(232)
where the last inequality holds because we are focusing on the integral I1 in (214) and, hence,
we consider the range
µu ≤ δ.
√
Noting now that ηi,(cid:96) ≤ θ by (226), the choice
¯δ2 <
2
ψ(cid:48)(cid:48)(η)
max
η≤θ
(233)
corresponds to (193), and allows invoking property P4, so that it is legitimate to use the Taylor
expansion:
log ϕηi,(cid:96)(ui,(cid:96)) = −ψ(cid:48)(cid:48)(ηi,(cid:96))
u2
i,(cid:96)
2
+ ψ(cid:48)(cid:48)(cid:48)(ηi,(cid:96))
(jui,(cid:96))3
6
+
R(ui,(cid:96)).
(234)
This leads to
October 28, 2018
n(cid:89)
S(cid:89)
i=1
(cid:96)=1
elog ϕηi,(cid:96) (ui,(cid:96))
i,(cid:96)
u2
2 +ψ(cid:48)(cid:48)(cid:48)(ηi,(cid:96))
(jui,(cid:96))3
6 +R(ui,(cid:96))
i=1
(cid:96)=1
ϕηi,(cid:96)(ui,(cid:96)) =
n(cid:89)
S(cid:89)
n(cid:89)
S(cid:89)
e−ψ(cid:48)(cid:48)(ηi,(cid:96))
(cid:80)S
(cid:80)n
(cid:96)=1 −ψ(cid:48)(cid:48)(ηi,(cid:96))
(cid:96)=1
i=1
=
= e
i=1
i,(cid:96)
u2
2 +ψ(cid:48)(cid:48)(cid:48)(ηi,(cid:96))
(jui,(cid:96))3
6 +R(ui,(cid:96)).
(235)
DRAFT
56
We now show that all terms in the exponent are convergent as n → ∞. By using the expressions
for ηi,(cid:96), ui,(cid:96) in (226) and (227), and recalling the definition of ξi,(cid:96) in (87), straightforward
manipulations yield:
∞(cid:88)
S(cid:88)
i=1
(cid:96)=1
ψ(cid:48)(cid:48)(ηi,(cid:96))
u2
i,(cid:96)
2
=
=
∞(cid:88)
S(cid:88)
1
µs2
k,µ
i=1
φ(cid:48)(cid:48)
k,µ(θ/µ)
µs2
k,µ
(cid:96)=1
u2
2
=
u2
2
,
i,(cid:96)ψ(cid:48)(cid:48)(ξi,(cid:96)θ/µ)
ξ2
u2
2
(236)
having used, in the last two equalities, Eq. (90) and the definition of sk,µ in (147). Similarly,
(jui,(cid:96))3
6
i,(cid:96)ψ(cid:48)(cid:48)(cid:48)(ξi,(cid:96)θ/µ)
ξ3
(ju)3
6
A1 (cid:44)
=
=
∞(cid:88)
S(cid:88)
i=1
(cid:96)=1
1
k,µ
µ3/2s3
φ(cid:48)(cid:48)(cid:48)
k,µ(θ/µ)
µ3/2s3
k,µ
ψ(cid:48)(cid:48)(cid:48)(ηi,(cid:96))
∞(cid:88)
S(cid:88)
i=1
(cid:96)=1
(ju)3
.
6
∞(cid:88)
S(cid:88)
i=1
(cid:96)=1
(237)
(238)
(239)
Finally, by defining
A2 (cid:44)
R(ui,(cid:96)),
and using (189), we have (recall that bk,(cid:96)(i) ≤ 1):
∞(cid:88)
S(cid:88)
i=1
(cid:96)=1
A2 ≤
∞(cid:88)
S(cid:88)
i=1
(cid:96)=1
ui,(cid:96)4
R(ui,(cid:96)) ≤ M
24
∞(cid:88)
S(cid:88)
i=1
(cid:96)=1
≤ M
24s4
k,µ
µ2
(1 − µ)4(i−1)u4
=
M S
24s4
k,µ
µ2
1 − (1 − µ)4u4.
We stress that the constant M appearing in the above formulas bounds uniformly all terms
R(ui,(cid:96)). Indeed, as already observed, in the considered range of analysis we have ui,(cid:96) ≤ ¯δ
and ηi,(cid:96) ≤ θ. Under this assumption, from property P4 we know that the bounding constant M
depends only on the pair (¯δ, θ), and, hence, not on the particular pair (i, (cid:96)).
Using (230) and (235), it is now legitimate to rewrite
ϕk,µ(u) = e− u2
2 +A1+A2.
(240)
DRAFT
October 28, 2018
Making explicit the definition of ζk,µ(u) appearing in (214), we have:
(cid:33)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
φ(cid:48)(cid:48)(cid:48)
k,µ(θ/µ)
6 µ3/2s3
k,µ
(ju)3
k,µ(θ/µ)
µ3/2s3
k,µ
(ju)3
6
=
ϕk,µ(u) − ζk,µ(u)
2
1 +
(cid:32)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ϕk,µ(u) − e− u2
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ϕk,µ(u)e
2 − 1 − φ(cid:48)(cid:48)(cid:48)
(cid:12)(cid:12)
2 (cid:12)(cid:12)eA1+A2 − 1 − A1
(cid:18)
(cid:19)
u2
A2 +
A22
2
= e− u2
2
= e− u2
≤ e− u2
2
where, in the last inequality, we resorted to the following result, which is known to hold for any
pair of complex numbers z and w -- see, e.g., [40, Eq. (2.8), p. 534]:
emax(z,w).
ez − 1 − w ≤
z − w +
w2
(cid:18)
(242)
Consider first the term A1. Using (147) and (91) with r = 3, we can write:
Making explicit the definition of limit, for any > 0, and for µ small enough, it holds that:
eA1+A2,
1
2
(cid:19)
(cid:12)(cid:12)(cid:12)(cid:12) φ(cid:48)(cid:48)(cid:48)(θ)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)√
(cid:12)(cid:12)(cid:12)(cid:12) +
(cid:19)
µu3
[φ(cid:48)(cid:48)(θ)]3/2
(cid:12)(cid:12)(cid:12)(cid:12) .
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) φ(cid:48)(cid:48)(cid:48)
lim
µ→0
k,µ(θ/µ)
µ2s3
k,µ
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) =
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) φ(cid:48)(cid:48)(cid:48)
(cid:18)(cid:12)(cid:12)(cid:12)(cid:12) φ(cid:48)(cid:48)(cid:48)(θ)
k,µ(θ/µ)
µ2s3
k,µ
[φ(cid:48)(cid:48)(θ)]3/2
µu3,
a1√
1
6µ
≤ 1
6µ
1
µ
=
A1 =
(cid:32)
(cid:33)
1
s4
k,µ
57
(241)
(243)
(245)
(246)
DRAFT
√
µu3
(244)
where the constant a1 has been implicitly defined. We switch to the term A2. Applying L'Hospital's
rule [43], and using again (147), we see that:
4[φ(cid:48)(cid:48)(θ)]2 ,
implying that, for any > 0, and for sufficiently small values of µ:
1 − (1 − µ)4
lim
µ→0
=
µ
1
A2 ≤ 1
µ
≤ 1
µ
1
µ
=
October 28, 2018
M S
24s4
k,µ
(cid:18)
M S
24
√
1 − (1 − µ)4 (
µ
1
4[φ(cid:48)(cid:48)(θ)]2 +
(cid:19)
µu)4
√
(
µu)4
√
µu)4,
a2 (
where the constant a2 has been implicitly defined. Observe now that, for any a > 0, any 0 ≤
x ≤ δ, and for any integers m and n such that m < n:
58
δn−m ≤ 1/a ⇒ axn ≤ xm.
µu, and recalling that in the considered range √
Setting x = √
implies that the parameter δ can be certainly chosen to satisfy:
µu)4 ≤ √
µu3 ≤ √
√
a2(
a1√
,
µu2
8
µu2
8
,
yielding (in the considered range):
(247)
µu ≤ δ, the above relationship
Finally, using these inequalities in (241), the integrand in (214) can be upper bounded as:
A1 ≤ u2
8
,
A2 ≤ u2
8
.
(cid:18)√
(cid:12)(cid:12)(cid:12)(cid:12) ≤ e− u2
4
(cid:19)
2u7
2
µ a2u3 + µ3/2 a2
,
(250)
u
implying that I1 → 0 as µ → 0.
Part ii (I2 → 0 as µ → 0). The following chain of inequalities holds true:
(248)
(249)
1√
µ
(cid:12)(cid:12)(cid:12)(cid:12) ϕk,µ(u) − ζk,µ(u)
(cid:90)
(cid:90)
I2 ≤ 1√
µ
(cid:12)(cid:12)(cid:12)(cid:12) du +
u
(cid:12)(cid:12)(cid:12)(cid:12) ϕk,µ(u)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)1 +
φ(cid:48)(cid:48)(cid:48)
k,µ(θ/µ)
6 µ3/2s3
u
k,µ
(ju)3
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) du
≤ 1
δ
ϕk,µ(u)du +
µ <u< a√
δ√
µ
e− u2
2
µ
1√
µ
u> δ√
(cid:90)
(cid:90)
1
u> δ√
δ
φ(cid:48)(cid:48)(cid:48)
k,µ(θ/µ)
6 µ2s3
µ
µ
µ <u< a√
δ√
e− u2
(cid:90)
k,µ
2 du +
u> δ√
µ
(cid:90) ∞
(cid:90) ∞
e− u2
2 u2du,
(251)
which follows by repeated application of the triangle inequality for complex numbers z + w ≤
z + w. Since the integrals
e− u2
are convergent, and since the quantities φ(cid:48)(cid:48)(cid:48)
the last two integrals on the RHS of (251) vanish as µ → 0.
e− u2
2 du,
−∞
−∞
2 u2du
k,µ(θ/µ)/µ2 and sk,µ converge in view of (91) and (147),
(252)
October 28, 2018
DRAFT
It remains to prove that the first integral on the RHS of (251) vanishes as µ → 0. To this aim,
observe that, by (225):
ϕk,µ(u) =
∞(cid:89)
S(cid:89)
i=1
(cid:96)=1
ν(ηi,(cid:96) + jui,(cid:96))
ν(ηi,(cid:96))
.
Since, from (177), we know that
ν(ηi,(cid:96) + jui,(cid:96))
ν(ηi,(cid:96))
≤ 1,
all the terms of the product in (253) are not greater than one, implying that, in particular:
ϕk,µ(u) ≤ 2(cid:98)1/µ(cid:99)(cid:89)
S(cid:89)
ν(ηi,(cid:96) + jui,(cid:96))
i=(cid:100)1/µ(cid:101)
ν(ηi,(cid:96))
(cid:96)=1
,
(255)
where (cid:100)x(cid:101) (resp., (cid:98)x(cid:99)) denotes the smallest (resp., the largest) integer not smaller (resp., not
greater) than x. Since in the above product we have 1/µ ≤ (cid:100)1/µ(cid:101) ≤ i ≤ 2(cid:98)1/µ(cid:99) ≤ 2/µ, and
since, in the range of interest δ < √
(1 − µ)2/µ−1bk,(cid:96)(i)
µu < a, for ui,(cid:96) defined in (227) we can write:
(1 − µ)1/µ−1bk,(cid:96)(i)
δ < ui,(cid:96) <
a.
sk,µ
The following convergences hold:
59
(253)
(254)
(256)
(257)
(258)
(259)
(261)
(262)
DRAFT
lim
µ→0
(1 − µ)1/µ = 1/e,
lim
i→∞ bk,(cid:96)(i) = p(cid:96),
lim
µ→0
sk,µ(i) = (cid:112)φ(cid:48)(cid:48)(θ).
(cid:32)
(cid:33)
−
δ < ui,(cid:96) <
(cid:32)
p(cid:96)/e2(cid:112)φ(cid:48)(cid:48)(θ)
v1 (cid:44)
sk,µ
[known limit]
[Eq. (18)]
[Eq. (147)]
(cid:33)
p(cid:96)/e(cid:112)φ(cid:48)(cid:48)(θ)
Using the explicit definition of limit, the above three relationships imply that, for any > 0, it is
possible to choose µ sufficiently small so as to ensure that, in the considered range i ≥ (cid:100)1/µ(cid:101):
+
a (cid:44) v2,
(260)
where, due to arbitrariness of , we can safely assume that v1 > 0.
Moreover, for ηi,(cid:96) defined in (226), we have 0 ≤ ηi,(cid:96) ≤ θ. Accordingly, by defining the set:
S(cid:96) = {(η, u) ∈ R2 : 0 ≤ η ≤ θ, v1 ≤ u ≤ v2},
(cid:90)
ϕk,µ(u)du ≤ 2
a − δ√
µ
c1/µ+1,
µ <u< a√
δ√
µ
we have:
October 28, 2018
where
S(cid:89)
S(cid:89)
(cid:96)=1
c =
=
(cid:18)
ν(η + ju)
ν(η)
max
(η,u)∈S(cid:96)
ν(¯η(cid:96) + j ¯u(cid:96))
ν(¯η(cid:96))
(cid:96)=1
60
(cid:19)
.
(263)
In the above equation, (¯η(cid:96), ¯u(cid:96)) are the pairs where the maxima are attained, which belong to S(cid:96)
since ν(η+ju)
, regarded as a function of the pair (η, u), is continuous.
ν(η)
ν(η)
In view of property P3, ν(η+ju)
is (as a function of u) nothing but the CF of xk(n) under
an exponential measure translation. If xk(n) is not lattice [40], the magnitude of the CF attains
the value one only at the origin. This implies that all the maxima appearing in (263) are strictly
less than 1, because u is bounded away from zero in S(cid:96). Since, for any c < 1, the function c1/µ
vanishes faster than any power of µ as µ → 0, we conclude that the integral in (262) vanishes
as µ goes to zero, and the proof of the lemma is complete.
(cid:3)
REMARK VI. The proof of Lemma 3 assumes that the local statistic xk(n) is not lattice. The
distribution of a lattice random variable with span ∆ is concentrated at the points d, d ± ∆, d ±
2∆, . . . for a certain real number d. The pertinent CF becomes:
∞(cid:88)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ∞(cid:88)
m=−∞
ν(η + ju)
m=−∞
=
ν(η)
where pm = P[xk(n) = d + m∆]. Accordingly, we have
ν(η)
pmeη(d+m∆)ejt(d+m∆)
ν(η + jt)
ν(η)
=
pmeη(d+m∆)ejtm∆
ν(η)
,
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
,
(264)
(265)
which shows that the magnitude of the CF has period 2π/∆ and, in particular, it assumes the
value one at all points t = 2πh/∆, for h = 0,±1,±2, . . . , which would violate the last step in
our proof above.
October 28, 2018
(cid:3)
DRAFT
REFERENCES
61
[1] P. Braca, S. Marano, V. Matta, and A. H. Sayed, "Asymptotic performance of adaptive distributed detection over networks,"
submitted for publication. Available as arXiv:1401.5742v2 [cs.IT], Jan. 2014.
[2] P. Braca, S. Marano, V. Matta, and A. H. Sayed, "Large deviations analysis of adaptive distributed detection," in Proc.
IEEE ICASSP, Florence, Italy, May 2014, pp. 6112 -- 6116.
[3] V. Matta, P. Braca, S. Marano, and A. H. Sayed, "Exact asymptotics of distributed detection over adaptive networks," in
Proc. IEEE ICASSP, Brisbane, Australia, Apr. 2015, pp. 3377 -- 3381.
[4] C. G. Lopes and A. H. Sayed, "Diffusion least-mean squares over adaptive networks: Formulation and performance
analysis," IEEE Trans. Signal Process., vol. 56, no. 7, pp. 3122 -- 3136, Jul. 2008.
[5] F. S. Cattivelli and A. H. Sayed, "Diffusion LMS strategies for distributed estimation," IEEE Trans. Signal Process., vol. 58,
no. 3, pp. 1035 -- 1048, Mar. 2010.
[6] A. H. Sayed, S.-Y. Tu, J. Chen, X. Zhao, and Z. J. Towfic, "Diffusion strategies for adaptation and learning over networks,"
IEEE Signal Process. Mag., vol. 30, no. 3, pp. 155 -- 171, May 2013.
[7] A. H. Sayed, "Adaptive networks," Proceedings of the IEEE, vol. 102, no. 4, pp. 460 -- 497, Apr. 2014.
[8] P. Braca, S. Marano, and V. Matta, "Enforcing consensus while monitoring the environment in wireless sensor networks,"
IEEE Trans. Signal Process., vol. 56, no. 7, pp. 3375 -- 3380, Jul. 2008.
[9] P. Braca, S. Marano, V. Matta, and P. Willett, "Asymptotic optimality of running consensus in testing statistical hypotheses,"
IEEE Trans. Signal Process., vol. 58, no. 2, pp. 814 -- 825, Feb. 2010.
[10] -- -- , "Consensus-based Page's test in sensor networks," Signal Processing, vol. 91, no. 4, pp. 919 -- 930, Apr. 2011.
[11] D. Bajovic, D. Jakovetic, J. Xavier, B. Sinopoli, and J. M. F. Moura, "Distributed detection via Gaussian running consensus:
Large deviations asymptotic analysis," IEEE Trans. Signal Process., vol. 59, no. 9, pp. 4381 -- 4396, Sep. 2011.
[12] D. Bajovic, D. Jakovetic, J. M. F. Moura, J. Xavier, and B. Sinopoli, "Large deviations performance of consen-
sus+innovations distributed detection with non-Gaussian observations," IEEE Trans. Signal Process., vol. 60, no. 11,
pp. 5987 -- 6002, Nov. 2012.
[13] D. Jakovetic, J. M. F. Moura, and J. Xavier, "Distributed detection over noisy networks: Large deviations analysis," IEEE
Trans. Signal Process., vol. 60, no. 8, pp. 4306 -- 4320, Aug. 2012.
[14] J. Tsitsiklis, D. Bertsekas, and M. Athans, "Distributed asynchronous deterministic and stochastic gradient optimization
algorithms," IEEE Trans. Autom. Control, vol. 31, no. 9, pp. 803 -- 812, Sep. 1986.
[15] L. Xiao and S. Boyd, "Fast linear iterations for distributed averaging," Systems and Control Letters, vol. 53, no. 1, pp.
65 -- 78, Sep. 2004.
[16] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah "Randomized gossip algorithms," IEEE Trans. Inf. Theory, vol. 52, no. 6,
pp. 2508 -- 2530, Jun. 2006.
[17] A. Nedic and A. Ozdaglar, "Distributed subgradient methods for multiagent optimization," IEEE Trans. Autom. Control,
vol. 54, no. 1, pp. 48 -- 61, Jan. 2009.
[18] A. G. Dimakis, S. Kar, J. M. F. Moura, M. G. Rabbat, and A. Scaglione, "Gossip algorithms for distributed signal
processing," in Proc. IEEE, vol. 98, no. 11, pp. 1847 -- 1864, Nov. 2010.
[19] S. Kar and J. M. F. Moura, "Convergence rate analysis of distributed gossip (linear parameter) estimation: Fundamental
limits and tradeoffs," IEEE J. Sel. Topics Signal Process., vol. 5, no. 4, pp. 674 -- 690, Aug. 2011.
[20] M. Longo, T. D. Lookabaugh, and R. M. Gray, "Quantization for decentralized hypothesis testing under communication
constraints," IEEE Trans. Inf. Theory, vol. 36, no. 2, pp. 241 -- 255, Mar. 1990.
October 28, 2018
DRAFT
62
[21] P. K. Varshney, Distributed Detection and Data Fusion.
[22] R. Viswanathan and P. K. Varshney, "Distributed detection with multiple sensors: Part I -- Fundamentals," in Proc. IEEE,
Springer-Verlag, New York, 1997.
vol. 85, no. 1, pp. 54 -- 63, Jan. 1997.
[23] R. S. Blum, S. A. Kassam, and H. V. Poor, "Distributed detection with multiple sensors: Part II -- Advanced topics," in
Proc. IEEE, vol. 85, no. 1, pp. 64 -- 79, Jan. 1997.
[24] J. F. Chamberland and V. V. Veeravalli, "Decentralized detection in sensor networks," IEEE Trans. Signal Process., vol. 51,
no. 2, pp. 407 -- 416, Feb. 2003.
[25] J. F. Chamberland and V. V. Veeravalli, "Wireless sensors in distributed detection applications," IEEE Signal Process.
Mag., vol. 24, no. 3, pp. 16 -- 25, May 2007.
[26] B. Chen, L. Tong, and P. K. Varshney, "Channel-aware distributed detection in wireless sensor networks," IEEE Signal
Process. Mag., vol. 23, no. 4, pp. 16 -- 26, Jul. 2006.
[27] V. Saligrama, M. Alanyali, and O. Savas, "Distributed detection in sensor networks with packet losses and finite capacity
links," IEEE Trans. Signal Process., vol. 54, no. 11, pp. 4118 -- 4132, Nov. 2006.
[28] J. N. Tsitsiklis, "Decentralized detection," Advs. Statistical Signal Processing, vol. 2, pp. 297 -- 344, 1993.
[29] P. Willett, P. F. Swaszek, and R. S. Blum, "The good, bad and ugly: Distributed detection of a known signal in dependent
Gaussian noise," IEEE Trans. Signal Process., vol. 48, no. 12, pp. 3266 -- 3279, Dec. 2000.
[30] K. Liu and A. M. Sayeed, "Asymptotically optimal decentralized type-based detection in wireless sensor networks," in
Proc. IEEE ICASSP, Montreal, Canada, May 2004, vol. 3, pp. 873 -- 876.
[31] S. Barbarossa, S. Sardellitti, and P. Di Lorenzo "Distributed detection and estimation in wireless sensor networks," in
Academic Press Library in Signal Processing, vol. 2, R. Chellapa and S. Theodoridis, Eds., pp. 329 -- 408, Academic Press,
Elsevier, 2014.
[32] F. S. Cattivelli and A. H. Sayed, "Distributed detection over adaptive networks using diffusion adaptation," IEEE Trans.
Signal Process., vol. 59, no. 5, pp. 1917 -- 1932, May 2011.
[33] R. R. Bahadur, and R. R. Rao, "On deviations of the sample mean," The Annals of Mathematical Statistics, vol. 31, no. 4,
pp. 1015 -- 1027, Dec. 1960.
[34] A. Dembo and O. Zeitouni, Large Deviations Techniques and Applications. Springer, 1998.
[35] F. den Hollander, Large Deviations. American Mathematical Society, 2008.
[36] R. Horn and C. Johnson, Matrix Analysis. Cambridge University Press, Cambridge, UK, 1985.
[37] A. H. Sayed, Adaptive Filters. Wiley, NJ, 2008.
[38] H. V. Poor, An Introduction to Signal Detection and Estimation. Springer-Verlag, 1988.
[39] S. A. Kassam, Signal Detection in Non-Gaussian Noise. Springer-Verlag, 1987.
[40] W. Feller, An Introduction to Probability and Its Applications, vol. 2, Wiley, NY, 1971.
[41] H. Cram´er, "Sur un nouveau th´eor`eme-limite de la th´eorie des probabilit´es," in: Actualit´es Scientifiques et Industrielles,
Hermann, Paris, no. 736, pp. 5 -- 23, 1938.
[42] J. A. Bucklew, Large Deviations Techniques in Decision, Simulation and Estimation. Wiley, 1990.
[43] W. Rudin, Principles of Mathematical Analysis. McGraw-Hill, 1976.
[44] H. L. Van Trees, Detection, Estimation, and Modulation Theory. Part I. Wiley, 1968, (reprinted, 2001).
[45] J. H. Curtiss, "A note on the theory of moment generating functions," The Annals of Statistics, vol. 13, no. 4, pp. 430 -- 433,
1942.
[46] W. Rudin, Real and Complex Analysis. McGraw-Hill, 1987.
October 28, 2018
DRAFT
[47] H. Shao, Mathematical Statistics, 2nd ed., Springer, 2003.
[48] R. N. Bhattacharya and R. R. Rao, Normal Approximation and Asymptotic Expansions. Robert E. Krieger Publishing
Company, 1986.
[49] E. C. Titchsmarsh, The Theory of Functions. Oxford University Press, 1939.
63
October 28, 2018
DRAFT
|
1105.0510 | 1 | 1105 | 2011-05-03T08:27:26 | Voting in a Stochastic Environment: The Case of Two Groups | [
"cs.MA",
"cs.SI",
"eess.SY",
"math.OC",
"physics.soc-ph"
] | Social dynamics determined by voting in a stochastic environment is analyzed for a society composed of two cohesive groups of similar size. Within the model of random walks determined by voting, explicit formulas are derived for the capital increments of the groups against the parameters of the environment and "claim thresholds" of the groups. The "unanimous acceptance" and "unanimous rejection" group rules are considered as the voting procedures. Claim thresholds are evaluated that are most beneficial to the participants of the groups and to the society as a whole. | cs.MA | cs |
ISSN 0005-1179, Automation and Remote Control, 2011, Vol. 72, No. 6, p. 345. c(cid:13) Pleiades Publishing, Ltd., 2011.
Original Russian Text c(cid:13) P.Yu. Chebotarev, A.K. Loginov, Ya.Yu. Tsodikova, Z.M. Lezina, and V.I. Borzenko, 2010,
published in Problemy Upravleniya, 2010, No. 1, pp. 18 -- 25.
CONTROL SCIENCES
Voting in a Stochastic Environment: The Case of Two Groups
P. Yu. Chebotarev, A. K. Loginov, Ya. Yu. Tsodikova,
Z. M. Lezina, and V. I. Borzenko
Trapeznikov Institute of Control Sciences, Russian Academy of Sciences, Moscow, Russia
Received April 6, 2009
Abstract -- Social dynamics determined by voting in a stochastic environment is analyzed for
a society composed of two cohesive groups of similar size. Within the model of random walks
determined by voting, explicit formulas are derived for the capital increments of the groups
against the parameters of the environment and "claim thresholds" of the groups. The "unan-
imous acceptance" and "unanimous rejection" group rules are considered as the voting proce-
dures. Claim thresholds are evaluated that are most beneficial to the participants of the groups
and to the society as a whole.
1. INTRODUCTION
This work was carried out within the framework of analyzing social dynamics determined by
democratic decisions in a stochastic environment. The subject of investigation is the relationship
between the parameters of social dynamics and social strategies of the participants including egoism,
collectivism (corporatism) and altruism. The results for the situation where a cohesive group
competes with egoistic participants are reported in [1, 2]; competition between egoists and two
cohesive groups (parties) was studied in [3]. The latter paper also considers the so-called "snowball
of cooperation" mechanism which, under certain conditions, motivates those participants initially
having egoistic strategies to act altruistically.
The present paper investigates a special case of the situation considered in [3], namely, compe-
tition of two groups. The relative simplicity of this case enables us to obtain explicit formulas for
the most interesting relationships.
Let us recall the basic features of our model of voting in a stochastic environment. Being
composed of a finite number of participants, the society sequentially votes for/against proposals that
are regularly generated by the "environment" according to a random law. A proposal is identified
with a vector of capital increments of the participants; an alternative interpretation involves the
utility values of the participants. According to the model, the capital/utility increments entering
the proposal are realizations of independent and identically distributed random variables. Here,
the normal distribution is mainly considered. During the vote, an egoistic participant supports any
proposal that increases his/her capital. In contrast to egoists, the members of a group vote jointly
for those proposals that would be favorable for the whole group (the latter is characterized by a
certain index). In particular, a group may support proposals that increase either the capital of the
majority of its members or the total group capital. Each proposal is accepted (and implemented)
or rejected under a particular voting procedure. Generally, the procedures of α-majority are used.
The parameter α ∈ [0, 1) determines the share of votes necessary and sufficient for the acceptance
of a proposal.
The presence of a stochastic environment is the focus of the model under consideration;
it
preserves many basic phenomena of social reality. At the same time, it enables the investigation of
these phenomena by analytical methods.
345
346
CHEBOTAREV, LOGINOV, TSODIKOVA, LEZINA, AND BORZENKO
In voting theory, the stochasticity assumption is often applied to choosing the voters' positions
(see, e.g., [4]). In cooperative game theory, it is widely adopted with respect to the payments [5].
A distinctive feature of our model is a stochastic mechanism for generating proposals for voting. In
other words, we study a model of random walks controlled by voting. In this context, some papers
on the dynamical correction of tax rates are relevant (see, e.g., [6]); note, however, that these
works focus on selecting the rate itself (which is optimized within special models of production and
consumption) and not on the random walks in the space of individual utilities. We also mention a
recent survey on modelling political competition processes that involve voting [7].
2. EXPECTED CAPITAL OF GROUP MEMBERS
Suppose that a society consists of two groups of similar size; every group votes jointly. A natural
voting rule requires that the accepted proposals are supported by both groups. In the sequel, we
use the term unanimous acceptance group rule for this voting procedure. Suppose that the first
(second) group supports a proposal if and only if this proposal leads to the increase in the mean
capital of the group members by at least t1 (respectively, t2). Here, the proposal support thresholds
t1 and t2 are variable parameters which may take positive, zero, or negative values. It is interesting
to investigate the dependence of the future capital of the groups and the whole society on the
proposal support thresholds t1 and t2 (we will also call them claim thresholds).
In addition to
the unanimous acceptance group rule, we will consider the rule according to which a proposal is
accepted if and only if it is supported by at least one group. This voting procedure will be called
the unanimous rejection group rule, since a proposal is rejected iff it is rejected by both groups.
In the following theorem, we derive expressions for the average capital increments under the above
voting rules.
Theorem 1. Suppose a proposal is accepted if and only if it is supported by at least one group.
Then the mathematical expectation of the one-step capital increment 1 of a member of group i
(i = 1, 2) is given by the formula
M ( di) = µF3−i + (µFi + σifi)F3−i.
(1)
Here, Fi = F (µi/σi), Fi = 1 − Fi, fi = f (µi/σi), f (·) and F (·) denote the density and distribution
function of the standard normal distribution, respectively,2 µi = µ − ti, σi = σ.√gi, ti is the claim
threshold of group i, gi is the size of group i, while µ and σ are the parameters of the normal
distribution N (µ, σ2) that describes the independent capital increments forming proposals.
Suppose a proposal is accepted if and only if it is supported by both groups. Then the mathematical
expectation of the one-step capital increment of a member of group i (i = 1, 2) is given by the formula
M ( di) = (µFi + σifi)F3−i.
(2)
Proof. For a given proposal, let G1 (G2) be the event that the first (respectively, second) group
supports the proposal. Denote by G1G2 the simultaneous implementation of G1 and G2. Similarly,
G1G2 and G1G2 are the simultaneous implementation of G1 and the complement of G2, and of the
complements of G1 and G2, respectively. Let P (·) denote the event probability.
To prove the first statement of the theorem, we first suppose that the unanimous rejection group
rule is used. Using the total probability formula one has
M ( di) = M ( di G3−i) P (G3−i) + M ( di GiG3−i) P (GiG3−i) + M ( di GiG3−i) P (GiG3−i).
(3)
1 Notation with tilde serves to indicate actual (i.e, taking into account the acceptance of proposals) capital increments,
as distinct from the proposed ones.
2 f (t) = 1
√2π
e−t2/2 and F (t) = 1
√2π R t
−∞
e−x2/2dx.
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 6
2011
VOTING IN A STOCHASTIC ENVIRONMENT
347
On the assumption of GiG3−i, the proposal is rejected; hence, M ( di GiG3−i) = 0. Un-
der G3−i, the proposal is accepted and independence of the proposal components implies that
M ( di G3−i) = µ. Similarly, the proposal is accepted under GiG3−i, and independence of the com-
ponents di yields M ( di GiG3−i) = M (di GiG3−i) = M (di Gi). Next, M (di Gi) = M (d ave
Gi)
with d ave
standing for the result of averaging the components of the proposal (these components
correspond to the ith group). Observe that d ave
is a random variable having the distribution
N (µ, σ2
i > ti. Using the formula for the
conditional mean of a normal random variable (it can be proved by integration) one finally obtains
i ), where σi = σ.√gi, and that Gi is tantamount to d ave
i
i
i
M ( di GiG3−i) = M (d ave
i
i > ti) = µ +
d ave
σifi
Fi
,
(4)
where Fi = F (µi/σi), fi = f (µi/σi), and µi = µ − ti. It is also easy to demonstrate that
P (G3−i) = F3−i. Using independence of the proposal components we have the expression
P (GiG3−i) = P (Gi) P (G3−i) = FiF3−i.
(5)
Substituting all this into (3) yields
M ( di) = µF3−i + (cid:18)µ +
σifi
Fi (cid:19) Fi F3−i = µF3−i + (µFi + σifi)F3−i.
This completes the proof of the first part.
Now prove the second statement of the theorem. Suppose that the unanimous acceptance group
rule is used. In this case,
Similarly to the derivation of (4), one obtains
M ( di) = M ( di GiG3−i) P (GiG3−i).
M ( di GiG3−i) = M (d ave
i
i > ti) = µ +
d ave
σifi
Fi
and similarly to (5),
P (GiG3−i) = P (Gi) P (G3−i) = FiF3−i.
(6)
(7)
(8)
Substitute (7) -- (8) in (6) to get M ( di) = (µFi + σifi) F3−i. This completes the proof. ♦
Of special interest are the comparative capital increments of the groups. Indeed, it is important
to know the capital-related performance of each group against the background of the results achieved
by the other one. The expected one-step capital increment of Group 1 as compared with the one
of Group 2 is expressed as M ( d1 − d2). Theorem 1 enables one to obtain simple formulas for
M ( d1 − d2).
Corollary 1. In the notation of Theorem 1, if the unanimous rejection group rule is adopted,
then
Under the unanimous acceptance group rule, one has
M ( d1 − d2) = σ1 f1 F2 − σ2 f2 F1.
M ( d1 − d2) = σ1 f1 F2 − σ2 f2 F1.
The proof of Corollary 1 is straightforward.
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 6
2011
(9)
(10)
348
CHEBOTAREV, LOGINOV, TSODIKOVA, LEZINA, AND BORZENKO
3. ANALYSIS OF SOCIAL DYNAMICS
In order to apply and interpret the results obtained, let us first consider the case where the
mean proposed capital increment is zero, i.e., the environment is neutral; suppose that the standard
deviation of the proposed capital increment is 10: µ = 0, σ = 10. Suppose that each group includes
300 participants and Group 1 supports a proposal whenever it increases the total capital of the
group (t1 = 0). The claim threshold t2 of Group 2 varies.
In the case of the unanimous acceptance group rule (sometimes, we will call it the (G1∧G2)-rule),
the expected capital increments of the groups and the whole society versus the claim threshold t2
of Group 2, as stated by Theorem 1, are depicted in Fig. 1.
Fig. 1. Expected capital increments of the groups and the society provided that the unanimous acceptance
group rule is adopted (in this example, it coincides with the majority rule): 1 -- Group 1; 2 -- Group 2; 3 --
the difference between Group 1 and Group 2; 4 -- the whole society. The parameters are: µ = 0; σ = 10;
g1 = g2 = 300.
In particular, the average capital increment of Group 2 represents a symmetrical bell-shaped
curve. This can be explained as follows. Setting a positive Group 2 threshold (high claims) leads to
the rejection of some favorable to Group 2 (on the average) proposals, whereas setting a negative
threshold (low claims) leads to the acceptance, along with the favorable to Group 2 proposals, of
some proposals unfavorable to it. So both strategies decrease the expected capital increment of
Group 2 as against the case of t2 = 0. A noteworthy fact is that positive and negative thresholds
of the same absolute value are equivalent. Let us prove it.
Corollary 2. Let µ = 0. Then for fixed values of the model parameters except for t2, any t ∈ IR,
and under either group voting rule, M ( d2 t2 = t) = M ( d2 t2 = −t) holds.
Proof. Applying Theorem 1 to the case µ = 0 one obtains
M ( d2) = σ2f2 F1
for the unanimous rejection group rule and
M ( d2) = σ2f2 F1
(11)
(12)
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 6
2011
for the unanimous acceptance group rule.
VOTING IN A STOCHASTIC ENVIRONMENT
349
The required statement follows from the facts that σ2 and F1 are independent of t2 and that
f2 = f (cid:18) µ − t2
σ2 (cid:19) is an even function of t2 provided that µ = 0. ♦
Remark 1. Due to (11) -- (12), for both voting rules under consideration, the expression of M ( d2)
in terms of t2 is proportional to the normal density function, which is a bell-shaped curve with zero
limits as t2 → −∞ and t2 → ∞. Finally, if t1 = 0, then under both voting rules, M ( d2) = 1
2 σ2f2
holds. ♦
Next we study the characteristics of social dynamics for each voting rule separately.
3.1. The Unanimous Acceptance Group Rule
If the unanimous acceptance group rule is adopted, then Group 1 benefits from low (negative)
claim threshold t2 of Group 2. Indeed, in this case Group 2 rarely vetoes proposals beneficial to
Group 1 and so Group 1 can maximize its benefits. Contrariwise, if t2 is high, then Group 1 can
rarely expect approval of proposals beneficial to it.
Now, suppose that Group 2 aims not at maximizing the average capital increment, but at
ensuring maximum advantage over Group 1. In other words, Group 2 maximizes M ( d2 − d1) rather
than M ( d2). A tool Group 2 can use for this is its claim threshold t2. For instance, in the example
illustrated by Fig. 1, M ( d2 − d1) as a function of t2 attains its maximum when M ( d1 − d2) attains
its minimum, i.e., at t2 ≈ 0.46. In the proposition below, we find the "claim threshold" t2 that
maximizes M ( d2 − d1) in the general case.
Proposition 1. Suppose the unanimous acceptance group rule is adopted. Then, in the notation
of Theorem 1, the expected advantage M ( d2 − d1) of a Group 2 member over a Group 1 member
in the sense of capital increment attains its unique maximum at the claim threshold t2 of Group 2
defined by
Proof. Differentiating (10) with respect to t2 we obtain
t+
2 = µ +
σ1f1
F1
.
dM ( d1 − d2)
d t2
=
d (σ1 f1 F2 − σ2 f2 F1)
d t2
= σ1 f1f2·(cid:0)−σ−1
2 (cid:1) − σ2f2−(t2 − µ)
σ2
2
(13)
F1.
Setting the derivative equal to zero results in the desired expression (13). Finding the second
derivative of the function M ( d1− d2) ensures that a minimum has been found. Hence, (13) provides
the unique maximum of M ( d2 − d1). ♦
Remark 2. It should be noted that the optimal claim threshold t+
2 found in Proposition 1 is
independent of the group size g2. It is also interesting that expression (13) coincides with (4) in
which i = 1.
In turn, (4) with i = 1 expresses the expected capital increment of a member
of Group 1 provided it exceeds the threshold t1. This observation suggests the following simple
algorithm of estimating the optimal "claim threshold" t+
2 by Group 2: (1) find the average capital
increments of Group 1 members according to the proposals that Group 1 supports; (2) set the
threshold t2 equal to the value found on Step (1) averaged over the proposals.
Thus, to achieve an advantage over Group 1, Group 2 should set its claim threshold at a higher
level than Group 1 does. As has been noted before, the optimal threshold t2 is equal to the mean
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 6
2011
350
CHEBOTAREV, LOGINOV, TSODIKOVA, LEZINA, AND BORZENKO
2 = q 2
"above threshold" value of Group 1 capital increment. In particular, for the example of Fig. 1, (13)
gives t+
3π . Now, if Group 1 wishes to act in the same way (i.e., to maximize its advantage
M ( d1 − d2) with respect to t2 = t+
2 . If this
process continues, it leads to an infinite increase in the claims (the process is divergent and the
corresponding game possesses no Nash equilibrium). ♦
2 ), it should, in turn, set a higher threshold: t1 > t+
How does the maximum comparative gain M ( d2 − d1) of Group 2 depend on the fixed claim
threshold t1 of Group 1? It increases as t1 → −∞, since in this case Group 1 supports all proposals,
and thus, the decisions are made by Group 2. If t1 grows, then this maximum gain decreases and
tends to zero as t1 → ∞ since in this case, no proposals are accepted due to the veto of Group 1.
Now consider the following question which seems quite interesting. What claim threshold t2 of
Group 2 is optimal for the whole society (thus, leading to the maximum expected capital increment
of the society)? The answer is provided by the following proposition.
Proposition 2. Suppose the unanimous acceptance group rule is adopted. Then the expected
capital increment of the whole society attains its maximum value at the claim threshold t2 of Group 2
given by
t0
2 = −
g1
g2 (cid:18)µ +
σ1f1
F1 (cid:19) .
(14)
Proof. Theorem 1 (see (2)) implies that the expected capital increment of the whole society is
g1M ( d1) + g2M ( d2) = g1(µF1 + σ1f1)F2 + g2(µF2 + σ2f2)F1
= ((g1 + g2)µF1 + g1σ1f1) F2 + g2σ2f2F1.
The derivative of this function with respect to t2 is
d (g1M ( d1) + g2M ( d2))
d t2
= ((g1 + g2)µF1 + g1σ1f1)f2·(cid:0)−σ−1
2 (cid:1) + g2σ2 f2F1−(t2 − µ)
σ2
2
.
Setting it equal to zero one obtains g2 F1 (t0
2 − µ) = −(g1 + g2)µF1 − g1σ1f1, which leads to (14).
Finally, the second derivative test confirms that this point provides a unique maximum value. ♦
Remark 3. Comparing Propositions 1 and 2 produces a somewhat unexpected result. Namely,
at g1 = g2 those values of claim threshold t2 of Group 2 leading to the maximum advantage over
Group 1 (on the one hand) and to the best results for the whole society (on the other hand) turn
out to be opposite. In particular, this is the case for the example illustrated by Fig. 1. Note that
even if g1 6= g2, the thresholds t+
2 always have different signs (or both are zero), since by
(13) and (14),
2 and t0
t0
2 = −
g1
g2
t+
2 . ♦
Proposition 2 determines t2 (as a function of t1) that guarantees the maximum capital increment
of the whole society. Let us maximize this maximum over t1 to find the global optimal point of the
society. Obviously, the corresponding solutions t1 and t2 satisfy the system of equations
t1 = −
g2
g1 (cid:18)µ +
σ2f2
F2 (cid:19) ;
t2 = −
g1
g2 (cid:18)µ +
σ1f1
F1 (cid:19)
(15)
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 6
2011
VOTING IN A STOCHASTIC ENVIRONMENT
351
with σ1, σ2, f1, f2, F1, and F2 defined in Theorem 1. Most likely, the solution of (15) cannot generally
be expressed in elementary functions. In particular, this applies even to the simplest case of g1 = g2
(two groups of equal size) in which the system (15) reduces to
t1 = −µ −
σ1f1
F1
;
t2 = t1.
Nevertheless, the solution can be obtained numerically. For instance, the dependence on µ of
the claim threshold t = t1 = t2 optimal for the society is shown (in the case of g1 = g2 = 300 and
σ = 10) in Fig. 2.
Fig. 2. Relationship between µ and the claim threshold t = t1 = t2 that maximizes the capital increment of
the whole society provided that g1 = g2 = 300 and σ = 10.
In particular, for g1 = g2 = g and µ = 0, the optimal threshold is t = −σy0(cid:14)√g, where y0 ≈ 0.506
is the unique solution of the equation y = f (y)/F (y) with f (y) and F (y) designating the density
and distribution function of the standard normal distribution.
One of the most instructive results of this study is that under the unanimous acceptance group
rule, the claim threshold t of the groups that is optimal for the whole society is negative (see Fig. 2).
In the case g1 = g2, it tends to zero from below as µ → −∞ and asymptotically approaches to the
line t = −µ as µ → ∞. Negative claim thresholds of the groups can be interpreted as a willingness
to a moderately negative result, that is, as a certain appetite for risk.
3.2. The Unanimous Rejection Group Rule
Now consider the unanimous rejection group rule (we will also call it the (G1 ∨ G2)-rule). With
this procedure, for acceptance of a proposal, the support of either one group is sufficient. The
analytical results obtained in Section 2 are illustrated by the diagram in Fig. 3.
It can be easily observed that this diagram mirrors the one shown in Fig. 1. Indeed, the following
statement holds.
Corollary 3. Let µ = 0. If the model parameters, except for t2, are fixed, then for any t ∈ IR,
MG1∨G2( d1 t2 = t) = MG1∧G2( d1 t2 = −t) holds, where MG1∧G2 (MG1∨G2) is the expectation, pro-
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 6
2011
352
CHEBOTAREV, LOGINOV, TSODIKOVA, LEZINA, AND BORZENKO
Fig. 3. Expected capital increments of the members of Groups 1 and 2 and the society under the unanimous
rejection group rule: 1 -- Group 1; 2 -- Group 2; 3 -- the difference between Group 1 and Group 2; 4 -- the whole
society; the parameters are: µ = 0; σ = 10; g1 = g2 = 300.
vided the unanimous acceptance group rule (resp., the unanimous rejection group rule) is adopted.
Moreover, at t1 = 0 one has MG1∨G2( d2 t2 = t) = MG1∧G2( d2 t2 = t) for any t ∈ IR.
Proof. According to Theorem 1, for µ = 0 we have:
MG1∧G2( d1 t2 = −t) = σ1f1 F (t/σ1),
MG1∨G2( d1 t2 = t) = σ1f1 (1 − F (−t/σ1)) = σ1f1 F (t/σ1) = MG1∧G2( d1 t2 = −t).
Moreover, t1 = 0 implies that MG1∧G2( d2 t2 = t) = σ2 f (−t/σ2)F (0) = MG1∨G2( d2 t2 = t).
This completes the proof. ♦
Remark 4. Due to Corollary 2, µ = 0 implies that M ( d2 t2 = t) = M ( d2 t2 = −t) for either
voting rule under study. Consequently, if µ = 0 and t1 = 0, then every relationship under (G1∨G2)-
rule can be derived from the corresponding relationship obtained for the (G1 ∧ G2)-rule by means
of the y-axis reflection. Thus, in this case, the situations where voting is organized according to
the (G1 ∧ G2)-rule and according to the (G1 ∨ G2)-rule are, in a certain sense, dual. ♦
Note that under the (G1 ∨ G2)-rule, Group 1 benefits from excessive claims of Group 2 (i.e.,
from high threshold t2). In this case, if threshold t1 is positive, but not so high, then most decisions
are made for the benefit of Group 1. On the other hand, at a low threshold t2, Group 2 ensures
implementation of almost all proposals, and so most proposals unfavorable to Group 1 pass through
the "riddle" of voting.
Now let us consider the maximization problem for the Group 2 advantage M ( d2 − d1) over
Group 1 provided that the (G1 ∨ G2)-rule is adopted.
Proposition 3. Under the (G1∨G2)-rule, the expected advantage M ( d2− d1) of a Group 2 member
over a Group 1 member attains its maximum value at the claim threshold t2 defined by
t+
2 = µ −
σ1f1
F1
.
(16)
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 6
2011
VOTING IN A STOCHASTIC ENVIRONMENT
353
Proof. Differentiating (9) with respect to t2 yields:
dM ( d1 − d2)
d t2
=
d (σ1 f1 F2 − σ2 f2 F1)
d t2
= σ1 f1f2·(cid:0)σ−1
2 (cid:1) − σ2f2−(t2 − µ)
σ2
2
F1.
Setting this derivative equal to zero one arrives at (16). The second derivative test confirms
that this unique extremum is a minimum. Thus, (16) provides a maximum value to the function
M ( d2 − d1). ♦
The maximum comparative gain M ( d2− d1) of Group 2 attained at the claim threshold t+
2 tends
to zero as t1 → −∞ (in the limit, all proposals are accepted by the votes of Group 1) and tends to
its maximum value when t1 → ∞ (in the limit, Group 1 does not support any proposals).
As well as in the case of the (G1 ∧ G2)-rule, consider the problem of maximizing, by choosing
t2, the capital of the whole society. The solution is provided by the following proposition.
Proposition 4. Suppose that the (G1 ∨ G2)-rule is adopted. Then the expected capital increment
of the whole society attains its maximum value at the Group 2 claim threshold given by
t0
2 = −
g1
g2 (cid:18)µ −
σ1f1
F1 (cid:19) .
(17)
Proof. By Theorem 1 (see Eq. (1)) the expected capital increment of the whole society is
g1M ( d1) + g2M ( d2) = g1·(cid:0)µF2 + (µF1 + σ1f1)F2(cid:1) + g2·(cid:0)µF1 + (µF2 + σ2f2)F1(cid:1)
= (g1 + g2)µF1 + g1σ1f1 + g2σ2F1f2 + (cid:0)g1·(µ − µF1 − σ1f1) + g2µF1(cid:1)F2.
The derivative of this function w. r. t. t2 is:
d (g1M ( d1) + g2M ( d2))
d t2
= g2σ2F1f2−(t2 − µ)
σ2
2
+ (cid:0)g1·(µ − µF1 − σ1f1) + g2µF1(cid:1)f2·(cid:0)−σ−1
2 (cid:1).
Setting it equal to 0 we have: −g2 F1 (t0
2 − µ) = g1·(µF1 − σ1f1) + g2µF1, which leads to (17).
Finally, using the second derivative test we verify that the point in question provides the maximum
value. ♦
Remark 5. Comparing Propositions 3 and 4 we obtain the following (cf. Remark 3). At g1 = g2,
the value t+
2 of the claim threshold t2 of Group 2 that leads to the maximum advantage over Group 1
and the value t0
2 that maximizes the capital of the whole society are opposite. In particular, this
is the case for the example in Fig. 3. Moreover, even if g1 6= g2, the thresholds t+
2 have
different signs (or both are equal to zero), since, as well as in the case of the (G1 ∧ G2)-rule,
2 = −(g1/g2)t+
t0
2 and t0
2 . ♦
Now consider the issue of maximizing the capital increment of the whole society when the
(G1 ∨ G2)-rule is employed.
In a certain sense, the result is dual to the one derived for the
(G1 ∧ G2)-rule. Namely, Proposition 4 implies that the claim thresholds of the groups, t1 and t2,
that maximize the capital increment of the whole society satisfy the following system of equations:
t1 = −
g2
g1 (cid:18)µ −
σ2f2
F2 (cid:19) ;
t2 = −
g1
g2 (cid:18)µ −
σ1f1
F1 (cid:19) ,
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 6
2011
354
CHEBOTAREV, LOGINOV, TSODIKOVA, LEZINA, AND BORZENKO
where σ1, σ2, f1, f2, F1, and F2 are defined in Theorem 1. In the simplest case g1 = g2, the above
system of equations reduces to
t1 = −µ +
σ1f1
F1
;
t2 = t1.
The dependence on µ of the claim threshold t of both groups that maximizes the capital of
the society is illustrated (for the case of g1 = g2 = 300 and σ = 10) in Fig. 4. In particular, for
g1 = g2 = g and µ = 0, the corresponding threshold is t = σy0(cid:14)√g, where y0 ≈ 0.506 is the solution
of the equation y = f (y)/F (y), f (y) and F (y) being the density and distribution function of the
standard normal distribution, respectively.
Fig. 4. Relationship between the parameter µ and the claim threshold t = t1 = t2 of both groups that
maximizes the capital increment of the whole society in the case of g1 = g2 = 300 and σ = 10.
In contrast to voting based on the (G1 ∧ G2)-rule, the claim threshold of both groups that
maximizes the capital of the society under the (G1 ∨ G2)-rule is positive (if the voting rule is not
conservative, then the voters have to be conservative); for g1 = g2 it tends to zero from above as
µ → ∞ and asymptotically approaches to the line t = −µ as µ → −∞ (see Fig. 4).
4. CONCLUSION
This paper has studied the social dynamics determined by voting of two cohesive groups in a
stochastic environment. Two groups of similar size (a kind of a "two-party system") have been
considered; this makes reasonable the application of the voting procedure which requires the support
of both groups for the acceptance of any proposal (the unanimous acceptance group rule).
Another procedure in which the support of either group suffices for the acceptance of a proposal
(the unanimous rejection group rule) looks a little less natural. However, using this procedure does
not lead to an infinite sequence of contradictory decisions suggested by different groups since the
proposals in the model are generated by the stochastic environment.
Each group supports only those proposals that increase the average capital of its members by an
amount exceeding the claim threshold set by the group. The relationship between social dynamics
and the claim thresholds of the groups was the main subject of the present study.
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 6
2011
VOTING IN A STOCHASTIC ENVIRONMENT
355
In particular, we have derived analytical expressions for the capital increments of the groups in
terms of their claim thresholds. It has been shown that under the unanimous acceptance group
rule and the equal size of the groups, the claim threshold of a group that ensures the maximum
advantage over the other group and the claim threshold that maximizes the capital of the whole
society are opposite. Moreover, the first above threshold is equal to the average capital increment of
the competing group members over the proposals supported by the competing group. Furthermore,
it turns out that the claim thresholds of the groups that maximize the capital of the whole society
are negative, which can be interpreted as the profitability of a certain appetite for risk in the case
of a conservative voting rule; the dependence of these thresholds on the environment favorability
has been established. Similar (in fact, dual) results have been obtained for the unanimous rejection
group rule.
It should be emphasized that the phenomena observed are not only inherent in the model
under consideration; the most important ones have real prototypes widely discussed in the relevant
literature.
REFERENCES
1. Borzenko, V.I., Lezina, Z.M., Loginov, A.K., Tsodikova, Ya.Yu., and Chebotarev, P.Yu., Strategies of
Voting in Stochastic Environment: Egoism and Collectivism, Autom. Remote Control , 2006, vol. 67,
no. 2, pp. 311 -- 328.
2. Chebotarev, P.Yu., Analytical Expression of the Expected Values of Capital at Voting in the Stochastic
Environment, Autom. Remote Control , 2006, vol. 67, no. 3, pp. 480 -- 492.
3. Chebotarev, P.Yu., Loginov, A.K., Tsodikova, Ya.Yu., Lezina, Z.M., and Borzenko, V.I., Analysis of
Collectivism and Egoism Phenomena within the Context of Social Welfare, Autom. Remote Control ,
2010, vol. 71, no. 6, pp. 1196 -- 1207.
4. Anderson, S.P., Kats, A., and Thisse, J.-F., Probabilistic Voting and Platform Selection in Multi-Party
Elections, Soc. Choice Welfare, 1994, vol. 11, no. 4, pp. 305 -- 322.
5. Suijs, J., Cooperative Decision Making in a Stochastic Environment, PhD Dissertation, Tilburg: Tilburg
Univ., 1998.
6. Aiyagari, S.R. and Peled, D., Social Insurance and Taxation under Sequential Majority Voting and
Utilitarian Regimes, J. Econom. Dynam. Control , 1995, vol. 18, no. 8, pp. 1511 -- 1528.
7. Zakharov, A.V., The Models of Political Competition: Literature Review, Ekonom. Mat. Metody, 2009,
vol. 45, no. 1, pp. 110 -- 128.
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 6
2011
|
1811.01458 | 3 | 1811 | 2019-09-10T21:21:00 | Bayesian Action Decoder for Deep Multi-Agent Reinforcement Learning | [
"cs.MA",
"cs.AI",
"cs.LG"
] | When observing the actions of others, humans make inferences about why they acted as they did, and what this implies about the world; humans also use the fact that their actions will be interpreted in this manner, allowing them to act informatively and thereby communicate efficiently with others. Although learning algorithms have recently achieved superhuman performance in a number of two-player, zero-sum games, scalable multi-agent reinforcement learning algorithms that can discover effective strategies and conventions in complex, partially observable settings have proven elusive. We present the Bayesian action decoder (BAD), a new multi-agent learning method that uses an approximate Bayesian update to obtain a public belief that conditions on the actions taken by all agents in the environment. BAD introduces a new Markov decision process, the public belief MDP, in which the action space consists of all deterministic partial policies, and exploits the fact that an agent acting only on this public belief state can still learn to use its private information if the action space is augmented to be over all partial policies mapping private information into environment actions. The Bayesian update is closely related to the theory of mind reasoning that humans carry out when observing others' actions. We first validate BAD on a proof-of-principle two-step matrix game, where it outperforms policy gradient methods; we then evaluate BAD on the challenging, cooperative partial-information card game Hanabi, where, in the two-player setting, it surpasses all previously published learning and hand-coded approaches, establishing a new state of the art. | cs.MA | cs | Bayesian Action Decoder for Deep Multi-Agent Reinforcement Learning
Jakob N. Foerster * 1 2 H. Francis Song * 3 Edward Hughes 3 Neil Burch 3 Iain Dunning 3 Shimon Whiteson 1
Matthew M. Botvinick 3 Michael Bowling 3
9
1
0
2
p
e
S
0
1
]
A
M
.
s
c
[
3
v
8
5
4
1
0
.
1
1
8
1
:
v
i
X
r
a
Abstract
When observing the actions of others, humans
make inferences about why they acted as they
did, and what this implies about the world; hu-
mans also use the fact that their actions will be
interpreted in this manner, allowing them to act in-
formatively and thereby communicate efficiently
with others. Although learning algorithms have
recently achieved superhuman performance in a
number of two-player, zero-sum games, scalable
multi-agent reinforcement learning algorithms
that can discover effective strategies and conven-
tions in complex, partially observable settings
have proven elusive. We present the Bayesian
action decoder (BAD), a new multi-agent learn-
ing method that uses an approximate Bayesian
update to obtain a public belief that conditions on
the actions taken by all agents in the environment.
BAD introduces a new Markov decision process,
the public belief MDP, in which the action space
consists of all deterministic partial policies, and
exploits the fact that an agent acting only on this
public belief state can still learn to use its private
information if the action space is augmented to
be over all partial policies mapping private infor-
mation into environment actions. The Bayesian
update is closely related to the theory of mind
reasoning that humans carry out when observ-
ing others' actions. We first validate BAD on a
proof-of-principle two-step matrix game, where
it outperforms policy gradient methods; we then
evaluate BAD on the challenging, cooperative
partial-information card game Hanabi, where, in
the two-player setting, it surpasses all previously
published learning and hand-coded approaches,
establishing a new state of the art.
*Equal contribution 1University of Oxford, UK 2Work done at
DeepMind. JF has since moved to Facebook AI Research, Menlo
Park, USA. 3DeepMind, London, UK. Correspondence to: Jakob
Foerster <[email protected]>, Francis Song <[email protected]>.
Proceedings of the 36 th International Conference on Machine
Learning, Long Beach, California, PMLR 97, 2019. Copyright
2019 by the author(s).
1. Introduction
In multi-agent reinforcement learning (RL), agents must
learn to act in an environment that contains multiple learn-
ing agents, often under partial observability (Littman, 1994).
In recent years, a variety of deep RL methods have been
adapted to this setting (Foerster et al., 2016a; Lowe et al.,
2017; Perolat et al., 2017; Jaderberg et al., 2018). In the par-
ticular case of cooperative, partially observable multi-agent
settings, a key challenge is to discover communication proto-
cols while simultaneously learning policies. Such protocols
are essential for many real-world tasks where agents must
interact and communicate seamlessly with other agents.
State-of-the-art deep RL methods for learning communica-
tion protocols mostly use backpropagation across a com-
munication channel (Sukhbaatar et al., 2016; Foerster et al.,
2016a). This approach has two limitations. First, it can only
be applied to cheap-talk channels in which the communi-
cation action has no effect on the environment. Second, it
misses the conceptual connection between communication
and reasoning over the beliefs of others, which is known to
be important to how humans learn to communicate (Grice,
1975; Frank & Goodman, 2012).
A well-known domain that highlights these challenges is
Hanabi, a popular, fully cooperative card game of incom-
plete information that is difficult even for humans (Hanabi
won the Spiel des Jahres award in 2013). A distinguishing
feature of the game is that players see everyone's hands but
their own and must find effective conventions for commu-
nication to succeed. Since there is no cheap-talk channel,
most recent methods for emergent communication are inap-
plicable, necessitating a novel approach. Because of these
unique features, Hanabi has recently been proposed as a
new benchmark for multi-agent learning (?).
The goal in Hanabi is to play a legal sequence of cards and,
to aid this process, players are allowed to give each other
hints indicating which cards are of a specific rank or colour.
These hints have two levels of semantics. The first level is
the surface-level content of the hint, which is grounded in
the properties of the cards that they describe. This level of
semantics is independent of any possible intent of the agent
in providing the hint, and would be equally meaningful if
provided by a random agent. For example, knowing which
Bayesian Action Decoder
Figure 1: a) In an MDP the action u is sampled from a policy π that conditions on the state features (here separated into f pub
and f a). The next state is sampled from P (s(cid:48)s, u). b) In a PuB-MDP, public features f pub generated by the environment and
the public belief together constitute the Markov state sBAD. The 'action' sampled by the BAD agent is in fact a deterministic
partial policy ∆π ∼ πBAD( ∆πsBAD) that maps from private observations f a to actions. Only the acting agent observes f a and
deterministically computes u = ∆π(f a). u is provided to the environment, which transitions to state s(cid:48) and produces the new
. BAD then uses the public belief update to compute a new belief B(cid:48) conditioned on u and ∆π (Equation 1),
observation f pub(cid:48)
thereby completing the state transition.
cards are of a specific colour often does not indicate whether
they can be safely played or discarded.
A second level of semantics arises from information con-
tained in the actions themselves, i.e., the very fact that an
agent decided to take a particular action and not another,
rather than the information resulting from the state transition
induced by the action. This is essential to the formation of
conventions and to discovering good strategies in Hanabi.
To address these challenges, we propose the Bayesian ac-
tion decoder (BAD), a novel multi-agent RL algorithm for
discovering effective communication protocols and policies
in cooperative, partially observable multi-agent settings. In-
spired by the work of Nayyar et al. (2013), BAD uses all
publicly observable features in the environment to compute
a public belief over the players' private features. This ef-
fectively defines a new Markov process, the public belief
Markov decision process (PuB-MDP), in which the action
space is the set of deterministic partial policies, parame-
terised by deep neural networks, that can be sampled for a
given public state. By acting in the space of deterministic
partial policies that map from private observations into envi-
ronment actions, an agent acting only on this public belief
state can still learn an optimal policy. Using approximate,
factorised Bayesian updates and deep neural networks, we
show for the first time how a method using the public belief
of Nayyar et al. (2013), can scale to large state spaces and
allow agents to carry out a form of counterfactual reasoning.
When an agent observes the action of another agent, the
public belief is updated by sampling a set of possible private
states from the public belief and filtering for those states in
which the teammate chose the observed action. This process
is closely related to the kind of theory of mind reasoning
that humans routinely undertake (Baker et al., 2017). Such
reasoning seeks to understand why a person took a specific
action among several, and what information this contains
about the distribution over private observations.
We experimentally validate an exact version of BAD on a
simple two-step matrix game, showing that it outperforms
policy gradient methods. We then apply an approximate
version to Hanabi, where BAD achieves an average score of
24.174 points in the two-player setting, surpassing the best
previously published results for learning agents by around
9 points and approaching the best known performance of
24.9 points for (cheating) open-hand gameplay. BAD thus
establishes a current state-of-the-art on the Hanabi Learning
Environment (?) for the two player self-play setting. We
further show that the beliefs obtained via Bayesian reasoning
have 40% less uncertainty over possible hands than those
using only grounded information.
t ), where τ a
t
2. Background and Setting
Consider a partially observable multi-agent environment
with A agents. At time t each agent a takes action ua
sampled from policy πa(uaτ a
t
is its action-
t = {oa
observation history τ a
t are the
0, ua
observations of agent a at time t, which is given by the obser-
vation function O(a, st) in state st. The next Markov state
st+1 of the environment is produced by the transition func-
tion P (st+1st, ut), which conditions on the joint action
ut = {u1
t ∈ U. In the fully cooperative
setting considered here, each agent receives a per-timestep
team reward rt+1(st, ut) that depends on the last state and
t }, where ua
0, .., oa
t }. Here oa
t , .., uA
Bayesian Action Decoder
t γtrt
(cid:2)(cid:80)
t in the hidden activations.
(cid:3), where γ is the discount
last joint action. We allow centralised training but require de-
centralised execution, from which follows that the policies
πa are known to all agents. This setting can be formalised
as a Dec-POMDP (Oliehoek, 2012).
The goal of multi-agent RL is to find a set of agent policies
{πa}a=1,...,A that maximise the total expected return per
episode J = Eτ∼P (τπa)
factor. In deep RL, optimisation involves training neural
networks that represent policies and value functions. In par-
tially observable settings, the networks are typically recur-
rent, e.g., LSTMs (Wierstra et al., 2009), as they can learn
to represent a sufficient statistic of the action-observation
history τ a
Here we consider a setting where the Markov state st con-
sists of a set of discrete features ft, composed of public
features f pub
. The public features
are common knowledge to all agents, while private features
are observable by at least one, but not all, of the agents.
t are the private features observable by agent a. We use
f a
the notation f pri
[i] to indicate the i-th private state feature.
For example, in a typical card game the cards being played
openly on the table are part of f pub
, the cards held by each
player are in f pri
t contains the cards held by agent a,
and f pri
[i] corresponds to a specific card held by a specific
player. We assume that this separation of state features is
common knowledge to all agents. An example of this sep-
aration for the case of an MDP is illustrated in Figure 1a.
Furthermore, while all our formalisms and methods can be
extended to synchronous action settings, for simplicity we
assume a turn-based setting with one agent acting per step.
and private features f pri
, f a
t
t
t
t
t
t
3. Method
Below we introduce the Bayesian Action Decoder (BAD).
BAD scales the public belief of Nayyar et al. (2013) to
large state spaces using factorised beliefs, an approximate
Bayesian update, and sampled deterministic policies param-
eterised by deep neural networks.
t
t
0
Fortunately, in our setting the common knowledge described
above makes it possible to compute a public belief, (Nay-
yar et al., 2013), that makes the recursion of I-POMDPs
unnecessary. In our case the public belief Bt is the posterior
over all of the private state features given only the public
features, i.e., Bt = P (f pri
f pub≤t ), where ≤ t indicates his-
). Because Bt conditions only
, .., f pub
tory: f pub≤t = (f pub
on publicly available information, it can be computed inde-
pendently by every agent via a common algorithm, yielding
the same result for all agents. Furthermore, since all agents
know f pub, it suffices for Bt to be a posterior over f pri, not
ft = {f pri, f pub}.
While the public belief avoids recursive reasoning, it is not
obvious how it can be used to guide behaviour: agents that
condition their actions only on the public belief will never
exploit their private observations. As Nayyar et al. (2013)
propose, we can construct a special public agent whose
policy πBAD conditions on the public observation and the
public belief but which nonetheless can generate optimal
behaviour.1 This is possible because an action selected by
πBAD specifies a partial policy, ∆π : {f a} → U, for the
acting agent, deterministically mapping private observations
to environment actions. The sampling of a deterministic
partial policy also addresses a fundamental tension in using
policy gradients to learn communication protocols, namely,
differentiation and exploration require high-entropy policies,
while communication requires low-entropy policies. By
sampling in the space of deterministic policies, both can be
achieved.
Intuitively, the public agent can be viewed as a third party
that can observe only the public observation and belief.
While πBAD cannot observe the private state, it can tell each
agent what to do for any private observation it might receive.
Thus at each timestep, the public agent selects ∆π based on Bt
and f pub
t = ∆π(f a)
by supplying the private observation hidden from the public
agent; the public agent then uses the observed action ua
t to
construct the new belief Bt+1.
; the acting agent then selects the action ua
t
3.1. Public belief
3.2. Public Belief MDP
In single-agent partially observable settings, it is clearly
useful for an agent to maintain beliefs about the hidden
environment state, since this is a sufficient statistic for its
action-observation history (Kaelbling et al., 1998). In multi-
agent settings, however, it is not obvious what the beliefs
should be over. It is not enough to maintain beliefs over the
environment state alone, as other agents also have unobserv-
able internal states. In interactive POMDPs (I-POMDPs;
Gmytrasiewicz & Doshi 2005), agents model each other's
beliefs, beliefs over these beliefs, and so on, but this is often
computationally intractable.
t are public information, observing ua
t induces
Since ∆π and ua
a posterior belief over the possible private state features f pri
t
given by the public belief update:
P (f a
t ua
t ,Bt, f pub
t
, ∆π) =
P (ua
∝ 1( ∆π(f a
t f a
P (ua
t ), ua
t , ∆π)P (f a
t Bt, f pub
t )P (f a
t
t Bt, f pub
t
)
, ∆π)
t Bt, f pub
t
(1)
).
(2)
1πBAD conditions on the public observation because the public
belief is a sufficient statistic for the public observation, but only
over the private features.
Bayesian Action Decoder
Using this Bayesian belief update, we can define a new
Markov process, the public belief MDP (PuB-MDP), as
illustrated in Figure 1b. The state sBAD = {B, f pub} of
the PuB-MDP consists of the public observation and pub-
lic belief; the action space is the set of deterministic par-
tial policies that map from private observations to envi-
ronment actions; and the transition function is given by
BADsBAD, ∆π). The next state contains the new public
P (s(cid:48)
belief calculated using the public belief update. The reward
function marginalises over the private state features:
B(f pri)r(s, ∆π(f pri)).
(cid:88)
rBAD(sBAD, ∆π) =
(3)
f pri
Since s(cid:48)
BAD includes the new public belief, and that belief
is computed via an update that conditions on ∆π, the PuB-
MDP transition function conditions on all of ∆π, not just the
selected action ua
t . Thus the state transition depends not just
on the executed action, but on the counterfactual actions:
t .
those specified by ∆π for private observations other than f a
In the remainder of this section, we describe how factorised
beliefs and policies can be used to efficiently learn a public
policy πBAD for the PuB-MDP.
3.3. Sampling Deterministic Partial Policies
For each public state, πBAD must select a distribution
πBAD( ∆πsBAD) over deterministic partial policies. The size
of this space is exponential in the number of possible private
observations f a, but we can reduce this to a linear depen-
dence by assuming a distribution across ∆π that factorises
across the different private observations, i.e., for all ∆π,
πBAD( ∆πBt, f pub) :=
πBAD( ∆π(f a)Bt, f pub, f a).
(cid:89)
(4)
Figure 2: Payoffs for the toy matrix-like game. The two
outer dimensions correspond to the card held by each player,
the two inner dimensions to the action chosen by each player.
Payouts are structured such that Player 1 must encode in-
formation about their card in the action they chose in order
to obtain maximum payoffs. Although presented here in
matrix form for compactness, this is a two-step, turn-based
game, with Player 1 always taking the first action and Player
2 taking an action after observing Player 1's action.
the number of cards held by all players. To avoid this un-
favourable scaling, we can instead represent an approximate
factorised belief state
f pub≤t ) ≈(cid:89)
P (f pri
t
P (f pri
t
[i]f pub≤t ) =: Bfact
t
.
(5)
f a
i
With this restriction, we can parameterise πBAD with factors
BAD(uaBt, f pub, f a) using a function approx-
of the form πθ
imator such as a deep neural network. In order for all of
the agents to perform the public belief update, the sampled
∆π must be public. We resolve this by having ∆π sampled
deterministically from a given Bt and f pub
, using a common
knowledge random seed ξt. The seeds are shared prior to
the game so that all agents sample the same ∆π. This re-
sembles the way humans share common ways of reasoning
in card games and allows the agents to explore alternative
policies jointly as a team. Further details on the mechanics
of parameterising and sampling from πBAD are provided in
the Supplemental Material.
t
3.4. Factorised Belief Updates.
In general, representing exact beliefs is intractable in all
but the smallest state spaces. For example, in card games
the number of possible hands is typically exponential in
From here on we drop the superscript and use B exclu-
sively to refer to the factorised belief. In a card game each
factor represents per-card probability distributions, assum-
ing approximate independence across the different cards
both within a hand and across players. This approximation
makes it possible to represent and reason over the otherwise
intractably large state spaces that commonly occur in many
settings, including card games.
To carry out the public belief update with a factorised repre-
sentation we maintain factorised likelihood terms Lt[f [i]]
for each private feature that we update recursively:
Lt[f [i]] := P (ua≤tf [i],B≤t, f pub≤t , ∆π≤t)
t f [i],Bt, f pub
(6)
(7)
, ∆πt)
≈ Lt−1[f [i]] · P (ua
= Lt−1[f [i]] · Eft∼Bt
(cid:2)1(ft[i], f [i])1( ∆π(f a
(cid:2)1(ft[i], f [i])(cid:3)
Eft∼Bt
t
t )(cid:3)
(8)
t ), ua
,
1000484100000104840010001048400010004841000Player 2 (acts second)Player 1 (acts first)Card 1Card 2Card 2Card 1Player 2 actionPlayer 1 action"Tiny Hanabi"●Each player knows their card but can't see the other player's card.●Player 1 acts first.●Player 2 observes Player 1's action and acts second.ABCABCBayesian Action Decoder
where (7) assumes that actions are (approximately) condi-
tionally independent of the future given the past. As indi-
cated, these likelihood terms are calculated by sampling,
and the more samples the better.
3.5. Self-Consistent Beliefs
f [−i]
∝ E
f [−i]∼Bk
(cid:2)Lt(f [i])P (f [i]f [−i], f pub
)(cid:3),
t
(9)
This factorisation is only an approximation, even in simple
card games: knowledge that a player is holding a specific
card clearly influences the probability that another player
is holding that same card. Furthermore, our approximation
can yield beliefs that are not even self-consistent, i.e., they
are not the marginalisation of any belief over joint features.
While not central to the key ideas behind BAD, we introduce
a general iterative procedure that can account for feature
interactions in factorised models. Starting with a public
belief B0 = Bt we can iteratively update the belief to make
it more self-consistent through re-marginalisation:
Bk+1(f [i]) =
Bk(f [−i])P (f [i]f [−i], f pub≤t , ua≤t, ∆π≤t)
(cid:88)
(10)
where f [−i] denotes all features excluding f [i]. In the last
step we used the factorised likelihoods from above to con-
vert to an expectation, so that we can use samples to ap-
proximate the intractable sum across features. The notion
of refining the distribution over one feature while keeping
the distribution across all other features fixed is similar to
Expectation Propagation for factor graphs (Minka, 2001).
However, the card counts constitute a global factor, making
the factor graph formulation less useful. While this iterative
update can in principle be carried out until convergence, in
practice we terminate after a fixed number of iterations.
4. Experiments and Results
4.1. Matrix Game
We first present proof-of-principle results for a two-player,
two-step partially observable matrix-like game (Figure 2).
The state consists of 2 random bits (the cards for Player 1
and 2) and the action space consists of 3 discrete actions.
Each player observes its own card, with Player 2 also ob-
serving Player 1's action before acting, which in princi-
ple allows Player 1 to encode information about its card
with its action. The reward is specified by a payoff tensor,
r = Payoff[card1][card2][u1][u2], where carda and ua are
the card and action of the two players, respectively. The
payout tensor is structured such that the optimal reward can
only be achieved if the two players establish a convention,
in particular if Player 1 chooses informative actions that can
be decoded by Player 2.
Figure 3: BAD, both with and without counterfactual (CF)
gradients, outperforms vanilla policy gradient on the matrix-
like game. Each line is the mean over 1000 games, and the
shade indicates the standard error of the mean (s.e.m.).
As shown in Figure 3, BAD clearly outperforms the base-
line policy-gradient method on the toy matrix game. In this
small, exact setting, it is also possible to estimate counterfac-
tual (CF) policy gradients that reinforce not only the action
taken, but also these counterfactual actions. This can be
t τ a) with log P ( ∆πBt, f pub)
achieved by replacing log πa(ua
in the estimation of the policy gradient. However, the addi-
tional improvement in performance from using CF gradients
is minor compared to the initial performance gain from us-
ing a counterfactual belief state.
Code for the matrix game with a proof-of-principle im-
plementation of BAD is available at https://bit.ly/
2P3YOyd.
4.2. Hanabi
Here we briefly describe the rules of 2-player Hanabi.
There are 5 cards in a hand. For each of the 5 colours there
are three 1s, one 5, and two each of all other ranks, i.e., 10
cards per colour for a total of 50 = 5 × 10 cards in the deck.
While this is a modestly large number of cards, even for
2 players it leads to 6.2 × 1013 possible joint hands at the
beginning of the game.
4.3. Observations and Actions
Each player observes the hands of all other players, but
not their own. The action space consists of 2 × 5 options
for discarding and playing cards, and 5 + 5 options per
teammate for hinting colours and ranks. Hints reveal all
cards of a specific rank or colour to one of the teammates,
Bayesian Action Decoder
Equation 8). As derived in the Supplemental Material,
Bk+1(f [i]) ∝
Bk(f [j])
×HM(f [i]). (12)
(cid:32)
C(f )−(cid:88)
j(cid:54)=i
(cid:33)
e.g., 'Player 2's card 3 and 5 are red'. Hinting for colours
and ranks not present in the hand of the teammate (so-called
'empty hints') is not allowed.
Each hint costs one hint token. The game starts with 8
hint tokens, which can be recovered by discarding cards.
After a player has played or discarded a card, she draws a
new card from the deck. When a player picks up the last
card, everyone (including that player) takes one more action
before the game terminates. Legal gameplay consists of
building 5 fireworks, which are piles of ascending numbers,
starting at 1, for each colour. When the 5 has been added to
a pile the firework is complete and the team obtains another
hint token (unless they already have 8). A life token is lost
each time a player plays an illegal card; after three mistakes
the game terminates. Players receive 1 point after playing
any playable card, with a perfect score being 25 = 5 × 5.
The number of hint and life tokens at any time are observed
by all players, as are the played and discarded cards, the last
action of the acting player and any hints provided.
4.4. Beliefs in Hanabi
The basic belief calculation in Hanabi is straightforward:
f pub
consists of a vector of 'candidates' C containing counts
for all remaining cards, and a 'hint mask' HM, an ANh ×
t
(NcolorNrank + 1) binary matrix that is 1 if in a given 'slot'
the player could be holding a specific card according to the
hints so far, and 0 otherwise; the additional 1 accounts for
the possibility that the card may not exist in the final round
of play. Slots correspond to the features of the private state
space f [i], for example the 3rd card of the second player.
Hints contain both positive and negative information: for
example, the statement 'the 2nd and 4th cards are red' also
implies that all other cards are not red.
The basic belief B0 can be calculated as
B0(f [i]) = P (f [i]f pub) ∝ C(f ) × HM(f [i]).
(11)
We call this the 'V0 belief', in which the belief for each
card depends only on publicly available information for that
card. In our experiments, we focus on baseline agents that
receive this basic belief, rather than the raw hints, as public
observation inputs; while the problem of simply remember-
ing all hints and their most immediate implication for card
counts is potentially challenging for humans in recreational
play, we are here more interested in the problem of forming
effective conventions for high-level play.
As noted above, this basic belief misses an important inter-
action between the hints for different slots. We can calculate
an approximate version of the self-consistent beliefs that
avoids the potentially expensive and noisy sampling step
in Equation 10 (note that this sampling is distinct from the
sampling required to compute the marginal likelihood in
We call the resulting belief at convergence (or after a max-
imum number of iterations) the 'V1 belief'. It does not
condition on the Bayesian probabilities but considers inter-
actions between hints for different cards. In essence, at each
iteration the belief for a given slot is updated by reducing
the candidate count by the number of cards believed to be
held across all other slots.
By running the same algorithm but including L, we obtain
the Bayesian beliefs BB that lie at the core of BAD:
BB0(f [i]) ∝ C(f ) × HM(f [i]) × L(f [i]),
(13)
(cid:33)
BBk+1(f [i]) ∝
Bk(f [j])
(cid:32)
C(f ) −(cid:88)
j(cid:54)=i
× HM(f [i]) × L(f [i]).
(14)
In practice, to ensure stability, the final 'V2 belief' that we
use is an interpolation between the Bayesian belief and the
V1 belief: V2 = (1 − α)BB + αV1 with α = 0.01 (we
found α = 0.1 to also work). For the Bayesian update we
sampled S = 3, 000 hands during training and S = 20, 000
hands for the final test games.
4.5. Architecture Details for Baselines and Method
Advantage actor-critic agents were trained using the
Importance-Weighted Actor-Learner Architecture (Espeholt
et al., 2018), in particular the multi-agent implementation
described in Jaderberg et al. (2018). In this framework,
'actors' continually generate trajectories of experience (se-
quences of states, actions, and rewards) by having agents
(self-)playing the game, which are then used by 'learners' to
perform batched gradient updates (batch size was 32 for all
agents). Because the policy used to generate the trajectory
can be several gradient updates behind the policy at the time
of the gradient update, V-trace was applied to correct for
the off-policy trajectories. The length of the trajectories, or
rollouts, was 65, the maximum length of a winning game.
Further details for the hyperparameters, architecture, and
training are given in the Supplemental Material.
4.6. Results on Hanabi
The BAD agent achieves a new state-of-the-art mean per-
formance of 24.174 points on two-player Hanabi. In Fig-
ure 4a we show training curves and test performance for
BAD and two LSTM-based baseline methods, as well as the
performance of FireFlower (https://github.com/
lightvector/fireflower), the best known hand-
coded bot for two-player Hanabi. For the LSTM agents,
Bayesian Action Decoder
(a)
(b)
(c)
Figure 4: a) Hanabi training curves for BAD and the V0 and V1 baseline methods using LSTMs rather than the Bayesian
belief. Thick lines indicate the final evaluated agent for each agent type, with the dots showing the final test score. Error
bars (standard error of the mean, s.e.m.) are smaller than the dots. Upward kinks in the curves are generally due to agents
'evolving' in PBT by copying its weights and hyperparameters (plus perturbations) from a superior agent. b) Distribution of
game scores for BAD on Hanabi under testing conditions. BAD achieves a perfect score in almost 60% of the games. The
dashed line shows the proportion of perfect games reported for FireFlower, the best known hard-coded bot for two-player
Hanabi. c) Per-card cross entropy with the true hand for different belief mechanisms during BAD play. V0 is the basic belief
based on hints and card counts, V1 is the self-consistent belief, and V2 is the BAD belief which also includes the Bayesian
update. The BAD agent conveys around 40% of the information via conventions, rather than grounded information.
test performance was obtained by using the greedy version
of the trained policy, resulting in slightly higher scores than
during training. To select the agent, we first performed a
sweep over all agents for 10,000 games, then carried out a
final test run of 100,000 games on the best agent from the
sweep to obtain an unbiased score. For the BAD agent we
also increased the number of sampled hands. The results for
other learning methods from the literature perform below
the range of the y-axis (far below 20 points) and are omitted
for readability. We note that, under a strict interpretation of
the rules of Hanabi, games in which all three error tokens
are exhausted should be awarded a score of 0. Under these
rules the same BAD agent achieves 23.917 ± 0.009 s.e.m,
the best known score, even though it was not trained under
these conditions. SmartBot and FireFlower achieve average
scores of 22.99 and 22.56 respectively.
While not all of the game play BAD learns is easy to follow,
some conventions can be understood simply from inspecting
the game. Printouts of 100 random games can be found at
https://bit.ly/2zeEShh. One convention stands
out: Hinting for 'red' or 'yellow' indicates that the newest
card of the other player is playable. We found that in over
80% of cases when an agent hints 'red' or 'yellow', the next
action of the other agent is to play the newest card. This
convention is very powerful: Typically agents know the
least about the newest card, so by hinting 'red' or 'yellow',
agents can use a single hint to tell the other agent that the
card is playable. Indeed, the use of two colours to indicate
Agent
Learning steps Mean ± s.e.m.
Prop. perfect
SmartBot
FireFlower
V0-LSTM
V1-LSTM
BAD
-
-
20.2B
21.1B
16.3B
23.09
23.37 ± 0.0002
23.622 ± 0.005
23.919 ± 0.004
24.174± 0.004
29.52%
52.6%
36.5%
47.5%
58.6%
Table 1: Test scores on 100K games. The LSTM agents
were tested with a greedy version of the trained policy, while
the final BAD agent was evaluated with V1 mix-in α = 0.01,
20K sampled hands, and inverse softmax temperature 100.0.
The FireFlower bot was evaluated over 25K games.
'play newest card' was present all of the highest-performing
agents we studied. Hinting 'white' and 'blue' are followed
by a discard of the newest card in over 25% of cases. We
also found that the agent sometimes attempts to play cards
which are not playable in order to convey information to
their team mate. In general, unlike human players, agents
play and discard predominantly from the last card. In the
supplementary material we also include a written analysis
of our bot by the creator of FireFlower.
Figure 4c shows the quality of the different beliefs. While
the iterated belief update leads to a reduction in cross en-
tropy compared to the basic belief, a much greater reduction
in cross entropy is obtained using counterfactual beliefs.
Bayesian Action Decoder
This clearly demonstrates the importance of learning con-
ventions for successful gameplay in Hanabi: Roughly 40%
of the information is obtained through conventions rather
than through the grounded information and card counting.
5. Related Work
5.1. Learning to Communicate
Many works have addressed problem settings where agents
must learn to communicate in order to cooperatively solve
a toy problem. These tasks typically involve a cheap-talk
communication channel that can be modeled as a continu-
ous variable during training, which allows differentiation
through the channel as first proposed by Foerster et al.
(2016a) and Sukhbaatar et al. (2016). In this work we fo-
cused on the case where agents must learn to communicate
via grounded hinting actions and observable environment
actions rather than a cheap-talk channel. This is closest to
the "hat game" of Foerster et al. (2016b), who proposed a
simple extension to recurrent deep Q-networks rather than
explicitly modeling action-conditioned Bayesian beliefs. An
idea similar to the Pub-MDP was introduced in the context
of decentralised stochastic control by Nayyar et al. (2013),
who also formulated a coordinator that uses "common in-
formation" to map local controller information to actions.
However, they did not provide a concrete solution method
that can scale to a high-dimensional problem like Hanabi.
5.2. Hanabi
A number of papers have been published on Hanabi. Baffier
et al. (2016) showed that optimal gameplay in Hanabi is
NP-hard even when players can observe their own cards.
Encoding schemes similar to the hat game essentially solve
the five-player case (Cox et al., 2015), but only achieve
17.8 points in the two-player setting (Bouzy, 2017). Walton-
Rivers et al. (2017) developed a variety of Monte Carlo tree
search and rule-based methods for Hanabi, but the reported
scores were roughly 50% lower than BAD. Osawa (2015)
defined a number of heuristics for the two-player case that
reason over possible hands given the other player's action.
While this is similar in spirit to our approach, the work was
limited to hand-coded heuristics, and the reported scores
were around 8 points lower than BAD. Eger et al. (2017)
investigated humans playing with hand-coded agents, but no
pairing resulted in scores higher than 15 points on average.
The best result for two-player Hanabi we could find
was for the FireFlower described at github.com/
lightvector/fireflower, which has been reported
to achieve an average of 23.37 points (52.6% perfect games).
While FireFlower uses the same game rules as those used in
our work, it is entirely hand-coded and involves no learning.
5.3. Belief State Methods
The continual re-solving (nested solving) algorithm used by
DeepStack (Moravc´ık et al., 2017) and Libratus (Brown &
Sandholm, 2018) for poker also use a belief state space. Like
BAD, when making a decision in a player state, continual re-
solving considers the belief state associated with the current
player and generates a joint policy across all player states
consistent with this belief. The policy for the actual player
is then selected from this joint policy. Continual re-solving
also does a Bayesian update of the beliefs after an action.
There are key differences, however. Continual re-solving
performa exact belief updates, which requires a joint policy
space small enough to enumerate; belief states are also
augmented with opponent values; continual re-solving is
a value-based method, where the training process consists
of learning the values of belief states under optimal play;
finally, the algorithm is designed for two-player, zero-sum
games, where it can independently consider player state
values while guaranteeing that an optimal choice for the
joint action policy can be found.
6. Conclusion and Future Work
We presented the Bayesian action decoder (BAD), a novel
algorithm for multi-agent reinforcement learning in cooper-
ative partially observable settings. BAD uses a factorised,
approximate belief state that allows agents to efficiently
learn informative actions, leading to the discovery of con-
ventions. We showed that BAD outperforms policy gradi-
ents in a proof-of-principle matrix game, and achieves a
state-of-the-art performance of 24.174 points on average
in the card game Hanabi. We also showed that using the
Bayesian update leads to a reduction in uncertainty across
the private hands in Hanabi by around 40%. To the best of
our knowledge, this is the first instance in which deep RL
has been successfully applied to a problem setting that both
requires the discovery of communication protocols and was
originally designed to be challenging for humans. BAD also
illustrates clearly that using an explicit belief computation
achieves better performance in such settings than current
state-of-the-art RL methods using implicit beliefs, such as
recurrent neural networks.
In the future, we aim to apply BAD to games with more
players and further generalise BAD by learning more of its
components, e.g., the V0-belief. While the belief update
necessarily involves a sampling step, most of the other com-
ponents can likely be learned end-to-end. We also plan to
extend the BAD mechanism to value-based methods and
further investigate the relevance of counterfactual gradients.
Similar to what was suggested as next steps in (?), we hope
to extend the setting to a point where our bots can learn to
collaborate with human players.
Bayesian Action Decoder
Acknowledgements
We thank Marc Lantot, Shibl Mourad, Angeliki Lazaridou,
Jelena Luketina, Anuj Mahajan, Gregory Farquhar, Kelsey
Allen, Thore Graepel, Nando de Freitas, and Nolan Bard for
valuable discussions.
This project has received funding from the European Re-
search Council (ERC) under the European Unions Horizon
2020 research and innovation programme (grant agreement
#637713).
References
Baffier, J.-F., Chiu, M.-K., Diez, Y., Korman, M., and
Mitsou, V. Hanabi is NP-complete, even for cheaters
who look at their cards. arXiv:1603.01911, 2016. URL
https://arxiv.org/abs/1603.01911.
Baker, C. L., Jara-Ettinger, J., Saxe, R., and Tenen-
baum, J. B.
Rational quantitative attribution of
beliefs, desires and percepts in human mentalizing.
Nat. Hum. Behav., 1(4):1 -- 10, 2017.
doi: 10.1038/
s41562-017-0064. URL http://dx.doi.org/10.
1038/s41562-017-0064.
Bouzy, B. Playing Hanabi near-optimally. In Advances in
Computer Games, pp. 51 -- 62. Springer, 2017.
Brown, N. and Sandholm, T. Superhuman ai for heads-up
no-limit poker: Libratus beats top professionals. Science,
359(6374):418 -- 424, 2018.
Cox, C., De Silva, J., Deorsey, P., Kenter, F. H. J., Ret-
ter, T., and Tobin, J. How to Make the Perfect Fire-
works Display : Two Strategies for Hanabi. Math.
Mag., 88:323, 2015.
doi: 10.4169/math.mag.88.5.
323. URL http://www.jstor.org/stable/10.
4169/math.mag.88.5.323.
Eger, M., Martens, C., and Cordoba, M. A. An intentional
AI for hanabi. 2017 IEEE Conf. Comput. Intell. Games,
CIG 2017, pp. 68 -- 75, 2017. doi: 10.1109/CIG.2017.
8080417.
Espeholt, L., Soyer, H., Munos, R., Simonyan, K., Mnih,
V., Ward, T., Doron, Y., Firoiu, V., Harley, T., Dunning,
I., Legg, S., and Kavukcuoglu, K. IMPALA: Scalable
Distributed Deep-RL with Importance Weighted Actor-
Learner Architectures. arXiv:1802.01561, 2018. URL
http://arxiv.org/abs/1802.01561.
Foerster, J. N., Assael, Y. M., de Freitas, N., and Whiteson,
S. Learning to communicate to solve riddles with deep
distributed recurrent Q-networks. arXiv:1602.02672,
2016b. URL https://arxiv.org/abs/1602.
02672.
Frank, M. C. and Goodman, N. D. Predicting pragmatic
reasoning in language games. Science, 336(6084):998,
2012. doi: 10.1126/science.1218633.
Gmytrasiewicz, P. J. and Doshi, P. A framework for sequen-
tial planning in multi-agent settings. J. Artif. Intell. Res.,
24:49 -- 79, 2005. doi: 10.1613/jair.1579.
Grice, H. P.
Logic and conversation.
In Cole, P.
and Morgan, J. L. (eds.), Syntax and Semantics: Vol.
3: Speech Acts, pp. 41 -- 58. Academic Press, New
York, 1975. URL http://www.ucl.ac.uk/ls/
studypacks/Grice-Logic.pdf.
Jaderberg, M., Czarnecki, W. M., Dunning, I., Marris, L.,
Lever, G., Castaneda, A. G., Beattie, C., Rabinowitz,
N. C., Morcos, A. S., Ruderman, A., Sonnerat, N., Green,
T., Deason, L., Leibo, J. Z., Silver, D., Hassabis, D.,
Kavukcuoglu, K., and Graepel, T. Human-level perfor-
mance in first-person multiplayer games with population-
based deep reinforcement learning. arXiv:1807.01281,
2018. doi: arXiv:1807.01281. URL http://arxiv.
org/abs/1807.01281.
Kaelbling, L. P., Littman, M. L., and Cassandra, A. R. Plan-
ning and acting in partially observable stochastic domains.
Artif. Intell., 101(1-2):99 -- 134, 1998. doi: 10.1016/
S0004-3702(98)00023-X. URL http://dx.doi.
org/10.1016/S0004-3702(98)00023-X.
Littman, M. L. Markov games as a framework for multi-
agent reinforcement learning. Mach. Learn. Proc. 1994,
pp. 157 -- 163, 1994. doi: 10.1016/B978-1-55860-335-6.
50027-1. URL http://linkinghub.elsevier.
com/retrieve/pii/B9781558603356500271.
Lowe, R., Wu, Y., Tamar, A., Harb, J., Abbeel, O. P.,
and Mordatch, I. Multi-agent actor-critic for mixed
cooperative-competitive environments. In Advances in
Neural Information Processing Systems, pp. 6379 -- 6390,
2017.
Minka, T. P. Expectation Propagation for Approximate
Bayesian Inference. Uncertain. Artif. Intell., 17(2):362 --
369, 2001. URL https://arxiv.org/abs/1301.
2294.
Foerster, J., Assael, Y. M., de Freitas, N., and Whiteson,
S. Learning to communicate with deep multi-agent re-
inforcement learning. In Advances in Neural Informa-
tion Processing Systems, pp. 2137 -- 2145, 2016a. URL
https://arxiv.org/abs/1605.06676.
Moravc´ık, M., Schmid, M., Burch, N., Lis`y, V., Morrill, D.,
Bard, N., Davis, T., Waugh, K., Johanson, M., and Bowl-
ing, M. Deepstack: Expert-level artificial intelligence in
heads-up no-limit poker. Science, 356(6337):508 -- 513,
2017.
Bayesian Action Decoder
Nayyar, A., Mahajan, A., and Teneketzis, D. Decentral-
ized stochastic control with partial history sharing: A
common information approach. IEEE Trans. Automat.
Contr., 58(7):1644 -- 1658, 2013. ISSN 00189286. doi:
10.1109/TAC.2013.2239000. URL https://arxiv.
org/abs/1209.1695.
Oliehoek, F. A. Decentralized pomdps. In Reinforcement
Learning, pp. 471 -- 503. Springer, 2012.
Osawa, H. Solving hanabi: Estimating hands by opponent's
actions in cooperative game with incomplete informa-
tion. In AAAI workshop: Computer Poker and Imperfect
Information, pp. 37 -- 43, 2015.
Perolat, J., Leibo, J. Z., Zambaldi, V., Beattie, C., Tuyls,
K., and Graepel, T. A multi-agent reinforcement
learning model of common-pool resource appropria-
tion. arXiv:1707.06600, 2017. ISSN 10495258. URL
http://arxiv.org/abs/1707.06600.
Sukhbaatar, S., Szlam, A., and Fergus, R. Learning Multia-
gent Communication with Backpropagation. Advances
in Neural Information Processing Systems, 2016. ISSN
10495258. URL http://arxiv.org/abs/1605.
07736.
Walton-Rivers, J., Williams, P. R., Bartle, R., Perez-Liebana,
D., and Lucas, S. M. Evaluating and modelling Hanabi-
In Evolutionary Computation (CEC),
playing agents.
2017 IEEE Congress on, pp. 1382 -- 1389. IEEE, 2017.
Wierstra, D., Forster, A., Peters, J., and Schmidhuber, J.
Recurrent policy gradients. Log. J. IGPL, 18(5):620 -- 634,
2009. doi: 10.1093/jigpal/jzp049.
Bayesian Action Decoder
A. Parameterising and Sampling from the
Distribution over Partial Policies
BAD requires us to parameterise a probability distribution
over partial policies using a deep neural network:
P ( ∆πsBAD) = πθ
BAD( ∆πsBAD).
(15)
The first insight is that we can trivially use a neural network
to map from public states, sBAD, into probabilistic partial
policies. To do so, we simply start with a feedforward
policy that takes as input both sBAD and f a and produces a
distributions over actions:
πθ(sBAD, f a) → P (usBAD, f a).
(16)
Next, we note that if we fix a given sBAD, we now have a
probabilistic partial policy which maps each private obser-
vation f a into a probability distribution over actions. This
partial policy is produced deterministically as a function of
sBAD via the parameters θ:
π(uf a) : {f a} → {P (U)} sBAD,
π(uf a) = πθ(usBAD, f a).
(17)
(18)
Now, this is close, but not quite what we want. Above we
have a deterministic map from sBAD into probabilistic par-
tial policies, π(uf a). Instead, we require a differentiable
distribution over deterministic partial policies.
Perhaps surprisingly, this can be accomplished by condition-
ing the sampling from π(uf a) on a common knowledge
random seed, ξ:
∆π : {f a} → U sBAD,
{f a} → u ∼ π(uf a) ξ,
{f a} → u ∼ πθ(usBAD, f a) ξ.
(19)
(20)
(21)
(22)
Thus, when we sample ξ we are effectively sampling an
entire deterministic partial policy.
B. Hyperparameters and Training Details
For the toy matrix game, we used a batch size of 32 and the
Adam optimiser with all default TensorFlow settings; we
did not tune hyperparameters for any runs.
In the V0-LSTM and V1-LSTM BAD agents, all observa-
tions were first processed by an MLP with a single 256-unit
hidden layer and ReLU activations, then fed into a 2-layer
LSTM with 256 units in each layer. The policy π was a
softmax readout of the LSTM output. The baseline network
was an MLP with a single 256-unit hidden layer and ReLU
activations, which then projected linearly to a single value.
Since the baseline network is only used to compute gradient
updates, we followed ? (?) in feeding each agent's own
hand (i.e., the other agent's private observation) into the
baseline by concatenating it with the LSTM output; thus we
make the common assumption of centralised training and
decentralised execution. We note that the V0 and V1-LSTM
agents differed only in their public belief inputs.
The Hanabi BAD agent consisted of an MLP with two 384-
unit hidden layers and ReLU activations that processed all
observations, followed by a linear softmax policy readout.
To compute the baseline, we used the same MLP as the
policy but included the agent's own hand in the input (this
input was present but zeroed out for the computation of the
policy).
For all agents, illegal actions (such as hint for a red card
when there are no red cards) were masked out by setting the
corresponding policy logits to a large negative value before
sampling an action. In particular, for the non-acting agent at
each turn the only allowed action was the 'no-action'. For
Hanabi, we used the RMSProp optimiser with = 10−10,
momentum 0, and decay 0.99. The RL discounting factor γ
was set to 0.999. The baseline loss was multiplied by 0.25
and added to the policy-gradient loss. We used population-
based training (PBT) (?Jaderberg et al., 2018) to 'evolve' the
learning rate and entropy regularisation parameter during the
course of training, with each training run consisting of a pop-
ulation of 30 agents. For the LSTM agents, learning rates
were sampled log-uniformly from the interval [1, 4) × 10−4
while the entropy regularisation parameter was sampled log-
uniformly from the interval [1, 5) × 10−2. For the BAD
agents, learning rates were sampled log-uniformly from the
interval [9 × 10−5, 3 × 10−4) while the entropy regularisa-
tion parameter was sampled log-uniformly from the interval
[3, 7)×10−2. Agents evolved within the PBT framework by
copying weights and hyperparameters (plus perturbations)
according to each agent's rating, which was an exponen-
tially moving average of the episode rewards with factor
0.01. An agent was considered for copying roughly every
200M steps if a randomly chosen copy-to agent had a rating
at least 0.5 points higher. To allow the best hyperparameters
to manifest sufficiently, PBT was turned off for the first 1B
steps of training.
The BAD agent was trained with 100 self-consistent iter-
ations, a V1 mix-in of α = 0.01, BAD discount factor
γBAD = 1, inverse temperature 1.0, and 3000 sampled hands.
Since sampling from card-factorised beliefs can result in
hands that are not compatible with the deck, we sampled 5
times the number of hands and accepted the first 3000 legal
hands, zeroing out any hands that were illegal.
Bayesian Action Decoder
C. Self-Consistent Belief Approximation for
Hanabi
t
We will use the same notation as in the main text: f pub
consists of a vector of 'candidates' C containing counts
for all remaining cards, and a 'hint mask' HM, an ANh ×
NcolorNrank binary matrix that is 1 if in a given 'slot' the
player could be holding a specific card according to the
hints given so far, and 0 otherwise". Furthermore, L(f [i]),
is the marginal likelyhood.
Then the basic per-card belief is simply:
B0(f [i]) ∝ C(f ) × HM(f [i]) × L(f [i]),
(cid:80)
C(f ) × HM(f [i]) × L(f [i])
(cid:0)C(f ) × HM(f [i]) × L(f [i])(cid:1).
g C(g) × HM(g[i]) × L(g[i])
B0(f [i]) =
= βi
(23)
(24)
(25)
In the last two lines we are normalising the probability, since
the probability of the i-th feature being one of the possible
values must sum to 1. For convenience we also introduced
the notation βi for the normalisation factor.
Next we apply the same logic to the iterative belief update.
The key insight here is to note that conditioning on the
features f [−i], i.e., the other cards in the slots, corresponds
to reducing the card counts in the candidates. Below we use
M (f [i]) = HM(f [i]) × L(f [i]) for notational convenience:
Bk+1(f [i])
=
Bk(f [−i])P (f [i]f [−i], f pub≤t , ua≤t, ∆π≤t)
(cid:19)
f [−i]
(cid:18)
(26)
(cid:88)
(cid:88)
C(f ) −(cid:88)
Bk(g[−i])βi
1(g[j] = f )
M (f [i]).
=
g[−i]
j(cid:54)=i
(27)
In the last line we relabelled the dummy index f [−i] to g[−i]
for clarity and used the result from above. Next we sub-
stitute the factorised belief assumption across the features,
(cid:19)
1(g[j] = f )
M (f [i])
1(g[j] = f )
M (f [i])
(cid:19)
(cid:19)
(28)
(29)
M (f [i]).
(30)
Bk(g[−i])βi
=
Bk+1(f [i])
Bk(g[−i]) =(cid:81)
(cid:88)
(cid:88)
(cid:89)
(cid:89)
(cid:88)
g[−i]
g[−i]
j(cid:54)=i
=
(cid:39) βi
g[−i]
j(cid:54)=i
j(cid:54)=i
j(cid:54)=i Bk(g[j]) :
(cid:18)
C(f ) −(cid:88)
(cid:18)
C(f ) −(cid:88)
(cid:18)
C(f ) −(cid:88)
j(cid:54)=i
Bk(g[j])
Bk(g[j])βi
1(g[j] = f )
j(cid:54)=i
In the last line we have ommited the dependency of βi on
the sampled hands f [−i]. It corresponds to calculating the
average across sampled hands first and then normalising
(which is approximate but tractable) rather than normalising
and then averaging (which is exact but intractable). We can
now use product-sum rules to simplify the expression.
Bk+1(f [i])
(cid:39) βi
Bk(g[j])
(cid:88)
1(g[j] = f )
(cid:19)
M (f [i])
j(cid:54)=i
(cid:89)
(cid:88)
j(cid:54)=i
g
g[−i]
(cid:18)
C(f ) −(cid:88)
(cid:18)
C(f ) −(cid:88)
(cid:18)
C(f ) −(cid:88)
(cid:18)
C(f ) −(cid:88)
j(cid:54)=i
j(cid:54)=i
= βi
= βi
∝
Bk(g[j])1(g[j] = f )
(cid:19)
(cid:19)
Bk(f [j])
M (f [i])
j(cid:54)=i
Bk(f [j])
M (f [i]).
(cid:19)
(31)
M (f [i])
(32)
(33)
(34)
This concludes the proof.
D. Anecdotal Analysis
Below we present commentary from David Wu (https:
//github.com/lightvector/), the creator of the
FireFlower bot, on our BAD agent. While this is anecdotal
evidence, we believe it provides some interesting insights
into the gameplay that our BAD agent discovers. The com-
ments are taking verbatim from an email exchange with
David:
D.1. Communicating Playables
• As you observed before, the bot uses R and Y often to
hint newest-card-playability.
• In addition to the R and Y hints, it also often uses direct
hints to the newest card to indicate playability, in the
way that natural human conventions do, and I think
these include both color and number hints.
• When the R and Y hints or direct hints to the newest
card hit multiple cards, the bot often was indicating
multiple plays. In the small sample size of cases we
looked over, it tended to be the case that the R/Y hints
were more often "play in the order from newest to
oldest" while the direct hints were more often in the
order of "play from oldest to newest". I think this
was not 100% consistent though, but in all cases when
looking at the direct beliefs, it was clear that in each
case there was a strong ordering convention was in
force for that hint, it's just that we didn't see enough
Bayesian Action Decoder
cases to be able to determine the precise rules for which
one when. Generally though, it makes a lot of sense to
vary the ordering convention in different parts of the
hint space to add flexibility in hinting.
• The bot uses certain other kinds of direct hints to older
cards to suggest that those cards are one step away
from playable, or something of that nature. Sometimes
the belief state shows that this is not absolutely certain,
but over time as other things happen the probability
mass sometimes gradually updates and concentrates
on the card on the truth, such that once the preceding
card is played, the bot may then play the formerly-one-
step-away card without any further suggestion.
• For these "delayed" one-step-removed hints to older
cards, there is also a similar variation in ordering con-
ventions in the case those hints hit more than one
card, sometimes they're in "age-order" and sometimes
they're in "reverse-age-order".
• Commonly the R and Y hints also indicate other plays
or delayed plays besides the play of the newest card.
The bot chooses the manner of hinting the first card as
playable (R vs Y vs direct hint) to try to communicate
other useful information at the same time, if possible.
• I think occasionally the bot seems to "single out" a card
by directly hinting all other cards in the hand *besides*
that card over successive turns, and sometimes this
implies that the singled-out unhinted card is playable.
I'm not sure on this one though, I'd need to see more
cases.
• I think there seems to be some interesting other con-
ventions that seem to function to give information to
allow play of older red and yellow cards, which are
necessary since direct hints of R and Y mean to play
the newest card rather than the card hinted.
D.2. Communicating Protection
• As you observed before, the bot discards its newest
card by default.
• G hints that do not directly hit the first card appear
to mean that the newest card is dangerous and should
not be discarded. Possibly it is more specific, and
actually just means that it's a 5, the examples I recall
all involved 5s. The bot also can just directly hint the
newest card in various ways.
• The bot is very aggressive about protecting the newest
card if the newest card is a 5 or otherwise dangerous
(the last copy in the deck), whether by giving a G hint,
or a direct hint, or otherwise. This is so consistent
that pretty much any action other than an immediate
protection causes the other bot to infer that the newest
card is NOT a 5 or the last copy of a card whose first
copy has been lost.
• However, the bot does *not* do this any longer if there
is a common-knowledge-extremely-safe discard in that
player's hand (e.g. a redundant copy of a card already
played). In that case, it is understood that the bot will
prefer to discard that instead. Then, protection of the
newest card is not necessarily urgent any more, and
neither will a player necessarily infer that the newest
card is safe from a failure by their partner to protect it
immediately.
• There seems to be some interesting dictionary of hints
that we haven't worked out yet about ways to signal
to discard cards besides the newest, which prevents
junk from accumulating in the hand as non-playable
but useful-to-hold-on-to cards enter the hand.
Miscellaneous Communication
• Often the hints, and sometimes its other actions just
come "attached" with miscellaneous information. The
most extreme example is I observed one game where
as a result of the bots discarding, it was immediately
implied that a particular card in the other player's hand
was almost certainly red. This information was not
immediately useful (the red card was not yet playable,
nor was it likely to have been discarded soon), it was
simply just extra information attached to the action of
discarding in that particular case. Presumably the bot
was by convention constrained to almost certainly do
some other action in that situation had that partner's
card counterfactually not been red.
• This kind of extra not-immediately-useful "attached"
information is perhaps the most non-human part of the
bot's convention set. But actually it doesn't happen as
often as one might expect from a "nonhuman" agent.
For the most part I didn't see this all that much for
plays and discards (that one extreme example notwith-
standing). This makes sense, as having too many such
conventions would overly constrain the ability of the
players to act, as discard/play are both critical actions
you need to take very frequently regardless of the other
player's hand.
• Even for hint actions, most hints were very sensible
and humanly explainable, or clearly appeared that they
would be humanly explainable had we had a larger
sample size so that we could be surer about the general-
ity of its meaning and exactly how the bot had packed
different meanings into the hint space. There were only
a few hint actions that I found particularly "weird" in
what inference was made.
Bayesian Action Decoder
thereafter (i.e. getting plays out in a timely man-
ner, collectively never discarding any card that
could be useful thereafter, optimizing who draws
the next card for parity, etc), and by my under-
standing of their conventions, nothing stopping
them from doing so.
-- But instead of playing, the bot wasted a turn giv-
ing their partner a hint. When you inspected the
V2 belief state, it gave no useful information - the
dominant effect of the hint was actually to con-
centrate probability mass *away* from the truth
giving the partner a misleading belief about a card,
and had almost no other effects.
-- Their partner then proceeded to also not play and
instead discarded their newest card, which unnec-
essarily lost one of the copies of a useful 4. There
was a copy of the 4 left in the deck, but such a dis-
card is still bad. If the remaining copy of that card
is the very bottom card of the deck, it guarantees
that you cannot get 25 points, so every unneces-
sary discard of the first copy of any card loses you
EV due to the chance for the other copy to be the
last card.
Speculating a little here - perhaps something about the bot's
policy or convention set hasn't converged as sharply in the
endgame? It's certainly the case that the gradient there is
much smaller - even a clear mistake near the end tends to
cost you only a little in EV if you're measuring by score,
whereas near the start of the game it can cost you a lot.
And the expected penalty for discarding the first copy of a
useful 4 when otherwise well ahead is slight, since it then
usually only harms you when that 4 is precisely the last card
in the deck which only happens 1/N times, so one might
imagine the average gradient there for good behavior to be
very small.
• A priori, there's no particular reason why a bot's con-
ventions couldn't, for example, completely change
depending on the turn number modulo 3, and be ex-
tremely hard for humans to comprehend. But for the
most part, the conventions of this bot weren't like that
- they were pretty understandable, or at least seemed
consistent and sensible even if we didn't have all the
exact meanings mapped out.
Overall Quality of Play and Game Flow
• The bot is *very* strong in the early game, and there
its convention set is overall far more efficient than "nat-
ural" human convention sets (although not-necessarily
human convention sets that were constructed to be
more artificial and encoding-like).
It's really quite
beautiful.
• The bot is superhumanish at tracking inferred informa-
tion over time, e.g. on the one hand inferring that a
card is not scary in first position, then as it drifts back
later in the hand, inferring this or that other property
incidentally, and inferring based on the "aging" of the
card that it is probably not this or that, and so on, until
only a couple possibilities remain. It's not uncommon
that in the midgame, both players know almost all the
relevant things about their hands.
• The bot might be tactically weak in occasional situa-
tions on or near 0 hints, where the ensuing sequence of
actions is heavily constrained. It seems to have a very
strong preference to discard and get away from 0 hints,
even when as far as we can tell based on its convention
set it should be possible to just stay at 0 hints and play
out some cards, and where discarding at that moment
is suboptimal. For example if the ensuing sequence
of plays would result in a few 5s being played thereby
recovering some hints for free, and the partner's im-
mediate discard is also completely safe in the event
that the partner wants to discard, whereas one's own
discard unnecessarily loses a copy of a card that could
be useful in the future. (If I read the paper right, there
is no explicit lookahead in this bot?).
• The bot makes a few seemingly-clear mistakes in the
endgame (as far as we can tell), although only slight
ones. For example, one of the games we looked at:
-- The players were in a close-to-winning state - they
both knew all the playable cards in their hands or
had inferred them with high confidence, and all
they needed to do was play those cards and wait
to draw the few remaining cards to play.
-- They had plenty enough hints and headroom
to theoretically execute essentially-perfect play
|
1104.1279 | 1 | 1104 | 2011-04-07T09:32:00 | Context Aware Multisensor Image Fusion for Military Sensor Networks using Multi Agent System | [
"cs.MA"
] | This paper proposes a Context Aware Agent based Military Sensor Network (CAMSN) to form an improved infrastructure for multi-sensor image fusion. It considers contexts driven by a node and sink. The contexts such as general and critical object detection are node driven where as sensing time (such as day or night) is sink driven. The agencies used in the scheme are categorized as node and sink agency. Each agency employs a set of static and mobile agents to perform dedicated tasks. Node agency performs context sensing and context interpretation based on the sensed image and sensing time. Node agency comprises of node manager agent, context agent and node blackboard (NBB). Context agent gathers the context from the target and updates the NBB, Node manager agent interprets the context and passes the context information to sink node by using flooding mechanism. Sink agency mainly comprises of sink manager agent, fusing agent, and sink black board. A context at the sensor node triggers the fusion process at the sink. Based on the context, sink manager agent triggers the fusing agent. Fusing agent roams around the network, visits active sensor node, fuses the relevant images and sends the fused image to sink. The fusing agent uses wavelet transform for fusion. The scheme is simulated for testing its operation effectiveness in terms of fusion time, mean square error, throughput, dropping rate, bandwidth requirement, node battery usage and agent overhead. | cs.MA | cs | International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
Context Aware Multisensor Image Fusion for
Military Sensor Networks using Multi-Agent
system
Ashok V. Sutagundar*, S. S. Manvi**
*Department of Electronics and Communication Engineering, Basaveshwar Engineering
College, Bagalkot-587102, INDIA.
**Wireless Information Systems Research Lab, Department of Electronics and
Communication Engineering, REVA , Institute of Technology and Management,
Yelahanka, Bangalore
[email protected], [email protected].
Abstract
This paper proposes a Context Aware Agent based Military Sensor Network (CAMSN) to form an improved
infrastructure for multi-sensor image fusion. It considers contexts driven by a node and sink. The contexts such as
general and critical object detection are node driven where as sensing time (such as day or night) is sink driven. The
agencies used in the scheme are categorized as node and sink agency. Each agency employs a set of static and mobile
agents to perform dedicated tasks. Node agency performs context sensing and context interpretation based on the
sensed image and sensing time. Node agency comprises of node manager agent, context agent and node blackboard
(NBB). Context agent gathers the context from the target and updates the NBB, Node manager agent interprets the
context and passes the context information to sink node by using flooding mechanism. Sink agency mainly comprises of
sink manager agent, fusing agent, and sink black board. A context at the sensor node triggers the fusion process at the
sink. Based on the context, sink manager agent triggers the fusing agent. Fusing agent roams around the network, visits
active sensor node, fuses the relevant images and sends the fused image to sink. The fusing agent uses wavelet
transform for fusion. The scheme is simulated for testing its operation effectiveness in terms of fusion time, mean
square error, throughput, dropping rate, bandwidth requirement, node battery usage and agent overhead.
Keywords
Context Aware, Image fusion, Discrete Wavelet transform (DWT), Agent, Military sensor Networks (MSN).
1.Introduction
Recent advancement in wireless communications and sensor technology has enabled the development of
low-cost Wireless Sensor Networks (WSNs). The sensor networks can be used for various application areas
such as health, military, environmental monitoring, home, etc,. A typical WSN consists of a large number
of low-cost and low-energy sensors, which are scattered in an area of interest to collect observations and
pre-process the observations. Each sensor node has its own communication capability to communicate with
other sensor nodes or the central node (fusion center) via a wireless channel. More recently, the production
of cheap CMOS cameras and microphones, which can acquire rich media content from the environment,
created a new wave into the evolution of wireless sensor networks. For instance, the Cyclops imaging
module is a light-weight imaging module which can be adapted to MICA21 or MICAz sensor nodes. Thus,
a new class of WSNs came to the scene that can be applied to military applications and are known as
Wireless Military Sensor Networks (WMSNs).
DOI : 10.5121/ijasuc.2011.2113 147
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
Lot of papers have been published in this research area [1]. Most of this research has, however, focused on
wireless networks of sensor nodes that collect scalar data such as temperature, pressure, and humidity
sensors. Such sensors generate a limited amount of information, which can be insufficient for many
applications, even if a large number of sensors are deployed. As VSNs offer new opportunities for many
promising applications compared to scalar sensor networks, they also raise new challenges that are not fully
addressed by current research on WSNs. Camera sensors generate a huge amount of data compared to
scalar sensors. Processing and transmitting such data by generally low-power sensor nodes is challenging
due to their computational and bandwidth requirements. It is emphasized in [2] that these applications
demand a re-consideration of the computation communication paradigm of traditional WSNs, which has
mainly focused on reducing the energy consumption, targeting to prolong the longevity of the sensor
network. Though, the applications implemented by WMSNs have a second goal, as important as the energy
consumption, to be pursued. This goal is the delivery of application-level quality of service (QoS) and the
mapping of this requirement to network layer metrics, like latency. A VSN with overlapped field of views
could exploit the redundancy between the field of view of each visual sensor to avoid inconsistencies and
obtain more accurate results. Therefore, a key challenge in visual sensor network contexts is how to get the
most relevant information from the environment and fuse it in the most efficient way. However getting the
most relevant information from each visual sensor is not a simple task. Multiple factors could affect the
visual sensor information, for example in tracking activities, occlusions of static objects could affect the
tracking positions.
Context awareness can then be defined as detecting a user’s internal or external state. Context-aware
computing describes the situation of a wearable or mobile computer being aware of the user’s state,
surroundings, and modifying its behavior based on this information [3]. Context awareness plays a
significant role in MSNs because it allows for interpreting various contexts such as temporal, emergency
and computational contexts coming from the battlefield based on information regarding the current state of
the object movement and the state of the environment. Context-aware sensing is an integral part of the
MSNs design to achieve the ultimate goal of long-term pervasive enemy battle field monitoring.
This paper proposes a Context Aware Agent based Military Sensor Network (CAMSN) to form an
improved infrastructure for multi-sensor image fusion. It considers contexts driven by a node and sink. The
contexts such as general and critical object detection are node driven where as sensing time (such as day or
night) is sink driven. The agencies used in the scheme are categorized as node and sink agency. Each
agency employs a set of static and mobile agents to perform dedicated tasks. Node agency performs
context sensing and context interpretation based on the sensed image and sensing time. Node agency
comprises of node manager agent, context agent and node blackboard (NBB). Context agent gathers the
context from the target and updates the NBB, Node manager agent interprets the context and passes the
context information to sink node by using flooding mechanism. Sink agency mainly comprises of sink
manager agent, fusing agent, and sink black board. A context at the sensor node triggers the fusion process
at the sink. Based on the context, sink manager agent triggers the fusing agent. Fusing agent roams around
the network, visits active sensor node, fuses the relevant images and sends the fused image to sink. The
fusing agent uses wavelet transform for fusion.
1.1Related works
Some of the related works are as follows. The focus of article [4] is on the military requirements for
flexible wireless sensor networks. Based on the main networking characteristics and military use-cases,
insights into specific military requirements for flexible wireless sensor networks are discussed. The article
structures the evolution of military sensor networking devices by identifying three generations of sensors
along with their capabilities. Existing developer solutions are presented and an overview of some existing
tailored products for the military environment is given. The work presented in [5] investigates the design
tradeoffs for using WSN for implementing a system, which is capable of detecting and tracking military
148
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
targets such as tanks and vehicles. Such a system has the potential to reduce the casualties incurred in
surveillance of hostile environments. The system estimates and tracks the target based on the spatial
differences of the target object signal strength detected by the sensors at different locations. The work
depicted in paper [6] proposes to use the mobile agent paradigm for reducing and aggregating data in planar
sensor network architecture. Mobile agents can be used to greatly reduce the communication cost,
especially over low bandwidth links, by moving the processing function to the data rather than bringing the
data to a central processor.
The work given in paper [7] describes the use of the mobile agent paradigm to design an improved
infrastructure for data integration in distributed sensor network (DSN). Instead of moving data to
processing elements for data integration, as is typical of a client/server paradigm, it moves the processing
code to the data locations. This saves network bandwidth and provides an effective means for overcoming
network latency, since large data transfers are avoided. The work given in [8], describes the image
transmission problem in sensor networks. It pre-processes the images in the sensors before sending them to
the server, but this preprocessing requires extra energy in the sensors. In [9], a hierarchical multi-quality
image fusion method based on region-mapping is proposed to improve quality of the image. Camera view
is divided into regions according to mapping relation and the structured deployment of nodes. The methods
of motion attention analysis and nearest neighbor sampling are also adopted to optimize the local attention
region of the image. The fusion method is analyzed and verified to improve the quality of the monitor
image with no need for more energy and bandwidth. The work presented in [10] gives architecture to
implement scene understanding algorithms in the visual surveillance domain. The main objective is to
obtain a high level description of the events observed by multiple cameras not to fuse the tracking
information. In [11], authors present a visual sensor network system with overlapped field of views,
modeled as a network of software agents. The communication of each software agent allows the use of
feedback information in the visual sensors, called active fusion. The work limits only to indoor scenario
only.
1.2Our Contributions
However most of the related works focus on how to solve different visual sensor problems, there are few
works that focus on building a software architecture which allows a context aware wireless visual sensor
network, where agents and wavelet transform can be applied to take active part in the fusion process. Our
contributions in this paper are as follows: 1) contexts are gathered from the target (sensor node) as well as
generated at the sink, 2) several static agents are defined for gathering and interpretation of the context, 3)
militant activities can be monitored using the proposed MSNs, 4) used mobile agents to perform several
tasks that aid information processing, fusing, etc., in asynchronous fashion, 5) based on the context,
low/high resolution image fusion is employed by changing agent code, 6) embedding wavelet code in the
agents for fusing images, 7) fuses only images from active sensor nodes, and 8) reduces communication
overheads and energy.
The rest of the paper is organized as follows. In section 2, we present context aware computing. Section 3
depicts the wavelet based multi-sensor image fusion. Section 4 describes context aware based information
fusion. Section 5 presents the simulation model and performance metrics. Section 6 explains results and
section 7 concludes the work.
2.Context Aware Computing
Context is any information that can be used to characterize the situation of an entity. An entity is a person,
place, or object that is considered relevant to the interaction between a user and an application, including
the user and applications themselves. In other words, any information that depicts the situation of a user can
be entitled context. This would include the number of people in the area, the time of day, and any devices
the user may employ. One can however distinguish between those contextual characteristics that are critical
149
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
to the application versus those that may be relevant but are not critical. Within computing applications,
there are three major context categories of interest: user context, computing resources, and environmental
aspects. Orthogonal to this view, context can be explicit (that is, information provided directly by the user)
or implicit (derived from on one hand sensors, on the other hand from an analysis of user behavior).
In previous decades, a narrow aspect of user context, the user preferences in terms of search and retrieval of
data was denoted in the database community with the concept of views. Today, user context is considered
far more broadly and includes user interests, goals, social situation, prior knowledge and history of
interaction with the system. Thus, the dimension of time may also be included in the user’s context.
``Context information may be utilized in an immediate, just in time, way or may be processed from a
historical perspective’’ [12, 13]. Environmental contextual aspects include (but are not limited to) location,
time, temperature, lighting conditions, and other persons present. Note that there is some ambiguity in the
literature in the use of the term environment, which can refer to the computing environment as well as the
actual physical environment [14,15,16,17] of the user. Context information is often acquired from
unconventional heterogeneous sources, such as motion detectors or GPS receivers. Such sources are likely
to be distributed and inhomogeneous. The information from these sensors must often be abstracted in order
to be used by an application; for example, GPS data may need to be converted to street addresses. Finally,
environmental context information must be detected in real time and applications must adapt to changes
dynamically.
To monitor the environment for changes and to adapt the behavior of the node to the current environment
CAC can be used. The applications and protocols need not be aware of the environment at all, but rather
focus on taking care of the tasks they have been designed for in the first place. As the network environment
changes, the node must be able to rapidly adapt to the new situation. In this work, context image sensor
nodes are configured based on the context. In order to reduce the communication overhead, we consider the
wavelet based image fusion in WSNs.
3.Wavelet Based Multi Sensor Image Fusion
In this section, we describe the wavelet transform and wavelet based image fusion.
3.1Wavelet Transform
Wavelets are mathematical functions that cut up data into different frequency components, and then study
each component with a resolution matched to its scale. They have advantages over traditional Fourier
methods in analyzing physical situations where the signal contains discontinuities and sharp spikes.
Wavelets were developed independently in the fields of mathematics, quantum physics, electrical
engineering, and seismic geology. Interchanges between these fields during the last decade has led to many
new wavelet applications such as image compression, turbulence, human vision, radar, and earthquake
prediction. The wavelet transform has become a useful computational tool for a variety of signal and image
processing applications. For example, the wavelet transform is useful for the compression of digital image
files, smaller files are important for storing images using less memory and for transmitting images faster
and more reliably. Wavelets are functions that satisfy certain mathematical requirements and are used in
representing data or other functions. Wavelet algorithms process data at different scales or resolutions [20,
21, 22, 23].
3.2Image Fusion
Image fusion is the processing of images about a given region obtained from different sensors by a specific
algorithm, so that the resultant image is more reliable, clear and more intelligible. Image fusion can take
150
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
place on pixel-level, feature-level, and decision-level. Pixel-level image fusion is the basic for other levels
and multiresolution image fusion based on multi-scale decomposition is a main research branch in it.
Figure 1: Sub band coding, Figure 2: Image Fusion using DWT
The 1-D wavelet transform can be extended to a two-dimensional (2-D) wavelet transform using separable
wavelet filters. With separable filters the 2-D transform can be computed by applying a 1-D transform to all
the rows of the input, and then repeating on all of the columns. The wavelet transforms of the input images
are appropriately combined, and the new image is obtained by taking the inverse wavelet transform of the
fused wavelet coefficients. An area-based maximum selection rule and a consistency verification step are
used for feature selection. The original image of a one-level (K=1), 2-D wavelet transform, with
corresponding notation is shown in figure 1.
The 2-D subband decomposition is just an extension of 1-D subband decomposition. The entire process is
carried out by executing 1-D subband decomposition twice, first in one direction (horizontal), then in the
orthogonal (vertical) direction. For example, the low-pass subbands (Li) resulting from the horizontal
direction is further decomposed in the vertical direction, leading to LLi and LHi subbands. To obtain a two-
dimensional wavelet transform, the one-dimensional transform is applied first along the rows and then
along the columns to produce four subbands: low-resolution, horizontal, vertical, and diagonal. (The
vertical subband is created by applying a horizontal high-pass, which yields vertical edges.) At each level,
the wavelet transform can be reapplied to the low-resolution subband to further decorrelate the image.
Figure 3 depicts the image fusion using DWT. DWT is first performed on each source images, then a
fusion decision map is generated based on a set of fusion rules. The fused wavelet coefficient map can be
constructed from the wavelet coefficients of the source images according to the fusion decision map.
Finally the fused image is obtained by performing the inverse wavelet transform. When constructing each
wavelet coefficient for the fused image, we have to determine which source image describes this coefficient
better. This information will be kept in the fusion decision map. The fusion decision map has the same size
as the original image. Each value is the index of the source image which may be more informative on the
corresponding wavelet coefficient and thus, make decision on each coefficient.
Assume that node i and node j have the common information to be sent to the sink node. In order eliminate
the common information between the neighboring nodes, a fusion process is adopted. Multi sensor image
fusion using wavelet transform is described as follows (1) and (2).
The fused image is given by (3)
151
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
where, fi(x,y): Image of sensor node i, f j(x,y): Image of sensor node j, fij(x,y): Fused Image of sensor node
i and sensor node j, Fi(u,v): Node i image in transform domain, and Fj(u,v): Node j image in transform
domain.
4.Context Aware Based Image Fusion
The scheme comprises of three phases: context gathering, context interpretation, and image fusion. Context
gathering - contexts are gathered from the target, i.e., sensed image and time from the target, and stored in
the node for a short period until its interpretation is done. Context interpretation sensed images are
compared with previous image and set of critical image features (weapons, explosives, enemy, etc.) stored
at the node. If image analysis yields some general or critical object feature existence, information fusion
process is invoked. Information fusion- relevant images from active sensor nodes corresponding to object
existence are fused to get a clear picture of the object and make some decisions.
Image fusion can classify into two types namely low resolution image fusion and high resolution image
fusion. Low resolution image fusion is used for contexts like general object detection, and general image
gathering by sink. High resolution image fusion is done for contexts such as critical object detection, image
gathering in night time by sink. During nights, it is better to monitor the target periodically by the deployed
MSN since lighting condition is poor and possibility of enemy attack, militant activities, etc,. are high. Sink
driven image fusion is based on the time of sensing, available network bandwidth and sensor node battery.
Static and mobile agents are employed to perform the fusion process. The scheme assumes that an agent
platform is available in the nodes of WSNs. However, if an agent platform is unavailable, the agent
communicates by traditional message exchange mechanisms such as message passing method. Several
agencies exist at each of the nodes based on their role in MSN, which will be discussed in this section.
Following are the assumptions made in proposed work.
1. Context Interpretation is based on the image detection. Image detection is not in the scope of this
work.
2. Based on the lighting condition, camera of the sensor node automatically configures itself to get
the better quality images.
3. Flooding protocol is used to pass the context information to the sink node [25].
4. Geographical routing protocol is used by mobile agent to reach the active sensor nodes [26].
5. Low and high resolution image fusion code is used to fuse the images.
This section presents system environment and the agencies at the sensor and sinks nodes.
1.1 System Environment
Sensor node comprises of static sensor nodes and sink nodes (also called as end nodes that require
information). A sensor node is said to form a cluster around it based on the communication range. Each
cluster will have cluster head node. Figure 3 depicts the WSN environment. A sensor node may have
several channels with different sensory devices connected to each of them. Sensor nodes are geographically
distributed and periodically collect measurements of different modalities such as acoustic, seismic, and
infrared from the environment. Every sensor node of WSN has predetermined value of the signal strength.
Once the information is sensed by sensor node, it compares the information signal strength with
predetermined value, if it is greater (if the deviation is more), a message is sent to its cluster head saying
that it is an active node.
The signal energy from each channel can be detected individually and processed in the analog front end.
The amount of signal energy that reaches an individual sensor is an effective indicator of how close the
node is to a potential target. Once the signal is captured and pre-processed by a sensor node, the strength
152
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
level of the detected signal is broadcast (through an omni directional antenna) to its cluster nodes if it
greater than some predefined value.
Figure 3: Distributed Sensor Network with Three Clusters
1.2 Agent Technology
The traditional programming paradigm uses functions, procedures, structures and objects to develop
software for performing a given task. This paradigm does not support development of flexible, intelligent
and adaptable software’s, and also does not facilitate all the requirements of Component Based Software
Engineering (CBSE) [27,28]. In recent developments, agent technology is making its way as a new
paradigm in the areas of artificial intelligence and computing, which facilitates sophisticated software
development with features like flexibility, scalability and CBSE requirements [29,30,31].
Agents are the autonomous programs situated within an environment, which sense the environment and act
upon it to achieve the goals. Agents have special properties such as mandatory and orthogonal properties.
The orthogonal properties provide strong notion of the agents [32, 33, 34]. The mandatory properties are as
follows: autonomy, decision-making, temporal continuity, goal oriented. The orthogonal properties are as
follows: mobility, collaborative, learning. A mobile agent platform comprises of agents, agent server,
interpreter and transport mechanisms. We classify the agent technologies as single-agent systems and
muti-agent systems. In the context of single-agent systems Local or user interface agents and Networked
agents can be identified, while in the area of multi-agent systems DAI (Distributed Artificial Intelligence)-
based agents and Mobile agents can be distinguished. In single-agent systems, an agent performs a task on
behalf of a user or some process, while performing a task; the agent may communicate with the user as well
with local or remote system resources. In contrast, the agents in multi-agent systems (MAS) may
extensively cooperate with each other to achieve their individual goals, and also may interact with users
and system resources.
1.3 Image Signal Strength
Image signal strength is measured by estimating the difference between previous image and present image
stored at the sensor node. To measure the change in the image, entropy of the difference image between the
present and previous image is taken. The notion of entropy may be used to estimate the information
content. For an image, the simplest idea is to create these states that correspond to the possible values in
which all pixels are involved. The image entropy would be given by [35]:
153
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
Where Pk is the probability of gray level k, k=0,1,2,3,…,255, assuming an 8-bit image. Equation (4)
represents the information content of an image. If a change in an image takes place, the entropy, H, changes
as well. Otherwise no change is detected. Firstly, subtract the previous image from a sensed image to obtain
the features which is given by (5).
Where Ij is the present image, I0 is the previous image of the node. Entropy is then applied to measure the
change in information. This step provides the image signal strength estimation, which is expressed by
equation (6).
Where Pj is difference image and H denotes entropy. Only the gray scale information of the images is used
to calculate the image entropy. A threshold signal of the image is considered to find out the required signal
strength where it is defined as the amount of information change from present to the previous image. This
facilitates to decide the active mode of a sensor node. If Pj is greater than threshold, then that node is
considered to be active otherwise inactive.
1.4 Fused Image Transmission Model
Let R1, R2, R3,....... Rk be the sensor nodes deployed in the field, and
is Fusion Factor, and N1 is the Fused
Image at R1 and later fuses with image from other nodes, i.e., shown in equation (7).
Figure 4 shows the network path representation. We assume that most of the sensor nodes carry the similar
images therefore instead of sending the individual images from each of the sensor nodes, the images are
fused in order to remove the redundancy and fused image fij(x,y) is being sent to the sink node.
Figure 4: Network Path Representation
Agent carries the fused images from node to node depending on its given itinerary or chosen itinerary.
Total transmission load, TLoad can be given by (8).
where, hc: Number of hops required to transmit the fused image to sink node, mal: Total number of packets
required to transmit the image and fusion code and TLoad: Transmission Load.
154
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
1.5 Agencies
Each node in MSN comprises of an agent platform and the proposed agent information fusion model. The
sensor nodes and sink node comprises of the node agency and sink agency respectively. Here we describe
both the agencies.
1.5.1 Node Agency
Node agency comprises of static agents and a node blackboard (NBB) for inter agent communication.
Agents are Node Manager Agent (NMA) and Context agent (CA). The agency is depicted in figure 5.
Node Manager Agent (NMA): This agent resides in all the sensor nodes of MSN. It creates context
agent and NBB and is responsible for synchronizing the actions of the agents within themselves and outside
world/agents. CA senses the image and updates the NBB periodically with image, capture time and image
signal strength. NMA compares the sensed image with previous image and set of critical images residing
in NBB and interprets the context. In sleep mode, NMA does not transmit any information to sink. The
agent also monitors the battery life; if battery is exhausting, sends the status of the battery to its sink node.
NMA sends information of the node such as node id, geographical information, context, and signal strength
information to the sink node, if and only if it has a signal strength above the predefined threshold set by the
sink (varies with time and critical situations).
Node black Board (NBB): This knowledge base is read and updated by the agents. NBB comprises of
node id, active mode /sleep mode, sensing time, previously sensed image, set of critical images, bandwidth
required to transmit in the available bandwidth, image signal strength and geographical status, and location
of the node. Critical images comprises of images of weapons, explosives, enemy dresses, etc. Figure 6
depicts the sample NBB at 11.13AM, when the CA senses the image and updates the NBB. The object is
detected to be a context-general object (Cgo).
Figure 5: Node Agency Figure 6: Node Black Board
Context Agent (CA): It gathers the context from the target such as time of sensing the image and
updates the NBB periodically. It interacts with NMA regarding the updating of the NBB. The agent is in
direct contact with the sensor. It can be also triggered as and when required (aperiodic) based on the need
of information by the sink.
155
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
1.5.2 Sink Agency
The sink agency comprises of static, mobile agents and sink black board (SBB). Agents employed are
Fusing agent (FA), and Sink Manager Agent (SMA) which are mobile and static, respectively. Sink agency
is shown in figure 7.
Sink Manager Agent (SMA): This agent resides in the sink node of MSN. It creates fusing agent and
SBB and is responsible for synchronizing the actions of the agents within themselves and outside
world/agents and monitors and updates the SBB continuously. It is responsible for the image fusion
process. SMA gets fused images from the target in two ways: 1) based on the sensor node context (context
driven) and 2) whenever user seeks (sink driven) fused information. SMA retrieves active sensor node's
geographical locations information from the SBB, generates the optimum routes using standard WSN
geographical routing protocol as and when required. Based on the context or as and when user needs the
information, SMA triggers FA with the necessary fusion code, forward and reverse route. The fused image
is given to the user monitoring the network either by alert alarm or updated in the user database of images.
Fusing Agent (FA): It is a mobile agent equipped with image fusion code (low/high resolution based on
the context) that migrates from one to another active node depending on the routing information provided
by the SMA. Whenever it visits active nodes, fuses the image, and moves to another active node along
with the fused image. The agent repeats fusion until it visits all active nodes. After completion of the fusion
process, FA sends the fused image to the sink node using reverse route specified by SMA.
Sink Black Board (SBB): It is the knowledge base that can read and updated by SMA. It stores the
information about the node id, signal strength, context information, time of sensing, image signal strength,
bandwidth required to transmit the image of each active node, available network bandwidth, and
geographical locations of the active nodes. Sample contents of SBB is shown in the figure 8 (using 1 as the
sink node).
Figure 7: Sink Agency
Figure 8: Sink Black Board
1.6 Agency Algorithm
In this section we discuss the node and sink agency algorithms.
1.6.1 Node Agency Algorithm
Nomenclature:x,y: index value of the image, D(x; y) = Difference image,C(x; y)= Critical image, P(x; y)=
Present image, B(x; y)= Previous image, Cgo= General object context, Cco= Critical object context, i: index
value of the critical images, , N _N: Size of the image,and H: Entropy operator, H1;H2=Entropy of present
and previous images, Tth= Threshold of image signal strength, Pth =Percentage of similarity between
previous and present image, and Nstatus= Node status, Ncriim= Number of critical images.
156
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
Begin
1. CA gathers the image and time of sensing
2. NMA gets the context information and does the interpretation
For x= 1 to N do,
For y= 1 to N do,
H1=H(P(x,y));
H2=H(B(x,y));
endfor
endfor
Pth = (H1/H2)X100;
NMA updates the Pth to NBB;
if(Pth > Tth)
Nstatus = Active;
NMA updates the node status to NBB;
1. else
Nstatus = Inactive;
Delete the image from NBB;
NMA updates the node status to NBB;
Go to (4);
For i= 1 to Ncriim,
For x= 1 to N do,
For y= 1 to N do,
D(x,y)= Pim(x,y) - Bim(x,y);
if(Di(x,y) = =Ci(x,y)) Then,
Context= Cco;
else
endfor
context =Cgo;
endfor
endfor
3. NMA updates the context information to NBB;
4. Stop
End
CA gathers the context such as image and sensing time and updates the NBB. NMA finds the similarity
between the previous and present image by taking the entropy ratio of them. The percentage of similarity
ratio compared with Tth, if it is greater than the threshold value then node is assigned with active status
otherwise inactive status is assigned. If the node is inactive then present image is deleted from NBB. The
D(x,y) is compared with set of critical images, C(x,y) of the node and if any critical object is found, then it
is assigned with Cco, else Cgo. NMA also finds the entropy of the difference image and compares with
threshold signal strength of an image, if it is greater; than status of the node is stored as active else status of
the node is stored as inactive. NMA updates the context information to NBB and sends it to the sink node
by using the flooding mechanism. In flooding mechanism message is sent from node to node until it
reaches the sink node.
4.6.2 Sink Node Agency Algorithm
Nomenclature:F(x,y) = Fused Image, N(x,y)= Active node Image, Nactive= Number of active nodes Cgo=
General Object Context, Cco= Critical Object Context, Rtable= Routing table to reach active sensor node, i=
157
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
index value of the active nodes, x,y= index value of the node image, Fgocode= General objection detection
image fusion code, Fcocode= Critical objection detection image fusion code NXN= Size of the image
.
Begin
1. SMA gets the context information from SBB;
2. SMA creates FA, and provides the context information;
3. Based on the Context FA gets the fusion code and routing table
if (context= = Cgo) Then,
FA gets the Fgocode and Rtable;
else
FA gets the Fcocode and Rtable;
4. Along with fusion code and routing information, FA visits active sensor nodes for fusion
F(x,y)=0;
For i=1 to Nactive
For x= 1 to N do,
For y= 1 to N do,
F(x,y)= F(x,y) + Ni(x,y);
endfor
endfor
endfor
5. FA sends the fused image to the sink node;
6. FA is disposed;
7. Go to (1) as and when the user seeks the information and repeat the process;
8. stop;
End
Whenever the SMA gets the context information or user seeks information, it creates the FA, based on the
context; FA retrieves low/ high resolution fusion code. With fusion code FA visits all the active sensor
nodes to fuse the images, and returns with fused image to the sink node. Fusion of images is done using
DWT, which is discussed in the section 3.2. For simplicity, in the sink agency algorithm fusion has
considered to be an addition operation.
4.7 Agent Interaction
Context based image fusion system agent interaction sequence is depicted in figure 9, which provides a
detailed view of the image fusion by agents in a MSNs. The numbers shown on the directed arcs denotes
the action number in the sequence of interactions that takes place.
158
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
Figure 9: Information Fusion System Agent Interaction
The interaction sequence is as follows:
1. CA of the active sensor nodes gathers the context namely sensing time and image. NMA compares
the sensed image with the previous and set of critical images of the node and interprets the
context.
2. NMA sends the context information into the sink by using the flooding protocol.
3. NMA updates the context information to SBB.
4. SMA gets the context information, creates the FA, along with fusion code (low/high resolution)
FA visits the first active node and fuses the image and migrate to the next active node and
continue the process till it visits all the active nodes.
5. FA returns to sink node along with fused image.
6. During night time, as and when user requires fused information, SMA generates the FA agent and
sends it for the fusion.
7. FA returns with fused image to sink node. Fused image will be sent to the military base camp
through the Internet or satellite.
5. Simulation model and performance metrics
We have carried out the simulation of the context aware image fusion using multi-agents for MSNs. The
proposed model has been simulated in various network scenarios on a Pentium-4 machine by using
MATLAB tool for the performance and effectiveness of the approach.
Simulation Model
Proposed scheme is simulated in various network scenarios to access the performance and effective of an
approach. Simulation environment comprises of six models namely network model, Channel Model,
Propagation model, Battery model, CAC model, and information fusion model. These models are described
as follows.
1. Network Model:
We considered simulation area of A X B sq meters with LOC scenario. A MSN consists of num static
nodes that are placed randomly within the given area. MSN have communication radius, r mts, and
network bandwidth, net_BW. Fcode kbytes wavelet based image fusion code roams around the network.
159
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
2. Channel Model
The communication environment is assumed to be contention-free (e.g., a media access scheme such as
time division media access (TDMA) may be assumed). The transmission of packets is assumed to occur in
discrete time. A node receives all packets heading to it during receiving interval unless the sender node is in
off state. For simplicity, we have considered the channel to be error free. The characteristics of sensor
networks and applications motivate a MAC that is different from traditional wireless MACs such as IEEE
802.11 in almost every way: energy conservation and self-configuration are primary goals, while per-node
fairness and latency are less important. Sensor MAC protocol (S-MAC) uses different techniques to reduce
energy consumption and support self-configuration. To reduce energy consumption in listening to an idle
channel, nodes periodically sleep. Neighboring nodes form virtual clusters to auto-synchronize on sleep
schedules. Simulation environment uses the S-MAC protocol.
3. Propagation model
Free space propagation model is used with propagation constant β. Transmission range of WMSN node
communication radius is r for a single-hop distance d. It is assumed that at any given time, the value of
transmitted power is NPow milliwatts for every node.
4. Battery model
In MSN, image sensor nodes are deployed in the battle field, recharging of the nodes at the target is
difficult. So, we have used a solar cell recharging model [36] and a layered clustering model to deal with
the restrict energy consumption under the consideration of visual quality. The system lifetime can be
prolonged by rechargeable solar cell that can be recharged by solar panel in daytime. Image sensor nodes
consumes node-batt millivolts (day, non critical information= less, day critical information= medium, and
night=more) to sense an image.
5. CAC Model
Various contexts considered are: General object detection context, Critical object detection context and
night detection context. The images and their respective contexts are stored in the knowledge base of each
sensor. Contexts are randomly generated by assigning a number such that 1= General object detection, 2 =
Critical object detection, 3 = Time (night or poor lighting condition) context.
6. Information Fusion Model
We are using two information fusion methods namely context driven image fusion and user driven image
fusion. Context driven fusion uses low resolution image fusion or high resolution image fusion. User/sink
driven image fusion uses the high resolution image fusion. Each of the sensor node is associated with
battery of node-batt millivolts. It is assumed that 1 millivolt is decremented for every usage
(transmission/processing). k number of active nodes are randomly chosen as active nodes from num nodes.
Set of critical images, present and previous images are stored in the node. Size of the gray images stored at
each of the sensor node is fixed. The fixed gray scale image of size rows X columns, 8 bits/pixel is assigned
to each of the active sensor node. Th, is the percentage of the threshold image signal strength.
5.1 Simulation Procedure
To illustrate some results of the simulation, we have taken A = 100, B =200 sq meters and N=1 to 5, num=5
to 15, netBW=40mbps, node_batt=90 millivolts, Th= (50%, 60 %, 70 %), Gray scale image of varying size
rows_columns=(32X32; 64X64; 128X128; 256X256), (8,12,16,24) bits/pixel, time of sensing (Tsensing=
(8AM, 11.30AM,5PM, 7PM), Pth= Present Signal strength (30%,50%,60%,70%), communication radius
r=10 mts , netBW= 4MBPS, Propagation Constant β =3.5, and Fcode = (4 , 8, 12) Kbytes. Each of the
simulation executes in varying seconds.
160
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
Begin
• Generate the WMSN for the given radius and number nodes.
• Apply the proposed context aware fusion model.
• Compute the performance of the system.
End
Performance parameters considered in the simulation are as follows.
1. Node Battery Usage: It is defined as the battery depleted with the usage of a node.
2. Dropping rate: It is defined as the number of packets missed during the transmission of packets
(Equation 9), i.e., it is a ratio of packets dropped to packets sent.
1. Fusion time: It is the total time required by the FA to fuse the images from active sensor nodes.
2. Bandwidth Requirement: It is the amount of bandwidth required to transmit the image to sink
node, i.e., it is a ratio of image size to available bandwidth. It is given by (Equation 10)
(9)
3. Throughput: It is the ratio of Image packets (data) received to the image packets sent and is given
by (Equation 11).
=
(11)
4. Mean Square Error: It is defined as the standard deviation of the difference image between the
ideal and standard image.
5. Agent Overhead: It is the additional code which acquires the communication channel. It is given
by (Equation 12).
(12)
6. Results
In this section, we discuss the various results obtained through the simulations. The results include node
battery usage, dropping rate, throughput, fusion time, bandwidth requirement, agent overhead and mean
square error.
6.1 Node Battery Usage
The life time of the sensor node mainly depends on the battery life time and its power. Sensor nodes will be
active whenever the sensor nodes have the information otherwise nodes status will be inactive (sleep
mode). In active mode of the sensor node, sensor nodes consume more power and in inactive mode, a node
consumes less power. This is evaluated by choosing the one sensor node of WSN for repeated simulation.
For each of the simulation, sensor node sends the varying number of packets. We observe from the figure
10 that the battery life decreases as the number of packets sent by the sensor node increases.
161
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
Sensor nodes require more power to transmit the critical and dark images which are of large size (better
resolution) as compared to day time image. During day time, only low resolution images are to be sent to
the sink node that needs less power. From figure 11, we can notice that power consumed by each of the
sensor node to transmit the day time, non critical image is less as compared to the critical dark images.
Figure 10: Battery in Milli Volts Vs. Number of times node used, Figure 11: Power in Milli watts Vs.
Number of times node used
6.2 Dropping Rate
During the transmission of the image packets in the network, some packets may not reach the sink node.
Dropping rate depends on the number of packets dropped. From figure 12, we can notice that dropping rate
increases as there is increase in the number of nodes and decrease in signal strength value (Th).
Figure 12: Dropping Rate Vs No. of Active Nodes, Figure 13: Fusion Time in milliseconds Vs. No. of
Active Nodes
6.3 Fusion Time
Since the sensor nodes have less processing capability, mobile agent requires more time to fuse the image
from all the active nodes.
162
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
If there is day time and non critical images in all the active nodes, then all the active nodes information has
to be fused and sent to the sink node which needs less time as we use low resolution image fusion
technique and better lightning condition. In case of critical object detection context, if the lighting condition
is poor, we use high resolution image fusion method which needs more time for fusion. From the figure 13,
we depict that for critical images as the number of nodes and Th increases, the fusion time also increases.
We can notice that fusion time required for the noncritical object detection context is less compared to the
noncritical object detection context.
6.4 Bandwidth Requirements
We allocate 8 or 12 bits/pixel for the low resolution image. For high resolution image, we allocate 15 or 24
bits/pixel depending on the availability of the bandwidth. For critical and dark images, we allocate more
number of bits compared to the general object detection context images.
6.5 Throughput
Throughput depends on number of image packets sent and received. In this paper, we have considered the
gray scale image. While transmitting the image, it is divided into packets and sent. The figure 16 shows
that it decreases with increase in the image size
Figure 15: BW Vs. Size of the image, Figure 16: Throghput Vs. Image size.
6.6 Agent Overhead
Agent overhead depends on the size of agent. Fusing agent has to carry image along with the wavelet based
image fusion code. Agent code is extra overhead to the communication channel. Figure 17 shows that as
the image size increases, the overhead decreases, as the same size agent is used for handling small as well
as large size image. We can also observe, as the size of the agent increases agent overhead also increases.
163
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
Figure 17: Agent Overhead Vs. Image Size, Table 1: MSE for different Wavelet Bases
6.7 Mean Square Error
We have also analyzed the performance of the image fusion in terms of mean square error (MSE) ρ for
different wavelet bases such as biorthogonal, db, haar, and Mayer. ρ is defined as the standard deviation of
the difference image between the ideal and standard image (See table 1).
7. Conclusion
This paper proposed a context aware agent based distributed sensor network (CADSN) to form an
improved infrastructure for multi-sensor image fusion to monitor the militant activities. The proposed work
is based on context aware computing which uses software agents for image fusion in WMSN. In an
environment where source nodes are close to each other, and considerable redundancy exists in the sensed
data, the source nodes generate a large amount of traffic on the wireless channel, which not only wastes the
scarce wireless bandwidth, but also consumes a lot of battery energy. Instead of each source node sending
sensed images to the sink node, images from the different active nodes are fused and sent to sink node by
using mobile agent. The use of agents facilitates the following: 1) asynchronous operation, i.e., does not
require a continuous connectivity between source and sink, 2) flexibility to change the embedded code to
perform context/user driven fusion, 3) adaptability to varying network conditions and the environment for
image fusion, 4) ease of maintenance since the code can be debugged and upgraded independent of other
agents in the system, 5) reusing of the code is possible by other applications with slight modifications and
put in the system, thus enables dynamic software architecture.
However, there are some issues to be questioned in the proposed scheme, which can be taken up as further
work: security in information fusion by mobile agent, standard agent framework supporting persistence and
security to agents, tackling the active node failures during agent's fusion process?, positioning of the
cameras concerned to images to be fused, and security to the sensors. Furthermore, we are planning to
employ cognitive agents to tackle the aforesaid questions.
164
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
ACKNOWLEDGMENTS
We are thankful to Visvesvaraya Technological University (VTU), Karnataka, INDIA for sponsoring the
part of the project under VTU Research Grant Scheme, grant no. VTU/Aca/2009-10/A-9/11624, Dated:
January 4, 2009.
References
[1] M. Rahimi, “Cyclops: In Situ Image Sensing and Interpretation in Wireless Sensor Networks’’, Proc. ACM Conf.
Embedded Networked Sensor Sys., San Diego, CA, Nov. 2005.
[2] I. Akyildiz, T. Melodia, and K. R. Chowdhury,” A survey of wireless multimedia sensor networks”, The
International Journal of Computer and Telecommunications Networking, Vol.51, No.4, pp. 921-960, 2007.
[3] A. Krause, D. Siewiorek, A. Smailagic, and J. Farringdon, “ Unsupervised, dynamic identification of physiological
and activity context in wearable computing”, IEEE, Proc. 7th International Symposium on Wearable Computers, pp.
88-97, 2003.
[4] MichaelWinkler, Graeme Barclay,Kester Hughes , “Theoretical and practical aspects of military wireless sensor
networks”, Journal of Telecommunications and Information Technology (JTIT), February, 2008
[5] Tatiana Bokareva,Wen Hu, Salil Kanhere, “Wireless Sensor Networks for Battle field Surveillance”, Land Warfare
Conference, Brisbane, 2006
[6] Taekyoung Kwon, Yong Yuan, and Victor C.M. Leung, ”Mobile Agent Based Wireless Sensor Networks”, Journal
of Computers, Academy Publishers, Vol. 1, No. 1, April,2006
[7] H. Qi, S.S. Iyengar and K. Charabarty, “ Multi-Resolution Data Integration using Mobile Agents in Distributed
Sensor Networks”, IEEE-Systems Man Cybernetics, Vol. 31, No. 3, pp. 383-390, August 2001
[8] King-Shan Lui and Edmund Y. Lam, “.Image transmission in sensor networks”, IEEE Workshop on Signal
Processing Systems, pp. 726-730, November 2005.
[9] Minghua Yang,Yuanda Cao ,Li Tan ,Changyou Zhang ,Jiong Yu, “A new multi-quality image fusion method in
visual sensor network”, Third International Conference on Intelligent Information Hiding and Multimedia Signal
Processing, IIHMSP, Vol. 2, pp.667 - 670, 2007.
[10] J. Orwell, S. Massey, P. Remagnino, D. Greenhill, and G. A. Jones,” A multi-agent framework for visual
surveillance”, IEEE, Proc. 10th International Conference on Image Analysis and Processing ICIAP 99, Washington,
DC, USA, 1999.
[11] Federico Castanedo, Miguel A, Patricio , M. Molina,” A Multi-Agent Architecture to Support Active Fusion In A
Visual Sensor Network”, Second ACM/IEEE International Conference on distributed smart cameras , Stanford
University, California, USA, pp. 1-8, sept., 2008
[12] G. Chen and D. Kotz,.”A survey of context-aware mobile computing”, Technical report 2000-381 , Department of
Computer Science, Dartmouth College, 2000.
[13] A. Dey and G. Abowd,”Towards a better understanding of context and context-awareness”, Technical report,
Georgia Institute of Technology College of Computing 1999.
[14] M. Gaber, S. Krishnaswamy, and A. Zaslavsky,” Ubiquitous data stream mining”, Proc. Eighth Pacific-Asia
Conference on Knowledge Discovery and Data Mining, Sydney, Australia,2004.
165
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
[15] J. Gwizdka, “Whats in the context?”, Proc. CHI 2000 Workshop on the What, Who, Where, When, Why and How
of Context-Awareness, Netherlands, April 1-6,2000.
[16] J. Heidemann, “ Building efficient wireless sensor networks with low-level naming”, Proc. 18th ACM Symposium
on Operating Systems Principles ,Chateau Lake Louise, Banff, Canada, 2001.
[17] J. Hill, R. Szewczyk, A.Woo, S. Hollar, D. Culler, and K.Pister, “System architecture directions for networked
sensors”, Proc. of ASPLOS , pp.93 - 104, Boston, MA, USA, 2000.
[18] W.M.Merrill, K.Sohrabi, ”Open standard Development platforms for distributed sensor networks”, Proc. SPIE,
Unattended Ground Sensor Technologies and Applications Iv (AeroSense), Vol. 4743, pp. 327 - 337,Orlando, FL, April
2002
[19] P.K. Willett, P.F. Swaszek, and R.S. Blum,” The good, bad, and ugly: distributed detection of a known signal in
dependent Gaussian noise”, IEEE Trans. Signal Processing, Vol. no.48, pp. 3266-3279 , Dec. 2000.
[20] H. Li, B.S. Manjunath, and S.K. Mitra, "Multisensor image fusion using the wavelet transforms. Graphical Models
and Image Processing , Vol.57, pp.235-245, 1995.
[21] J.L. Moigne and R.F. Cromp, “ The use of wavelets for remote sensing image registration and fusion”, Technical
Report TR-96-171, NASA , 1996.
[22] N.G. Kingsbury, “The dual-tree complex wavelet transform with improved orthogonality and symmetry
properties”, IEEE International Conference on Image Processing, pp. 375-378, Vancouver, BC, Canada, Sept. 10-13,
2000.
[23] A. V. Sutagundar, S. S. Manvi, S. R. Bharmagoudar,” Wavelet Based Image Indexing and Retrieval”, Proc. IEEE
ICETET, Nagapur,India, 2007.
[24] Sajid Hussain, Abdul w. Martin, “Hierarchical cluster based routing in wireless routing in wireless sensor
Networks”, available at www.cs.virginia.edu/ ipsn06/wip/Hussain-1568986753.pdf.
[25] A. Qayyum, L. Viennot, and A. Laouiti. “Multipoint relaying: An efficient technique for flooding in mobile
wireless networks”, Technical Report 3898, INRIA -Rapport de recherche, 2000.
[26] Yan Yu, R. Govindan and D. Estrin., “Geographical and Energy Aware Routing: A Recursive Data Dissemination
Protocol for Wireless Sensor Networks”, Technical Report UCLA/CSD-TR-01-0023, May 2001
[27] C. Castelfranchi, and E. Lorini, “Cognitive anatomy and functions of expectations”, In Proc. IJCAI03 Workshop
on Cognitive Modeling, Acapulco, Mexico, Aug. 9-11, 2003
[28] M. L. Griss, and G. Pour, “ Development with agent components”, IEEE Computer Magazine, Vol.34, pp.37-43,
2001.
[29] M. S. Kakkasageri, S. S. Manvi, and A. K. Sinha,” Agent based multicast routing in MANETs”, Proc. Thirteenth
National conference on communications, IIT Kanpur, India, pp. 188-192, 2007.
[30] S. S. Manvi, and P. Venkataram,” Applications of agent technology in communications: A review”, Computer
Communications, Vol.27 pp.1493-1508, 2004.
[31] A. V. Sutagundar, S. S. Manvi, M. N. Birje, “ Agent based Location Aware Services in Wireless Mobile
Networks”, Proc. IEEE, AICT, Mauritius, 2007.
[32] T. Magedanz, K.Rothermel and S. Krause, “Intelligent agents: An emerging technology for next generation
telecommunications”, IEEE Proc. Globecom, pp. 464-472, San Francisco, CA, 1996.
[33] V. Oham, and A. Karmouch,” Mobile software agents: An overview”, IEEE Communications Magazine 36, pp.
25-37, 1998.
166
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
[34] A. V. Sutagundar, S. S. Manvi, “Agent based Information Fusion in Wireless Sensor Networks”, Proc. IEEE
TENCON, Hydrabad, India, 2008.
[35] M. Sonka, V. Hlavac, R. Boyle, ” Image Processing Analysis, and Machine Vision” , Brooks/Cole Public cashing
company, second edition, pp.15-23, 1999.
[36] Xiaoming Fan, William Shaw, Ivan Lee,” Layered Clustering for Solar Powered Wireless Visual Sensor
Network”, Ninth IEEE International Symposium on Multimedia (ISM 2007), pp.237-244, Taichung, Taiwan, Taichung,
Taiwan, Dec.10-12, 2007.
Authors
A. V. SUTAGUNDAR completed his M. Tech from Visvesvaraya Technological
University, Belgaum, Karnataka. He is pursing his PhD in the area of Cognitive
Agent based Information Management in wireless Networks. Presently he is
serving as an Assistant Professor of Department of Electronics and
Communication Engineering Bagalkot, Karnataka. His areas of interest include
Signal and system, Digital Signal Processing, Digital Image Processing,
Multimedia Networks, Computer communication networks, Wireless networks,
Mobile ad-hoc networks, Agent technology. He has published 16 papers in
referred National/International Conferences and 4 papers in international journals.
Sunilkumar S. Manvi received M.E. degree in Electronics from the University of
Visweshwariah College of Engineering, Bangalore and Ph.D degree in Electrical
Communication Engineering, Indian Institute of Science, Bangalore, India. He is
currently working as a Professor and Head of Department of Electronics and
Communication Engineering, Reva Institute of Technology and Management,
Bangalore, India. He is involved in research of Agent based applications in
Multimedia Communications, Grid computing, Vehicular Ad-hoc networks, E-
commerce and Mobile computing. He has published about 100 papers in national and
international conferences and 40 papers in national and international journals. He has
published 3 books. He is a Fellow IETE (FIETE, India), Fellow IE (FIE, India) and
member ISTE (MISTE, India ), member of IEEE (MIEEE, USA),
He has been listed in Marqui’s Whos Who in the World.
167
|
cs/9905003 | 1 | 9905 | 1999-05-10T17:07:11 | Collective Choice Theory in Collaborative Computing | [
"cs.MA",
"cs.DC"
] | This paper presents some fundamental collective choice theory for information system designers, particularly those working in the field of computer-supported cooperative work. This paper is focused on a presentation of Arrow's Possibility and Impossibility theorems which form the fundamental boundary on the efficacy of collective choice: voting and selection procedures. It restates the conditions that Arrow placed on collective choice functions in more rigorous second-order logic, which could be used as a set of test conditions for implementations, and a useful probabilistic result for analyzing votes on issue pairs. It also describes some simple collective choice functions. There is also some discussion of how enterprises should approach putting their resources under collective control: giving an outline of a superstructure of performative agents to carry out this function and what distributing processing technology would be needed. | cs.MA | cs |
Collective Choice Theory in Collaborative
Computing
Walter D Eaves
June 20, 2018
Abstract
This paper presents some fundamental collective choice theory for
information system designers, particularly those working in the field of
computer -- supported cooperative work. This paper is focused on a pre-
sentation of Arrow's Possibility and Impossibility theorems which form
the fundamental boundary on the efficacy of collective choice: voting and
selection procedures. It restates the conditions that Arrow placed on col-
lective choice functions in more rigorous second -- order logic, which could
be used as a set of test conditions for implementations, and a useful prob-
abilistic result for analyzing votes on issue pairs. It also describes some
simple collective choice functions. There is also some discussion of how
enterprises should approach putting their resources under collective con-
trol: giving an outline of a superstructure of performative agents to carry
out this function and what distributing processing technology would be
needed.
1 Collective Choice in Information Systems
1.1 Naming Services
1. Windows NT
If one uses a system then, from time to time, one might receive an event
message saying that "The Browser Has Forced an Election..." [MSK99a,
MSK99b].
2. The Internet and the Domain Naming Service DNS
Internet connected systems could not function without the Domain Nam-
ing Service and this too relies upon elections: individual system adminis-
trators choose when their name -- server is to authoritative or not [Wel99,
Ricly] and which name -- servers it will rely upon.
The difference between the two systems is that Windows NT is designed to
manage the naming of relatively small domains and can use a direct election
amongst all its naming components, the browsers. This is represented in figure
1, where the master browser is elected by the itself and the other browsers.
The browsers apply the same fitness criteria in choosing their
master. There can be no conflict in policy.
1
elect
Master
Browser
Browser
Browser
elect
elect
Names
Names
Names
Figure 1: Browser programs choosing a master browser
The Internet's DNS has to rely upon a loosely co -- ordinated database of
name servers. This is represented in figure 2. Here the Administrator of each
DNS chooses which other DNS it will use to resolve names. In this example,
for all names other than their own, the Superior Administrator is chosen as
authoritative.
The Administrators need not apply the same fitness criteria in
choosing their superior DNS. There may be conflicts in policy.
They can therefore attempt malevolent actions collectively if they so wish,
for example:
Consider an electronic commerce web site. The user's web browser
makes a secure connection to the site, providing a protected chan-
nel. If the DNS entry for the server's address was replaced by one
indicating an attacker's address, the browser will connect to the ma-
licious site, possibly without the user's knowledge. In this scenario,
the DNS spoofer could monitor the traffic over the "secure" connec-
tion, since the secure connection would actually be to the spoofer,
and forward the transaction data to the real website or process the
traffic itself [Wel99].
Without human intervention, computer programs have wholly predictable
behaviour and cannot possess ulterior motives: people can. (The problems that
can arise from badly managed networks are described to a much greater extent
in [EFL+97].)
2
Administrator
Superior
Administrator
Administrator
elect
elect
own
own
own
DNS
Superior
DNS
DNS
Names
Names
Names
Figure 2: DNS Administrators choosing a superior DNS
3
But even if computer programs have predictable behaviour they
may not apply the same fitness criteria in making choices. This may
lead to conflicts in policy.
1.2 Groups choosing policies
Most people will have come across moderated newsgroups and mailing lists.
Potentially these services could be made self -- managing and would be simple
examples of a computer -- supported working environments.
1. Joining the Group
A policy decision is needed to determine whether or not an individual
should be allowed to join a particular group and take the rights and priv-
ileges enjoyed by its members. A collective choice, probably by a mem-
bership committee, is made based upon the applicant's credentials.
The procedure is usually carried out using a set of recommendations. The
individual requesting the rights fills in a form stating his credentials. Peo-
ple are assigned to check the applicant's trustworthiness, qualifications and
so forth. If the membership committee is satisfied, someone is instructed
to assign the applicant to the group.
2. Expulsion from the Group
Should the membership committee decide to expel an individual from the
group, that, too, would be a collective policy decision.
A situation that could clearly arise is for a number of individuals to infiltrate
a group, subvert it by having themselves elected to the membership committe
and then expelling all the members of the group who are not sympathetic to
the infiltrators. Of course, those individuals might also do this legitimately, if
the selection of the membership committee reflected the views of the current
membership. What legitimates actions is a wider consensus.
1.3 Lattices and Access Control
Organizing the membership of groups is a sub -- process needed for the formation
of lattices of membership classes for an access control system, first put forward
by Denning in [Den76]. The only provably safe access control systems are those
that are based on Mandatory Access Control, MAC, schemes, also as described
by Denning [Den82].
1.3.1 Operating Systems
Discretionary Access Control, DAC, schemes are used in most multi -- user operat-
ing systems such as VAX -- VMS [Cor84] and Unix [Cur90] and resource -- sharing
operating systems such as Windows NT [Jum98]. These are not as discretionary
as one might think:
• Individual users are allocated to groups
• Privileged User(s): the "super -- user" or "Administrator" set group mem-
berships.
4
It could be described as a dictatorial Discretionary Access Control scheme.
The only latitude that individuals have is to be able to grant or deny access
rights to members of their own group or to everyone. The privileged user can
undo any access control operations performed by any individual.
To use some better terminology: subjects are entities who may possess access
rights and objects are those entities to which subjects have rights to use. An
operating system that uses a MAC scheme is represented in figure 3 and one
that uses a DAC scheme is represented in figure 4.
1. MAC Scheme
This is a simple scheme. The administrator classifies all the subjects and
the objects and it classifies some subjects above other subjects so that
higher subjects can access everything that lower subjects can.
Administrator
classify
classify
classify
classify
Subject
access
Objects
access
Subject
access
Objects
Figure 3: Mandatory Access Control Scheme
2. DAC Scheme
5
This is more sophisticated. The administrator classifies all the subjects
and can denote that they belong to certain a Group. Every subject belongs
to the group of Everyone.
Individual subjects own some objects and can choose to grant access to
• Either: their groups (or groups)
• Or: to Everyone
In
Groups do not own anything and neither can the group Everyone.
figure 4, the object A is owned by one of the subjects and has allowed
access to the group its owner belongs to and to Everyone. The object B
can be accessed by the group, but not by Everyone.
There is degree of autonomny granted to the subjects in that they may
classify objects to be accessible to the members of the groups they belong
to, but they may not choose which group, or groups, they belong to.
Neither may they change ownership of an object they own1.
1.3.2 Database Management Systems DBMS
Some DBMSs have more flexible DACs which allow some individuals to be more
privileged than others by granting them the right to grant rights. This feature
is available in some DBMSs that support the Structured Query Language, SQL,
which was based upon System -- R, which is descibed by Denning in [Den89].
In effect, this is the same as the DAC scheme for operating systems, see
figure 4, but the owner can grant access to subjects other than those in its
group and it can grant to others the right to grant access, but not to those to
whom access has been explicitly denied by the owner.
1.4 General Resource Management Systems
Information processing systems can be thought of as general resource manage-
ment systems and the Open Distributed Processing ODP standards, in par-
ticular the prescriptive model, [ISO95], describe how an enterprise modelling
language could be used to state the relationships between resource owners and
users as behavioural contracts given in terms of a set of permissions, prohibi-
tions and obligations. This can be seen as a generalization of the MAC and
DAC schemes, but the ODP standards are only reference models and each in-
formation system should contain some component that embodies its enterprise
model. This is a wholly new superstructure to an information processing sys-
tem: there are some simple class relationships describing the ODP model set
out in appendix A, these rather vaguely state the information model for the
superstructure. Some mechanisms that could be used for applying policy, im-
plementing the administrators, has already been proposed [Eav99b].
Recently, the Java programming environment has provided a powerful lan-
guage for expressing permissions [SUN98]. However, it assumes the existence
of some agent which would negotiate the contracts between resource owner and
user. There have been only a few efforts made to develop arbitrator agents
which could generate such contracts.
1A POSIX [Lew91] requirement, Unix typically does allow ownerships to be changed.
6
Group
Subject
classify
classify
Administrator
classify
Everyone
belongs-to
own
Objects
classify
belongs-to
classify
Objects
access
A
belongs-to
Group
Subject
belongs-to
classify
own
Objects
access
Objects
B
A
belongs-to
Subject
classify
Objects
own
B
A
e
m
e
h
c
S
l
o
r
t
n
o
C
s
s
e
c
c
A
y
r
a
n
o
i
t
e
r
c
s
i
D
:
4
e
r
u
g
i
F
7
There are some system proposals which attempt to apply abstract behavioural
rules in terms of concrete permissions:
in papers by Minsky [Min89, Min95].
Minsky's treatment is for information processing systems in general, but a pa-
per by Rabitti et al. [RBKW91] describes authorization generation mechanisms
which support a lattice model of authorization policy for an object -- oriented
database. The innovation of the system is that it generates authorization policy
as it operates. Authorization is viewed as having three dimensions:
Expression Authorizations specified by users, which are known as explicit and
those that are derived by the system as known as implicit.
Direction An authorization can be positive, stating what may be done, or
negative stating what may not be done.
Strength An authorization may be strong, in which case it may not be over-
ridden, or weak, in which it can.
This model has been extended [BW94] and a recent contribution by Castano
[Cas97] introduces metrics that can be used to generate concrete permissions
from more abstract specifications, including:
• Operation compatibility
• Individuality similarity co -- efficient
• Authorization compatability
• Semantic correspondence
• Clustering of Individuals
Although Bertino et al. attempt to produce mechanical means of generating
authorization policy no -- one would seriously expect a system to be driven wholly
by mechanical recommendation, it would require choices to be made by people
and, if that is the case, then a suitable collective choice procedure must be
found.
1.5 Summary
Information processing systems are not mechanical systems. They represent
the interests of people and the agents that comprise an information processing
system will require policies that represent people's interests which will be used
in formulating behavioural contracts between agents that own resources and the
agents that use them.
2
Issues in Collective Choice Theory
The principal difficulty in collective choice theory is that if a group of people
have to choose between more than two issues, there is no choice procedure they
can adopt that is not open to abuse. By abuse, it is meant:
• Denial of service: some agent can exercise a veto on any policy proposed.
8
• Enforced service: some agent can force a policy upon others.
An abuse takes the form of insincere behaviour: an agent acts not to fulfil his
own interests, but to prevent others from fulfilling theirs.
This simple example, known as the Voting Paradox might help:
Scenario 2.1 (Denial of Service by Policy Cycle). Three agents, x, y and
z, have to choose between three services: A, B and C. x and y rank sincerely, but
z ranks the policies to prevent x and y from reaching a compromise, i.e. policy
A, see table 1.
Agent
x
y
z
Ranking
A > B > C
C > A > B
B > C > A
Table 1: Policy cycle used to deny service
Just to clarify terminology: an election is an expression of collective choice
and the policy chosen by an election is the outcome of what statisticians might
call a trial. In a trial, there are a number of choices available to each voter, or
individual, taking part. A policy is usually chosen with regard to an issue; the
proposal that a policy should be followed regarding an issue is called a motion.
2.1 Two Policy Issues
This could also be described as a a two outcome trials. These arise when there
are only two policies which can result: the choice is to accept a policy or not.
1. Number of Choices is always three
Although there are two policies, there are three choices: one can vote For
or Against. One may also be given the explicit right to Abstain, and, by
doing so, state that one cannot vote for or against. One may also choose
Not to Vote.
2. Abstentions and Not Voting
Usually in referenda, there is no option to abstain and those who do not
vote are considered to have abstained. This assumption is legitimate if one
is sure that all individuals who are entitled to vote have been informed
that they may do so and have made a decision not to. In most business
processes, this would not be the case.
In what follows, it is assumed that all abstentions are explicitly made and
that individuals who do not vote have excluded themselves.
3. Choice Function
Simple majority rule is the usual method for resolving two policy elections,
but it by no means the only one. Two policy collective choice is dealt with
in some detail in appendix B.
9
What is required from a choice function is that it is not open to abuse and
it is decisive. Two policy issues can not be abused because it can be shown
to be the case that the majority have chosen the policy. The only difficulty is
resolving ties.
2.2 Three policy issues
A three -- outcome trial, for example, one of A, B or C must be chosen. The
voting procedures described here are explained at greater length in [Saa94] and
and there is some documentation on voting methods at [VOT98]. What follows
illustrates some of the problems that arise from using them.
1. Number of Choices can vary
(a) Four Choices
One can organize the election so that are four choices: any of A, B
or C and to abstain.
(b) Seven (or Eleven) Choices
One could also allow voters to express a choice between their first
two preferences and to abstain. So a vote might be: (A, B) which
implies that A > B > C.
One can also allow voters to state they are indifferent between their
first two choices, but prefer them to the third; an example of this
kind of vote is: (A = B) > C.
(c) Thirteen (or Seven) Choices
Also one can allow voters to express their choices as a ranking over
all three policies, in two ways:
• Strong ordering no statements of indifference allowed.
• Weak ordering statements of indifference are allowed.
The former allows seven choices of rankings, the latter thirteen.
2. Choice Functions
(a) Simple Majority Rule
This could only be used when the voters are presented with four
choices and clearly would not work:
• Three voters: a tie can result from a policy cycle and can be
used by one voter to deny service, see table 1.
• Seven voters:
if three vote A, two B and two C, then, even
though a majority did not want A, A is chosen.
(b) Single Transferable Vote
This could be used when the voters are presented with seven or eleven
choices. It suffers from the same problem as the next procedure.
(c) Hare Voting System and Borda Preferendum
These two can be used if one presents to the voters thirteen or seven
choices; they, and the Single Transferable Vote procedure, all suffer
from the same fault, [Dor79, Fis73], which is that voting is affected
10
Voter
i
j
k
Policy and Ranking
w
4(3)
4(3)
1(1)
9(7)
y
2(2)
2(2)
4(3)
8(7)
x
3(-)
3(-)
2(-)
8(-)
z
1(1)
1(1)
3(2)
5(4)
Table 2: The Borda "Preferendum"
by irrelevant alternatives. This is best illustrated by using the results
of a Borda Preferendum which has each voter rank their alternatives
in order, see table 2.
If the voters i, j and k are asked to rank the four policies w, x, y and
z, then the order is w > x > y > z, but if asked to choose between
w, y and z then (w = y) > z, but it was clear that w was preferred
over y. The anomaly being that an irrelevant policy, x, serves to
differentiate between relevant ones.
(d) Condorcet Procedure
This procedure is often employed in committees but also suffers from
irrelevant alternatives affecting the selection of a final choice. (There
are some good examples of how a Condorcet procedure can be abused
in [Saa94].) It is simply a series of two policy elections: (A, B), (A, C)
and (B, C). If any policy beats the other two, then it is chosen. If
there is a policy cycle then there is no Condorcet winner. It may also
allow an irrelevant alternative to beat a potential Condorcet winner.
It will be shown that there is no satisfactory choice function for more than
two policy issues. The next note shows that the number of different orderings
for a given number of issues increases dramatically.
2.3 n policy issues
The total number of different weak orderings for n policies can be calculated as
follows:
1. Generate all the partitions[Ski90, p. 56] of n.
2. Calculate the number of permutations for each partition, call this N (partitions).
3. For each partition find the number of number of ways in which the policies
could be allocated to the elements of the partition, N (policies).
4. Multiply N (partitions) by N (policies) for each partition and sum them
together.
ΣpartitionsN (policies) N (partitions)
(1)
A Mathematica[Ins99] package is available[Eav99a] that performs the calcu-
lation. Table 3 lists the total number of different preference orders for up to 6
policies and clearly shows how large the search space becomes.
11
Policies Orderings
1
3
13
75
541
4683
1
2
3
4
5
6
Table 3: Number of Different Preference Orderings for n policies
2.4 Sincere and Sophisticated Voting
Sophisticated voting utilizes some strategy whereby a voter does not vote for
their first choice to ensure that their least -- preferred policy is not chosen. For
example, an electorate of seven votes sincerely for three policies x, y and z thus:
4 x, 3 y and 2 z, then x would be chosen. However, the z voters may prefer y
to x so their sophisticated vote is for y.
An interesting example of a sophisticated vote is global abstention.
If a
motion is formulated which requires a choice between A or B, but all voters
prefer C which is not proposed, a sophisticated response is a global abstention.
Unfortunately, sophisticated voters enjoy an advantage over sincere voters,
but, to do so, they must formulate their own voting policy, which usually re-
quires that they have some information as to the relative strengths of the dif-
ferent coalitions within an electorate and their choice of voting policy would,
presumably, be decided by a sincere vote amongst them. One of the attractions
of presenting an electorate with a complex agenda -- of more than two issues --
is that they are less able to formulate strategies amongst themselves, so that
complex agendas should elicit more sincere voting, but the likelihood of a policy
cycle arising is greater, as is made clear in a later section, §5 and by equation
(2). Sincere voting would allow voters' underlying values to more precisely de-
termined, which one would hope, would in the long -- run be a more stable basis
for decision -- making.
3 Collective Choice Mathematical Model
This is more rigorous presentation of collective choice theory. This following
section introduces the notation that will be used to formalize the conditions
that are placed on collective choice functions.
3.1 Some Notation
Notation 3.1 (Relations, Preferences and Their Ordering: ≻). is a pref-
erence ordering over a set of objects in a finite set X = {x1, . . . , xn} constructed
thus:
R is an instance of a class of binary relations between any two objects. To
state that x1 is related to x2 in some way, one would write: x1 R x2. The
particular relation might be any of the following >, ≥, ≤, =. At this stage,
R is taken to be transitive and connected.
12
≻ is a statement of an individual's preference order or preferences over the
elements of X.
It is a tuple, i.e. a vector, with exactly #X elements,
with each element being of the form xi R xj, where R is instantiated to
one of the values that the class might take. The ordering is assumed to
be consistent for whatever qualities R possesses. There must be at least
one statement of preference for each element of X, even if that statement
is one of indifference.
It is assumed that such a preference ordering is
consistent with the qualities of R. The power set of ≻ is X × X
Notation 3.2 (Policies and Voters). Some simple set definitions are needed.
I is the set of voters or individuals I = {1, . . . , i, . . . , n}.
X a non -- empty set is the universal set of social alternatives, or policies, at least
one of which must be chosen by the voters.
X is a subset of the power set P (X) of X; it is a non -- empty set of non -- empty
subsets of X and describes the potential feasible policy sets of X.
Y is an element of X . It is the set of policies that are presented to an electorate
for them to vote on: the proposal set.
~D is a preference profile of all voters, it will be called a vote, but will contain
more than just the voters' preferences on the elements of the proposal set.
It contains the preference orders of all the individuals in the society for all
alternatives in X. For the n individuals, if individual i is presumed to have
a preference order ≻i, ~D can be written as the n-tuple (≻1, ≻2, . . . , ≻n)
of preference orders on X.
P(cid:16) ~D(cid:17) is the power set of all votes, feasible and infeasible. For a given set of
policies and a given set of individuals only a subset of these votes will
occur.
(Y, ~D) is an ordered pair called the situation. It is the feasible set of policies,
Y , presented to the electorate, and a vote ~D.
The important word is feasible. Only some votes will be feasible given the
preferences held by voters; therefore only some policy sets will be feasible.
Definition 3.1 (Sincere and Sophisticated). The following function defini-
tions clarify how voters make up their minds and form their preference orders.
They are, therefore, purely notional and one or the other is performed by each
individual, i. How a preference order is formed is dependent on whether the
individual votes sincerely or is sophisticated.
If an individual, or population, is voting sincerely, then:
sincere : I × X 7→ X × X
sincere : X 7→ P(cid:16) ~D(cid:17)
e.g. ≻i = sincere(i, X)
~D = sincere(X)
13
If an individual is a sophisticated voter, then a new set of histories is needed:
~D -- and its power set P(cid:16) ~D(cid:17) -- which is the set of all votes that have taken place.
sophisticated: I × X × P(cid:16) ~D(cid:17) 7→ X × X
sophisticated: X 7→ P(cid:16) ~D(cid:17)
e.g. ≻i = sophisticated(i, X, ~D)
~D = sophisticated(X, ~D)
Definition 3.2 (Promotion and Demotion). When stating conditions it is
useful to construct votes from other votes. These may be elements of P(cid:16) ~D(cid:17)
that are infeasible.
These functions promote and demote a policy within a vote.
promote: P(cid:16) ~D(cid:17) × X 7→ P(cid:16) ~D(cid:17) e.g. ~D′ = promote(x, ~D)
And similarly,
demote : P(cid:16) ~D(cid:17) × X 7→ P(cid:16) ~D(cid:17) e.g. ~D′ = demote(x, ~D)
demote() would be implemented as follows:
1. Every preference not involving x is unchanged:
∀x′, y′ ∈ X[(x′ 6= x, y′ 6= x, x′ R y′ ∈≻i, x′ R′ y′ ∈ ≻′
i)
→ (x′ R y′ ↔ x′ R′ y′)]
2. Everything that involves x is unchanged if x if preferred over something
else; or is changed so that x is now preferred over the other policy
∀y′ ∈ X[x > y′ ∈≻i→ x > y′ ∈ ≻′
i]
or
∀y′ ∈ X[x = y′ ∈≻i→ x > y′ ∈ ≻′
i]
Along the same lines, two other variants of promote and demote can be
defined, which promote or demote for a particular voter on a particular policy
and resolve any conflicts.
~D′ = promote(i, x, ~D) and ~D′ = demote(i, x, ~D)
Definition 3.3 (Collective Choice Function). Is a function that maps each
situation to a subset of the feasible subsets for that situation. The collective
choice function F yields the choice set of the proposal set.
F : X × P(cid:16) ~D(cid:17) 7→ X F (Y, ~D) ⊆ Y
Typically the choice set will contain only one policy, the one that is preferred
over all others. The chosen policy can then be removed from Y and the next
policy found.
In the event of a tie -- if ties are tolerated -- the choice set will
contain the tied policies.
14
Remark 3.1 (Quorums). A quorum is usually taken to be the minimum num-
ber of voters that can demand that a policy be a legitimate choice. However, it
may be that case that there is a quorum, but all votes, bar one, are abstentions
and that the choice of that single individual becomes mandatory.
For the time being, this anomaly should be noted, and there will be references
in the text to the validity of a policy decision.
3.2 Conditions on a Collective Choice Function
These conditions prescribe the behaviour of a collective choice function 2. These
are derived from Arrow's work[Arr63] and have been the subject of consid-
erable debate. This rendering is original and, it is hoped, is more explicit,
self -- contained and rigorous than that given in Arrow's work. Each condition is
expressed as a deduction rule in second -- order logic: if the premises are fulfilled
then the conclusion is required i.e. it is expected behaviour. The conditions
therefore constitute tests for an implementation of a collective choice function.
A more succinct rendering can be found in a paper by Batteau et al. [PB81].
It requires some familiarity with Arrow's conditions and the theory of games3,
but has the advantage of relating Arrow's conditions to work in games theory
and also to requirements on the behaviour of collective choice functions. This
latter task has been carried out very successfully by Fishburn[Fis74], but only for
two issue collective choice functions. The paper by Batteau et al. only addresses
collective choice functions that use strong orderings.
There are five conditions in all. There is a brief description of the meaning
of each.
Condition 3.1 (Admissible Orderings). This is a specification that the func-
tion need only operate on what are called admissible orderings, an individual's
ordering is admissible if it alone satisfies the collective choice function, viz.
∀Y ∈ X
∀i∃ ~D[ ~D = (≻i), ∅ 6= F (Y, ~D) ⊂ Y ]
∃ ~D′[ ~D′ = (≻1, . . . , ≻i, . . . , ≻n), ∅ 6= F (Y, ~D) ⊂ Y ]
By specifying that individual voters must present orderings that are proper
subsets of Y , this eliminates orderings that are completely indifferent or are
cyclical, e.g. X = {x, y, z}, ≻i= ( x > y, y > z, z > x) -- so it is a condition on
the vote set as well as on the collective choice function. In practice, it would be
best to ensure that the orderings in ~D are well -- formed.
The choice set F () cannot be empty and it must be a proper subset of Y . If
it is neither of these then there is either global indifference or a policy cycle.
Condition 3.2 (Monotonicity). or "positive association of social and indi-
vidual values"[Arr63, p. 25]: put simply if the individuals want something and
choose it for their society; if, in a later vote, more individuals choose it, then,
2The more common term is social choice function, but this due to its origin in social welfare
economics.
3See for example, [BO82].
15
ceterus paribus, it will be chosen for society again, or, more formally:
∀Y ∈ X
∀ ~D∃S[F (Y, ~D) = S]
∀x ∈ S∃ ~D′[ ~D′ = promote(x, ~D)]
∃S′[S′ = F (Y, ~D′), x ∈ S′]
Condition 3.3 (Independence). or "independence of irrelevant alternatives"
[Arr63, p. 27] requires that the collective choice function return a choice set
regardless of any individual's preferences for policies that are not explicitly part
of the proposal set. This means that individuals may take on or discard values,
or they may change their values regarding other matters, but these changes
should not effect those values that have not changed. Formally, this can be
expressed thus:
∀Y ∈ X
∃X, X ′[Y ⊆ X, Y ⊆ X ′, X 6= X ′]
∀ ~D, ~D′[ ~D = sincere(X), ~D′ = sincere(X ′), F (Y, ~D) = F (Y, ~D′)]
This condition on the implementation of the collective choice function is proba-
bly unimportant in practice; normally, the input to the collective choice function
is ~D which only contains the preferences on the contents of Y , but as can be de-
duced from the discussion of the effect of an irrelevant alternative in the Borda
preferendum, see table 2, these can affect a preference order.
The following two conditions are more contentious. They are different from
the other conditions in that they need not be applicable to all issues and there
are two types of tests one can apply.
Condition 3.4 (Non -- imposition). There is no bias in the collective choice
function that causes it, on some issues, to yield a choice set that is insensitive
to voters' preferences.
The first test is a unilateral test, viz.
∃Y ∈ X
∀ ~D∃S[S = F (Y, ~D)]
∀x ∈ S∃ ~D′[ ~D′ = demote(x, ~D)]
∄S′[S′ = F (Y, ~D′), S′ ∩ S 6= ∅]
That is, it should be possible on a particular set of issues to construct a vote
that does not return a particular policy for all votes that select that policy.
The second test is used in the event of a tie between some policies to ensure
that the collective choice function does not prefer one policy over the other.
∃Y ∈ X [#Y ≥ 3]
∃S[#S ≥ 1, F (Y, ~D) = S]
∀y, z ∈ Y \ S[y 6= z]
∀w∃Y ′[¬(w ∈ Y ), Y ′ = Y ∪ {w}]
∃ ~D′[ ~D′ = sincere(Y ′)]
∄S′[S′ = F (Y ′, ~D′), (y ∈ S′ ∧ ¬(z ∈ S′)) ∨ (z ∈ S′ ∧ ¬(y ∈ S′))]
16
It might not be immediately clear from this formulation but this is an exact
statement of the irrelevant alternative anomaly observed in the Borda preferen-
dum, see table 2.
Condition 3.5 (Non -- dictatorial). There is no one individual whose choice
on some issues is always returned by the collective choice function, a dictator,
nor is there any one individual who can reject some policies, a vetoer4. (Unfor-
tunately, there is some contention about the use of the term "one individual",
see the discussion following.)
1. Unilateral Tests
These test whether it is possible to overcome a dictator's choice or a
vetoer's rejection. The dictator or vetoer is placed in position 1 for con-
venience.
(a) Dictator
∃Y ∈ X
∃S∃ ~D[ ~D = (≻1), S = F (Y, ~D)]
∀x ∈ S∃ ~D′[∀ ≻i [i 6= 1, ≻i= demote(x, ≻i)], ~D′ = (≻1, . . . , ≻n)]
∄S′[S′ = F (Y, ~D′), S′ ∩ S 6= ∅
(b) Vetoer
∃Y ∈ X
∃ ~D∃Sc[ ~D = (≻1), Sc = Y \ F (Y, ~D)]
∀x ∈ Sc∃ ~D′[∀ ≻i [i 6= 1, ≻i= promote(x, ≻i)], ~D′ = (≻1, . . . , ≻n)]
∄S′c[S′c = Y \ F (Y, ~D′), S′c ∩ Sc 6= ∅]
2. Tie -- Breaking Tests
Subtler tests are those that are applied in the event of a tie.
(a) Dictator
The dictator is preferred in some way. In that, if the dictator changes
allegiance, policy changes, but if anyone else it does not.
∃Y ∈ X [#Y ≥ 3]
∃S[S ⊂ Y, #S ≥ 1]
∀i∃ ~D′
∀y[y ∈ Y \ S]
i = promote(i, y, ~D)]
i[ ~D′
∀i∃Si[F (Y, ~D′
i) = Si]
∄j∀i[i 6= j, Si 6= Sj]
4Vetoer is a noun constructed solely for the purposes of this exposition.
17
(b) Vetoer
∃Y ∈ X [#Y ≥ 3]
∃S[S ⊂ Y, #S = 1]
∀i∃ ~D′
∃x[x ∈ S]
i = demote(i, x, ~D)]
i[ ~D′
∀i∃Si[F (Y, ~D′
i) = Si]
∄j∀i[i 6= j, Si 6= Sj]
This definition states that "no one individual" can dictate a vote, which
would seem to suggest that individuals can change their minds, but must do
so en masse. Arrow requires that a deciding set 5 of voters must change their
preferences. How many need to be in that set can only be determined by
analyzing a vote. It may appear that simple majority rule does not appear to
meet this criteria, since, in a close result, any voter can invert the result, but
under simple majority rule on two issues, this can be dismissed, because every
voter has exactly the same capability, therefore the simple majority becomes
the decisive set.
So, as it stands, this condition is still not accurately expressed, it should
state that no subset of voters that is not a deciding set can change the outcome.
The problem is that the deciding set cannot be known until the votes have been
cast and counted.
4 Possibility and Impossibility Theorems
Arrow, who originally addressed the problem of the distribution of social welfare,
developed these theorems as general statements about a class of functions which
seek to combine hierachies of preference relations. Such functions would be of
great use in any field where a joint policy must be formulated. Clearly, that
includes distributed computing and the "globalization" of local access rules to
databases to form lattices of information flow, §1.4 .
There are two results:
1. Possibility theorem for two -- policy elections
Such a collective choice function does exist for elections which have only
a choice between two policies.
2. Impossibility theorem for elections having more than two policies
There is, in general, no such collective choice function for elections having
more than two policies.
The idea behind the proof of the possibility theorem has already been given
in the discussion of deciding sets, condition 3.5, but the same idea is used in the
proof of the impossibility theorem.
5Also called a preventing set in [PB81] or a winning set as defined in [Isb60]. Some useful
rules on winning sets are defined in the latter paper.
18
4.1 Conflict Resolution Mechanisms
Arrow's proof for the impossibility theorem consists of analyzing how a collective
choice function can choose one preference over another. The notation is as used
in §3.1 .
Definition 4.1 (Unanimous Choice). If the voters unanimously agree that
one policy is preferred over all others then that policy is chosen.
∀Y ∈ X
∀i∃x ∈ Y [∀ ~D[ ~D = (≻i)], x ∈ F (Y, ~D)]
∄S∀ ~D′[ ~D′ = (≻1, . . . , ≻i, . . . , ≻n), S = F (Y, ~D′), x ∋ S]
Note that with this formulation it is possible to be indifferent to x, but one
cannot oppose it6. For example, if some voter has ≻= (x = y, y > z, x > z)
then {x, y} = F ({x, y, z}, (≻)).
Definition 4.2 (Biased Choice). If pairs of voters contradict one another
over a policy, one policy is chosen over the other.
∀Y ∈ X
∀x′, y′ ∈ Y ∃i, j ∈ I[i 6= j, x′ > y′ ∈≻i, y′ > x′ ∈≻j]
∀ ~D∄S[ ~D = (≻i, ≻j), S = F (Y, ~D), y′ ∈ S]
Note that this rule can only be applied pair -- wise, it cannot be applied to the
population as a whole.
Definition 4.3 (Unresolved Choice). If pairs of voters contradict one an-
other over a policy, neither policy is chosen.
∀Y ∈ X
∀x′, y′ ∈ Y ∃i, j ∈ I[i 6= j, x′ > y′ ∈≻i, y′ > x′ ∈≻j]
∀ ~D∄S[ ~D = (≻i, ≻j), S = F (Y, ~D), x′, y′ ∈ S]
This, too, may only be applied pair -- wise.
4.2
Inadequacy of Conflict Resolution Mechanisms
Unanimity, with abstentions, does not resolve any conflicts. If one attempts to
do so using one of the other two choice methods, one or more of the conditions
will be breached.
1. Biased Choice
With two voters there is no majority decision, so the collective choice
function must prefer:
(a) Either a policy
6This is, in essence the Pareto principle of social welfare.
It can be stated as: "social
welfare is increased by a change that makes at least one individual better off, without making
anybody else worse off[SN89]." Clearly, if one abstains then one feels one is not going to be
worse off if x is chosen. If one opposes x then one would be worse off if x were chosen.
19
(b) Or a particular voter's choice of policy
(c) Or randomly choose one policy
The first two lead to an imposed policy or indicate a dictatorship, respec-
tively; the latter has been suggested [Zec69], but it is rather arbitrary.
2. Unresolved Choice
This method allows anyone to act as a vetoer.
One might think that one can improve the biased choice method so that
it decides in favour of whichever policy has a simple majority over the other.
Unfortunately, if one admits a third voter to make the biased choice decisive,
then one also allows that third voter to present a third policy choice; in which
case, one is attempting to choose between three policies, which is the problem
one is trying to solve.
If, in an attempt to overcome this, one requires that there always be more
voters than issues, then on some issues at least one voter will be a dictator, or
vetoer7. The dictator, or vetoer, is acting as a "Kingmaker". It is possible to
stand this dilemma on its head (or feet) and use it as the basis for a collective
choice function as in [How89].
4.3 Are the Conditions Reasonable?
Hopefully, it should now be clear that it is not possible to construct a collective
choice function that satisfies all the conditions given above simultaneously. That
said, one can argue that the requirements on the collective choice function's
behaviour are too demanding.
1. Decisiveness
Implicit in the definition of the collective choice function is that it is
decisive.
2. The Non -- imposition and Non -- dictatorial Conditions
These conditions come in two forms. The first form is unilateral and
quite acceptable, although it may even be desirable that one particular
voter has an absolute veto over a policy. The other form of the condition
is only invoked in the event of a tie, where the requirement is that no
policy or voter be preferred over another. This, it has been seen, is the
pivotal difference between simple majority rule for a two policy vote and
a three (or more) policy vote. In the two policy vote in the event of there
only being one vote separating those for and those against, every voter is
equally decisive and will be supported by the majority. In a close three (or
more) policy vote, some voters can choose the minority position to force
a tie.
The issue is, again, the decisiveness of the collective choice function and
would so close a result be acceptable.
7This minority power is often said to be the cause of the instability of proportional repre-
sentation parliaments.
20
3. Independence from Irrelevant Alternatives
The preferendum, see table 2, and Condorcet pairings are both examples of
collective choice functions that are non -- dictatorial but are not free from
the effects of irrelevant alternatives. This is very unfortunate, since an
irrelevant alternative is any policy that is ranked lower than the collective
winner, but is ranked higher than the collective winner by some voters.
This would happen when the voters are assessing the policies with different
underlying values which are more abstract.
If one looks at the rankings made in table 2, it is clear that voter k agrees
with the others that y > z but disagrees with them regarding the merits
of both y and z over both of w and x.
4. Monotonicity
It can also be argued that monotonicity should be sacrificed to achieve
a consensus. There is an attractive suite of collective decision functions
called "Kingmaker Trees"[How89]. These do not demonstrate monotonic
behaviour, but can be used to obtain a decision in the presence of sophis-
ticated voting.
4.4 Are three (or more) policy collective choice functions
usable?
Whether the conditions Arrow imposed on collective choice functions are rea-
sonable only arises when the votes are close and that a sophisticated voter would
vote in such a way that a policy cycle arises. Three (or more) policy votes can
give decisive results and it would be very useful to have them resolve issues: can
one therefore quantify how reliable a collective choice is? How likely is it that
an election has been subverted by sophisticated voters, given the distribution
of votes. Referring again to table 2, if it were possible to compare the two sets
of votes, impartially, an administrator would be able to make a better choice
of final policy. In which case, it would be better to introduce more irrelevant
alternatives to make a more certain choice.
Technologically, this is feasible. There are cryptographic algorithms which
would allow vote sets to be cast secretly [Sch96] and these could then be assessed
by an impartial arbitrator to make the most appropriate choice. The basis for
that choice would be probabilistic and an example of a probabilistic criterion
that could be employed is given next.
5 Max -- Min Probabilities in Condorcet Pairings
There is an interesting paper by Usiskin [Usi64], which quantifies the probabil-
ities for Condorcet pairings. The paper addresses the "Voting Paradox", but
this is slightly misleading, it addresses the organization of votes within commit-
tees. It covers the same ground as the seminal works of Black and Farquharson
[Bla58, Far69], which describe how committee procedures can be abused, if a
policy cycle exists.
In a committee procedure, if there is a policy cycle then for all those voting:
• A > B > C has exactly 1
3 of vote
21
• as does C > A > B
• and B > C > A
If the policies are voted on in pairs, then the order in which they are intro-
duced will determine which is chosen, viz.
• (A vs B) vs C = C ∵ A vs B = A
• (C vs A) vs B = C ∵ C vs A = C
The question that Usiskin resolves is how much more popular than one
another can they be. In the example above, they all have probability of beating,
or of being beaten, of 2
3 .
Denote by Xi a real -- valued random variable that represents the proportion
of a simple majority vote received for policy i. The probability of a simple
majority vote having the outcome that Xi > Xj will be: P (Xi > Xj). A policy
cycle will be revealed if the probabilities for all pairs, P (X1 > X2), P (X2 > X3)
and so on, for n policies is non -- zero and, finally, P (Xn > X1) is also non -- zero.
The maximum minimum value will represent how much more popular one policy
can be over another so that a policy cycle might still result.
If one then has at least one policy that beats another by an amount that is
greater than this, then there can be no policy cycle.
Theorem 5.1 (Arbitrary Random Variables). The maximum minimum value
for the joint probability distribution of a set of n arbitrary random variables is
given by:
max {min [P (X1 > X2), . . . , P (Xn−1 > Xn), P (Xn > X1)]} =
n − 1
n
(2)
This is as one would expect, looking at the example given above, where
each of A, B and C had a probability of 2
3 of beating the other, if one of these
had a greater probability than that, there could be no policy cycle.
In the
example given above, were there were only three voters, this would mean the
voters unanimously agreed on one policy being preferred over at least one other.
This may not be the winning policy, it would allow at least one policy to be
eliminated, then a two -- policy vote can be taken.
This result is rather depressing but one can appreciate its intuitive correct-
ness, because it tells us that the more policies there are, the more difficult it is
to have one policy beating all others.
This case of arbitrary random variables does not help in understanding the
behaviour of sophisticated voters. (The probabilistic events would all be con-
ditioned by at least the previous result, viz. P (Xi > Xi+1Xi > Xi−1) and
probably would need to be conditioned by all events.
However, Usiskin does present a result which could be used to interpret
sincere voting results. The election results P (Xi > Xj) would be based on
Xi, Xj being independent random variables
Theorem 5.2 (Independent Random Variables). The maximum minimum
value for the joint probability distribution of a set of n independent random vari-
ables is given by:
max {min [P (X1 > X2), . . . , P (Xn−1 > Xn), P (Xn > X1)]} = b(n)
where b(n + 1) > b(n) and lim
n→∞
b(n) =
3
4
22
This latter result is quite encouraging, because if there is an election where
4 then no policy cycle can
at least one votes has a probability of greater than 3
exist.
Usiskin also demonstrates a method for formulating the function b(n) and
presents some upper and lower bounds.
6 Some Collective Choice Functions
It was mentioned above, in the discussion of quorums, that a simple majority
rule collective choice would be valid even if only one voter expressed a choice
and all the others abstained. Simple majority rule is just one of a number
of collective choice functions that could be employed.
It is worthwhile just
listing the collective choice functions. These are only for two policy votes and,
because of Arrow's conditions, cannot be extended to three (or more) policy
votes, but they are insightful to the acceptability of collective choices. This
summary follows Fishburn, [Fis74] and the details are contained in appendix B,
but suffice to say that when only two policies, x and y, are under consideration
ternary logic can be used with x > y being 1, y < x being −1 and x = y 0.
There are some diagrams that illustrate the different types of voting rule and
outcomes, figure 10
From the discussion above, §4.1 , a Pareto -- optimal collective choice function
can also be specified, which is not in the appendix, but is discussed in [ARS98]
where it is called "unanimous with abstentions".
Rank Rule
1
2
3
4
Specified Majority
Simple Majority
Specified Majority
Simple Majority
Paretian
Yes
Yes
No
No
Table 4: Ranking of Binary Voting Rules
Simple Majority if s( ~D) > 1 then x > y is the collective choice, see (3).
Non -- minority if 1( ~D) > n/2 then x > y is the collective choice, see (4). This
is a special case of the next type of rule.
Specified Majority if 1( ~D) > αn then x > y, where α is some pre -- defined
constant in range (0, 1), see (5).
Absolute Majority if 1( ~D) > αn then x > y and y > x otherwise, where α
is some pre -- defined constant in range (0, 1), see (5).
Absolute Special Majority if 1( ~D) ≤ αn then y > x, see (6).
Pareto Majority: For if -1( ~D) = 0 and 1( ~D) > 0 then x > y.
Pareto Majority: Indifference if 0( ~D) > 0 and -1( ~D) = 1 = 0 then x = y.
23
Absolute special majority is a variant of absolute majority (it is an absolute
majority of votes against) and absolute majority is just a variant of specified
majority where the complement of the policy is not installed if the required vote
count is not reached and, as noted, non -- minority rule is a variant of Specified
Majority Rule. So all of these can be replaced by that rule.
It is possible to define a Paretian quality which can be added to any voting
rule and requires there is no dissenting vote.
(Paretian indifference can be
thought of as a vote for z , (x = y) as opposed to w =, (x > y) ∨ (y > x), so
it is actually a Paretian vote on a different pair of issues: z and w.) The rules
can be ranked in a qualitative order of difficulty of attaining them, see table 4.
7 Summary
As information systems become more sophisticated they will be used to support
human decision -- making. The prospect of constructing virtual organizations
based on how people interact is attractive: they could potentially be more
responsive -- Miller describes an evolving information processing organization,
[Mil95], which develops its internal structure using a genetic algorithm. There
are already some prototypes, [HK96, HH94], which share information based on
past usage.
This paper acts as a warning that collective decision -- making is not some-
thing to be taken lightly. Even the most sophisticated voting systems can give
rise to erroneous results,
§2.2 . Sophisticated voters making policy choices
could give rise to systems falling into stasis or being subverted to execute the
wrong policies. If a discretionary access control mechanism used to control the
release of information from databases were put under the control of collective
choice functions and determined access rights based on the criteria proposed by
Bertino et al. , §1.4 , it would almost certainly prove to be a vulnerable system.
There is clearly a need for a more sophisticated architecture to deal with
access requests which can only be expressed in an enterprise modelling language
which would have components similar to that described by ISO in their ODP,
[ISO95]. This type of information processing system would need software agents
acting on behalf of individuals to ensure that their information is protected.
This would necessarily be a probabilistic analysis, based on how trustworthy
potential information users are and it may prove expedient to develop systems
that are insured against loss or provide degrees of surety, like those proposed
by Neumann et al. [LMN97].
These information systems and their users would constitute an economy very
much like the everyday commercial world occupied by institutions, corporations
and people -- only it would be faster, less resource wasteful and, if information
system designers integrate the safeguards before they are used, safer.
A ODP Enterprise Entities
These are Booch [Boo94] class diagrams of the relationships that exist between
entities in a distributed processing system, or, indeed, any organization as de-
scribed in [ISO95, Enterprise Modelling Language].
1. Communities, see figure 5
24
Community(cid:13)
1(cid:13)
1(cid:13)
Resource(cid:13)
x(cid:13)
Resource(cid:13)
x(cid:13)
Policy(cid:13)
Figure 5: Communities, policies and resources
Communities comprise of collections of resources and policies. The com-
munity is itself a resource.
2. Enterprise Agents, see figure 6
Performative agents are also resources. There are three kinds of these:
• Administrators
• Arbitrators
• Policy -- Makers
Administrators and arbitrators have policies they follow, but policy -- makers
create policy.
3. Resource Users
These are also agents, but are not performative. They will have their own
policies, but they are not explicitly open to arbitration. Resource users
may contact administrators prior to using a resource or they may not, it
depends on the nature of the resource.
Resource users usually control the policy -- makers within communities and
this is the case with most societies, since legislative assemblies are usually
elected, but this need not be so. Companies are owned by its sharehold-
ers who appoint the board of directors, the administrators, but may not
use the resources the company makes available. Suffice to say, that, in
practice, in most business processes, the resource users have very little
influence on the policy -- makers.
4. Administrators, see figure 7
Administrators control sets of resources. Each consumable resource has a
behaviour and may use other consumable resources. Since there may be
25
Administrator(cid:13)
executive(cid:13)
1(cid:13)
Agent(cid:13)
performative()(cid:13)
x(cid:13)
Policy(cid:13)
x(cid:13)
1(cid:13)
Arbitrator(cid:13)
ju dicial(cid:13)
legislative(cid:13)
Resource(cid:13)
PolicyMaker(cid:13)
make()(cid:13)
Figure 6: Agents (Policy -- maker, Administrator, Arbitrator) and Policy
(cid:0)(cid:0)
Administrator(cid:13)
Resource(cid:13)
consumable(cid:13)
controller(cid:13)
Resource(cid:13)
1(cid:13)
1(cid:13)
u
s
e
r
(cid:13)
x(cid:13)
1(cid:13)
Resource(cid:13)
consumable(cid:13)
Set of Resources(cid:13)
x(cid:13)
x(cid:13)
Behaviour(cid:13)
Figure 7: Administrators, Resources and Behaviour
26
different administrators vieing for the same consumable resources conflicts
may arise.
Resource users must obey the policy for using a resource. If there is no
suitable policy, then the prospective user must have policy made. (This
might seem different from what is observed in most organizations, where
one can ask an administrator to apply policy differently in some way:
usually by asking the administrator's superior to become involved. The
administrator's superior is then acting as a policy -- maker.)
5. Arbitrators, see figure 8
Arbitrator(cid:13)
controller(cid:13)
Administratpr(cid:13)
Set of(cid:13)
Administrators(cid:13)
Figure 8: Arbitrators and Administrators
Arbitrators control adminstrators in that they resolve any conflicts that
arise between them. They control neither administrators nor resources
directly.
6. Policy, see figure 9
Policy is a set of prescriptive statements about the behaviour of a set of
resources: usually one sub -- set of those resources vis `a vis another sub -- set.
There are three kinds of statement:
• Permission what one sub -- set may do with (or for) the other sub -- set.
• Requirement (or Obligation) what one sub -- set must do with (or for)
the other sub -- set.
• Prohibition what one sub -- set must not do with (or for) the other
sub -- set.
B Collective Choice Functions
What follows is drawn mostly from [Fis74] (who refers to proofs from his own
text[Fis73]: and gives a precise definition of the conditions that a collective
27
Statement(cid:13)
Set of statements(cid:13)
1(cid:13)
Requirement(cid:13)
Permission(cid:13)
x(cid:13)
x(cid:13)
Prohibition(cid:13)
Policy(cid:13)
x(cid:13)
1(cid:13)
1(cid:13)
1(cid:13)
Behaviour(cid:13)
x(cid:13)
Statement(cid:13)
1(cid:13)
x(cid:13)
Resource(cid:13)
Set of Resources(cid:13)
Figure 9: Policy, Resources and Behaviour
28
choice function must fulfill for a particular voting procedure for two policy
alternative systems.
Definition B.1 (Principle of Choice). The basic materials for collective choice
functions are social alternatives (candidates, policies, etc.) and individuals (vot-
ers, members, etc.) who have preferences among the alternatives. The idea of
a collective choice function is to map a non -- empty subset of the potential feasi-
ble subset of alternatives to each ordered pair consisting of a potential feasible
subset of alternatives and a schedule of the voters' preferences. The assigned
set is often referred to as the choice set.
How that mapping is achieved is based on the properties of the collective
choice function, which decides whether the choice is:
• Egalitarian
• Weighted
• Representative
• Unbiased (or neutral)
• Decisive
• Unanimous
B.1 Two Policies
If each individual has only two policies to choose from, then the policy chosen
by the population as a whole will always be one of them, so two policy systems
cannot select a set of policies that an individual has not specified.
Definition B.2 (Sets for Two Policies). The sets can be enumerated quite
easily for two policies x, y. If a voter prefers x to y, then 1 else if y to x then
−1 else 0 signifies indifference -- ternary logic.
Policies
X = {x, y}
X = {X}
so write
F ( ~D) for F (X, ~D)
n voters
~D = (D1, D2, . . . , Dn)
where Di ∈ {1, 0, −1}
so {1, 0, −1}n , P(cid:16) ~D(cid:17) and ~D ⊆ {1, 0, −1}n
For the collective choice function over n individuals:
F : {1, 0, −1}n 7→ {1, 0, −1}
Note that the power set of the preferences is written {1, 0, −1}n as shorthand
and is the set of all permutations of vectors of length n where each component
can take one of three values -- #{1, 0, −1}n = 3n. When a condition is applied
to a preference profile, it is either applied with reference to the power set or the
vote set: the power set, although large, is denumerable a priori, the vote set is
not.
29
B.2 Egalitarian
Egalitarian8 collective choice functions treat each voter's vote as identical in
effect to every other's.
Condition B.1 (Strongly Neutral). A collective choice function F is Strongly
Neutral, if, for all ~D ∈ {1, 0, −1}n:
F (− ~D) = −F ( ~D)
(Strongly Neutral)
Condition B.2 (Strongly Monotonic). A collective choice function F is Strongly
Monotonic, if, for any ~D, ~D′ ∈ {1, 0, −1}n:
~D ≥ ~D′ ⇒ F ( ~D) ≥ F ( ~D′)
~D > ~D′, F ( ~D′) = 0 ⇒ F ( ~D) = 1
(Strongly Monotonic)
Condition B.3 (Egalitarian). A collective choice function F is Egalitarian,
if for all ~D ∈ {1, 0, −1}n:
F (D1, . . . , Dn) = F (Dσ(1), . . . , Dσ(n))
if σ is a permutation on {1, . . . , n}
(Egalitarian)
Theorem B.1 (Conditions for Simple Majority Rule[May52]). A collec-
tive choice function F implements simple majority rule over two policies and has
the following qualities: Strongly Neutral, Strongly Monotonic and Egalitarian.
Definition B.3 (Simple Majority Rule). If F applies ternary logic, it can
be implemented with:
F (D) , s( ~D)
(3)
Condition B.4 (Monotonic). A collective choice function is just Monotonic,
rather than Strongly Monotonic if, for any ~D, ~D′ ∈ {1, 0, −1}n:
~D ≥ ~D′ ⇒ F ( ~D) ≥ F ( ~D′)
(Monotonic)
Definition B.4 (Non -- minority Rule). If a collective choice function is Strongly
Neutral, Monotonic and Egalitarian and is implemented thus:
F ( ~D) = 1 ⇔ 1( ~D) > n/2
F ( ~D) = −1 ⇔ -1( ~D) > n/2
(4)
then the voting system is known as non -- minority rule.
8Fishburn in [Fis74] uses the term "anonymous" for egalitarian and "dual" for neutral.
30
Non -- minority rule is just one of a class of neutral, monotonic and egalitarian
collective choice functions; they differ in effect from the strongly monotonic sim-
ple majority rule by having a "dead -- band". A geometric insight into the speci-
fication of a collective choice function can be given using a unit simplex[Saa94].
There is only one dimension.
~q = (
1( ~D)
n
,
-1( ~D)
n
)
The election vector ~q emanates from the origin and will always be within [−1, 1].
Under simple majority rule, whichever point, −1 or 1, the vector is closest to
wins. Under non -- minority rule the vector has to be over half 1
2 way towards
the point, see figure 10. The indecisive region in the centre is symmetric. For
non -- minority rule, any boundary can be chosen, so long as it is symmetric about
the origin.
-1(cid:13)
-1/2(cid:13)
0(cid:13)
1/2(cid:13)
1(cid:13)
Simple Majority(cid:13)
Non-minority(cid:13)
(cid:0)(cid:0)(cid:0)
alpha(cid:13)
Absolute majority(cid:13)
Figure 10: Two policy voting systems
It should be clear from figure 10 that a simple majority voting system can
determine policy if only one voter is not indifferent to either of the policies, the
others abstaining. In this respect, non -- minority rule seems to impose a natural
quorum, since it requires that at least half of the voters have chosen one or
the other policy.
In this respect, non -- minority rule is less questionable as a
decision -- making device than simple majority rule. Most electoral systems do in
fact operate a non -- minority rule system.
Condition B.5 (Neutral). A collective choice function is Neutral, as opposed
to Strongly Neutral, if, for all ~D ∈ {1, 0, −1}n:
1( ~D) 6= -1( ~D) ⇒ F (− ~D) = −F ( ~D)
(Neutral)
31
Condition B.6 (Strongly Decisive). A collective choice function is Strongly
Decisive if, for all ~D ∈ {1, 0, −1}n:
F ( ~D) 6= 0
(Strongly Decisive)
Condition B.7 (Unanimity unambiguous). A collective choice function is
Unanimity unambiguous if:
F (~1) = 1 and F ( ~−1) = −1
(Unanimity unambiguous)
Condition B.8 (Pro -- biased). A collective choice function is Pro -- biased if,
for all ~D ∈ {1, 0, −1}n:
if ~D = ~D′ except that (Di, D′
i) = (0, 1)
for some i then F ( ~D) = F ( ~D′)
(Pro -- biased)
The number of electoral ties can be reduced by downgrading Strongly Neutral
to Neutral and adding Strongly Decisive. If Neutral is dropped then an electoral
preference is given to one policy over the other. The policy that is preferred is
usually already in force and is therefore called the incumbent, the other policy is
the challenging policy. See figure 10 for the asymmetry of the indecisive region
under an absolute majority rule.
Definition B.5 (Absolute Majority Rule). If the collective choice function
is no longer Neutral and is made Strongly Decisive, and the function is imple-
mented thus:
F ( ~D) = 1 ⇔ 1( ~D) > αn
F ( ~D) = −1 ⇔ 1( ~D) ≤ αn
for α ∈ (0, 1)
(5)
then these are the absolute majority rule functions. A special case is unaminous
rule which requires either all votes are −1 or 1.
Definition B.6 (Absolute Special Majority Rule). As for absolute major-
ity rule, but the function is also (Unanimity unambiguous) and (Pro -- biased).
The collective choice function can be implemented by:
F ( ~D) = −1 ⇔ 1( ~D) ≤ αn
for α ∈ (0, 1)
(6)
B.3 Non -- Egalitarian: Weighted
The effect of the Egalitarian property is that one voter's preference can be
exchanged for another within the decision profile and it will have no effect on
the evaluation of the collective choice function. An alternative system is to use a
weighted system, which is often used by some committees, where the chairman
is given both a deliberative and a casting vote. Weighted systems have a number
of attractions because they can be designed so that:
• No one person can dictate policy to the group.
• Ties can be readily resolved without a further vote.
The simplest way to define a weighted voting function is to use a weighting
vector.
32
Weighted Voting
Definition B.7 (Weighting Vector and Vote). A weighting vector can be
defined thus:
~ρhni > ~0hni,~ρ = (ρ1, . . . , ρn)
where ρi ≥ 0, ρi ∈ Z+
0 is the weight assigned to each voter
Then
Weighted Vote ~ρ · ~D
Weight Function W (~ρ) ,
n
X
i=1
ai
Weight of c ∈ {1, 0, −1}Wc( ~D) , W ((~ρ · ~D) : Di = c) =
n
X
i=1
ρiDi for those Di = c
It does not follow that n(~ρ) ≥ n because it is possible to set any number of
ρi equal to zero, but at least one must be non -- zero.
Theorem B.2 (Weighted Majority Function). A function F , F : {1, 0, −1}n 7→
{1, 0, −1}, is a weighted majority function if and only if it satisfies Monotonic,
Unanimity unambiguous and Neutral, the weighted majority function can be de-
fined as F ( ~rho · ~D) = s(~ρ · ~D).
The conditions can be readily tested by substituting F (~ρ · ~D) for F ( ~D).
The other systems can be added thus:
1. Non -- minority rule
F (~ρ · ~D) =
2. Absolute majority
1 W1(~ρ · ~D) > W (~ρ)
−1 W−1(~ρ · ~D) > W (~ρ)
0
Otherwise
2
2
F (~ρ · ~D) =
1 W1(~ρ · ~D) > αW (~ρ)
−1 W−1(~ρ · ~D) ≤ αW (~ρ)
0
Otherwise
Dictators and Vetoers The final choice may be wholly determined by only
one of the voters, in which case that voter is either a dictator or a vetoer.
1. Dictator
Definition B.8 (Dictator). A voter, j, is a Dictator with regard to a
collective choice function F and a weighting vector ~ρ if:
For all ~D ∈ {1, 0, −1}n such that
~D = (D1, . . . , Dj, . . . , Dn)
when Dj 6= 0, F (~ρ · ~D) = Dj
33
(Dictator)
Whether a dictator can effect all decision profiles is a condition on the
behaviour of the collective choice function and the weighting vector, not
on the voters, which is as follows.
Definition B.9 (Undominated by dictator). A collective choice func-
tion is Undominated by dictator if there is no Dictator. This can be stated
thus:
For all ~D ∈ ~D
There is no i such that
~D = (D1, . . . , Di, . . . , Dn),
Di 6= 0 and F ( ~D) = Di
(Undominated by dictator)
This is not particularly useful, since there may legitimately be a voter
whose vote is always in line with the choice of the group as a whole.
2. Vetoer
Definition B.10 (Vetoer). The first voter, 1, is a Vetoer with regard
to a collective choice function F and a weighting vector ~ρ if:
For
~D1 = (0, 1, . . . , 1)
~D−1 = (0, −1, . . . , −1)
(Vetoer)
F (~ρ · ~D1) = 0
F (~ρ · ~D−1) = 0
(The vetoer is in first position for convenience).
Whether a vetoer can effect those two very specific decision profiles is
a condition on the behaviour of the collective choice function and the
weighting vector, not on the voters, which is as follows.
Definition B.11 (Undominated by vetoer). A group of voters are Un-
dominated by vetoer if there is no voter j, such that:
If
Dj = 1, F (~ρ · ~D1) = 1, and
Dj = −1, F (~ρ · ~D−1) = −1
but
Dj 6= 1, F (~ρ · ~D1) = 0
Dj 6= −1, F (~ρ · ~D−1) = 0
For all ~D ∈ ~D.
(Undominated by vetoer)
This, again, is not particularly useful, since there may legitimately be a
voter whose always votes against the group.
34
Sensitivity
Definition B.12 (Essential). A voter i is said to be Essential with regard to
a collective choice function, and weighting vector, if at least one of the following
conditions holds:
Either F (~ρ · ~D1) 6= F (~ρ · ~D0)
Or F (~ρ · ~D−1) 6= F (~ρ · ~D0)
Or F (~ρ · ~D1) 6= F (~ρ · ~D−1)
(Essential)
For at least one of the vectors ~D1, ~D0, ~D−1 constructed as follows:
~D1 = (D1, . . . , Di−1, 1, Di+1, . . . , Dn)
~D0 = (D1, . . . , Di−1, 0, Di+1, . . . , Dn)
~D−1 = (D1, . . . , Di−1, −1, Di+1, . . . , Dn)
where the contents of those vectors can be taken from any of the vectors con-
structed thus:
~Dhn−1i = (D1, . . . , Di−1, Di+1, . . . , Dn) ∈ {1, 0, −1}n−1
This condition requires that a voter can be decisive in at least one decision
profile. It prevents a voter from being given so ineffectual a vote that it is never
decisive in any election.
B.3.1 Vetoer, Dictator and Essential
By this it is meant safe from dictators and vetoers and sensitive to voters; it
is desirable if a collective choice function and weighting vector could be chosen
so that for all decision profiles in {1, 0, −1}n there is no voter who is either a
Dictator or a Vetoer. It would also be desirable there is at least one voter who
is Essential.
The collective choice functions simple majority, non -- minority and absolute
majority are demonstrably safe from dictators and vetoers when used under an
egalitarian regime so only the weighting vector needs to be checked.
Dictators, Vetoers and Weighting Vectors
1. Weighted majority and weighted non -- minority rule
If the collective choice function is either of the above, for ~ρ = (ρ1, . . . , ρn)
and the weighting vector has been scaled so that ρ1 has weight 1.
In
which case, the worst case for the dictator is that all vote against, so for
the dictator to succeed ρdictator > W (~ρ)
Because both of these collective choice functions are dual; it should be
clear ρdictator = ρvetoer.
Consequently, ρmax < W (~ρ)
, is sufficient for both of these.
/ 2.
2
2. Absolute majority
To succeed, ρdictator > α · W (~ρ), so the converse is required.
A vetoer has it easier ρvetoer > (1 − α) · W (~ρ), so the converse.
35
Weighting Vectors that are Essential to Voters Under egalitarian rule,
all voting functions are sensitive to all voters, because if any voter is sensitive,
a permutation can put another voter in his place, so again the collective choice
function will not be at fault should a system of rule prove insensitive, it will be
the weighting vector.
There are two possibilities:
• The voter has a weighting of zero
• The voter has a weighting which can never be decisive
Whether a voter has a non -- zero vote can only be tested for; probably by
using the weighted majority rule function with all other voters not voting.
Having a vote that is never decisive is more subtle. The weighting vector is
as usual, with the lowest rated voter in first position having value 1. Construct
a dictator to each voter in the following manner.
ρ1 = 1
ρ2 = ρ1 + 1
ρ3 = ρ2 + ρ1 + 1
. . .
ρn−1 = ρn−2 + · · · + ρ2 + ρ1 + 1
ρn = ρn−1 + ρn−2 + · · · + ρ2 + ρ1 + 1
ρn = ρn−1 + ρn−1
ρn = 2ρn−1
ρn = 2 · 2 · · n − 1 times · 1
ρn = 2n−1
A necessary conditions on weighting vectors can be set, each ρi < 2n−1 if
W (~ρ) ≥ 2n − 1 -- geometric progression. There are effectively two choices:
• Set n ≥ 3, max ρi = 2n−1 − 1, in which case W (~ρ) ≥ 2n − 2 and all other
voters will tie with the largest voter.
• Set n ≥ 4, max ρi = 2n−1 − 2, in which case W (~ρ) ≥ 2n − 3 and all other
voters will defeat the largest voter.
For ~ρ = (ρ1, . . . , ρi, . . . , ρn)
∄ρi >
1
2
n
X
j=1
ρj
B.4 Representative Systems
A representative system can be thought of as a heirachy of voting councils in
which the outcomes of votes in lower councils become votes in higher councils.
A voter in one of the higher councils may be a voter or a voting council. Each
voting council can use weighted majority rule between its members. Voters (or
councils) can vote more than once in different councils.
36
Definition B.13 (Representation). Let a heirachy of voting councils be de-
fined as a representation R. Let each level of representation be denoted by a
suffix, the lowest level being R0.
To make the lowest level similar in mathematical structure to higher levels,
we shall introduce a selection function Si which selects from a preference profile,
D, the preference of voter i.
Si : {1, 0, −1}n 7→ {1, 0, −1}
Si(D) = Di
R0 can then be written as:
R0 = {S1(D), . . . , Sn(D)}
So R0 is simply the decision profile as a set.
Thereafter, there is a level m ∈ N which is such that:
Rm = {s(F1, . . . , FK)(Rm−1)}
This is effectively voting using a tree structure and is probably the most used
organizational control system. Unfortunately, it is proving to be very difficult
to analyze. Hopefully, more results will arise.
C Funding and Author Details
Research was funded by the Engineering and Physical Sciences Research Council
of the United Kingdom. Thanks to Malcolm Clarke, Russell -- Wynn Jones and
Robert Thurlby.
Walter Eaves
Department of Electrical Engineering,
Brunel University
Uxbridge,
Middlesex UB8 3PH,
United Kingdom
[email protected]
[email protected]
http://www.bigfoot.com/∼Walter.Eaves
http://www.brunel.ac.uk/∼eepgwde
References
[Arr63]
[ARS98]
Kenneth Arrow. Social Choice and Individual Values. Yale Univer-
sity Press, second edition, 1963.
Hajnal Andr´eka, Mark Ryan, and Pierre-Yves Schobbens. Opera-
tors and laws for combining preference relations. World -- Wide Web,
1998. http://www.dmi.ens.fr/∼vaudenay/spw97/.
37
[Bla58]
[BO82]
[Boo94]
[BW94]
[Cas97]
[Cor84]
[Cur90]
[Den76]
[Den82]
[Den89]
Duncan Black. The theory of committees and elections. Cambridge
University Press, 1958.
Tamer Baser and Geert Jan Olsder. Dynamic Noncooperative Game
Theory, volume 160 of Mathematics in Science and Engineering.
Academic Press, London, 1982.
Grady Booch. Object-oriented analysis and design with applications.
Benjamin/Cummings, 1994.
E. Bertino and H. Weigand. An approach to authorization modeling
in object-oriented database systems. Data & Knowledge Engineer-
ing, 12:1 -- 29, 1994.
Silvana Castano. An approach to deriving global authorizations
in federated database systems.
In P Samarati and R S Sandhu,
editors, Database Security X: Status and Prospects, International
Federation for Information Processing. Chapmand and Hall, 1997.
Digital Equipment Corp. VAX/VMS DCL commands and lexi-
cal functions. Technical Report AA-Z003A-TE, Digital Equipment
Corp. (DEC), Maynard, Mass., September 1984.
David A. Curry.
Improving the security of your unix system.
Technical Report ITSTD-721-FR-90-21, SRI International, 1990.
http://julmara.ce.chalmers.se/Security/security-doc.tar.gz.
Dorothy E. Denning. A lattice model of secure information flow.
Communications of the ACM, 19(5):236 -- 243, May 1976. Papers
from the Fifth ACM Symposium on Operating Systems Principles
(Univ. Texas, Austin, Tex., 1975).
Dorothy Elizabeth Robling Denning. Cryptography and data secu-
rity. Addison -- Welsey, 1982.
D E Denning. Secure databases and safety: some unexpected con-
flicts. In T Anderson, editor, Safe and Secure Computing Systems,
chapter 6. Blackwell, Oxford, 1989.
[Dor79]
Gideon Doron.
Is the hare voting scheme representative? The
Journal of Politics, 41(3):918 -- 922, August 1979. In Research Notes.
[Eav99a] Walter Eaves. mypack.m. Mathematica Package: Available by FTP,
January 1999. ftp://ftp.brunel.ac.uk/eepgwde/myPack.m.
[Eav99b] Walter D Eaves. ODP channel objects that provide services trans-
parently for distributing processing systems. Technical report, e --
print archives, April 1999, http://xxx.lanl.gov/abs/cs.DC/9904020.
[EFL+97] R J Ellison, D A Fisher, R C Linger, H F Lipson, T Longstaff,
and N R Mead. Survivable network systems: An emerging dis-
cipline. Technical Report CMU/SEI-97-TR-013, Carnegie Mel-
lon University, Software Engineering Institute, November 1997.
http://www.cert.org/research/97tr013.pdf.
38
[Far69]
Robin Farquharson. Theory of voting. Blackwell, Oxford, 1969.
[Fis73]
[Fis74]
[HH94]
[HK96]
Peter C Fishburn. The Theory of Social Choice. Princeton Univer-
sity Press, 1973.
Peter C Fishburn. Social choice functions. SIAM Review, 16(1):63 --
90, January 1974.
B A Hubermann and T Hogg. Communities of practice: Perfor-
mance and evolution. World-Wide Web, 1994. ftp://parcftp.xerox.
com/pub/dynamics/multiagent.html.
B A Hubermann and M Kaminsky. Beehive: A system for filtering
and sharing information. World-Wide Web, 1996.
ftp://parcftp.
xerox.com/pub/dynamics/multiagent.html.
[How89]
J V Howard. Implementing alternative voting in kingmaker trees.
Technical report, STCRED, London School of Economics, 1989.
[Ins99]
[Isb60]
[ISO95]
[Jum98]
[Lew91]
[LMN97]
[May52]
[Mil95]
Wolfram Research Institute. Mathematica. World Wide Web,
February 1999. http://www.wri.com.
J R Isbell. Homogeneous games - II. Proceedings of the American
Mathematical Society, 11(2):159 -- 161, April 1960.
ISO. Reference model: Architecture (10).
In A Herbert, edi-
tor, Information technology - Open distributed processing, number
903 in Series X Recommendations X.900 to X.1000. International
Telecommunication Union, International Telecommunication Union
(ITU), Place des Nations, CH-1211 Geneva 20, Switzerland, 1995.
http://info.itu.ch/itudoc/itu-t/rec/x/x500up.html.
James G. Jumes, editor. Microsoft Windows NT 4.0 Security, Au-
dit, and Control. Microsoft Technical Reference. Microsoft Press,
December 1998. ISBN 157231818X.
Donald A. Lewine. POSIX programmer's guide: writing portable
UNIX programs with the POSIX.1 standard. O'Reilly & Associates,
Inc., 981 Chestnut Street, Newton, MA 02164, USA, 1991. March
1994 printing with corrections, updates, and December 1991 Ap-
pendix G.
Charlie Lai, Gennady Medvinsky, and B. Clifford Neuman. En-
dorsements, licensing, and insurance for distributed services.
In
Lee W Knight and Joseph P Bailey, editors, Internet Economics,
chapter Internet Commerce. MIT Press, 1997.
Kenneth May. A set of independent necessary and sufficient con-
ditions for simple majority decisions. Econometrica, 20:680 -- 684,
1952.
John H Miller. Evolving information processing organizations. Re-
search note, Carnegie Mellon University, Social and Decision Sci-
ences, Carnegie Mellon University, Pittsburgh, PA 15213, 1995.
http://zia.hss.cmu.edu/miller/.
39
[Min89]
[Min95]
N. H. Minsky. Law-governed software processes. In D. E. Perry, ed-
itor, Proceedings of the 5th International Software Process Work-
shop, pages 98 -- 100, October 1989.
Naftaly Minsky. Coordination and trust in open distributed sys-
tems. Technical report, Rutgers University, NJ, March 1995.
http://www.cs.rutgers.edu/∼minsky/public-papers/trust-paper.ps.
[MSK99a] Event msg: The browser has forced an election... Microsoft Per-
sonal Supprt Center, January 1999. http://support.microsoft.com/
support/kb/articles/q103/0/42.asp, Article ID: Q103042.
[MSK99b]
Information on browser operation. Microsoft Personal Supprt
Center, January 1999.
http://support.microsoft.com/support/kb/
articles/q102/8/78.asp, Article ID: Q102878.
[PB81]
Bernard Monjardet Pierre Batteau, Jean-Marie Blin. Stability of
aggregation procedures, ultrafilters and simple games. Economet-
rica, 49(2):527 -- 534, March 1981.
[RBKW91] Fausto Rabitti, Elisa Bertino, Won Kim, and Darrell Woelk. A
model of authorization for next-generation database systems. ACM
Transactions on Database Systems, 16(1):88 -- 131, March 1991. http:
//www.acm.org/pubs/toc/Abstracts/tods/103144.html.
[Ricly]
Craig Richmond.
Setting up a basic DNS server for a do-
main. World -- Wide Web, 1993 July. http://web.syr.edu/∼jmwobus/
comfaqs/faq-dns.
[Saa94]
Donald Saari. Geometry of Voting. Springer, 1994. BLPES JF1001.
[Sch96]
[Ski90]
Bruce Schneier. Applied Cryptography: Protocols, Algorithms, and
Source Code in C. John Wiley & Sons, Inc, 1996.
Steven S. Skiena.
Implementing Discrete Mathematics: Combi-
natorics and Graph Theory with Mathematica, with programs by
Steven Skiena and Anil Bhansali. Addison-Wesley, Reading, MA,
USA, 1990.
[SN89]
P A Samuelson and W D Nordhaus. Economics. McGraw -- Hil, 13
edition, 1989.
[SUN98]
Java security. World -- Wide Web, 1998.
products/jdk/1.2/docs/guide/security/.
http://java.sun.com/
[Usi64]
Zalman Usiskin. Max-min probabilities in the voting paradox. An-
nals of Mathematical Statistics, 35(2):857 -- 862, June 1964.
[VOT98]
[Wel99]
Alternative systems for calculating winners of multi-option votes.
World -- Wide Web Document Queens University Belfast, Jan 1998.
http://www.qub.ac.uk/mgt/papers/prefer/prefcalc.html.
Brian Wellington. An introduction to Domain Name System se-
curity. World -- Wide Web Document from TISLabs at Network
Associates, January 1999. http://www.nai.com/products/security/
tis research/netsec/dnssec-paper.html.
40
[Zec69]
Richard Zeckhauser. Majority rule with lotteries on alternatives.
The Quarterly Journal of Economics, 83(4):696 -- 703, 1969. Nov.
41
|
1306.3134 | 6 | 1306 | 2016-10-31T21:06:12 | Opinion dynamics and wisdom under out-group discrimination | [
"cs.MA",
"cs.SI",
"nlin.AO"
] | We study a DeGroot-like opinion dynamics model in which agents may oppose other agents. As an underlying motivation, in our setup, agents want to adjust their opinions to match those of the agents of their 'in-group' and, in addition, they want to adjust their opinions to match the 'inverse' of those of the agents of their 'out-group'. Our paradigm can account for persistent disagreement in connected societies as well as bi- and multi-polarization. Outcomes depend upon network structure and the choice of deviation function modeling the mode of opposition between agents. For a particular choice of deviation function, which we call soft opposition, we derive necessary and sufficient conditions for long-run polarization. We also consider social influence (who are the opinion leaders in the network?) as well as the question of wisdom in our naive learning paradigm, finding that wisdom is difficult to attain when there exist sufficiently strong negative relations between agents. | cs.MA | cs |
Opinion dynamics and wisdom under out-group discrimination
Steffen Eger
Computer Science Department
Technische Universitat Darmstadt
Abstract
We study a DeGroot-like opinion dynamics model in which agents may oppose other agents. As an
underlying motivation, in our setup, agents want to adjust their opinions to match those of the agents
of their 'in-group' and, in addition, they want to adjust their opinions to match the 'inverse' of those of
the agents of their 'out-group'. Our paradigm can account for persistent disagreement in connected
societies as well as bi- and multi-polarization. Outcomes depend upon network structure and the
choice of deviation function modeling the mode of opposition between agents. For a particular choice
of deviation function, which we call soft opposition, we derive necessary and sufficient conditions for
long-run polarization. We also consider social influence (who are the opinion leaders in the network?)
as well as the question of wisdom in our naıve learning paradigm, finding that wisdom is difficult to
attain when there exist sufficiently strong negative relations between agents.1
1 Introduction
On many economic, political, social, and religious agendas, disagreement among individuals is pervasive.
For example, the following are or have been highly debated: whether abortion, gay marriage, or death
penalty should be legalized or not; whether Iraq had weapons of mass destructions; the scientific standing
of evolution; whether taxes/social subsidies/unemployment benefits/(lower bounds on) wages should be
increased or decreased; the right course of government in general; the effectiveness of alternative (or
'standard') medicine such as homeopathy.2
In fact, in certain contexts such as the political arena,
disagreement is 'built into' and essential part of the system of opinion exchange (Jones, 1995; Cohen,
2003). Yet, contradicting this factual basis, it has been observed that the phenomenon of disagreement
is not among the predictions of renown and widely used theoretical models of opinion dynamics in the
social and economic context.3 Namely, in these models, a standard prediction is that agents tend toward
a consensus opinion, that is, that all agents eventually hold the same opinion (or belief)4 about any
specific issue. Typically, this applies to both (fully rational) Bayesian frameworks -- which is the reason
why Acemoglu and Ozdaglar (2011) call them "[no] natural framework[s] for understanding persisent
disagreement" (p. 6) -- and non-Bayesian (boundedly rational) setups such as the famous DeGroot
model of opinion dynamics (DeGroot, 1974), where consensus obtains as long as the social network
wherein agents communicate with each other is strongly connected (and aperiodic).
Concerning the non-Bayesian DeGroot model, as we consider in this work, a few amendments have
more recently been suggested which are capable of producing disagreement among agents. In one strand
of literature, models including a homophily mechanism, whereby agents limit their communication to
individuals whose opinions are not too different from their own, can reproduce patterns of opinion diver-
sity and disagreement (Deffuant et al., 2000; Hegselmann and Krause, 2002). In another strand, Daron
Acemoglu and colleagues (cf. Acemoglu and Ozdaglar, 2011) introduce two types of agents, regular and
stubborn, whereby the latter never update their opinions but 'stubbornly' retain their old beliefs, which
1Earlier and more verbose working paper versions of this article can be found at http://arxiv.org/pdf/1306.3134 and
the author's personal website.
2Our examples are, i.a., taken from Abramowitz and Saunders (2005), Acemoglu and Ozdaglar (2011), and Golub and
Jackson (2012).
3See, e.g., the discussions Acemoglu and Ozdaglar (2011); Acemoglu et al. (2013). See also Abelson (1964).
4Typically, in the literature, the term belief is used when there exists a truth for an agenda, and the term opinion is
used when truth is not explicitly modeled. Like our related work, we more generally subsume under the term opinions also
beliefs, judgements, estimations, or even norms and values, depending on the application scenario.
1
may be considered an autarky condition. Multiple stubborn agents with distinct opinions on a certain
agenda may then draw society toward distinct opinion clusters. Such stubborn agents, it is argued, may
appear in the form of opinion leaders, (propaganda) media, or political parties that wish to influence
others without receiving any feedback from them. As a solution to the disagreement problem, however,
both of these model types rely on a problematic 'disconnectedness condition', insofar as disagreement
only obtains when there is no (uni- or bilateral) information flow between certain subclasses of agents.
In this work, we investigate an alternative explanation of disagreement, which can also explain dis-
agreement in connected societies. We consider a non-Bayesian DeGroot-like opinion dynamics model in
which agents are related to each other via two types of links. One link type represents the degree or
intensity of relationship between agents and is given by nonnegative real numbers. The other link type
represents whether agents follow or oppose (deviate from) each other, that is, it represents the kind of
relationship between agents. We assume that group identity causes agents to follow their in-group mem-
bers and to deviate from their out-group members. In-group favoritism and out-group discrimination are
important and well-established notions in social psychology (see, for instance, Tajfel et al., 1971; Brewer,
1979; Castano et al., 2002). They have also more recently been included in economists' models (e.g., in an
experimental context, Charness, Rigotti, and Rustichini, 2007; Ben-Ner et al., 2009; Chen and Li, 2009;
Hargreaves Heap and Zizzo, 2009; Fehrler and Kosfeld, 2013; Tsutsui and Zizzo, 2014). Experimentally,
it has been shown that even minimal group identities, induced by a random labeling of groups, may lead
to intergroup discrimination. When group membership is more salient, Charness, Rigotti, and Rustichini
(2007) show that there is much more cooperation between in-group members than between out-group
members in a prisoner's dilemma game, and Fehrler and Kosfeld (2013) show that individuals associating
with particular NGOs (non-governmental organizations) strongly discriminate against out-group mem-
bers (those that do not associate with an NGO) in a trust game.5 Analogously, we assume that agents
want to coordinate with their in-group members (have negative utility from holding different opinions
than in-group members) and want to anti-coordinate with their out-group members (have negative utility
from not deviating from the opinions that their out-group members hold).6 A special case of our model is
when an agent opposes everyone but himself, i.e., his in-group is himself and his out-group is all 'the rest'.
In some works, such agents have been referred to as rebels or anti-conformists in contrast to conformists
(Jackson, 2009; Cao et al., 2011; Javarone, 2014; Jarman et al., 2015).
Our model closely follows the literature on learning through communication in a given social network
(cf. DeGroot (1974); DeMarzo, Vayanos, and Zwiebel (2003); Golub and Jackson (2010); Acemoglu,
Ozdaglar, and ParandehGheibi (2010); Buechel, Hellmann, and Klossner (2015)). There, the standard
assumption is that agents learn from others in a naıve manner, not properly accounting for the repetition
of opinion signals, which DeMarzo, Vayanos, and Zwiebel (2003) call 'persuasion bias'. A now classical
argument is that if all agents' initial beliefs/opinions were independent and unbiased estimates of the true
value (of a discussion topic), then taking a weighted average of the agents' beliefs in one's social network
(where the weights are proportional to the inverses of the beliefs' variances) is an optimal aggregation
strategy. Then, continuing to average -- in order to incorporate more remote information, e.g., from
friends of friends -- in the same manner is a boundedly rational heuristic that treats the evolving
information signals as novel, not accounting for their cross-contamination. Such a heuristic aggregation
of opinion signals appears quite plausible given the processing costs involved in exact inference in this
setup (cf. Golub and Jackson, 2010). Also, recent experimental evaluations find that the naıve DeGroot
model is a much better approximation of information aggregation in network interactions than 'fully
rational' Bayesian approaches and that individuals are indeed affected by persuasion bias (Corazzini et
al., 2012). In our model, we posit that agents are subject to the same biases involving processing of cross-
contaminated information and are, in addition, susceptible to in-group bias, attempting to coordinate
5In a 'field' setting, the in-group/out-group distinction may prominently be seen as arising, e.g., in a (main stream)
culture/counterculture (e.g., hippies, punks, etc.) dichotomy (Yinger, 1977) or in classical party divisions (e.g., Republicans
vs. Democrats) in the field of politics, etc.
6Out-group discrimination (opposition) is also closely related to what has been termed rejection of beliefs, actions,
and values of dissimilar/disliked others. According to this concept, agents change their normative systems to become
more dissimilar to interaction partners they dislike (cf. Abelson, 1964; Kitts, 2006; Tsuji, 2002; cf. also Groeber, Lorenz,
and Schweitzer, 2013) insofar as disliked others may serve as 'negative referents' who inspire contrary behavior. While in
controlled experiments Tak´acs, Flache, and Mas (2014) do not find strong evidence for the tenet that individuals disassociate
from the opinions of a disliked source, their study explicitly excludes a group identity structure. Moreover, as the authors
argue, their laboratory experiment may have "suppressed the emotional processes that in field settings induce disliking and
rejection of others' opinions."
2
with in-group members and to anti-coordinate with out-group members.7
This work is structured as follows. Section 2 presents the model and gives two introductory exam-
ples. Sections 3 and 4 present our main results, on persistent disagreement (Theorem 3.1) and bi- and
multi-polarization (Proposition 3.1). For a special case of our model, we derive necessary and sufficient
conditions for long-run polarization (Theorem 4.1) as well as opinion leadership (Theorem 4.2) as further
main results. In Section 5, we summarize and conclude with a discussion on wisdom. To make this work
more or less self-contained, we provide concepts, e.g., from graph and matrix theory in the appendix, to
which we also relegate all our proofs.
2 Model
Let S be a finite set ('discrete model') or a subset of the real numbers ('continuous model'), which we
refer to as opinion spectrum.8 Let n ≥ 1 and let [n] = {1, . . . , n} be a set of n agents. Consider the
normal form game ([n], S1 × · · · × Sn, U ), where
• [n] is the set of players,
• S = S1 = · · · = Sn is the action set of each player,
• and U = (u1, . . . , un), where ui : Sn → R is the payoff/utility function of player i ∈ [n].
Let F be the identity function on S -- that is, F(x) = x for all x ∈ S -- and let D be a function D : S → S
that is not the identity function, and which we term deviation function (in the most general form of our
model, we let deviation functions D depend on particular agents i and j involved, that is, we subscript
D as in Di or Dij ). We assume that agents are connected via a (social) network W, where Wij ≥ 0
denotes the strength of relationship between agents i and j.9 More precisely, Wij signals the degree of
importance of agent j for agent i, and we do not require W to be symmetric, that is, Wij and Wji may
j=1 Wij = 1, for all i ∈ [n].10 Assume further that player i has payoff
differ. Assume that Wii = 0 and Pn
for action profile (b1, . . . , bn)
ui(b1, . . . , bn) = − Xj∈In(i)
Wij (bi − F(bj))2 − Xj∈Out(i)
Wij (bi − D(bj))2
(2.1)
for the continuous model. Here, In(i) ⊆ [n] is the in-group (set of friends) of player i and Out(i) ⊆ [n] is
the out-group (set of enemies) of player i. For the discrete model, assume that the analogous payoff is
ui(b1, . . . , bn) = − Xj:j∈In(i),bi6=F(bj )
Wij −
Xj:j∈Out(i),bi6=D(bj )
Wij .
(2.2)
Utility functions ui in Eq. (2.1) and Eq. (2.2) say that player i has disutility from choosing a different
action than his friends and has disutility from choosing a different action than the 'opposite' action of
his enemies, where D specifies what the opposite of an action is.
When each agent repeatedly plays a best response to the actions -- which in our setup are opinions
-- of the other players, i.e., i ∈ [n] chooses action bi that maximizes ui(·), then, in the continuous model,
opinions evolve over time according to the following weighted average of (possibly, via D, 'inverted') past
opinions:
bi(t + 1) = Xj∈In(i)
Wij bj(t) + Xj∈Out(i)
Wij D(bj(t)) =
n
Xj=1
Wij Fij (bj(t)),
(2.3)
7If one wanted to construct an argument that closely follows that of DeMarzo, Vayanos, and Zwiebel (2003), one might
posit that, in our model, agents 'correct' their out-group members' opinion signals -- possibly because of distrust -- before
averaging.
8For the continous DeGroot model as we discuss, S is typically modeled as a convex subset of the real numbers, that is,
Pj αj xj ∈ S for all finite numbers of elements xj ∈ S and all weights αj ∈ [0, 1] such that Pj αj = 1. For convenience, we
think of S as the whole of R or of some (closed and bounded) interval [α, β] for α ≤ β.
9Throughout, we denote the entries of a vector u as ui or [u]i and analogously for matrices.
10The assumption Wii = 0 can be relaxed, see Groeber, Lorenz, and Schweitzer (2013). In subsequent sections, we do not
always assume that Wii = 0.
3
for t = 0, 1, 2, . . ., starting from some particular initial actions bi(0). Here, Fij ∈ {F, D}, depending
on whether j is in i's in-group or out-group, respectively. For the discrete model, the analogous best
response action is weighted majority voting of agents' (possibly inverted) past opinions:
bi(t + 1) = arg max
,
(2.4)
n
Xj=1
s∈S
Wij 1(cid:0)Fij (bj(t)), s(cid:1)
where 1(r, t) = 1 if r = t and zero otherwise. Casting the updating processes (2.3) and (2.4) in a more
compact 'operator' notation, we write (F being the n × n 'matrix' with entries Fij )
b(t + 1) = (W ⊙ F)(b(t)).
(2.5)
Here, we let the 'operator' W ⊙ F act on a vector b ∈ Sn in the manner prescribed in (2.3) and (2.4),
j=1 Wij · Fij (bj) and analogously for the discrete model.11 Equation (2.5) may
i.e., (cid:2)(W ⊙ F)(b)(cid:3)i
again be rewritten as
def= Pn
b(t) = (W ⊙ F)t(b(0)),
(2.6)
by which we denote the t-fold application of operator W ⊙ F on b(0), that is, f t(b) = f (· · · f (f (b))),
where f = W ⊙ F. In the sequel, we refer to W ⊙ F as 'operator' or 'social network'.
Remark 2.1. In case F is the n × n matrix of identity functions, updating process (2.6) collapses to the
standard DeGroot learning model where (W ⊙ F)t is simply the t-th matrix power of matrix W. From
an alternative (equivalent) viewpoint, our model generalizes the standard DeGroot model insofar as the
latter posits that Out(i) = ∅ for all i ∈ [n].
We note that since the operator W ⊙ F in opinion updating process (2.5) retrieves best responses
of agents to an opinion profile b(t), under utility functions ui(·) as in (2.1) or (2.2), the fixed-points of
W ⊙ F -- that is, the points b such that (W ⊙ F)(b) = b -- are the Nash equilibria of the normal form
games ([n], Sn, U (·)). Namely, for each such a fixed-point, all players in [n] play best responses to the
other players' actions (opinions).
We now illustrate our model with two examples, outlining its relationship to other models discussed
in the literature and hinting at its potential for long-run disagreement.
Example 2.1. Let S = {0, 1} be a binary opinion space. Assume that
D(x) =(1
0
if x = 0,
if x = 1.
Let Wij = 1
N (i) , where N (i) denotes the set of neighbors of agent i in the social networks, i.e., the set
of agents j for which Wij > 0. When Fij = F for all j ∈ [n], and agent i updates opinions according
to (2.4), then, at each time step, agent i chooses the majority opinion among his neighbors' opinions.
Such individuals have also been called 'conformists' in some contexts; e.g., Jackson (2009); Cao et al.
(2011); Javarone (2014); Jarman et al. (2015). Conversely, when Fij = D for all j ∈ [n], and agent i
updates opinions according to (2.4), then, at each time step, agent i chooses the minority opinion (=
majority of inverted opinions) among his neighbors' opinions. Such individuals have also been called
'anti-conformists' or 'rebels'. When weights are non-uniform and/or agents follow some of their peers
while deviating from others, then the current setup may yield interesting generalizations of the basic
conformist/non-conformist model.12
11For short, we will usually write (W ⊙ F)b instead of (W ⊙ F)(b).
12 It is also worthy to note that binary opinion spaces (in a conformist/anti-conformist setup) are closely related to games
on networks (cf. Jackson, 2009 and references therein) with binary action spaces. In a society with only anti-conformists
on simple graphs (undirected graphs with no self-loops), maximally independent sets S ⊆ [n] of agents for which it holds
that Wi,S = Pj∈S Wij > 1/2 for all i ∈ [n]\S form pure strategy Nash equilibria of the underlying games in the sense that
assigning one action/opinion to all agents in S and the complementary action/opinion to all agents in [n]\S constitutes a
setting where each agent plays a best response to the actions/opinions of the others. In a society with both conformists
and anti-conformists, (pure strategy) Nash equilibria exist on networks in which each agent assigns weight mass > 1/2 to
conformists: an equilibrium is where all the conformists take one action (hold one opinion), and all the anti-conformists the
other (cf. Jackson, 2009, p.272).
4
Example 2.2. In this example, we let S = [−1, 1] and think of the opinion x = −1 as extreme left-wing
opinion, x = +1 as extreme right-wing opinion and of opinions −1 < x < 1 as more moderate opinions
(x = 0 as 'center' opinion). Assume there are six individuals, organized in four groups A, B, C, D,
members of each of which follow members of their own group and deviate from the members of the other
groups. Hence, let [n] = {1, 2, 3, 4, 5, 6}, A = {1, 2}, B = {3}, C = {4, 5}, D = {6}, and
Out(1) = Out(2) = {3, 4, 5, 6}, Out(3) = {1, 2, 4, 5, 6},
Out(4) = Out(5) = {1, 2, 3, 6}, Out(6) = {1, 2, 3, 4, 5}.
Assume the following specification of deviation functions for members in each group of agents:
DA(x) = 1, DB(x) = −1, DC (x) =
x
2
,
(2.7)
DD,AB(x) = −x, DD,C (x) = sgn(x)px,
for all x ∈ [−1, 1]. Put differently, agents in group A ignore the actual opinion signals of members of their
out-groups, simply interpreting any uttered opinion of an out-group individual as evidence of the opinion
1. Similarly, agents in group B interpret any opinion signal uttered by an out-group agent as evidence
for opinion −1. Agents in group C are moderate in that they 'discount' (extreme) viewpoints that their
out-group members hold. Finally, agents in group D more literally invert the opinions of members of
(their out-)groups A and B -- possibly knowing of these agents' predispositions for extreme opinions of
particular kinds. Moreover, they map the opinions of members of (their out-)group C to more extreme
opinions for any value of x between −1 and 1 -- possibly knowing of these agents' biases toward moderate
opinions. According to this specification, matrix F looks as follows:
F =
F
F
DB
DC
DC
F
F
DB
DC
DC
DA
DA
F
DC
DC
DA
DA
DB
F
F
DD,AB DD,AB DD,AB DD,C DD,C
DA DA
DA DA
DB DB
DC
F
F
DC
F
.
In Figure 1, we plot sample opinion dynamics when agents start with the initial consensus b(0) =
(µ, . . . , µ)⊺, where µ = 1/4, and for an arbitrarily selected positive row-stochastic matrix W ∈ R6×6.
Note how, in this case, agents' opinions polarize into extreme and moderate viewpoints and note how the
opinion dynamics process (apparently) converges and stabilizes as time progresses. In the same figure,
we also sketch the deviation functions defined in Equation (2.7).
3 Persistent disagreement, bi- and multipolarization
In this section, we consider our extended DeGroot model in the abstract situation of arbitrary deviation
functions D. Our results in this context concern the possible consensus opinions that agents may hold
in our model in the long-run (Theorem 3.1). We will find that the long-run consensus vectors can
be determined quite simply: under appropriate weight conditions, a certain consensus opinion vector
(c, . . . , c) is an equilibrium if and only if c is a (D-)neutral opinion with respect to each agent's deviation
function D, i.e., D maps the opinion c to itself. This is our persistent disagreement result: as long as there
exist (sufficiently strong) out-group relations between agents, society will disagree forever if there is no
opinion which is neutral for each agent, no matter the agents' initial opinions. After investigating long-run
persistent disagreement, we consider a particular form of disagreement, namely, bi- and multi-polarization
(for abstract and arbitrary deviation functions D).
To begin with our formal analysis, we define a few concepts. Let C be the set of consensus opinion
vectors in Sn, i.e.,
C = {(a1, . . . , an) ∈ Sn a1 = · · · = an}.
Let Y be an arbitrary set and let Q be an arbitrary function Q : Y → Y . By Fix(Q), we denote the set
of fixed-points of Q, that is, the set of all x ∈ Y such that Q(x) = x. For a deviation function D, we call
5
1
0.5
0
-0.5
-1
-1
1
x/2
−1
−x
sgn(x)x0.5
x
1
0.8
0.6
0.4
0.2
0
-0.2
-0.4
-0.6
-0.8
-1
-0.5
0
0.5
1
Agent 1
Agent 2
Agent 3
Agent 4
Agent 5
Agent 6
0
2
4
6
8 10 12 14 16 18 20
t = 0, 1, 2, . . .
Figure 1: Left: Deviation functions DA, DB, DC , and DD,AB, DD,C specified in the Equation (2.7), as
well as identity function F, on S = [−1, 1]. Right: Opinion dynamics for the society described in the
example, starting from the initial consensus (1/4, . . . , 1/4) at time 0. Agents 1 and 2 belong to group A,
agent 3 makes up group B, agents 4 and 5 belong to group C, and agent 6 makes up group D. Weights
Wij set to arbitrary positive values.
an opinion x ∈ S for which D(x) = x (D-)neutral. Let A ⊆ [n] be an arbitrary subset of the set of agents
and let i ∈ [n] be a particular agent. We denote by Wi,A :=Pj∈A Wij the total weight mass i assigns to
group A.
Theorem 3.1. Let W ⊙ F be an arbitrary social network such that Fij ∈ {F, Di}, for all i, j ∈ [n].
Assume that either W ⊙ F refers to the discrete model or that each function Fij in F is continuous. Let
A = {i ∈ [n] Wi,Out(i) > C0} denote the set of agents whose weight mass assigned to out-group members
exceeds a particular threshold C0; in the discrete case, C0 = 1
2 , and in the continuous case, C0 = 0. Then:
P1[Lim(W ⊙ F) ∩ C] = \i∈A
Fix(Di),
where Lim(W ⊙ F) = {b ∈ Sn b = limt→∞(W ⊙ F)tb(0), for some b(0) ∈ Sn} denotes the set of
opinion profiles b ∈ Sn that may result in the limit of opinion updating process (2.6). Moreover, P1
projects consensus vectors (c, . . . , c) ∈ Sn on their first coordinate c ∈ S. If A is the empty set, we let
Remark 3.1. One of the implications of Theorem 3.1 is persistent disagreement, under the assump-
tions of the theorem and further rather mild conditions, as a prediction of our generalized DeGroot
Ti∈A Fix(Di) = S.
updating process (2.6). Namely, in particular, the relation Ti∈A Fix(Di) = ∅ follows when, for instance:
• One agent's deviation function is radical : Fix(Di) = ∅.
• Two agents' assessment of what constitutes a neutral opinion differs: Fix(Di) ∩ Fix(Dj) = ∅.
More generally, persistent disagreement follows whenever the agents in society have no common
interpretation of neutrality: there exists no opinion c ∈ S such that c is Di-neutral for all agents i.
Moreover, concerning deviation functions D, our only assumption was that there are points which they do
not fix. Modeling deviation, however, a plausible (stronger) restriction on D is that D(x) 6= x for many,
most, or all x ∈ S. Thus, potential long-run agreement, that is, Ti∈A Fix(Di) 6= ∅, would be particularly
difficult to obtain, because this consists of a condition that is unlikely on the level of individual agents,
and in addition contains a cross-agent constraint that deviation functions would have to fix the same
point(s) x ∈ S for all agents.
6
Example 3.1. We apply Theorem 3.1 to the examples discussed previously. In Example 2.1, Fix(D) = ∅,
so in a conformist/anti-conformist society, consensus cannot ensue if at least one agent opposes more than
half of his social network.
In Example 2.2, Fix(DA) = {1}, Fix(DB) = {−1}, Fix(DC ) = Fix(DD,AB) = {0}, and Fix(DD,C ) =
{0, 1, −1}. While Theorem 3.1 does not directly apply to Example 2.2, since agent 6's deviation functions
vary across out-group agents, we can nonetheless apply the theorem to the society consisting of agents
1 through 5 and conclude that reaching a consensus is not possible for this subsociety since, e.g., ∅ =
{1} ∩ {−1} (and assuming that respective weights satisfy the positivity assumption outlined in the
theorem). Hence, since agents 1 to 5 cannot reach a consensus, then also agents 1 to 6 -- the overall
society in the example -- cannot reach a consensus.
Polarization
We now investigate (bi-)polarization as an outcome of our opinion updating dynamics. We call an
opinion vector p ∈ Sn a (bi-)polarization if p consists of two elements a, b ∈ S exclusively, that is, if
[p]i ∈ {a, b} for all i = 1, . . . , n. Note that according to our definition, a consensus vector is a special case
of a polarization. We first define network structures that are sufficient for inducing polarization opinion
vectors.
Definition 3.1 (Opposition bipartite operator W ⊙ F). We call the operator W ⊙ F opposition bipartite
if there exists a partition (N1, N2) of the set of agents [n] into two disjoint subsets -- [n] = N1 ∪ N2,
with N1 ∩ N2 = ∅ -- such that agents in Nk follow each other, for k = 1, 2, while for all agents i ∈ Nk,
j ∈ N−k, for k = 1, 2, it holds that i deviates from j. More precisely, we require
∀ i, i′ ∈ Nk(cid:16)Wii′ > 0 =⇒ i′ ∈ In(i)(cid:17),
∀ i ∈ Nk, j ∈ N−k(cid:16)Wij > 0 =⇒ j ∈ Out(i)(cid:17),
for k = 1, 2,
for k = 1, 2.
Remark 3.2. Note that our above definition of opposition bipartiteness is equivalent to the condition
that (1) no two agents within each subsociety are enemies of each other and that (2) no two agents across
the two subsocieties are friends of each other.
Also note that we do not necessarily require N1 and N2 to be non-empty. Therefore, the standard
DeGroot model (with exclusively friendship relationships) constitutes a special case of an opposition
bipartite network in which N1 = [n] and N2 = ∅.
Remark 3.3. What we call 'opposition bipartite' operator -- or at least a special case of our concept
-- has also been called 'balanced signed network' in the literature (cf. Beasley and Kleinberg, 2010).
Definition 3.2 (Reverse opposition bipartite operator W ⊙ F). We call the operator W ⊙ F reverse
opposition bipartite if there exists a partition (N1, N2) of the set of agents [n] into two disjoint subsets
such that agents in Nk deviate from each other, for k = 1, 2, while for all agents i ∈ Nk, j ∈ N−k, for
k = 1, 2, it holds that i follows j. More precisely, we require
∀ i, i′ ∈ Nk(cid:16)Wii′ > 0 =⇒ i′ ∈ Out(i)(cid:17),
∀ i ∈ Nk, j ∈ N−k(cid:16)Wij > 0 =⇒ j ∈ In(i)(cid:17),
for k = 1, 2,
for k = 1, 2.
An example of an opposition bipartite operator is given in Example 3.2 below. An example of a
reverse opposition bipartite operator is given in Example 3.3 below. A schematic illustration of both
concepts is given in Figure 2.
Clearly, opposition bipartite networks have polarization opinion vectors as equilibria, when agents in
the same group hold one opinion and agents in the alternative group hold the 'opposite' opinion, as we
illustrate below.
Example 3.2. Let W be arbitrary row-stochastic. Consider
F =
F F D D
F F D D
D D F F
D D F F
.
7
2
1
3
4
6
5
7
2
1
3
4
6
5
7
Figure 2: Schematic illustration of the concepts of opposition bipartite (left) and reverse opposition
bipartite operators (right). We omit network links referring to weights W for clarity and we also draw
links as undirected for the same reason. We omit links Fij where Wij = 0. Red links denote opposition
(D), green links following (F).
Clearly, W ⊙ F is opposition bipartite; for example, take N1 = {1, 2} and N2 = {3, 4}. Moreover,
let S = {"impossible","unlikely","possible","likely","certain"} and let, e.g., "unlikely" and "likely" be
D-opposing viewpoints, i.e., D(a) = b and D(b) = a for a ="unlikely" and b ="likely". Then
p =
is a polarization fixed-point of W ⊙ F.
"unlikely"
"unlikely"
"likely"
"likely"
Reverse opposition bipartite networks may induce oscillating, or fluctuating, opinion updates (cf.
Kramer, 1971), very similar to ordinary periodic networks.
Example 3.3. Let W be arbitrary row-stochastic. Consider
F =
D D F F
D D F F
F F D D
F F D D
.
Clearly, W ⊙ F is reverse opposition bipartite; for example, take N1 = {1, 2} and N2 = {3, 4}. For p and
D as in Example 3.2, we have
"unlikely"
"unlikely"
"likely"
"likely"
7→W⊙F
"likely"
"likely"
"unlikely"
"unlikely"
7→W⊙F
"unlikely"
"unlikely"
"likely"
"likely"
7→W⊙F . . .
Also, note that in this example self-weights Wii may be zero for all agents i, so that agents do not
necessarily have to deviate from their own opinions in order for reverse opposition bipartiteness to be
satisfied.13
Next, we turn from bi-polarization to multi-polarization in which an opinion vector p ∈ Sn consists
of K distinct opinions s1, . . . , sK. We generalize our notion of opposition bipartite networks.
Definition 3.3 (Opposition multi-partite operator W ⊙ F). We call the operator W ⊙ F opposition
K-partite if there exists a partition (N1, . . . , NK), for K ≥ 2, of the set of agents [n] into disjoint subsets
-- [n] = N1 ∪ · · · ∪ NK, with Nk ∩ Nℓ = ∅ for all k 6= ℓ -- such that agents in Nk follow each other,
for k = 1, . . . , K, while for all agents i ∈ Nk, j ∈ Nℓ with k 6= ℓ, it holds that i deviates from j. More
13In fact, in reverse opposition bipartite networks we have either Wii = 0 or we have Wii > 0 and Fii = D, while in
opposition bipartite networks we have either Wii = 0 or we have Wii > 0 and Fii = F.
8
precisely, we require
∀ i, i′ ∈ Nk(cid:16)Wii′ > 0 =⇒ i′ ∈ In(i)(cid:17),
∀ i ∈ Nk, j ∈ Nℓ(cid:16)Wij > 0 =⇒ j ∈ Out(i)(cid:17),
for k = 1, . . . , K,
for k 6= ℓ.
We also call an opposition K-partite operator opposition multi-partite.
Opposition multi-partite networks admit multi-polarizations as outcomes, as a simple generalization
of Example 3.2.
Proposition 3.1. Let W ⊙ F be an opposition K-partite, for K ≥ 2, social network. Moreover, let F
be such that Fij ∈ {F, D1, . . . , DK} for deviation functions D1, . . . , DK that precisely correspond to the
K groups society is made up of (that is, agents in group k, for 1 ≤ k ≤ K, apply deviation function Dk).
Let s1, . . . , sK ∈ S be such that
Dk(sℓ) = sk,
∀ k 6= ℓ.
Then, there exists a multi-polarization opinion vector p consisting of opinions s1, . . . , sK, that is, [p]i ∈
{s1, . . . , sK}, such that (W ⊙ F)p = p.
Example 3.4. For a concrete example, let S = {L, M, R} and consider three different groups with
distinct deviation functions D1(x) = L, D2(x) = M , D3(x) = R for all x ∈ {L, M, R}. Group 1 may
be thought of as always deviating to a left wing opinion, provided that its members deviate from certain
agents; group 2 to a moderate position in the opinion spectrum; and group 3 to a right wing position.
Let, e.g., n = 6, W be arbitrary row-stochastic, and let
F =
F
F
F
F
F
F
D2 D2 D2
D3 D3 D3 D3
D3 D3 D3 D3
F D1 D1 D1
F D1 D1 D1
F D1 D1 D1
F D2 D2
F
F
F
F
.
Clearly, W⊙F is opposition 3-partite (see also Figure 3). It is easy to check that, e.g., p = (L, L, L, M, R, R)
is a fixed-point of W ⊙ F, in accordance with the proposition.
1
2
3
4
5
6
Figure 3: Graphical illustration of Example 3.4. Groups have individualized deviation functions, in
different colors. We omit many links for clarity.
We omit the introduction of reverse opposition K-partite networks, for K ≥ 2, as a straightforward
generalization of reverse opposition bipartite networks. The generalization is along the lines of the
generalization of opposition K-partite networks over opposition bipartite ones.
9
4 Continuous linear deviation functions
We now consider the situation when deviation functions take the affine-linear form
D(x) = a · x + b,
(4.1)
for a, b ∈ R. When deviation functions are of this form and when agents are in addition homogeneous
with respect to their deviation functions, i.e., D does not vary across agents, then the operator W ⊙ F
admits a particularly simple form, namely, that of an affine-linear operator; see Proposition A.2 in the
appendix. Moreover, we consider here the special case when a = −1 and b = 0.14 We consider such D
on opinion spectra S0 that are either of the form [−β, β] for some β > 0 or of the form S = R. We call
this D defined on such opinion spectra soft opposition.15 In this case, social networks W ⊙ F may be
represented by a matrix A that has entries Wij iff j ∈ In(i) and entries −Wij iff j ∈ Out(i).
4.1 A graph theoretical description
In the remainder, we consider the situation when graphs (i) contain no self-loops and are undirected
(simple) in the sense that Wij = Wji and Fij = Fji,16 (ii) contain at most one type of deviation function
D across all agents, and (iii) when D is linear on the opinion spectrum S0; in particular, D is soft
opposition. When networks W ⊙ F are so specified, then, as before, W ⊙ F admits a linear matrix
representation A where A is in addition symmetric: A⊺ = A. We denote this class of networks by
SLS(S0) (for S imple, Linear, S oft opposition, and where the argument refers to the opinion spectrum),
that is,
SLS(S0) = {W ⊙ F ∀i, j ∈ [n](cid:0)Wii = 0, Fij ∈ {F, D}, D soft opposition on S0,
Wij = Wji, Fij = Fji(cid:1)}
denotes the class of social networks on agent sets [n] that satisfy simplicity, symmetricity, etc., as de-
scribed.
2
1
3
4
6
5
7
2
1
3
4
6
5
7
Figure 4: Balanced and imbalanced networks. The left network is opposition bipartite (balanced) while
the right is neither opposition bipartite nor reverse opposition bipartite. In particular, agents 3 and 4
have mutual 'friends' (agents 1, 2) while agent 6 is in 3's out-group and 4's in-group. Alternatively:
agents 4 and 6, from different positively linked factions, have befriended each other.
We make an additional technical assumption here and in the remainder, namely, we generally assume
that the social networks wherein agents interact are aperiodic, that is, the greatest common divisor of the
lengths of their simple cycles is 1. Our main theorem in this context exhaustively categorizes long-run
opinions in terms of three different social network structures as outlined in the theorem. In the theorem,
recall that a graph G is said to be (strongly) connected if there exists a path in G from any node to any
other node. Moreover, in the theorem, we say that W ⊙ F is convergent if W ⊙ F is convergent for all
14The case a > 1 usually implies that opinions 'explode' over time because agents 'overscale' their out-group members'
opinions while a < 1 usually implies that society reaches a 'zero consensus' because agents iteratively discount their
out-group members' opinions.
15We call such D soft opposition because opinions are inverted the less strongly the closer they are to the neutral consensus
zero. In our working paper version, we also define a (discontinuous) deviation function called hard opposition that maps
opinions to extreme inverted values of the opinion spectrum, depending on whether they are positive or negative (depending
on which side of the opinion spectrum they lie, with 0 as reference point).
16This captures reciprocity: amity and enmity are mutual.
10
initial opinion vectors b(0) ∈ Sn, that is, limt→∞(W ⊙ F)tb(0) exists for all b(0) ∈ Sn. We say that
W ⊙ F induces a consensus if W ⊙ F induces a consensus for all initial opinion vectors b(0) ∈ Sn, that
is, W ⊙ F is convergent and limt→∞(W ⊙ F)tb(0) is always a consensus. We say that W ⊙ F is divergent
if it is not convergent. In other words, W ⊙ F is divergent when there exists a vector b(0) such that
limt→∞(W ⊙ F)tb(0) does not exist. We say that W ⊙ F induces a polarization if limt→∞(W ⊙ F)tb(0)
is a polarization, for all initial opinion vectors b(0). We say that W ⊙ F induces a non-zero polarization
when W ⊙ F induces a polarization and limt→∞(W ⊙ F)tb(0) 6= 0 for some initial opinion vectors b(0).
Theorem 4.1. Let W ⊙ F ∈ SLS(S0). Assume that W ⊙ F is strongly connected (since A is symmetric,
we might also simply say 'connected') and aperiodic. Then:
(i) W ⊙ F induces a polarization (that is not always zero) if and only if W ⊙ F is opposition bipartite.
(ii) W ⊙ F is divergent if and only if W ⊙ F is reverse opposition bipartite.
(iii) W ⊙ F induces a neutral17 consensus if and only if W ⊙ F is neither opposition bipartite nor reverse
opposition bipartite.
For better understanding, we give alternative characterizations of conditions (i) and (ii) of Theorem
4.1, which follow from the theorem and its proof. Namely, we find that:
(i) If and only if W ⊙ F is opposition bipartite, the following holds: b(∞) = limt→∞(W ⊙ F)b(0)
exists for all b(0) ∈ Sn and b(∞) is then always either the zero vector (e.g., when b(0) is the zero
vector; but it is not the zero vector for all b(0) ∈ Sn) or is some polarization vector where each
entry is a > 0 or −a. Moreover, when Wi,Out(i) > 0 for some i ∈ [n], then, if b(∞) is a non-zero
polarization vector, both a and −a are components of b(0); otherwise b(∞) is always a consensus,
as in the standard DeGroot model.
(ii) If and only if W ⊙ F is reverse opposition bipartite, the following holds: limt→∞(W ⊙ F)b(0) does
not exist for all b(0) in Sn. Moreover, when it exists it is the zero vector.
The fact that polarization requires 'exact' balance (opposition bipartiteness) and admits not a 'grain
of imbalancedness', as stated in Theorem 4.1 and exemplified in Figure 4, may appear odd since one
might expect, in reality, small perturbations to balance -- e.g., small-scale intra-group antagonisms or
individual friendships among enemies -- to be the rule rather than the exception, particularly in large
enough systems. We note that this result is closely connected to the continuous opinion spectrum and
the corresponding averaging updating that we have considered in this section. If one thinks that reality
is better perceived of as discrete, with weighted majority voting as a more plausible opinion updating
mechanism, then it is apparent that the discrete model is clearly robust against small such perturbations,
so that polarizing viewpoints can be Nash equilibria in this case even when the underlying networks exhibit
(marginal) imbalancedness.
We also note that our results may be generalized to periodic graphs (those that are not aperiodic)
and to graphs that are not connected. We leave this to future work.
4.2 Social influence and opinion leadership
In DeGroot learning, one of the important questions has been that of opinion leadership: whose agents'
initial opinions have most impact upon resulting limiting (long-run) opinions and how does this depend
on the network structure in which the agents are embedded.
In the context of connected SLS(S0)
networks as we have defined above, this question admits an elegant solution in our extended DeGroot
model with in-group/out-group relationships. Namely, if the network is reverse opposition bipartite,
the updating operator diverges (for at least some initial opinion vectors) and opinion leadership is thus
not well-defined. If, in contrast, the network is opposition bipartite and aperiodic, opinion leadership is
determined by eigenvector centrality (Bonacich, 1972) exactly in the same way as in the original DeGroot
model, except that a plus or minus sign indicates the group membership of the agents. Finally, if none of
those two conditions hold, then no agent is influential, since agents will converge to a fixed-point of the
deviation function no matter their initial opinions. The opposition bipartite case is the focus of the next
theorem.
17Here, we call a consensus (c, . . . , c) neutral if D(c) = c. For soft opposition on S0, c = 0.
11
Theorem 4.2. Let W ⊙ F ∈ SLS(S0). Assume that W ⊙ F is strongly connected and aperiodic. Then
the following are equivalent:
(i) There exists a unique (nonnegative) left unit eigenvector s of A, the matrix with entries Aij ,
whose entries sum to 1 such that each agent holds one of two long-run opinion values a and b
(b = −a), given by
g(j)sjbj(0),
(−g(j))sjbj(0),
a = Xj∈[n]
b = Xj∈[n]
where g(j) ∈ {±1}.
(ii) W ⊙ F is opposition bipartite.
Since in case of opposition bipartite and aperiodic strongly connected networks there are two long-run
opinion values and an agent j's 'influence' on each of them is g(j)sj and −g(j)sj, respectively, where
g(j) ∈ {±1}, we may speak of agent j's absolute power vj = g(j)sj = −g(j)sj = sj. Thus, in
summary, the last theorem and our previous discussion lead to the following characterization for strongly
connected networks W ⊙ F ∈ SLS(S0):
(i) Each agent's absolute power vi is given by vi = si where s is the unique left unit eigenvector of
A with normalization Pi∈[n] si = 1 if and only if W ⊙ F is opposition bipartite.
(ii) Opinion leadership is not (well-)defined if and only if W ⊙ F is reverse opposition bipartite.
(iii) Each agent's power is given by vi = 0 if and only if W ⊙ F is neither opposition bipartite nor
reverse opposition bipartite.
It is noteworthy that in case (i), absolute power is independent of the kinds of relationships between
agents and only depends on their intensities.
In other words, an agent may also be prominent when
she attracts strong negative links. When society partitions into several subsocities, these results may be
applied independently to each of them.
5 Concluding remarks
Opinions are important in an economic context (and other contexts) since they shape the demand for
products, set the political course, and guide, in general, socio-economic behavior. Models of opinion
dynamics describe how individuals form opinions or beliefs about an underlying state or a discussion
topic. Typically, in the social networks literature, subjects may communicate with other individuals,
their peers, in this context, enabling them to aggregate dispersed information. Bayesian models of
opinion formation assume that agents form their opinions in a fully rational manner and have an accurate
'model of the world' at their disposal, both of which are questionable and unrealistic assumptions for
actual social learning processes of human individuals. Non-Bayesian models, and most prominently the
classical DeGroot model of opinion formation, while also not unproblematic (cf. Acemoglu and Ozdaglar,
2011), posit that agents employ simple 'rule-of-thumb' heuristics to integrate the opinions of others.
Unfortunately, both the non-Bayesian and Bayesian paradigms typically lead individuals to a consensus,
which apparently contradicts the facts as people disagree with others on many issues of (everyday) life.
In the context of DeGroot learning models, some approaches can address this, either by assuming a
homophily principle whereby agents limit their communication to those who hold similar opinions as
themselves or by introducing stubborn agents, modeling, e.g., opinion leaders, who never update their
opinions. Both approaches are, again, debatable since they assume a complete lack of flow of information
between some classes of agents (from some time onwards). In addition, models based on homophily and
stubborn agents both ignore negative relationships between individuals as potential sources for conflict
and disagreement.
12
In the current work, we have investigated opinion dynamics under out-group discrimination (in-group
bias) as such a potentially alternative explanation for disagreement.
In our setup, agents are driven
by two forces: they want to adjust their opinions to match those of the agents of their in-group and, in
addition, they want to adjust their opinions to match the 'inverse' of those of the agents of their out-group.
Best responses in this setting lead us to a DeGroot-like opinion updating process in which agents form
their next period opinions via weighted averages of their neighbors' (possibly inverted) opinion signals.
Unlike in the standard DeGroot model where opinions may converge to arbitrary consensus opinion
profiles, in our model only neutral consensus opinion profiles may be attained in the long-run, that is,
consensus vectors where the consensus opinion is a fixed-point of each agent's deviation function (modeling
the mode of opposition between agents). Thus, if there exists no opinion that is 'globally' neutral in
this sense, our model predicts persistent disagreement provided that negative relations between agents
are sufficiently strong. When we specialize our model to undirected networks containing no self-loops
and where the only allowable deviation function is 'soft opposition', we derive necessary and sufficient
conditions for bi-polarization in connected societies. These say that long-run opinions bi-polarize if and
only if the underlying network wherein agents communicate satisfies 'opposition bipartiteness': it consists
of two groups of agents exhibiting positive within-group links and negative between-group links. We also
investigate social influence in this special case, that is, the question of whose initial opinions matter most
for resulting long-run opinions. We find that in opposition bipartite networks (satisfying aperiodicity),
opinion leadership, in terms of absolute power, is determined by eigenvector centrality exactly in the same
way as in the standard DeGroot model. This means that an agent is prominent to the degree that she is
interlinked with prominent agents; it is noteworthy that even strong negative ties increase prominence.
Finally, considering the question of wisdom (Golub and Jackson, 2010; Jadbabaie et al., 2012; Buechel,
Hellmann, and Klossner, 2015), that is, whether agents can (jointly) learn the true state of nature of their
discussion topic, provided that such a truth exists, we observe the following. The case for wisdom is a
weak one in our model since negative ties typically prevent consensus formation, so clearly not everybody
can be wise in the long-run. This holds even when agents are initially perfectly informed in the sense that
their initial beliefs coincide with truth. In particular, if agents (multi-)polarize, then at most one group
of agents may be wise in the long-run, but due to the mutual dependence of long-run beliefs, we might
suspect none to be.18 Ultimately, this result must be interpreted by reference to the rationality of the
agents involved. The standard interpretation of DeGroot learners is that of naıve individuals susceptible
to persuasion bias. Golub and Jackson (2010) show that such agents can still learn the true state of
nature under not too demanding conditions. Jadbabaie et al. (2012) show that slightly more rationality
increases the case for wisdom. In contrast, we show that an additional bias such as in-group bias may
significantly worsen this case.
Concerning future research directions within our context, both weight links and opposition links
between agents, W and F, have been assumed exogenous in the current work. Prospectively, it might
be worthwhile to consider endogenous link formation processes. In particular, the origin and evolution of
out-group relations, and their interdependence with agents' opinions and external factors, such as, most
importantly, external truth, might be of interest.
Acknowledgments
I am indebted to the associate editor Juan D. Moreno-Ternero and two anonymous reviewers for various
comments that have greatly improved the layout of the current work. I also thank Matthias Blonski for
valuable suggestions that led to improvements in the paper. All remaining errors are my own.
Appendix A Definitions, theorems, and proofs
Sections A.1 and A.2 review notation and concepts for graphs and matrices, respectively. Section A.3
states basic results on signed social networks from Altafini (2013). Finally, Section A.4 provides the proofs
18In particular, observe that an agent's wisdom is expected to decrease in her amount of in-group bias (i.e., how strongly
she discriminates against out-group individuals) provided that out-group individuals' opinions are close to truth, because
this controls how strongly she desires to match the 'opposite' of truth. From a reverse perspective, her wisdom is expected
to increase in her out-groups' biases.
13
of our own results in this work.
A.1 Graphs
Definition A.1 ((Weighted) Network). A network, or graph, is a tuple G = (V, E) where V is a finite set
and E ⊆ V × V = {(u, v) u, v ∈ V }. We call V the vertices or nodes of graph G and E the edges or links
of G. Moreover, we call the network G weighted if there exist weights wuv for each edge (u, v) ∈ E.19
In a multigraph, instead of having only one link type between nodes, there may exist multiple link
types. The networks investigated in this work may be considered multigraphs with exactly two types of
links, one denoting intensity of connection and one denoting kind of connection.
Definition A.2. A walk in a network G = (V, E) is a sequence of nodes i1, i2, . . . , iK, not necessarily
distinct, such that (ik, ik+1) ∈ E for all k ∈ {1, . . . , K − 1}. A path is a walk consisting of distinct nodes.
A cycle is a walk i1, . . . , iK such that i1 = iK. The length of cylce i1, . . . , iK is defined to be K − 1. A
cycle is called simple if the only node appearing twice is i1 = iK.
Remark A.1. We use the same terminology -- 'strongly connected', 'aperiodic', etc. -- whether we
speak of (our) multigraphs, in which there exist exactly two types of relationships between agents, or
ordinary graphs. In the case of multigraphs, we refer to their underlying ordinary graphs. We also use
the same terminology for n × n matrices A and their underlying graphs ([n], {(i, j) Aij 6= 0}).
A.2 Matrix and Markov chain theory
We first state one of the main theorems for the DeGroot updates (2.6) in the non-opposition case (cf.
Golub and Jackson (2010)). We assume that W is row-stochastic.
Theorem A.1. Consider the opinion updating process (2.6) with Fij = F for all i, j ∈ [n], where F is
the identity function. Let the multigraph corresponding to the operator W ⊙ F = W -- an ordinary
graph -- be strongly connected and aperiodic. Then W ⊙ F is convergent and induces a consensus.
In case W ⊙ F is an affine-linear map, whether or not W ⊙ F converges can be fully determined by
reference the notion of eigenvalues, which we introduce now.
Definition A.3. Let A ∈ Rn×n be an n × n matrix. An eigenvalue of A is any value λ ∈ C such that
Ax = λx for some non-zero vector x ∈ Rn. The set of distinct eigenvalues of matrix A is called its
spectrum and denoted by σ(A). By ρ(A), we denote the spectral radius of A, the largest absolute value
of all the eigenvalues of A, that is, ρ(A) = max{(cid:12)(cid:12)λ(cid:12)(cid:12) λ ∈ σ(A)}.
Theorem A.2 (Meyer, 2000, p.630). For A ∈ Rn×n, limt→∞ At exists if and only if
ρ(A) < 1,
ρ(A) = 1 and λ = 1 is the only eigenvalue on the unit circle, and λ = 1 is semisimple,
or else,
where an eigenvalue is called semisimple if its algebraic multiplicity equals its geometric multiplicity. The
algebraic multiplicity of an eigenvalue λ is the number of times it is repeated as a root of the characteristic
polynomial χ(λ) = det (A − λIn), where In is the n × n identity matrix. The geometric multiplicity is
the number of linearly independent eigenvectors associated with λ.
A.3 Signed networks
Here, we assume social networks W ⊙ F such that Fij ∈ {F, D} where D is soft opposition on S0, i.e.,
D(x) = −x. Such operators admit a matrix representation A in which each entry has a positive or
negative sign (or is zero), see Proposition A.2. We assume that A is connected and aperiodic.
Lemma A.1. Let W ⊙ F be such that Aii = 0 and Aij = Aji. Then, W ⊙ F is opposition bipartite if
and only if there exists a diagonal matrix ∆ such that ∆A∆ = A, where A denotes the matrix with
entries Aij.
19Weights may typically be real numbers but we more generally allow them to be arbitrary mathematical objects.
14
Lemma A.2. Let A = ∆A∆ as in Lemma A.1. Then A and A have the same eigenvalues with the
same multiplicities.
Lemma A.3. Let W ⊙ F be such that Aii = 0 and Aij = Aji. Then, W ⊙ F is opposition bipartite if
and only if λ = 1 is an eigenvalue of A.
Proof. Altafini (2013), Lemma 1, shows that 0 ∈ σ(L) if and only if A is opposition bipartite where
L = I − A. Clearly, 1 ∈ σ(A) ⇐⇒ 0 ∈ σ(L).
A.4 Proofs of main results
Proposition A.1. Let W ⊙ F be an arbitrary social network such that Fij ∈ {F, Di}, for all i, j ∈ [n].
Then, for all c ∈ S,
c ∈ \(i,j)∈[n]×[n]
Fix(Fij ) =⇒ (c, . . . , c) ∈ Fix(W ⊙ F).
Moreover, let A = {i ∈ [n] Wi,Out(i) > C0} denote the set of agents whose weight mass assigned to
out-group members exceeds a particular threshold C0; in the discrete case, C0 = 1
2 , and in the continuous
case, C0 = 0. Then, for any i ∈ A, it holds that
c /∈ Fix(Di) =⇒ (c, . . . , c) /∈ Fix(W ⊙ F).
Combining both implications yields that
P1[Fix(W ⊙ F) ∩ C] = \i∈A
Fix(Di).
Remark A.2. If D is allowed to vary across both i and j, then c /∈ Fix(Dij) does not necessarily imply
that (c, . . . , c) /∈ Fix(W ⊙ F). To see this, assume, for example, that in a three-player society {1, 2, 3}
agent 1 has Out(1) = {2, 3} with W12 = W13 = 1
4 . For a c ∈ S = R, let D12(c) = c + ǫ and let
D13(c) = c − ǫ, for some ǫ > 0. Assuming that Out(2) = Out(3) = ∅, we have (W ⊙ F)c = c, since, in
particular, for agent 1,
W11c + W12D12(c) + W13D13(c) =
1
2
c +
1
4
(c + ǫ) +
1
4
(c − ǫ) = c.
Proof of Proposition A.1. We only provide the proof for the continuous model. The discrete model proof
is similar.
If c = Fij (c) for some c ∈ S and all (i, j) ∈ [n] × [n], then clearly -- letting c = (c, . . . , c) --
(W ⊙ F)c = c by the definition of W ⊙ F since for each agent i ∈ [n],
n
(cid:2)(W ⊙ F)c(cid:3)i =
Xj=1
Wij Fij(c) = c Xj∈[n]
Wij = c = [c]i.
Conversely, let c 6= Di(c) for some c ∈ S and some i ∈ A. If c = (c, . . . , c) were a fixed-point of
W ⊙ F, then
c = Xj∈Out(i)
Wij Di(c) + Xj∈In(i)
Wij c = Di(c)Wi,Out(i) + c(1 − Wi,Out(i)),
which implies that
This is a contradiction since Wi,Out(i) > 0 by assumption.
Wi,Out(i)c = Wi,Out(i)Di(c).
Lemma A.4. Let W ⊙ F be an arbitrary social network. Assume that either W ⊙ F refers to the discrete
model or that each function Fij in F is continuous. Then:
Lim(W ⊙ F) = Fix(W ⊙ F).
15
Proof of Lemma A.4. The relation Fix(W ⊙ F) ⊆ Lim(W ⊙ F) is obvious. Conversely, if each Fij is
continuous, then W ⊙ F is a continuous operator and thus, each limit vector b(∞) ∈ Lim(W ⊙ F) is a
fixed-point of W ⊙ F:
(W ⊙ F)b(∞) = (W ⊙ F) lim
t→∞
(W ⊙ F)tb(0) = lim
t→∞
(W ⊙ F)t+1b(0) = b(∞).
If S is finite and W ⊙ F is convergent (for b(0)), then b(∞) is a fixed-point of W ⊙ F no matter the
specification of F.
Proof of Theorem 3.1. This is an application of Proposition A.1 and Lemma A.4.
Proposition A.2. Let D be of the form ax + b for some constants a and b, and let Fij ∈ {F, D}. Then,
W ⊙ F is an affine-linear operator of the form Ax + d, that is, (W ⊙ F)(x) = Ax + d for all x ∈ Sn.
Proof of Proposition A.2. For each agent i ∈ [n], we have
(cid:2)(W ⊙ F)x(cid:3)i = Xj∈In(i)
= Xj∈In(i)
= Xj∈In(i)
Wij xj + Xj∈Out(i)
Wij xj + Xj∈Out(i)
Wij xj + Xj∈Out(i)
Wij D(xj ) = Xj∈In(i)
aWij xj + b Xj∈Out(i)
(aWij )xj + bWi,Out(i).
Wij (axj + b)
Wij xj + Xj∈Out(i)
Wij
Thus, we can set A ∈ Rn×n, d ∈ Rn with
Aij =(Wij
aWij
if Fij = F,
if Fij = D,
di = bWi,Out(i).
(A.1)
Lemma A.5. Let W ⊙ F be an arbitrary social network with Fij ∈ {F, D} for an arbitrary deviation
function D. Then, W ⊙ F is opposition bipartite if and only if W ⊙ ¯F is reverse opposition bipartite,
where ¯F is the matrix with entries ¯Fij = ¬Fij , whereby we define ¬D = F and ¬F = D.
Proof. See Figure 2, in Section 3, for a graphical proof.
Remark A.3. If D is soft opposition on S0, let (A, 0) be the representation of W ⊙ F. Then, the lemma
specializes to the statement that, in this situation, (A, 0) is opposition bipartite if and only if (−A, 0) is
reverse opposition bipartite.
Proof of Theorem 4.1. (i) If W ⊙ F induces a (non-zero) polarization, then, necessarily, 1 ∈ σ(A). But,
1 ∈ σ(A) ⇐⇒ W ⊙ F is opposition bipartite by Lemma A.3. Conversely, let W ⊙ F be opposition
bipartite. Then, A and A are isospectral, that is, they have the same eigenvalues and with the same
associated multiplicities by Lemmas A.1 and A.2. Now, (⋆) a strongly connected and aperiodic row-
stochastic matrix A has exactly one eigenvalue on the unit circle, λ = 1, with algebraic and geometric
multiplicity of 1. Therefore, A has exactly one eigenvalue on the unit circle, λ = 1, with algebraic
and geometric multiplicity of 1 and, consequently, converges by Theorem A.2. Moreover, since each
polarization vector x with xi = 1 if i ∈ N1 and xi = −1 if i ∈ N2 satisfies Ax = (W ⊙ F)x = x when
W ⊙ F is opposition bipartite with partition (N1, N2), W ⊙ F induces a polarization that is not always
zero (note that the geometric multiplicity of λ = 1 of A is 1).
Part (ii) "⇐" follows from the fact that 1 ∈ σ(A) ⇐⇒ W ⊙ F is opposition bipartite and the
fact that W ⊙ F with representation A is opposition bipartite if and only if −A is reverse opposition
bipartite by Lemma A.5. Thus, −1 ∈ σ(A) ⇐⇒ W ⊙ F is reverse opposition bipartite, whence A
diverges by Theorem A.2. Conversely, when W ⊙ F diverges, then ρ(A) = 1 (we have ρ(A) ≤ 1 for all
such matrices A as we consider since A = W is row-stochastic and therefore, ρ(A) ≤ ρ(A) = 1). If 1
were in σ(A), then W ⊙ F were opposition bipartite and W ⊙ F would converge by (i). Hence, 1 /∈ σ(A)
and consequently, −1 ∈ σ(A) -- since a symmetric matrix A has no complex eigenvalues. Consequently,
W ⊙ F is reverse opposition bipartite.
16
Finally, for part (iii), if W ⊙ F is neither opposition bipartite nor reverse opposition bipartite, then,
by our above reasonings, ±1 /∈ σ(A), and since A is symmetric, A has no complex eigenvalues, whence
ρ(A) < 1. Thus, W ⊙ F induces the unique neutral consensus (0, . . . , 0). Conversely, if W ⊙ F induces
the neutral consensus (0, . . . , 0) for each initial belief vector b(0), then necessarily ρ(A) < 1. Hence,
W ⊙ F is neither opposition bipartite nor reverse opposition bipartite.
Now, fact (⋆) is a classical theorem for row-stochastic matrices, which is, e.g., based on the famous
Perron-Frobenius theorem; in our context, it is given by combining Theorems A.1 and A.2, for example.
Proof of Theorem 4.2. (i) =⇒ (ii): For an appropriate initial opinion vector, let each agent hold limiting
opinions a 6= 0 or −a as indicated. Place agents in a group N1 resp. N2 depending on whether they hold
limit opinions a or −a, respectively. We show that (N1, N2) forms an opposition bipartite partition of
[n]. Take i, i′ ∈ N1 and assume that Aii′ < 0 (i.e., i and i′ are enemies). Then, since the limit opinion
vector is a fixed-point of A, we have:
a(±Ai1 + · · · + Aii′ + · · · + ±Ain) = a.
But this cannot be, since Aii′ + C < Aii′ + C′ = 1 where C = Pj6=i′ ±Aij and C′ = Pj6=i′ Aij .
Similarly, we can show that no two agents i ∈ N1, j ∈ N2 are friends of each other. Hence, W ⊙ F is
opposition bipartite.
(ii) =⇒ (i): Conversely, let W ⊙ F be opposition bipartite and aperiodic. By Lemma A.1, W ⊙ F
is opposition bipartite if and only if there exists a diagonal matrix ∆ (with entries ±1) such that A =
∆A∆. We know that
At p = s⊺p1
lim
t→∞
for all p ∈ Sn (see, e.g., Golub and Jackson, 2010, Proposition 1) and that ∆−1 = ∆. Therefore,
lim
t→∞
Atp = ∆ lim
t→∞
At (∆p) = ∆s⊺(∆p)1.
This proves the theorem.
References
[1] Robert P. Abelson. "Mathematical models of the distribution of attitudes under controversy". In:
Contributions to mathematical psychology. Ed. by N. Frederiksen and H. Gulliksen. New York:
Rinehart Winston, 1964, pp. 142 -- 160.
[2] Alan Abramowitz and Kyle Saunders. "Why can't we all just get along? The reality of a polarized
America". In: The Forum 3 (2005).
[3] Daron Acemoglu and Asuman Ozdaglar. "Opinion Dynamics and Learning in Social Networks".
In: Dynamic Games and Applications 1 (1 2011), pp. 3 -- 49.
[4] Daron Acemoglu, Asuman Ozdaglar, and Ali ParandehGheibi. "Spread of (Mis)Information in
Social Networks". In: Games and Economic Behavior 70 (2 2010), pp. 194 -- 227.
[5] Daron Acemoglu, Giacomo Como, Fabio Fagnani, and Asuman Ozdaglar. "Opinion Fluctuations
and Disagreement in Social Networks". In: Mathematics of Operations Research 38.1 (Feb. 2013),
pp. 1 -- 27. issn: 0364-765X. doi: 10.1287/moor.1120.0570. url: http://dx.doi.org/10.1287/moor.1120.0570.
[6] Claudio Altafini. "Consensus Problems on Networks With Antagonistic Interactions". In: IEEE
Transactions on Automatic Control 58 (4 2013).
[7] David Beasley and Dan Kleinberg. Networks, Crowds, and Markets: Reasoning about a Highly
Connected World. Cambridge, UK: Cambridge University Press, 2010.
[8] Avner Ben-Ner, Brian McCall, Massoud Stephane, and Hua Wang. "Identity and in-group/out-
group differentiation in work and giving behaviors: Eperimental evidence". In: Journal of Economic
Behavior and Organization 72 (2009), pp. 153 -- 170.
17
[9] Philip Bonacich. "Factoring and weighting approaches to status scores and clique identification".
In: The Journal of Mathematical Sociology 2 (1 1972), pp. 113 -- 120.
[10] Marylinn B. Brewer. "In-Group Bias in the minimal intergroup situation: A cognitive-motivational
analysis". In: Psychological Bulletin 86 (2 1979), pp. 307 -- 324.
[11] Berno Buechel, Tim Hellmann, and Stefan Klossner. "Opinion dynamics and wisdom under con-
formity". In: Journal of Economic Dynamics and Control 52.0 (2015), pp. 240 -- 257. issn: 0165-1889.
doi: http://dx.doi.org/10.1016/j.jedc.2014.12.006. url: http://www.sciencedirect.com/science/article/pii/S0165188914003315.
[12] Zhigang Cao, Mingmin Yang, Xinglong Qu, and Xiaoguang Yang. "Rebels Lead to the Doctrine of
the Mean: Opinion Dynamic in a Heterogeneous DeGroot Model". In: The 6th International Con-
ference on Knowledge, Information and Creativity Support Systems. Beijing, China, 2011, pp. 29 --
35.
[13] Emanuele Castano, Vincent Yzerbyt, David Bourguignon, and El´eonore Seron. "Who may Enter?
The Impact of In-Group Identification on In-Group/Out-Group Categorization". In: Journal of
Experimental Social Psychology 38 (2002), pp. 315 -- 322.
[14] Gary Charness, Luca Rigotti, and Aldo Rustichini. "Individual Behavior and group membership".
In: American Economic Review 97 (4 2007), pp. 1340 -- 1352.
[15] Yan Chen and Sherry Xin Li. "Group Identity and Social Preferences". In: American Economic Re-
view 99.1 (2009), pp. 431 -- 57. doi: 10.1257/aer.99.1.431. url: http://www.aeaweb.org/articles.php?doi=10.1257/aer.99.1.431.
[16] Geoffrey L. Cohen. "Party Over Policy: The Dominating Impact of Group Influence on Political
Beliefs". In: Journal of Personality and Social Psychology 85 (5 2003), pp. 808 -- 822.
[17] Luca Corazzini, Filippo Pavesi, Beatrice Petrovich, and Luca Stanca. "Influential listeners: An
experiment on persuasion bias in social networks". In: European Economic Review 56 (6 2012),
pp. 1276 -- 1288.
[18] Guillaume Deffuant, David Neau, Frederic Amblard, and Gerard Weisbuch. "Mixing beliefs among
interacting agents". In: Advances in Complex Systems 3 (2000), pp. 87 -- 98.
[19] Morris H. DeGroot. "Reaching a Consensus". English. In: Journal of the American Statistical Asso-
ciation 69.345 (1974), pp. 118 -- 121. issn: 01621459. url: http://www.jstor.org/stable/2285509.
[20] Peter M. DeMarzo, Dimitri Vayanos, and Jeffrey Zwiebel. "Persuasion Bias, Social Influence, And
Unidimensional Opinions". In: The Quarterly Journal of Economics 118.3 (2003), pp. 909 -- 968.
url: http://ideas.repec.org/a/tpr/qjecon/v118y2003i3p909-968.html.
[21] Sebastian Fehrler and Michael Kosfeld. "Can you trust the good guys? Trust within and between
groups with different missions". In: Economics Letters 121.3 (2013), pp. 400 -- 404.
[22] Benjamin Golub and Matthew O. Jackson. "How Homophily Affects the Speed of Learning and
Best-Response Dynamics". In: The Quarterly Journal of Economics 127 (3 2012), pp. 1287 -- 1338.
[23] Benjamin Golub and Matthew O. Jackson. "Naıve Learning in Social Networks and the Wisdom
of Crowds". In: American Economic Journal: Microeconomics 2 (1 2010), pp. 112 -- 149.
[24] Patrick Groeber, Jan Lorenz, and Frank Schweitzer. "Dissonance minimization as a microfoundation
of social influence in models of opinion formation". In: Journal of Mathematical Sociology (2013).
[25] Shaun P. Hargreaves Heap and Daniel John Zizzo. "The Value of Groups". In: American Economic
Review 99.1 (2009), pp. 295 -- 323. doi: 10.1257/aer.99.1.295. url: http://www.aeaweb.org/articles.php?doi=10.1257/aer.99.1.295.
[26] Rainer Hegselmann and Ulrich Krause. "Opinion dynamics and bounded confidence: models, anal-
ysis and simulation". In: J. Artificial Societies and Social Simulation 5.3 (2002).
[27] Matthew O. Jackson. Social and Economic Networks. Princeton: Princeton University Press, 2009.
[28] Ali Jadbabaie, Pooya Molavi, Alvaro Sandroni, and Alireza Tahbaz-Salehi. "Non-Bayesian social
learning." In: Games and Economic Behavior 76.1 (2012), pp. 210 -- 225. url: http://dblp.uni-trier.de/db/journals/geb/geb76.html#JadbabaieMST12.
[29] Matthew Jarman, Andrzej Nowak, Wojciech Borkowski, David Serfass, Alexander Wong, and Robin
Vallacher. "The Critical Few: Anticonformists at the Crossroads of Minority Opinion Survival and
Collapse". In: Journal of Artificial Societies and Social Simulation 18.1 (2015).
18
[30] Marco Alberto Javarone. "Social influences in opinion dynamics: The role of conformity". In: Phys-
ica A: Statistical Mechanics and its Applications 414.0 (2014), pp. 19 -- 30. issn: 0378-4371. doi:
http://dx.doi.org/10.1016/j.physa.2014.07.018. url: http://www.sciencedirect.com/science/article/pii/S0378437114005871.
[31] Mark P. Jones. Electoral Laws and the Survival of Presidential Democracies. Notre Dame: University
of Notre Dame Press, 1995.
[32] James A. Kitts. "Social influence and the emergence of norms amid ties of amity and enmity". In:
Simulation Modelling Practice and Theory 14 (2006), pp. 407 -- 422.
[33] Gerald H. Kramer. "Short-term fluctuations in U.S. voting behavior, 1896 -- 1964". In: American
Political Science Review 65 (1 1971), pp. 131 -- 143.
[34] Carl D. Meyer. Matrix analysis and applied linear algebra. Philadelphia: SIAM, 2000.
[35] Henri Tajfel, M. G. Billig, R. P. Bundy, and Claude Flament. "Social categorization and intergroup
behaviour". In: European Journal of Social Psychology 1.2 (1971), pp. 149 -- 178. issn: 1099-0992.
doi: 10.1002/ejsp.2420010202. url: http://dx.doi.org/10.1002/ejsp.2420010202.
[36] K´aroly Tak´acs, Andreas Flache, and Michael Mas. "Is there negative social influence? Disentan-
gling effects of dissimilarity and disliking on opinion shifts". In: CoRR abs/1406.0900 (2014). url:
http://arxiv.org/abs/1406.0900.
[37] Ryuhei Tsuji. "Interpersonal influence and attitude change toward conformity in small groups: a
social psychological model". In: Journal of Mathematical Sociology 26 (2002), pp. 17 -- 34.
[38] Kei Tsutsui and Daniel Zizzo. "Group status, minorities and trust". In: Experimental Economics
17.2 (2014), pp. 215 -- 244. url: http://EconPapers.repec.org/RePEc:kap:expeco:v:17:y:2014:i:2:p:215-244.
[39] Ercan Yildiz, Daron Acemoglu, Asuman Ozdaglar, Amin Saberi, and Anna Scaglione. Discrete
Opinion Dynamics with Stubborn Agents. LIDS report 2870. to appear in ACM Transactions on Eco-
nomics and Computation. 2012. url: http://web.mit.edu/asuman/www/documents/voter-submit.pdf.
[40] John M. Yinger. "Countercultures and social change". In: American Sociological Review 42 (6 1977),
pp. 833 -- 853.
19
|
1703.06416 | 1 | 1703 | 2017-03-19T10:35:17 | A Passivity-Based Distributed Reference Governor for Constrained Robotic Networks | [
"cs.MA",
"cs.DC",
"cs.RO",
"eess.SY"
] | This paper focuses on a passivity-based distributed reference governor (RG) applied to a pre-stabilized mobile robotic network. The novelty of this paper lies in the method used to solve the RG problem, where a passivity-based distributed optimization scheme is proposed. In particular, the gradient descent method minimizes the global objective function while the dual ascent method maximizes the Hamiltonian. To make the agents converge to the agreed optimal solution, a proportional-integral consensus estimator is used. This paper proves the convergence of the state estimates of the RG to the optimal solution through passivity arguments, considering the physical system static. Then, the effectiveness of the scheme considering the dynamics of the physical system is demonstrated through simulations and experiments. | cs.MA | cs |
A Passivity-Based Distributed Reference
Governor for Constrained Robotic
Networks (cid:63)
Tam Nguyen ∗ Takeshi Hatanaka ∗∗ Mamoru Doi ∗∗
Emanuele Garone ∗ Masayuki Fujita ∗∗
∗ Service d'Automatique et d'Analyse des Syst`emes, Universit´e Libre de
Bruxelles, Brussels, Belgium (e-mails: [email protected],
∗∗ Department of Systems and Control Engineering, Tokyo Institute of
[email protected])
Technology, Tokyo, Japan (e-mails: [email protected],
[email protected], [email protected])
Abstract: This paper focuses on a passivity-based distributed reference governor (RG) applied
to a pre-stabilized mobile robotic network. The novelty of this paper lies in the method used to
solve the RG problem, where a passivity-based distributed optimization scheme is proposed. In
particular, the gradient descent method minimizes the global objective function while the dual
ascent method maximizes the Hamiltonian. To make the agents converge to the agreed optimal
solution, a proportional-integral consensus estimator is used. This paper proves the convergence
of the state estimates of the RG to the optimal solution through passivity arguments, considering
the physical system static. Then, the effectiveness of the scheme considering the dynamics of
the physical system is demonstrated through simulations and experiments.
Keywords: Distributed control and estimation, Control of networks, Mobile robots, Convex
optimization, Control under communication constraints
1. INTRODUCTION
In recent years, teleoperative robotic networks have at-
tracted the interest of several researchers around the
world. In bilateral teleoperation, Lee and Spong (2005)
and Shokri-Ghaleh and Alfi (2014) propose control frame-
works for the synchronization of bilateral teleoperation
systems with communication delays. A number of basic
algorithms running on synchronous robotic networks to
achieve rendez-vous are analyzed by Mart´ınez et al. (2007).
The study of motion coordination algorithms for robotic
networks is rich in the literature and Bullo et al. (2009)
summarize the basic tools for coordination algorithms.
However, the main problems of huge telecommunication
networks are hardware limitations and communication
signal strength, where the latter has been thoroughly
analyzed and modeled in Mostofi et al. (2010). Reich and
Sklar (2006) have shown that the performance of simple
and inexpensive onboard hardwares can be similar to the
performance of sophisticated and expensive systems that
are applied to search and rescue robotic networks. This
is why, as a rule of good practice, we usually limit the
communication capabilities of each agent and select a
small group of leaders that are able to communicate with
the teleoperation station.
(cid:63) This work is supported by EM-EASED, FRIA, and JSPS KAK-
ENHI Grant Number JP15H04019. The stay of Tam Nguyen in
Tokyo Institute of Technology has been supported by the Eras-
mus Mundus EASED programme (Grant 2012-5538/004-001) coor-
dinated by CentraleSup´elec.
An important feature to take into account for the con-
trol of mobile robotic networks is the ability to manage
constraints present in the environment (e.g. walls, holes,
obstacles, etc.) and the limitations of the actuators. For
geometric constraints, numerous research in the literature
for single robot path planning have been carried out us-
ing potential fields (Ge and Cui (2000)) and grid search
(Thorpe and Matthies (1984)). However, in the case of
robotic networks, the importance to manage constraints
in an efficient and distributed fashion is brought to light
since in general each agent does not share its information
to all the agents of the network and the teleoperator is only
able to send requests to the leaders. A possible way to deal
with the constraints in a distributed way is presented in
Soleymani et al. (2015), where a solution based on the
reference governor (RG) is proposed.
The RG (Gilbert et al. (1994)) is an add-on control
scheme, which manages the constraints to a pre-stabilized
system by suitably changing the applied reference. The
first idea to introduce an RG scheme using passivity argu-
ments applied to constrained mobile robotic networks has
been proposed in Nguyen et al. (2016). The proposed set
invariance-based RG uses the same passivity arguments for
the pre-stabilization of the robotic network, introducing
a paradigm for the control of constrained mobile robotic
networks. However, the proposed RG solves the problem
in a global way but not in a distributed fashion, which will
be one of the contribution of this paper.
In theory, passivity has been shown to have close relations
with distributed convex optimization. Firstly, Fan et al.
(2006) developed new decentralized control algorithms
that globally stabilize the desired Nash equilibrium by
exploiting the passivity property of the feedback loop.
Then, the results in Burger et al. (2014) established a
strong and explicit connection between passivity-based co-
operative control theory and network optimization theory.
The second contribution of this paper is to extend those
results to both inequality and equality constraints. The
proposed solution is then applied to robotic networks to
solve the specific RG problem.
This paper is organized as follows. First, the problem of
the mobile robotic network is described. The system is pre-
stabilized and then the RG optimization problem is for-
mulated. Then, we focus on a passivity-based distributed
optimization scheme to solve the RG problem. We prove
that the states of the proposed scheme converge to the
optimal solution using passivity arguments for a static
robotic network. To demonstrate the effectiveness of the
passivity-based distributed RG in real-time, the proposed
algorithm is implemented to the pre-stabilized system,
where simulations and experiments are carried out.
2. SYSTEM DESCRIPTION AND LOCAL
FEEDBACK
Consider a system of n mobile robots V = {1, . . . , n}
operating on a plane. The model of the ith robot proposed
in De La Croix and Egerstedt (2012) is
qi = ui, i ∈ V,
(1)
where qi ∈ R2 and ui ∈ R2 are the position and the
velocity input of the ith robot, respectively. The robots are
able to communicate and the inter-agent communication
is modeled by a graph G = (V,E), E ⊆ V ×V. Accordingly,
robot i has access to the information of the robots that are
belonging to the set of neighbors Ni = {j ∈ V(i, j) ∈ E}.
It is assumed that Vh is the subset of V corresponding to
the subset of robots that are able to communicate with
the teleoperation station, while all the robots in V \Vh are
able to communicate only with their neighbors. We also
introduce the notation δi such that δi = 1 if i ∈ Vh, and
δi = 0 otherwise. The system is guided by an operator that
sets a reference r ∈ R2 to the leaders.
Assumption 1. The graph G is fixed, undirected and con-
nected.
is(cid:20) q
(cid:21)
= −
(cid:20) ¯L − ¯L
(cid:21)(cid:20) q
(cid:21)
+
(cid:20) D ⊗ I2
(cid:21)
The system dynamics is pre-stabilized through a proportional-
integral (PI) consensus estimator (Freeman et al. (2006))
and a proportional feedback loop. The aggregate system
αr((1n⊗I2)r−q) (2)
0
ξ
¯L 0
ξ
n ]T is the coordinate vector, the
1 , . . . , qT
where q := [qT
symbol ⊗ is the Kronecker product, ξ the additional
integral state, D ∈ Rn×n a diagonal matrix whose (i, i)-
element is equal to δi, 1n the n-unit vector, I2 the 2-
dimensional identity matrix, αr ∈ R+
0 the gain of the
system, and ¯L := L ⊗ I2, where L ∈ Rn×n is the Graph
Laplacian associated to the graph G.
To ensure the formation objective, a pre-defined bias is
applied to the robots with respect to the leader. We can
then prove the following theorem.
Theorem 1. The states q of system (2) converge to the
pre-defined formation reference in absence of constraints.
Proof. The proof can be found in Nguyen et al. (2016).
The next section formulates the RG optimization problem
to deal with the constraints.
3. REFERENCE GOVERNOR OPTIMIZATION
PROBLEM FORMULATION
Similar to the paradigm proposed in Nguyen et al. (2016),
the constraints of the pre-stabilized system are managed
by a set invariance-based RG (Gilbert and Kolmanovsky
(2001)). The control scheme is depicted in Fig. 1.
Fig. 1. Proposed control scheme. The system is first pre-
stabilized then augmented with RG for constraints
enforcement.
We assume that each robot has sensors detecting obstacles
around the robot. Moreover, we assume that the sensors
provide a line specifying the boundary of the obstacles
detected. The collision-free space is given by the half-
space where the robot lies in and this space is denoted by
Hq
i ⊆ R2. As a consequence, the condition for all robots
to avoid collisions with the obstacle detected by robot i is
(3)
[qT ξT ]T ∈ Qi :=(cid:8)[qT ξT ]T qj ∈ Hq
Because the set Qi is a polyhedron, it is formulated as
i ∀j ∈ V(cid:9) .
(cid:9)
Qi :=(cid:8)[qT ξT ]T Aq
i [qT ξT ]T ≤ bq
(4)
i ∈ Rn. If robot i does not
i ∈ Rn×4n and bq
using some Aq
detect any obstacle, then Qi = R4n
Let us assume that the input ui is constrained within a
convex polytope Hu
i . Following from (2), ui is given by
ui = −(ei ⊗ I2)( ¯Lq − ¯Lξ) + δi(r − qi),
(5)
where ei is the i-th standard basis of Rn. Therefore, the
condition can be formulated as
[qT ξT ]T ∈ Ui(r)
(6)
Ui(r) := {[qT ξT ]T (ei ⊗ I2)( ¯Lq − ¯Lξ) + δi(r − qi) ∈ Hu
i }.
i
(cid:1)Passivity-based distributed RG !"#$(cid:1)%&−&&0)(cid:1)PI consensus estimator *+(cid:1),!-#0.(cid:1)[!-#0](cid:1)(cid:2)(cid:1)(cid:2)(cid:1) (cid:1) (cid:1)1(cid:1)2(cid:1)(cid:4)(cid:1),23.(cid:1)Robotic network system i
Since Hu
i + Bu
(7)
i ∈ Rγ×2, where
using some Au
γ corresponds to the number of conditions specifying Hu
i .
Define
i [qT ξT ]T ≤ bu
i ∈ Rγ and Bu
(cid:21)
i ∈ Rγ×4n, bu
is a convex polytope, it is formulated as
Ui(r) :=(cid:8)[qT ξT ]T Au
(cid:20)bq
i r(cid:9)
(cid:21)
Ci(r) :=(cid:8)[qT ξT ]T Ai[qT ξT ]T ≤ bi + Bir(cid:9) .
Bu
i
Then, the set Ci(r) := Qi ∩ Ui(r) is given as
(8)
In the sequel, we assume that the set Ci, namely Ai, bi and
Bi, is a local information of robot i and the other robots
do not have access to these information.
(cid:20)Aq
(cid:20) 0
, Bi :=
, bi :=
Ai :=
i
Au
i
(cid:21)
i
bu
i
.
Let us now assume that the robotic network modifies the
reference r in order to ensure constraints (3) and (6), where
the modified reference is denoted by m. Suppose that a
constant signal m is added to (2) instead of r and define
qm = q − (1n ⊗ I2)m. System (2) becomes
(cid:20) ¯L + αr(D ⊗ I2) − ¯L
(cid:21)(cid:20) qm
(cid:20) qm
(cid:21)
(cid:21)
(9)
¯L
0
ξ
= −
ξ
Under Assumption 1, the matrix ¯L is symmetric and
positive semi-definite. Thus, defining
(cid:107)qm(cid:107)2 +
V (qm, ξ) :=
(cid:107)ξ(cid:107)2,
V ≤ 0 holds along the
it is immediately proved that
trajectories of (9) and hence any level set of the function is
positively invariant for system (9). More specifically, define
the set
1
2
1
2
Lm(c) := {[qT ξT ] V (qm, ξ) ≤ c}
Then, at a time t, the state trajectories never get out of
the set Lm(V (qm(t), ξ(t))) as long as the constant m will
be applied to the system in the future. Thus, if
Lm(V (qm(t), ξ(t))) ⊂ Ci(m),
constraints (3) and (6) are never violated. It is worth
to note that this set inclusion is a sufficient condition
for constraint fulfilment. It is well-known for linear-time
invariant systems like (2) that, once the constraint sets
Ci(r) (r = 1, 2, . . . , n) are given a priori, a necessary and
sufficient condition is provided through offline computa-
tion (Gilbert and Tan (1991)). However, this approach
cannot be taken in the present case, since these sets are
provided online according to the sensing information and
also no robot can collect all of the sets. This is why we
take the sufficient condition at the cost of conservatism.
In the next subsections, the global optimization problem
is formulated and then the local problem is derived.
3.1 Global Optimization Problem
(cid:88)
Since the constraints have to be satisfied for all i, the global
problem to be solved by the robotic network at time t is
i∈Vh
(cid:107)r − m(cid:107)2, subject to
min
m∈R2
Lm(V (qm(t), ξ(t))) ⊂ Ci(m) ∀i
Denoting the l-th row of Ai and Bi by A(l)
, re-
i
spectively, and the l-th element of bi by b(l)
, the constraint
Lm(V (qm(t), ξ(t))) ⊂ Ci in (11) becomes
i
and B(l)
(11)
(10)
i
(cid:18)
[((1n ⊗ I2)m)T 0]T − b(l)
A(l)
i
1
(cid:107)A(l)
i (cid:107)
(cid:20)(1n ⊗ I2)m
(cid:21)
(cid:19)
i − B(l)
i m ≤ 0 ∀l
(cid:21)(cid:13)(cid:13)(cid:13)(cid:13) ∀l (13)
(cid:13)(cid:13)(cid:13)(cid:13)(cid:20)(1n ⊗ I2)m
(cid:21)
+ b(l)
i + B(l)
i m
(cid:20)q(t)
−A(l)
(12)
ξ(t)
≥
−
0
0
i
At this point, define a function gi : R2×R2n×R2n such that
gi(m, q(t), ξ(t)) coincides with (12) and (13). Remark that
the constraint (12) is linear in m and hence convex. The
left-hand side of (13) is also a convex function in m and
the left-hand side is also proved to be convex by showing
positive semi-definiteness of its Hessian. Thus, the function
gi(m, q(t), ξ(t)) is convex in m for any given q(t) and ξ(t)
and the problem (10) and (11) is a convex optimization.
In summary, the problem which the robotic network solves
at time t can be compactly formulated as
(cid:88)
(cid:107)r − m(cid:107)2 subject to:
min
m
gi(m, q(t), ξ(t)) ≤ 0 ∀i
i∈Vh
(14)
(15)
Following the strategy of the standard reference governors,
the optimal solution to the problem is applied to the
system and then, at the next time t + 1, the network
again solves the problem by replacing q(t) and ξ(t) by
new measurements q(t + 1) and ξ(t + 1). Remark now that
since the cost function is strictly convex, if there exists
an optimal solution for given q(t) and ξ(t), it must be
unique. However, feasibility of the problem is not always
ensured depending on the set Qi, namely the locations
of the obstacles and of the robots. Although the issue is
basically left to future works, an approach is to expect
the human decision to be flexible enough to overcome the
problem.
Moreover, another problem is faced and this problem is
the main focus of this paper. Problem (14),(15) depends
on Ai, bi and Bi for all i but they are local information
as mentioned above. To ensure the information restriction,
we need to solve the problem in a distributed fashion. To
this end, we equivalently transform (14) and (15) into
min
z=(m,zq,zξ)
(cid:107)r − m(cid:107)2 subject to:
gi(m, zq, zξ) ≤ 0 ∀i
(ei ⊗ I2)zq = qi(t) and (ei ⊗ I2)zξ = ξi(t) ∀i
(16)
(17)
(18)
From the equivalence to (14) and (15), if (16) -- (18) is
feasible, the optimal solution to (16) -- (18) is also unique.
Following the same procedure as above, we can also
confirm that each element of gi is convex in z and hence
it is also a convex optimization.
In the next subsection, the local optimization problem is
derived from the global problem.
3.2 Local Optimization Problem
Let us now decompose the problem (16) -- (18) into n local
problems as follows.
(cid:88)
i∈Vh
fi(z) subject to:
(19)
(20)
z=(m,zq,zξ)
min
gi(z) ≤ 0
hi(z) = 0
(21)
where fi(z) = (cid:107)r − m(cid:107)2 if i ∈ Vh and fi(z) = 0 otherwise,
and hi
is defined so that hi(z) = 0 is equivalent to
(ei ⊗ I2)zq = qi(t) and (ei ⊗ I2)zξ = ξi(t). Then, the
local problem consists only of the local information Ai,
bi and Bi. Moreover, it does not depend on the states of
other robots. Thus, if each robot i with the local problem
(19) -- (21) were able to compute the optimal solution to the
global problem (16) -- (18), they would not need to share the
state information among robots. For future developments,
denote the k-th element of gi by gik and the l-th element
of hi by hil. Moreover, define z∗ as the optimal solution of
(19) -- (21).
In the next section, we present a solution to the above
problem. Although several solutions have already been
presented in the literature, we propose a novel passivity-
based solution since it allows one to integrate other passive
components like communication delays while ensuring
the entire system stability as exemplified in Hatanaka
et al. (2016). A passivity-based distributed optimization
algorithm is already presented in Hatanaka et al. (2016),
but the equality constraint like (21) is not taken into
account therein. We thus extend Hatanaka et al. (2016)
to problems with equality constraints in order to apply
the algorithm to the above reference governor problem.
4. DISTRIBUTED OPTIMIZATION ALGORITHM
AND PROOF OF CONVERGENCE FOR A STATIC
PROBLEM
In this section, a scheme to solve (19) -- (21) is proposed.
The proof of the states convergence of the scheme to the
optimal solution is provided using passivity arguments
when the physical system is static,
q = 0. Then,
in the next section, the effectiveness of the proposed
solution considering the dynamics of the robotic system
is demonstrated through simulations and experiments.
i.e.
4.1 Passivity-Based Distributed Optimization Scheme
This subsection gives details about the algorithm to solve
(19) -- (21). The RG block in Fig. 1 is detailed in Fig. 2,
using the state estimate vector z = [zT
n ]T , where
zi is the estimate of the optimal solution z∗ to (19) -- (21)
and zi ∈ R(4n+2). For the sake of completeness, consider
mi ∈ N0 inequality constraints and pi ∈ N0 equality
constraints for agent i.
1 , . . . , zT
The dual problem associated to (19) -- (21) is
n(cid:88)
i=1
Hi(λi, νi)
λi ≥ 0,
maximize
subject to
where Hi(λi, νi) := minz∈RN Li(z, λi, νi) is the Hamilto-
nian with Li(z, λi, νi) := fi(z) + λigi(z) + νihi(z), and
λi ∈ Rmi, νi ∈ Rpi (i = 1, . . . , n) are the Lagrange multi-
i=1 Hi(λi, νi)
i=1 Li(z, λi, νi), where
pliers. Define the dual function H(λ, ν) :=(cid:80)n
and the Lagrangian L(z, λ, ν) :=(cid:80)n
λ := [λT
1 , . . . , λT
n ]T and ν := [νT
1 , . . . , νT
n ]T .
Fig. 2. Proposed passivity-based distributed optimization
architecture, dealing with inequality and equality con-
straints. I4n+2, Im, Ip, In are the 4n + 2, m, p, n-
dimensional
identity matrices, respectively, where
i=1 mi and p =:=(cid:80)n
m :=(cid:80)n
i=1 pi.
Since strong duality holds, the optimal solution of (22),
denoted as d∗, satisfies
d∗ = z∗.
i=1
i=1
i=1
(23)
Moreover, z∗ satisfies the Karush-Kuhn-Tucker (KKT)
conditions (Boyd and Vandenberghe (2004))
n(cid:88)
n(cid:88)
∇fi(z∗) +
i ≥ 0, gi(z∗) ≤ 0, ∀i = 1, . . . , n
λ∗
ikgik(z∗) = 0, ∀k = 1, . . . , mi,∀i = 1, . . . , n,
λ∗
i ∇gi(z∗) +
λ∗
n(cid:88)
i ∇hi(z∗) = 0
ν∗
i ∈ Rmi is the optimal Lagrange multiplier and
where λ∗
λ∗
ik is the k-th element of λ∗
i .
The main idea to solve (19) -- (21) is to minimize the
global objective function f (z) through the gradient descent
method (Nedic and Ozdaglar (2009)) while maximizing
the dual function H(λ, ν) through the dual ascent method
(Boyd et al. (2011)). Then, using the PI consensus estima-
tor, the agents will cooperate to converge to the optimal
solution.
(24)
(22)
The next subsection provides the algorithm of the passivity-
based distributed optimization scheme.
Algorithm The algorithm dynamics depicted in Fig. 2 is
(cid:20) z
(cid:21)
ζ
(cid:21)
(cid:20) L −L
(cid:21)(cid:20) z
(cid:21)
(cid:20) ΓT (z)λ
L 0
ζ
− α
0
(cid:20) φ(z)
(cid:21)
(cid:21)
(cid:20) ΨT (z)ν
− α
0
0
= −
− α
(25)
(cid:1)1"#$%&'(cid:1)(cid:1)(cid:1)[#'%&'0](cid:1)+,−,,0.(cid:1)/#'%&'00(cid:1)1(cid:1)Agent i's optimization dynamics PI consensus estimator 2(cid:1)3(cid:1)#4"(cid:1)Γ(cid:1)6(cid:1)#7"(cid:1)8(cid:1)9(cid:1)Gradient descent method :(cid:1)−(cid:1)−(cid:1)−(cid:1)+(cid:1)+(cid:1)=:>?(cid:1)Dual ascent method @(cid:1)/::0(cid:1)/AB0(cid:1)C(cid:1)E(cid:1)C(cid:1)E(cid:1)−(cid:1)+(cid:1)where ζ ∈ RN is the additional
integral variable, L
the Graph Laplacian (Ren and Beard (2008)) associated
to the graph G, α ∈ R the passivity-based distributed
optimization gain, φ(z) := [φ1(z1)T , . . . , φn(zn)T ]T , where
φi := ∇fi is the gradient of the global objective function,
and the functions Γ(z) and Ψ(z) are
∇g1(z1)T
∇h1(z1)T
Γ(z) :=
Ψ(z) :=
,
.
. . .
. . .
O
∇gn(zn)T
O
∇hn(zn)T
(26)
(27)
The Lagrange multipliers λ, ν are updated as follows. First,
define the constraint matrices G := [gT
n ]T and
H := [hT
1 , . . . , gT
n ]T . The update algorithm for λ is
1 , . . . , hT
λ = η(λ, G),
η1,1 . . . η1,m
...
...
ηn,1 . . . ηn,m
. . .
(28)
is
where the switch function η(λ, G) :=
(cid:26)0,
ηij(λij, gij) :=
gij, otherwise,
if λij = 0 and gij < 0
(29)
where λij (i = 1, . . . , n, j = 1, . . . , mi) denotes the j-th
element of λi. This switch block η ensures λi ≥ 0 (see
KKT conditions (24)), where the initial condition must be
λi(0) ≥ 0.
The update algorithm of ν is
ν = h(z).
(30)
4.2 Convergence to the Optimal Solution
Define z∗ := 1n ⊗ z∗ as the goal state. This subsection
will prove the convergence to the optimal solution in three
steps:
(1) z∗ is a point of equilibrium of the system;
(2) the optimization scheme is passive;
(3) proof of asymptotic convergence to the optimal solu-
tion z∗.
Point of Equilibrium We will prove that z∗ is a point of
equilibrium of the system.
1 , . . . , λ∗T
Define the optimal Lagrange multipliers λ∗ = [λ∗T
n ]T
and ν∗ = [ν∗T
n ]T . The following lemma holds true.
Lemma 2. There exists ζ∗ such that (z∗, ζ∗) is an equilib-
rium of (25) for the equilibrium input Γ(z∗)λ∗ + Ψ(z∗)ν∗.
In addition, (λ∗, ν∗) is an equilibrium of (25) for the
equilibrium input z∗.
1 , . . . , ν∗T
Proof. See the proof of Lemma 7 in Hatanaka et al.
(2016).
Passivity Property We will study the passivity property
of the passivity-based distributed optimization scheme.
Define u ∈ R4n+2 as the input of the PI consensus
estimator/gradient descent method subsystem as depicted
in Fig. 2, zc = z − z∗ as the shifted state estimate,
ζ := ζ − ζ∗ as the shifted integral additional state, and
∆ := [µT , ωT ]T as the output of the dual ascent method
subsystem, where [µT , ωT ]T := [Γ(z)λ, Ψ(z)ν]T (see Fig.
2). For the sake of completeness, define the shifted input
∆ := [µT , ωT ]T , where [µT , ωT ]T := [(µ − Γ(z∗)λ∗)T , (ω −
Ψ(z∗)ν∗)T ]T .
First, the passivity of the PI consensus estimator/gradient
descent method subsystem is proved (see blue block in Fig.
2).
Lemma 3. The PI consensus estimator/gradient descent
method subsystem is passive from u := u − u∗ to zc with
2ζ2, where
respect to the storage function S := 1
u∗ := −αφ(z∗).
2zc2+ 1
Proof. The proof can be found in Hatanaka et al. (2015).
At this point, the passivity of the dual ascent method
subsystem is proved (see gray block in Fig. 2).
Lemma 4. The dual ascent method subsystem is passive
from Z := [zT
c ]T to ∆ with respect to the storage
function
c , zT
Ui, Ui :=
1
2
(λi − λ∗
i + νi − ν∗
i ) ,
where the initial condition for λi is λi(0) ≥ 0.
Proof. The proof consists in proving that (cid:80)n
i=1
∆T Z.
(31)
Ui ≤
n(cid:88)
i=1
The first step is to compute the time derivative of Ui in
(31), which is
m(cid:88)
j=1
p(cid:88)
ij and νij := νij − ν∗
ij.
j=1
Ui =
λijηij(λij, gij(zi)) +
νijhij(zi),
(32)
where λij := λij − λ∗
The first sum of (32) is analyzed. The KKT conditions (24)
and the switch block (29) are used to create an inequality.
Following from the switch block (29), the terms in the first
sum of (32) becomes
(cid:26)λijgij(zi) + λ∗
λijgij(zi),
λijηij =
ijgij(zi),
if λij = 0 and gij(zi) < 0
otherwise.
(33)
In the first case of (33), gij(zi) < 0 and following from
KKT conditions (24),
ijgij ≤ 0.
λ∗
Following from (33),(34), we deduce
λijηij(λij, gij(zi)) ≤ λijgij(zi).
As a consequence,
Ui ≤ (λi − λ∗
i )T gi(zi) + (νi − ν∗
i )T hi(zi).
(34)
(35)
(36)
At this point, it is needed to make the gradients appear
in the inequality to prove passivity. Using artifices to
introduce gi(z∗) and hi(z∗) in the inequality, Eq. (36) can
be rewritten as
Ui ≤(λi − λ∗
i )T{gi(zi) − gi(z∗)} + (λi − λ∗
i )T gi(z∗)
+ (νi − ν∗
i )T{hi(zi) − hi(z∗)} + (νi − ν∗
i )T hi(z∗).
(37)
Note that (λ∗
i )T gi(z∗) = 0 from KKT condition (24).
i gi(z∗) ≤ 0 holds, and since the optimal solution
Since λT
z∗ satisfies the equality constraint hi(z∗) = 0, Eq. (37)
becomes
Ui ≤ (λi−λ∗
i )T{hi(zi)−hi(z∗)},
(38)
i )T{gi(zi)−gi(z∗)}+(νi−ν∗
which can be rewritten as
[λij{gij(zi) − gij(z∗)} − λ∗
ij{gij(zi) − gij(z∗)}]
Ui ≤ m(cid:88)
p(cid:88)
j=1
+
[νij{hij(zi) − hij(z∗)} − ν∗
ij{hij(zi) − hij(z∗)}].
j=1
(39)
5. COMPLETE PROPOSED PASSIVITY-BASED
SCHEME
In this section, the schemes of Fig. 1 and 2 are combined as
shown in Fig. 3. The proof of the convergence of the entire
system is not provided and is let for future works. Instead,
the effectiveness of the proposed method in real-time is
demonstrated through simulations and experiments.
Consider the terms in the first sum of (39). Because of the
convexity of gij, Boyd and Vandenberghe (2004) proves
that (cid:26)gij(zi) − gij(z∗) ≥ (∇gij(z∗))T (zi − z∗),
gij(zi) − gij(z∗) ≤ (∇gij(zi))T (zi − z∗).
(40)
Since hij is affine, hij is also convex and ∇hij is constant,
i.e.
∇hij(z∗) = ∇hij(zi).
As a consequence, we can deduce that
(cid:26)hij(zi) − hij(z∗) = (∇hij(z∗))T (zi − z∗),
hij(zi) − hij(z∗) = (∇hij(zi))T (zi − z∗).
(41)
(42)
Therefore, since λi ≥ 0 and λ∗
(39), the gradients appear as
i ≥ 0, using (40) and (42) in
Ui ≤{(∇gi(zi))T λi − (∇gi(z∗)T )λ∗
i }T (zi − z∗)
+ {(∇hi(zi))T νi − (∇hi(z∗)T )ν∗
i }T (zi − z∗).
(43)
n(cid:88)
Therefore, using (43) in (31), we deduce
Ui ≤ [(Γ(z)λ − Γ(z∗)λ∗)T + (Ψ(z)ν − Ψ(z∗)ν∗)T ]zc
i=1
= µzc + ν zc = ∆T Z,
which concludes the proof.
Fig. 3. Complete scheme considering the dynamics of the
(44)
robotic network system.
5.1 Simulations
In the next subsection, using hybrid Lassale's principle, we
can prove asymptotic convergence to the optimal solution
z∗.
Convergence At this point, we proved that (z∗, ζ∗) is a
point of equilibrium of the system (Lemma 2) and that the
two subsystems (blue and gray blocks in Fig. 2) are passive
(Lemmas 3 and 4). Using hybrid Lassale's principle, the
following theorem proves that the states converge to the
optimal solution z∗.
Theorem 5. Consider the system (25),(28),(30). The state
estimate of the i-th agent zi asymptotically converges to
the optimal solution z∗ for all i ∈ V.
Proof. See the proof of Theorem 3 in Hatanaka et al.
(2016).
In the next section, simulations and experiments are car-
ried out to demonstrate the effectiveness of the passivity-
based distributed optimization scheme to solve (19) -- (21)
in real-time.
The system is composed of 5 agents, which communicate
in a circle according to the adjacency matrix
0 1 0 0 1
1 0 1 0 0
0 1 0 1 0
0 0 1 0 1
1 0 0 1 0
.
A =
(45)
The RG (25) is implemented to the pre-stabilized system
(2).
The leader of the system is agent 5. The formation is
added to the system through biases with respect to the
leader. The formation is a triangle formation, which is
[−1, 1]T , [−1,−1]T , [0,−1]T , [1,−1]T for agents 1, 2, 3 and
4, respectively, biased from agent 5. The initial conditions
are q = [−2, 0.7,−1.4,−1, 0.2,−1.4, 1.2,−3]T , and ξ and
all the state estimate variables zi are initialized at 0. The
parameters of the system are α = 2, αr = 1. For simplicity,
input constraints are neglected. The line detected by the
leader is x + y = 3(m).
(cid:1)!"#$(cid:1)%&−&&0)(cid:1)PI consensus estimator *+(cid:1),!-#0.(cid:1)[!-#0](cid:1)(cid:2)(cid:1)(cid:2)(cid:1) (cid:1) (cid:1)1(cid:1)2(cid:1)(cid:4)(cid:1),23.(cid:1)Robotic network system (cid:1)1"#$%&'(cid:1)(cid:1)(cid:1)[#'%&'0](cid:1)+,−,,0.(cid:1)/#'%&'00(cid:1)1(cid:1)Agent i's optimization dynamics PI consensus estimator 2(cid:1)3(cid:1)#4"(cid:1)Γ(cid:1)6(cid:1)#7"(cid:1)8(cid:1)9(cid:1)Gradient descent method :(cid:1)−(cid:1)−(cid:1)−(cid:1)+(cid:1)+(cid:1)=:>?(cid:1)Dual ascent method @(cid:1)/::0(cid:1)/AB0(cid:1)C(cid:1)E(cid:1)C(cid:1)E(cid:1)−(cid:1)+(cid:1)Consider first a reference chosen close to the constraint
r = [1, 2]T . The passivity-based distributed RG modifies
the reference r so that constraints are enforced during the
transients as shown in Fig. 4. Then, consider an inadmis-
the built Simulink program is D-Space 1.1.0.4. Fig. 6 shows
the experimental environment.
Fig. 4. Simulations for a reference close to the constraint.
Trajectories and modified references of the agents for
r = [1, 2]T .
sible reference r = [2, 3]T . The passivity-based distributed
RG modifies the reference r so that the reference remains
admissible and ensures constraints satisfaction as shown
in Fig. 5.
Fig. 6. Experimental environment captured by cameras.
The agents communicate in a circle according to the
adjacency matrix (45). The RG (25) is implemented to the
pre-stabilized system (2). The leader of the system is agent
5. The formation is added to the system through biases
with respect to the leader. The formation is a triangle
formation similar to subsection 5.1. The initial conditions
are q = q(0) and r = q(0), where q(0) is the initial
real position of the robots, and ξ is initialized at 0. The
parameters of the system are α = 7, αr = 2.5. The line
detected by the leader is x + y = 3(m).
The first experiment consists in moving the robots to a
reference close to the constraint solving (19) -- (21) at each
time instant. As seen in Fig. 7, the trajectories followed
by each robot do not violate the constraints at each time
instant. Note the small static error due to the difference
of static friction that depends on the working area.
Fig. 5. Simulations for an inadmissible reference. Tra-
jectories and modified references of the agents for
r = [2, 3]T .
Fig. 7. Experimental results with a reference close to the
constraint. Trajectories and modified references of the
agents for r = [1.4, 1.18]T .
5.2 Experimental Results
The experimental environment consists of five TDO-48
robots, whose positions are captured by a 30-fps Fire
Fly MV camera. The input signal of the robots' motors
is a PWM signal, which is sent through a Bluetooth
communication using OpenCV 2.4.11. The platform to run
The second experiment consists in moving the robots to
a reference chosen outside the admissible region. As seen
in Fig. 8, the system behaves as expected and the tra-
jectories followed by each robot do not violate the con-
straints at each time instant. The video of the experiments
can be found on https://www.youtube.com/watch?v=
TeEE9gXt3qQ.
-2-101234x position (m)-4-2024y position (m)ConstraintInitial positionFinal positionReference02040time (s)00.20.40.60.811.2x reference (m)02040time (s)00.511.522.5y reference (m)-2-101234x position (m)-4-2024y position (m)ConstraintInitial positionFinal positionReference02040time (s)00.511.52x reference (m)02040time (s)00.511.522.53y reference (m)0.511.52x position (m)00.511.522.5y position (m)ConstraintInitial positionFinal positionReference0204060time (s)0.811.21.4x reference (m)0204060time (s)0.40.60.811.2y reference (m)Gilbert, E. and Kolmanovsky, I. (2001). A generalized ref-
erence governor for nonlinear systems. In Decision and
Control, 2001. Proceedings of the 40th IEEE Conference
on, volume 5, 4222 -- 4227. IEEE.
Gilbert, E.G., Kolmanovsky, I., and Tan, K.T. (1994).
Nonlinear control of discrete-time linear systems with
state and control constraints: A reference governor with
global convergence properties. In Decision and Control,
1994., Proceedings of the 33rd IEEE Conference on,
volume 1, 144 -- 149. IEEE.
Gilbert, E.G. and Tan, K.T. (1991). Linear systems
with state and control constraints: The theory and
application of maximal output admissible sets.
IEEE
Transactions on Automatic control, 36(9), 1008 -- 1020.
Hatanaka, T., Chopra, N., Ishizaki, T., and Li, N. (2016).
Passivity-Based Distributed Optimization with Com-
munication Delays Using PI Consensus Algorithm.
ArXiv e-prints.
Hatanaka, T., Chopra, N., and Fujita, M.
(2015).
Passivity-based bilateral human-swarm-interactions for
cooperative robotic networks and human passivity anal-
ysis.
In 2015 54th IEEE Conference on Decision and
Control (CDC), 1033 -- 1039. IEEE.
Lee, D. and Spong, M.W. (2005). Bilateral teleoperation of
multiple cooperative robots over delayed communication
networks: theory.
In Proceedings of the 2005 IEEE
International Conference on Robotics and Automation,
360 -- 365. IEEE.
Mart´ınez, S., Bullo, F., Cort´es, J., and Frazzoli, E. (2007).
On synchronous robotic networkspart ii: Time complex-
ity of rendezvous and deployment algorithms.
IEEE
Transactions on Automatic Control, 52(12), 2214 -- 2226.
Mostofi, Y., Malmirchegini, M., and Ghaffarkhah, A.
(2010). Estimation of communication signal strength in
robotic networks. In Robotics and Automation (ICRA),
2010 IEEE International Conference on, 1946 -- 1951.
IEEE.
Nedic, A. and Ozdaglar, A. (2009). Distributed sub-
gradient methods for multi-agent optimization. IEEE
Transactions on Automatic Control, 54(1), 48 -- 61.
Nguyen, T., Mamoru, D., Hatanaka, T., Garone, E., and
Fujita, M. (2016). A passivity-based approach for
constrained mobile robotic networks. In 2016 55th IEEE
Conference on Decision and Control (CDC). IEEE.
Reich, J. and Sklar, E. (2006). Robot-sensor networks for
search and rescue. In IEEE International Workshop on
Safety, Security and Rescue Robotics, volume 22.
Ren, W. and Beard, R.W. (2008). Distributed consensus
in multi-vehicle cooperative control. Springer.
Shokri-Ghaleh, H. and Alfi, A. (2014). A comparison be-
tween optimization algorithms applied to synchroniza-
tion of bilateral teleoperation systems against time delay
and modeling uncertainties. Applied Soft Computing, 24,
447 -- 456.
Soleymani, T., Garone, E., and Dorigo, M. (2015). Dis-
tributed constrained connectivity control for proxim-
ity networks based on a receding horizon scheme.
In
2015 American Control Conference (ACC), 1369 -- 1374.
IEEE.
Thorpe, C. and Matthies, L. (1984). Path relaxation: Path
planning for a mobile robot. In OCEANS 1984, 576 -- 581.
IEEE.
Fig. 8. Experimental results with an inadmissible ref-
erence. Trajectories and modified references of the
agents for r = [1.8, 2]T .
6. CONCLUSIONS
A passivity-based distributed RG has been proposed for
the control of constrained mobile robotic networks. The
distributed RG problem is solved through a passivity-
based optimization scheme. This scheme solves a convex
optimization problem that is subject to inequality and
equality constraints. Passivity arguments are used to prove
the convergence of the states to the optimal solution. The
main limitation of the passivity-based distributed RG lies
in the fact that the problem may be infeasible. In the
present paper, the convergence of the interconnected sys-
tem is demonstrated through simulations and experiments.
Future works will aim at proving the convergence of the
states of the complete system.
REFERENCES
Boyd, S., Parikh, N., Chu, E., Peleato, B., and Eckstein, J.
(2011). Distributed optimization and statistical learning
via the alternating direction method of multipliers.
Foundations and Trends R(cid:13) in Machine Learning, 3(1),
1 -- 122.
Boyd, S. and Vandenberghe, L. (2004). Convex optimiza-
tion. Cambridge university press.
Bullo, F., Cortes, J., and Martinez, S. (2009). Distributed
control of robotic networks: a mathematical approach to
motion coordination algorithms. Princeton University
Press.
Burger, M., Zelazo, D., and Allgower, F. (2014). Dual-
ity and network theory in passivity-based cooperative
control. Automatica, 50(8), 2051 -- 2061.
De La Croix, J.P. and Egerstedt, M.B. (2012). Control-
lability characterizations of leader-based swarm interac-
tions.
Fan, X., Alpcan, T., Arcak, M., Wen, T., and Ba¸sar, T.
(2006). A passivity approach to game-theoretic cdma
power control. Automatica, 42(11), 1837 -- 1847.
Freeman, R.A., Yang, P., and Lynch, K.M. (2006). Sta-
bility and convergence properties of dynamic average
consensus estimators. In Proceedings of the 45th IEEE
Conference on Decision and Control.
Ge, S.S. and Cui, Y.J. (2000). New potential functions
for mobile robot path planning. IEEE Transactions on
robotics and automation, 16(5), 615 -- 620.
0.40.60.811.21.41.61.82x position (m)00.511.522.5y position (m)ConstraintInitial positionFinal positionReference0102030time (s)0.60.811.21.41.6x reference (m)0102030time (s)0.511.52y reference (m) |
1612.08552 | 1 | 1612 | 2016-12-27T09:37:56 | A Hybrid Network/Grid Model of Urban Morphogenesis and Optimization | [
"cs.MA",
"physics.soc-ph"
] | We describe a hybrid agent-based model and simulation of urban morphogenesis. It consists of a cellular automata grid coupled to a dynamic network topology. The inherently heterogeneous properties of urban structure and function are taken into account in the dynamics of the system. We propose various layout and performance measures to categorize and explore the generated configurations. An economic evaluation metric was also designed using the sensitivity of segregation models to spatial configuration. Our model is applied to a real-world case, offering a means to optimize the distribution of activities in a zoning context. | cs.MA | cs | Raimbault, J., Banos, A. & Doursat, R. (2014) A hybrid network/grid model of urban morphogenesis and optimization.
Proceedings of the 4th International Conference on Complex Systems and Applications (ICCSA 2014), June 23-26, 2014,
Universite de Normandie, Le Havre, France; M. A. Aziz-Alaoui, C. Bertelle, X. Z. Liu, D. Olivier, eds.: pp. 51-60.
Proceedings of ICCSA 2014
Normandie University, Le Havre, France - June 23-26, 2014
A Hybrid Network/Grid Model of
Urban Morphogenesis and Optimization
Juste Raimbault ∗, Arnaud Banos †, and Ren´e Doursat ‡
6
1
0
2
c
e
D
7
2
]
A
M
.
s
c
[
1
v
2
5
5
8
0
.
2
1
6
1
:
v
i
X
r
a
Abstract. We describe a hybrid agent-based model and sim-
ulation of urban morphogenesis. It consists of a cellular au-
tomata grid coupled to a dynamic network topology. The in-
herently heterogeneous properties of urban structure and func-
tion are taken into account in the dynamics of the system. We
propose various layout and performance measures to catego-
rize and explore the generated configurations. An economic
evaluation metric was also designed using the sensitivity of
segregation models to spatial configuration. Our model is ap-
plied to a real-world case, offering a means to optimize the
distribution of activities in a zoning context.
Keywords.
agent-based modeling, cellular automata, bi-
objective pareto optimization, evidence-based urbanism, ur-
ban morphogenesis.
1
Introduction
Recent progress in many disciplines related to urban plan-
ning can be interpreted as the rise of a "new urban sci-
ence" according to Batty [7]. From agent-based mod-
els in quantitative geography [17], in particular the suc-
cessful Simpop series by Pumain et al. [30], to other ap-
proaches termed "complexity theories of cities" by Portu-
gali [28], involving physicists of information theory such
as Haken [15] or architects of "space syntax theory" such
as Hillier [18], the field is very broad and diverse. Yet,
all these works share the view that urban systems are
quintessentially complex systems,
i.e. large sets of ele-
ments interacting locally with one another and the en-
vironment, and collectively creating a emergent struc-
ture and behavior. Taking into account the intrinsic het-
erogeneity of geographical and urban systems, this view
lends itself naturally to an agent-based modeling and sim-
ulation (ABMS) approach.
∗Graduate School, ´Ecole Polytechnique, Palaiseau, France; and
LVMT, Ecole Nationale des Ponts et Chauss´ees, Paris, France.
E-mail: [email protected]
†G´eographie-cit´es, CNRS UMR8504, Paris, France. E-mail:
‡Complex Systems Institute, Paris Ile-de-France (ISC-PIF),
[email protected]
CNRS UPS3611. E-mail: [email protected]
Among the most popular ABMS methods are cellular
automata (CA), in which agents are cells that have fixed
locations on a grid and evolve according to the state of
their neighbors. CA models of urban planning, in particu-
lar the reproduction of existing urban forms and land-use
patterns, have been widely studied, notably by White and
Engelen [39], then analyzed [5, 9] and synthesized [6] by
Batty. A recent review by Iltanen [19] of CA in urban
spatial modeling shows a great variety of possible system
types and applications. They include, for example, "mi-
croeconomic" CA for the simulation of urban sprawl [11],
"linguistic" CA (including real-time rule update via feed-
back from the population) for the measure of sustain-
able development in a fast growing region of China [41],
and one-dimensional CA [26] showing discontinuities and
strong path-dependence in settlement patterns.
In this context, we propose a hybrid model of urban
growth that combines a CA approach with a graph topol-
ogy containing long-range edges. It is inspired by Moreno
et al.'s work [24, 25], which integrates a network dynam-
ics in a CA model of urban morphology. Its goal was to
test the effects of physical proximity on urban develop-
ment by introducing urban mobility in a network whose
evolution was coupled with the evolution of urban shape.
We generalize this type of model to take into account het-
erogeneous urban activities and the functional properties
that they create in the urban environment. This idea
was introduced by White [38] and explored by van Vliet
et al. [36] but, to our knowledge, never considered from
the perspective of physical accessibility and its impact on
sprawl patterns.
The rest of the paper is organized as follows. The
model and indicator functions used to quantify the gener-
ated patterns are explained in Section 2. Next, Section 3
presents the results of internal and external validations
of the model by sensitivity analysis and reproduction of
typical urban patterns. It is followed by an application
to a concrete case, proposing a bi-objective optimization
heuristic of functional configuration based on the rele-
vant objective functions from the validation study. We
end with a discussion and conclusion in Sections 4 and 5.
ICCSA 2014, Normandie University, Le Havre, France June 23-26, 2014
51
J. Raimbault, A. Banos & R. Doursat
2 Model description
2.1 Agents and rules
The world is represented by a square lattice (Li,j)1≤i,j≤N
composed of cells that are empty or occupied (Fig. 1).
This is denoted by a function δ(i, j, t) ∈ {0, 1}, where
time t follows an iterative sequence t ∈ T = τN =
{0, τ, 2τ, ...} [14] with a regular time step τ . Another
evolving structure is laid out on top of the lattice: a
Euclidean network G(t) = (V (t), E(t)) whose vertices V
are a finite subset of the world and edges E (its agents)
represent roads. In the beginning, the lattice is empty:
δ(i, j, 0) = 0, and the network is either initialized ran-
domly (e.g. uniformly) or set to a user-specified configu-
ration G(0) = (V0, E0). In order to translate functional
mechanisms into the growth of a city, we assume that
the initial vertices include a subset formed by city cen-
ters, C0 ⊂ V0, which have integer activities, denoted by
a : C0 → {1, . . . , amax}.
To characterize the urban structures emerging in this
world, we define in general a set of k functions of the lat-
tice, (dk(i, j, t))1≤k≤K, called explicative variables. These
variables are here: d1, the density,
i.e. the average δ
around a cell (i, j) in a circular neighborhood of radius ρ;
d2, the Euclidean distance of a cell to the nearest road; d3
the network-distance of a cell to the nearest city center,
i.e. the sum of d2 and edge lengths; and d4, the accessi-
bility of activities (or rather difficulty thereof), written
(cid:32)
(cid:33)1/p4
amax(cid:88)
a=1
1
amax
d4(i, j, t) =
d3(i, j, t; a)p4
(1)
where d3(i, j, t; a) is the network-distance of the cell to the
nearest center with an activity a, and p4 ≥ 1 (typically 3)
defines a p-norm.
A set of weights (αk)1≤k≤K ∈ [0, 1]K is assigned to
these variables to tune their respective influence on what
we define as the net land value of a cell, as follows:
dk,max(t) − dk(i, j, t)
dk,max(t) − dk,min(t)
1(cid:80)
v(i, j, t) =
αk
.
(2)
K(cid:88)
k=1
k αk
Figure 1: Example of urban morphology generated by the
model. Houses (blue squares) were built in some cells of a
56 × 56 lattice. City centers and roads (red edges) compose
the added network. Cell shades (yellow) represent distances
to the built cells (the brighter, the closer).
Figure 2: The hybrid network/grid model. Blue arrows: feed-
back interactions. Red arrows: output evaluation functions.
of randomness. In any case, growth is halted after a con-
stant amount of time T , evaluated from experiments, so
that the final structure is neither "unfinished" nor filling
out the world (see 3.1). Fig. 2 displays the core ABMS
flowchart with feedback interactions between agents.
Houses are preferentially built where v is high, i.e. dk's
are low. Thus the evolution of the system proceeds in
three phases at each time step: (a) all values v(i, j) are
updated, (b) among the cells that have the best values, n
new cells are randomly chosen and "built" (set to δ = 1);
(c) for each built cell, if d2 is greater than a threshold θ2
(maximum isolation distance), then that cell is directly
connected to the network by creating a new road branch-
ing out orthogonally from the nearest edge.
Network initialization is random (see details in 3.1),
and the selection of new cells is also random among iden-
tical values of v. A sensitivity analysis and model explo-
ration is conducted in the next section to determine the
relative effect of parameters with respect to these sources
2.2 Evaluation functions
Once a structure is generated, its properties need to be
quantified so that it can be categorized or compared
to other structures for optimization purposes. To this
goal, we define various evaluation functions, both objec-
tive quantification measures and structural fitness values.
The measures described in this section take into account
all the explicative variables, whose distributions over the
grid are emergent properties that cannot be known in ad-
vance and are therefore essential to monitor.
Morphology To assess the morphological structure of
an urban configuration, we map it onto a 2D metric space
52
ICCSA 2014, Normandie University, Le Havre, France June 23-26, 2014
A Hybrid Network/Grid Model of Urban Morphogenesis and Optimization
defined by a pair of global indicators (D, I) called the
integrated density and the Moran index (Fig. 4). The
density D ∈ [0, 1] is calculated by taking the p-norm (with
exponent pD ≥ 1, typically 3) of the local densities d1:
1/pD
A(t) =
(3)
1(cid:80)
i,j δ(i, j, t)
N(cid:88)
i,j=1
δ(i,j,t)(cid:54)=0
D(t) =
d1(i, j, t)pD
Moran's I, an index of spatial autocorrelation, is widely
used in quantitative geography [35, 20] to evaluate the
"polycentric" character of a distribution of populated
cells. It is defined by
(cid:80)
(cid:80)M 2
µ(cid:54)=ν(Pµ − P )(Pν − P )/dµν
µ=1(Pµ − P )2
(4)
M 2(cid:80)
µ(cid:54)=ν 1/dµν
I(t) =
where the lattice is partitioned into M × M square areas,
at an intermediate scale between cell size and world size
(1 (cid:28) M (cid:28) N ), dµν is the distance between the centroids
of areas µ and ν, (Pµ)1≤µ≤M 2 denotes the number of oc-
cupied cells in each area, and P is their global average.
We can recognize in this formula the normalized ratio of
a modified covariance (pairwise correlations divided by
distances) and the variance of the distribution. Moran's
I belongs by construction to the interval [−1, 1], where
values near 1 correspond to a strong monocentric distri-
bution, values around 0 to a random distribution, and
values near −1 to a checkered pattern (every other cell
occupied). Usually, polycentric distributions have rela-
tively small positive I values, depending on the size and
distance between centers.
Network performance Due to the branching nature
of the growth algorithm, the network of roads G cannot
contain any other loops than the ones initially present in
G0. Therefore, notions of "clustering coefficient" or "ro-
bustness" (with respect to node removal) are not relevant
here. On the other hand, since G is intended to simulate
a mobility network, we can evaluate its performance by
defining a relative speed [4] S, representing the "detours"
imposed by G with respect to direct, straight travels:
S(t) =
1(cid:80)
i,j δ(i, j, t)
N(cid:88)
(cid:18) d3(i, j, t)
(cid:19)pS
e3(i, j, t)
i,j=1
δ(i,j,t)(cid:54)=0
1/pS
(5)
on the relative local accessibility from each cell, which is
d4 over its maximum:
1(cid:80)
i,j δ(i, j, t)
N(cid:88)
(cid:18) d4(i, j, t)
(cid:19)pA
d4,max(t)
i,j=1
δ(i,j,t)(cid:54)=0
1/pA
(6)
This normalization puts A in [0, 1] and allows comparing
configurations of different sizes. Like S, "better" urban
configurations are characterized by a lower A.
Economic performance It was shown by Banos [2]
that the Schelling segregation model, a standard ABM of
socio-economic dynamics [33], was highly sensitive to the
spatial structures in which it could be embedded, since
segregation rules depended on proximity. This justifies
the use of this model as an evaluation of economic perfor-
mance of our urban configurations, measuring how much
structure influences segregation. To this aim, we imple-
mented a model of residential dynamics based on the work
of Benenson et al. [10]. The output function is a segre-
gation index H(t) calculated on the residential patterns
that emerge inside a distribution of built patches. For ur-
ban structures produced in a practical case (Section 3.3),
we obtained densities of mobile agents between 0.1 and
0.2. Following Gauvin et al. [13], the phase diagram of
the Schelling model indicates that in such a density range,
tolerance thresholds of 0.4 to 0.8 lead to clustered frozen
states, where the calculation of a spatial segregation in-
dex is indeed relevant. The detailed description of this
economic model is out of the scope of this paper.
3 Results
Our hybrid network/grid model was implemented in Net-
Logo [40]. Plots and charts were created in R [32] from ex-
ported data. Processing of GIS Data (for vectorization by
hand of simple raster data) was done in QGIS [31]. Explo-
ration of the 4D space of explicative variables' weights αk
was conducted inside the [0, 1]4 hypercube with a linear
increment of 0.2. This created 64 − 1 = 1295 points, from
(0, 0, 0, 0) excluded to (1, 1, 1, 1) included, via (0.2, 0, 0, 0),
etc. Unless otherwise noted, the output values of the eval-
uation functions were averaged over 5 simulations for each
combination of the αk's.
where pS ≥ 1 (also 3), and e3(i, j, t) is the direct Eu-
clidean distance between cell (i, j) and the nearest city
center over the network, i.e. the one that realizes the value
of d3(i, j, t). Note that S ≥ 1 and is actually higher for
more convoluted networks (thus it is a measure of "slow-
ness", but we still employ "speed").
Functional accessibility The global functional acces-
sibility A to city centers is another p-norm (also 3), based
3.1 Generation
of
urban
patterns:
external validation of the model
Typical patterns We ran the model on different ini-
tial configurations, in which a few city centers C0 (typ-
ically 4) were randomly positioned on a 56 × 56 lattice,
and their activity values drawn in [1, amax] (both uni-
formly). The initial network G0 was built progressively
and quasi deterministically over increasing distances, by
ICCSA 2014, Normandie University, Le Havre, France June 23-26, 2014
53
J. Raimbault, A. Banos & R. Doursat
Figure 4: Morphological classification of urban patterns.
Scatterplot in the (D, I) evaluation plane with four typical
structures highlighted. Three of them, despite visual differ-
ences, are relatively close to each other in this space, indicat-
ing that two metrics are not sufficient for a full classification.
The area near the origin corresponds to unfinished patterns,
i.e. which occupy only a small part of the world and cannot be
compared with larger ones. Almost all I values were positive.
Figure 3: Typical patterns obtained from our model, repro-
ducing Le Corbusier's analysis of "human settlements". In his
1945 attempt to theorize urban planning, Le Corbusier ana-
lyzed the form of cities by hand and outlined three types of
settlements: radial-concentric cities, linear cities along com-
munication roads, and rural communities. We were able to
reproduce this typology by setting the weights of the ex-
plicative variables of our model to corner values: Top-right:
(αk) = (1, 0, 0, 0), i.e. density-based only. Middle: (0, 1, 0, 0),
i.e. distance-to-road only. Bottom: (0.2, 0, 1, 0), i.e. network-
distance combined with a little density. Left: source [22].
creating isolated clusters and linking them until they per-
colated into one component. The initial grid was empty
(δ = 0 everywhere). Simulations were cut off at 30 iter-
ations (T = 30τ ), before the sprawl of urban settlements
reached the square boundaries of the world and started
"reverberating". Since this artifact occurred the fastest
in a density-driven model, αk = (1, 0, 0, 0), we empirically
assessed T in that case and applied it everywhere.
Different parameter settings generated very diverse
structures. In particular, we observed striking similarities
between the patterns obtained for binary values of αk's
in some "corners" of the hypercube (one or two measures
dk with weight 1, the others 0), and the fundamental ur-
ban configurations that Le Corbusier had identified in his
1945 analysis of human settlements [22] (Fig. 3).
Classification of structures Using the pair of mor-
phological indicators (D, I) defined above, and by vary-
ing the αk's, we constructed a 2D map of the dynamical
regimes of our system (Figs. 4-5), in which qualitatively
different morphological "classes" could be distinguished.
The projected locations of urban configurations in this
plane allowed a better understanding and comparison of
their features and growth process. Again, for certain cor-
ner parameter values (all of them 0 except one or two at
1), the results ended up in distinct locations on the map,
Figure 5: Influence of each explicative variable dk on urban
morphogenesis. Color darkness corresponds to the relative
value of weight αk used during the growth of mapped struc-
tures. Whereas Figs. 4-5 showed distinct classes at expected
locations, this plot displays a rather uniform and chaotic dis-
tribution of high weights for d2, d3, and d4, revealing a perva-
sive role of roads, city centers, and accessibility. Only density
d1 correlates better with its own evaluation function D (a high
influence of density results in low-density patterns), except for
the low-I cluster on the right.
54
ICCSA 2014, Normandie University, Le Havre, France June 23-26, 2014
0.00.10.20.30.40.50.60.00.20.40.60.8Morphological classificationDensity (D)Moran's Index (I)centers only
D = 0.48,
I = 0.07
densities onlyD = 0.9,
I = 0.49
roads only
D = 0.45,
I = 0.08
roads and centersD = 0.58,
I = 0.13
"unachieved"
sprawls
0.00.10.20.30.40.50.60.00.20.40.60.8Density influenceDensityMoran0.00.10.20.30.40.50.60.00.20.40.60.8Accessibility influenceDensityMoran0.00.10.20.30.40.50.60.00.20.40.60.8Centers' influenceDensityMoran0.00.10.20.30.40.50.60.00.20.40.60.8Roads' influenceDensityMoranA Hybrid Network/Grid Model of Urban Morphogenesis and Optimization
Figure 6: Statistical distribution of the output evaluations.
For each of the 15 corner points of the 4D hypercube of αk's
(excluding the origin), we ran 500 simulations from random
initializations of 4 city centers C0. Three resulting distribu-
tions out of these 15 are displayed, each in the form of a his-
togram of evaluation function values, D, S, I, and A, fit-
ted with a Gaussian curve. Green: (αk) = (1, 0, 0, 0), i.e. a
simulation taking into account only the density d1. Yellow :
(0, 1, 0, 0), i.e. Euclidean distance d2 only. Red : (0, 0, 0, 1),
i.e. accessibility d4 only. These three histograms were chosen
for their minimum overlap and clarity of display; the other 17
are similar. The narrow peaks (except one), spread about the
mean by ±10%, attest to the low sensitivity of the model with
respect to the spatial initialization, and validates its internal
consistency. This also allowed us to rely on a smaller number
of runs in our experiments.
Figure 7: Assessing the influence of the update scheme on
the morphologies. In the (D, I) classification plane, each point
corresponds to 3 runs of a given combination of αk parameters,
repeated under a sequential (n = 1) and under a parallel (n =
20) update scheme. For each run, the symmetric difference ∆
between the two patterns is computed and its average over the
3 runs is projected on the map. The color of a point highlights
its "significance", defined as the product of its local density
(clustered points represent more frequent configurations) and
its pattern size, ∆ (large patterns are more significant). The
scattered points indicate that the model is sensitive to the
update scheme for certain parameters. On the other hand, the
concentration of significant points near the origin and D = 0.5
means that corner cases, such as (1, 0, 0, 0), are more robust.
which could be relatively well explained.
Intermediate
combinations of parameters, however, seemed to project
the structures quite literally "all over the map", which
might be interpreted as the emergence of chaos in the
system.
3.2 Sensitivity analysis and parameter
space exploration: internal validation
Sensitivity to initial conditions To ensure the va-
lidity of the results, we investigated the sensitivity of the
model to the spatial conditions, the initial set of nodes
C0, estimating in particular the number of repetitions
necessary to obtain statistically meaningful values for the
evaluation functions. If conclusions drawn from one case
were highly susceptible to small changes in the initial lay-
out, then the model would obviously have less significance
than if there was some invariance with respect to abstract
topological features (in particular the distribution of cen-
ters' activities). The optimization heuristics would have
to be designed very differently in these two cases.
Toward this assessment, we ran a large number of simu-
lations under the same parameter values but starting from
different initial C0 configurations, and collected statistics
on the output. For each of the 15 binary combinations
of αk's (excluding all zero), standard deviations were cal-
culated over 500 runs. We obtained narrow peak distri-
butions in most cases, with Gaussian widths typically at
10% of the mean function value (Fig. 6).
In order to
ensure that these were the typical widths on all the pa-
rameter space and not only on extreme binary points, we
also explored the grid {0; 0.5; 1}4 with 100 runs per point,
assessing in a more representative subspace the relative
spread of distributions. This confirmed that the eval-
uation functions were significantly less sensitive to the
exact spatial locations than the parameters and over-
all topology, and justified our use of a smaller number
of trials in subsequent experiments. Typically, assum-
ing a normal distribution of width σ = 0.1, we needed
n = (2σ·1.96/0.05)2 (cid:39) 60 trials to reach a 95% confidence
interval of length 0.05, and 5 trials for a length 0.17. For
practical reasons of computing speed, we chose the latter.
ICCSA 2014, Normandie University, Le Havre, France June 23-26, 2014
55
DensityFrequency0.00.20.40.60.81.001020304050MoranFrequency0.00.20.40.60.81.0051015202530SpeedFrequency1.01.52.02.53.0010203040AccessibilityFrequency0.00.20.40.60.81.00510152025300.10.20.30.40.50.20.40.60.8Morphologic imprint of differencesDensityMoranJ. Raimbault, A. Banos & R. Doursat
Sensitivity to update scheme On the other hand,
the emergent urban patterns depended on the number n
of cells filled at every iteration, before land values were re-
calculated at the next iteration, i.e. whether the update
scheme was a sequential (n = 1) or parallel (n > 1).
Building several houses "simultaneously" between two
market reevaluations is consistent with the view that real-
world functions have a response delay, here of the order of
τ . There must be a limit, however, and an intermediate
n must be found to obtain reasonable simulations.
To this aim, we explored the 4D parameter space of the
αk's as in Figs. 4-5 and ran one sequential update scheme
and one parallel update scheme with n = 20 in each case.
At the end of the simulation, t = T , the two correspond-
ing output patterns δseq and δpar were compared by calcu-
lating their symmetric difference, i.e. the subset of lattice
cells that were built either in one or the other but not
in both: ∆ = {(i, j); δseq(i, j, T ) (cid:54)= δpar(i, j, T )}. Then,
these difference patterns ∆ were projected on the same
classification map (D, I) used previously (Fig. 7). The
results showed that for many combinations of parame-
ters, the model's behavior could be noticeably influenced
by the update scheme, as many difference patterns ex-
hibited a nontrivial structure with high density or high
Moran's index or both. On the other hand, it exhibited a
stronger invariance for the corner quadruplets of αk's: in
these cases the ∆'s clustered near the origin and D = 0.5.
Based on this study, we decided to adopt a parallel up-
date scheme with n = 15 built cells per time step in the
remainder of the experiments.
Figure 8: Sample surface plots of the evaluation functions.
For each 4D field of evaluation values in the hypercube, we
select two out of four parameters and display the 2D slice cor-
responding to the other two parameters set to (0, 0). Horizon-
tal axes are reoriented in each case to minimize visual clutter.
This exhaustive exploration has an intrinsic explanatory value
(see text), and allows us to predict with some level of confi-
dence how the model responds to certain input parameters.
Exploration of parameter space The above two pre-
liminary studies validated the robustness of the model
with respect to the initialization and update scheme, and
helped us choose a reasonable number of runs (about 5)
for each parameter combination, and a adequate degree
of parallelism in the simulations (n = 15). Next, we revis-
ited the αk hypercube (same 1295 points in the partition
of step 0.2), this time calculating the complete charts of
all evaluation functions. Other parameters with a direct
correspondence to the real-world, depending on the scale
adopted, were set to fixed values. For example, the neigh-
borhood radius ρ or the road-triggering distance θ2 were
both equal to 5 cells: this number could represent 50m,
characteristic of a block at the scale of a district, or 500m
for a district in a city, or 5km between cities in a region.
Examples of evaluation surfaces in 2D projection spaces
are shown in Fig. 8. Each function, D, I, S, and A, was
plotted against two parameters out of four, chosen for
their higher "influence" (variations in amplitude) on the
function. The economic index H was not calculated here
(see 3.3). This exhaustive exploration of parameter space
was necessary to gain deeper insight into the behavior of
the model. It also represents a crucial step toward making
computational simulations more rigorous [3].
Altogether, we observed that outputs varied for the
most part smoothly, except Moran's index which ap-
peared more chaotic. Variations were greater in cases
where one parameter was dominant. For example, the
measures of density D, speed S and (global) accessibil-
ity A all exhibited a significant jump when including
the effect of (local) accessibility d4 in the simulations,
i.e. when transitioning from α4 = 0 to α4 > 0. In par-
ticular, the more activities were influent, the denser the
city became-a nonintuitive emergent effect, compared
to top-down planning alternatives that would try to op-
timize accessibility while keeping density low. Speed,
or rather "sluggishness", exploded when density was the
only influence on urban sprawl: this confirmed that pure
density-driven dynamics creates anarchic growth, without
concern for network performance.
As for global accessibility, or rather the difficulty
thereof, it was minimal for α4 = 0 : an interesting para-
doxical effect suggesting that when individual agents took
into account local accessibility (α4 > 0), a few of them
might have occupied the "best spots" too quickly, signif-
icantly diminishing the others' prospects. Therefore, at
the collective level, it would be better for everyone to ig-
nore that dimension-an example where competition at
the individual level does not produce the most efficient
system for all. Finally, no meaningful conclusion could
be formulated about the chaotic variations of Moran's in-
dex, except for its extreme sensitivity to spatial structure.
56
ICCSA 2014, Normandie University, Le Havre, France June 23-26, 2014
alpha_40.00.20.40.60.81.0alpha_20.00.20.40.60.81.00.200.250.300.350.400.45Densityalpha_30.00.20.40.60.81.0alpha_10.00.20.40.60.81.00.10.20.30.4Moran Indexalpha_40.00.20.40.60.81.0alpha_10.00.20.40.60.81.01.41.61.82.0Speedalpha_40.00.20.40.60.81.0alpha_10.00.20.40.60.81.00.50.60.70.8Accessibility0.00.00.00.50.5A Hybrid Network/Grid Model of Urban Morphogenesis and Optimization
Figure 9: Practical application: optimizing the distribution of activities over urban centers. Left: existing masterplan of the
Massy Atlantis district: 9 building areas are identified by their centers (black squares). Buildings are color-coded by type of
activity (orange: residential, blue: tertiary). Railroad tracks traverse the upper left corner (light blue strip) and three train
transportation hubs are also represented (green locomotive icons): these are part of the fixed environment. Right: example
of housing configuration obtained after a simulation in which the 9 centers' activities were initialized to the same values as
their real-world counterpart (red house icons: residential, blue computer icons: tertiary; one of 510 possible distributions).
The evaluation functions of the outcome are (H, A) = (0.067, 0.76), a point close to the Pareto front of Fig. 10 (blue circle).
3.3 Practical example
In this section, we apply our model to the optimization of
activities on top of a real-world urban structure obtained
from a geographic file, as opposed to an randomly gener-
ated, artificial configuration. This type of scenario occurs
in a planning problem where one must decide about the
possible land use of predefined zones.
The practical example under study here concerns the
It is based on a real-
planning of a new district.
world neighborhood, Massy Atlantis (Paris metropolitan
area), built in 2012 (Fig. 9). We would like to investi-
gate whether a more efficient planning could have been
achieved. The goal of this exercise is to find an optimal
assignment of two types of activities, "residential" (apart-
ments) or "tertiary" (offices), to the centers of 9 areas
located on a map. The transportation infrastructure is
already in place and the train station is also considered a
center with a fixed, third type of activity. A network of
avenues is laid out and passes through the 9 centers. The
district is initially empty (unbuilt). The particular spa-
tial configuration was automatically imported from a GIS
shapefile, so the computation could be readily applied to
other cases.
Parameters of the model were set as follows: high in-
fluence of activities, α4 = 1, reflecting the fact that ac-
cessibility to home, workplace, and train station are of
special importance to the agents of this district; medium
influence of density, α1 = 0.7, because, not far from Paris,
housing must reasonably fill the available areas; no influ-
ence of road proximity, α2 = 0, since the initial network
is already built and the scale is relatively small; and no
influence of network-distance, α3 = 0, because centers in
this problem are abstract entities representing areas.
For every possible distribution of binary activities over
the 9 areas, excluding the two uniform cases (all resi-
dential or all tertiary), the model was simulated 5 times,
producing a total of (29 − 2)× 5 = 2550 runs. The result-
ing configurations were examined here via a morphologi-
cal projection in the (H, A) plane, instead of (D, I) used
in the previous sections, as we judged it to be a more
meaningful measure of fitness in this application. The
calculation of the economic segregation index H involved
a secondary agent-based simulation on top of the main
urban development model (details not provided here).
Results are shown in Fig. 10. We obtained a Pareto
front of "optimal solutions" trying to minimize both H
and A, while observing that the actual configuration is
not far from being optimal itself, and appears to be a
compromise between accessibility and economic perfor-
mance. After closer examination of the Pareto front and
its vicinity, we found that the distribution of activities
was highly mixed in these points. More precisely, we de-
fined a spatial heterogeneity index of center activities by
(cid:80)
(cid:80)
d(c, c(cid:48))−1
a(c)(cid:54)=a(c(cid:48))
c(cid:54)=c(cid:48)
c(cid:54)=c(cid:48) d(c, c(cid:48))−1
λ = amax
(7)
ICCSA 2014, Normandie University, Le Havre, France June 23-26, 2014
57
J. Raimbault, A. Banos & R. Doursat
4 Discussion
The reproduction of typical urban morphologies and the
possible application to a real-world problem shown in the
previous sections indicate that a model like ours can be
useful for evidence-based decision-making in urban plan-
ning. Several questions remain open, however, and would
need further investigation.
Scale of the model One ambiguity of the model is
that it can be applied at different scales, therefore there
is no unique correspondence between its agents and the
real world. As the above results illustrate, the simulated
urban configurations may represent a system of cities at
the macroscopic scale, the neighborhoods of one city at
the mesoscopic scale, or the buildings of one district at
the microscopic scale. Without engaging in an ontolog-
ical debate over levels of abstraction, this could still be
pointed out as a potential issue.
We wish to argue, however, that the multiscale appli-
cability of our model is legitimate as a great number of
urban systems and associated dynamics have been shown
to be "scale-free", in particular by Pumain [29], and even
to possess fractal properties, by Batty [8]. It means that
scaling laws may also operate in our model, therefore
qualitative results should remained unchanged while the
quantitative evolution of variables and relations should
only depend on the underlying power law's exponent.
Barth´elemy [21] warns that most multi-agent urban
models fail because they do not focus on the "dominating"
physical process but, instead, integrate too many aspects
that bear no relevance to the emergent properties of the
system. Following up on this advice, we believe that we
have successfully identified "good" proxies for the domi-
nating processes of urban morphogenesis, namely: urban
density, accessibility to road network, and accessibility to
main functionalities.
Local scope When the model is considered at a meso-
scopic or microscopic scale, another objection could be
that it seems to limit itself to an artificially "closed" ur-
ban system, neglecting important contextual phenomena
such as economic exchanges. Yet, although input and out-
put flows are greatly simplified here, they are still present
in implicit form. Our simulated world is not truly closed,
since newly built houses are associated with a net influx
of resources. Moreover, despite the absence of a direct
economic force in the growth dynamics (the H index is
only a post-hoc metric), the attractivity of centers con-
stitutes a proxy for underlying activity, and a form of
interdependence among urban processes. Finally, other
models that have taken into account the global complex
network of cities [1] have reproduced well-known patterns
of urban systems much like ours.
Therefore, here too, local or global approaches appear
to be equivalent and the modeling decisions and compro-
mises made in each case must be compared. This ques-
Figure 10: Scatterplot of all configurations in the (H, A) mor-
phological plane. A Pareto front (red circles) is apparent in the
bottom left part of the plot: it corresponds to "optimal" con-
figurations trying to minimize both H and A objectives. The
real situation (blue circle in H = 0.067, A = 0.76) corresponds
to Fig. 9 and is not far from this front. Points are colored ac-
cording to their level of heterogeneity λ, from low (black) to
high (yellow). More homogeneous configurations are concen-
trated in the central cluster, whereas Pareto points and their
neighbors have higher heterogeneity levels. This lends sup-
port to the principle of "functional diversity", which is often
adopted by planners and urbanists today but has never been
backed up by computational simulations.
where c = (i, j) and c(cid:48) = (i(cid:48), j(cid:48)) are two centers, d(c, c(cid:48))
their Euclidean distance, and a(c), a(c(cid:48)) their activities.
Points in the scatterplot were colored according to their
level of λ. Highly heterogeneous configurations appeared
in regions of the plot distinct from homogeneous configu-
rations, which were for the most part located in the cen-
tral cluster. Optimal solutions and their neighbors all
corresponded to high heterogeneity. This interesting re-
sult is a step toward evidence-based justification of mixed
land use in planning-a principle often invoked by urban-
ists but never quantitatively demonstrated.
In conclusion, this case study is encouraging as it pro-
poses a concrete methodology of optimal planning with
respect to criteria that are relevant to a particular situa-
tion. It could be used by generically planners in similar
situations, while remaining cautious on the conditions of
its applicability. We discuss this point next.
58
ICCSA 2014, Normandie University, Le Havre, France June 23-26, 2014
0.0600.0650.0700.0750.0800.0850.0900.600.650.700.750.80Pareto plot of configurationsEconomic segregation (H)Distance to activities (A)A Hybrid Network/Grid Model of Urban Morphogenesis and Optimization
tion also ties in with the fundamental issue, contained in
the previous point, of the existence of a "minimal dimen-
sion" for a generalized representation of urban systems.
The challenge is to understand how universal the depen-
dence between a system and its dimension may be, and if
a generalized minimalist formulation can be constructed.
Speculations toward that ambitious goal have been for-
mulated by Haken [15] through a notion of "semantic in-
formation" linked to properties of attractors in dynamical
systems. This theory, however, has not been quantified,
i.e. neither confirmed nor falsified.
Quantitative calibration The question of the validity
of the model is also linked to the need for a finer quan-
titative calibration based on real patterns, which creates
a dilemma: on the one hand, calibration on the errors of
output function proxies does not influence the formation
of spatial patterns; on the other hand, calibration on the
spatial patterns themselves is too constraining and may
preclude the emergence of other, similar patterns. Pre-
vious works addressing the issue of calibration [23] have
not been conclusive so far.
To revisit this question, we would need to apply our
model at a finer grain of spatial resolution, i.e. a very
large world in terms of data size.
In this scenario, it
would be particularly important to keep processing time
under control by reducing computational complexity, for
example through a cache of the network's shortest paths.
The potential increase in size can also create methodolog-
ical hurdles, not just computational, as a huge amount
of details in the resulting patterns might contribute to
more noise than signal and significantly bias the indica-
tors. One solution would be to create a new operator
extracting the morphological envelope of the generated
pattern, along the lines of an original method proposed
by Frankhauser et al. [12, 34]. Other ways to deal with
noise may involve Gaussian smoothing.
Complex coupling with economic model Our
method of economic evaluation consists of "simple cou-
pling", i.e. running a secondary agent-based model (the
basis of H's calculation, not described here) after the pri-
mary urban growth simulation has finished. Another im-
portant direction of research would implement a "complex
coupling" between the two models in the sense proposed
by Varenne [37]: the study of urban sprawl on other time
scales would require the simultaneous and mutually in-
teracting evolutions of the population, the building rents,
and the terrain values. Obviously, this would lead to a
more sophisticated model oriented toward a whole new
set questions, such as the evaluation of long-term rent
policies to foster social diversity.
5 Conclusion
We have proposed a hybrid network/grid model of ur-
ban growth structures, and studied their morphological
and functional properties by simulation. Results showed
that it could reproduce the characteristic urban facts of a
classical typology of "human settlements", and was also
applicable to a concrete scenario by calculating "optimal"
solutions (in the Pareto sense) to a planning challenge in
an existing zoning context. Our work provide evidence
in favor of the "mixed-use city", a topic on which lit-
erature is still scarce and future work is needed. This
paradigm is now commonly advocated by urbanists, such
as Mangin [22] through his concept of "ville passante" (a
pun on "evolving/flowing/pedestrian city"), and would
require more validation through quantitative results.
Finally, beyond its technical achievements and poten-
tial usefulness as a decision-making tool, our work also
fuels a contemporary debate on the state-of-the-art in
"quantitative urbanism". Siding with Portugali [27], we
certainly agree that the conception and application of
computational models is a delicate matter, which can lead
to more confusion than explanation if not properly han-
dled and validated. Depending on the scale, a careless
choice of parameter values can produce dubious results.
Yet, we support the idea that quantitative insights are
paramount for a better understanding of urban and so-
cial systems. With the recent explosion in data size and
computing power, evidence-based analysis and solutions
are becoming a real alternative to older attitudes, such as
Lefebvre's [16], which doubted that scientific approaches
could ever translate or predict the mechanisms of a city.
References
[1] C. Andersson, A. Hellervik, K. Lindgren, A. Hagson, and
J. Tornberg. Urban economy as a scale-free network. Physical
Review E, 68(3):036124, 2003.
[2] A. Banos. Network effects in schelling's model of segregation:
new evidences from agent-based simulation. Environment and
Planning B: Planning and Design, 39(2):393–405, 2012.
[3] A. Banos. Pour des pratiques de mod´elisation et de simula-
tion lib´er´ees en G´eographie et SHS. PhD thesis, UMR CNRS
G´eographie-Cit´es, ISCPIF, D´ecembre 2013.
[4] A. Banos and C. Genre-Grandpierre. Towards new metrics for
urban road networks: Some preliminary evidence from agent-
based simulations. In Agent-based models of geographical sys-
tems, pages 627–641. Springer, 2012.
[5] M. Batty. Cellular automata and urban form: a primer.
Journal of the American Planning Association, 63(2):266–274,
1997.
[6] M. Batty. Cities and Complexity: Understanding Cities with
Cellular Automata, Agent-based Models, and Fractals. MIT
Press, 2007.
[7] M. Batty. The New Science of Cities. MIT Press, 2013.
[8] M. Batty and P. Longley. Fractal Cities: A Geometry of Form
and Function. Academic Press, London, 1994.
[9] M. Batty and Y. Xie. Possible urban automata. Environment
and Planning B, 24:175–192, 1997.
ICCSA 2014, Normandie University, Le Havre, France June 23-26, 2014
59
J. Raimbault, A. Banos & R. Doursat
[10] I. Benenson. Multi-agent simulations of residential dynam-
ics in the city. Computers, Environment and Urban Systems,
22(1):25–42, 1998.
[30] D. Pumain. Multi-agent system modelling for urban systems:
The series of simpop models. In Agent-based models of geo-
graphical systems, pages 721–738. Springer, 2012.
[31] QGIS Development Team. QGIS Geographic Information Sys-
tem. Open Source Geospatial Foundation, 2009.
[32] R Core Team. R: A Language and Environment for Statistical
Computing. R Foundation for Statistical Computing, Vienna,
Austria, 2013.
[33] T. C. Schelling. Models of segregation. The American Eco-
nomic Review, 59(2):488–493, 1969.
[34] C. Tannier, G. Vuidel, and P. Frankhauser. D´elimitation
d'ensembles morphologiques par une approche multi-´echelle. In
J.-C. Foltete, editor, Actes des huiti`emes Rencontres de Th´eo
Quant, page 14, Besan¸con, France, 2008. http://thema.univ-
fcomte.fr/theoq/.
[35] Y.-H. Tsai. Quantifying urban form: compactness versus'
sprawl'. Urban Studies, 42(1):141–161, 2005.
[36] J. van Vliet, J. Hurkens, R. White, and H. van Delden. An
activity-based cellular automaton model to simulate land-use
dynamics. Environment and Planning-Part B, 39(2):198, 2012.
[37] F. Varenne, M. Silberstein, et al. Mod´eliser & simuler.
Epist´emologies et pratiques de la mod´elisation et de la sim-
ulation, tome 1. 2013.
[38] R. White. Modeling multi-scale processes in a cellular au-
tomata framework. In Complex artificial environments, pages
165–177. Springer, 2006.
[39] R. White and G. Engelen. Cellular automata and fractal urban
form: a cellular modelling approach to the evolution of urban
land-use patterns. Environment and planning A, 25(8):1175–
1199, 1993.
[40] U. Wilensky.
Center for Connected Learn-
ing and Computer-Based Modeling, Northwestern University,
Evanston, IL., 1999.
Netlogo.
[41] F. Wu. A linguistic cellular automata simulation approach for
sustainable land development in a fast growing region. Com-
puters, Environment and Urban Systems, 20:367–87, 1996.
[11] G. Caruso, G. Vuidel, J. Cavailhes, P. Frankhauser, D. Peeters,
and I. Thomas. Morphological similarities between dbm and
a microeconomic model of sprawl. Journal of Geographical
Systems, 13:31–48, 2011.
[12] P. Frankhauser and C. Tannier. A multi-scale morpholog-
ical approach for delimiting urban areas.
In 9th Comput-
ers in Urban Planning and Urban Management conference
(CUPUM'05), University College London, 2005.
[13] L. Gauvin, J. Vannimenus, and J.-P. Nadal. Phase diagram of
a schelling segregation model. The European Physical Journal
B, 70(2):293–304, 2009.
[14] B. Golden, M. Aiguier, and D. Krob. Modeling of complex sys-
tems ii: A minimalist and unified semantics for heterogeneous
integrated systems. Applied Mathematics and Computation,
218(16):8039–8055, 2012.
[15] H. Haken and J. Portugali. The face of the city is its infor-
mation. Journal of Environmental Psychology, 23(4):385–408,
2003.
[16] L. Henri. Le droit `a la ville. Anthropos, 1968.
[17] A. J. Heppenstall, A. T. Crooks, and L. M. See. Agent-based
models of geographical systems. Springer, 2012.
[18] B. Hillier, A. Leaman, P. Stansall, and M. Bedford. Space
syntax. Environment and Planning B: Planning and Design,
3(2):147–185, 1976.
[19] S. Iltanen. Cellular automata in urban spatial modelling.
In Agent-based models of geographical systems, pages 69–84.
Springer, 2012.
[20] F. Le N´echet and A. Aguilera. D´eterminants spatiaux et
sociaux de la mobilit´e domicile-travail dans 13 aires urbains
fran¸caises : une approche par la forme urbaine, `a deux ´echelles
g´eographiques.
In ASRDLF 2011, SCHOELCHER, Mar-
tinique, July 2011. http://asrdlf2011.com/.
[21] R. Louf and M. Barthelemy. Modeling the polycentric transi-
tion of cities. ArXiv e-prints, Sept. 2013.
[22] D. Mangin. La ville franchis´ee: formes et structures de la ville
contemporaine. ´Editions de la Villette Paris, 2004.
[23] C. Maria de Almeida, M. Batty, A. M. Vieira Monteiro,
G. Camara, B. S. Soares-Filho, G. C. Cerqueira, and C. L. Pen-
nachin. Stochastic cellular automata modeling of urban land
use dynamics: empirical development and estimation. Com-
puters, Environment and Urban Systems, 27(5):481–509, 2003.
[24] D. Moreno, D. Badariotti, and A. Banos. Un automate cellu-
laire pour exp´erimenter les effets de la proximit´e dans le pro-
cessus d'´etalement urbain :
le mod`ele raumulus. Cybergeo :
European Journal of Geography, 2009.
[25] D. Moreno, A. Banos, and D. Badariotti. Conception d'un
automate cellulaire non stationnaire `a base de graphe pour
mod´eliser la structure spatiale urbaine: le mod`ele remus. Cy-
bergeo: European Journal of Geography, 2007.
[26] D. Peeters and M. Rounsevell. Space time patterns of urban
sprawl, a 1d cellular automata and microeconomic approach.
Environment and Planning B: Planning and Design, 36:968–
988, 2009.
[27] J. Portugali. Complexity theories of cities: Achievements, crit-
icism and potentials. In Complexity Theories of Cities Have
Come of Age, pages 47–62. Springer, 2012.
[28] J. Portugali, H. Meyer, E. Stolk, and E. Tan. Complexity theo-
ries of cities have come of age: an overview with implications
to urban planning and design. Springer, 2012.
[29] D. Pumain. Scaling laws and urban systems. Santa Fe Insti-
tute, Working Paper n 04-02, 2:26, 2004.
60
ICCSA 2014, Normandie University, Le Havre, France June 23-26, 2014
|
1910.09508 | 1 | 1910 | 2019-10-21T16:54:49 | Multi-agent Hierarchical Reinforcement Learning with Dynamic Termination | [
"cs.MA",
"cs.AI",
"cs.LG"
] | In a multi-agent system, an agent's optimal policy will typically depend on the policies chosen by others. Therefore, a key issue in multi-agent systems research is that of predicting the behaviours of others, and responding promptly to changes in such behaviours. One obvious possibility is for each agent to broadcast their current intention, for example, the currently executed option in a hierarchical reinforcement learning framework. However, this approach results in inflexibility of agents if options have an extended duration and are dynamic. While adjusting the executed option at each step improves flexibility from a single-agent perspective, frequent changes in options can induce inconsistency between an agent's actual behaviour and its broadcast intention. In order to balance flexibility and predictability, we propose a dynamic termination Bellman equation that allows the agents to flexibly terminate their options. We evaluate our model empirically on a set of multi-agent pursuit and taxi tasks, and show that our agents learn to adapt flexibly across scenarios that require different termination behaviours. | cs.MA | cs |
Multi-agent Hierarchical Reinforcement
Learning with Dynamic Termination
Dongge Han, Wendelin Bohmer, Michael Wooldridge, and Alex Rogers
Dept. Computer Science, University of Oxford, Oxford, UK
{dongge.han, wendelin.boehmer, michael.wooldridge,
alex.rogers}@cs.ox.ac.uk
Abstract. In a multi-agent system, an agent's optimal policy will typ-
ically depend on the policies chosen by others. Therefore, a key issue
in multi-agent systems research is that of predicting the behaviours of
others, and responding promptly to changes in such behaviours. One ob-
vious possibility is for each agent to broadcast their current intention,
for example, the currently executed option in a hierarchical reinforce-
ment learning framework. However, this approach results in inflexibility
of agents if options have an extended duration and are dynamic. While
adjusting the executed option at each step improves flexibility from a
single-agent perspective, frequent changes in options can induce incon-
sistency between an agent's actual behaviour and its broadcast intention.
In order to balance flexibility and predictability, we propose a dynamic
termination Bellman equation that allows the agents to flexibly terminate
their options. We evaluate our model empirically on a set of multi-agent
pursuit and taxi tasks, and show that our agents learn to adapt flexibly
across scenarios that require different termination behaviours.
Keywords: Multi-agent Learning · Hierarchcial Reinforcement Learning
1
Introduction
Many important real-world tasks are multi-agent by nature, such as taxi coor-
dination [10], supply chain management [6], and distributed sensing [9]. Despite
the success of single-agent reinforcement learning (RL) [17,13], multi-agent RL
has remained as an open problem. A challenge unique to multi-agent RL is that
an agent's optimal policy typically depends on the policies chosen by others [16].
Therefore, it is essential that an agent takes into account the behaviours of oth-
ers when choosing its own actions. One possible solution is to let each agent
model and broadcast its intention, in order to indicate the agent's subsequent
behaviours [3]. As an example, Figure 1(a) shows a taxi pickup scenario where
taxi A is choosing its next direction. Given the information that taxi B is cur-
rently heading towards Q, taxi A can determine passenger P as its preferred
option over Q.
* Preprint presented at PRICAI 2019. The final authenticated version is available online at
https://doi.org/10.1007/978-3-030-29911-8_7.
2
D. Han et al.
(a) Taxi A choosing a target
(b) Taxi B switching target
Fig. 1: Taxi Scenario Examples
Fig. 2: The effect of terminating options early, i.e., after T steps
Fortunately, hierarchical RL provides a simple solution for modeling agents'
intentions by allowing them to use options, which are subgoals that an agent aims
to achieve in a finite horizon. Makar et al. [11] proposed multi-agent hierarchical
RL, where hierarchical agents broadcast their current options to the others.
However, despite the advantage brought by using options, there can be a delay
in an agent's responses towards changes in the environment or others' behaviours,
due to the temporally-extended nature of options, which forbids the agents from
switching to another option before the current one is terminated. In the scenario
depicted in Figure 1(b), while taxi A is going for passenger R, taxi B finished
picking up passenger Q and also switched towards R. In this case, taxi A will
miss the target R, but it cannot immediately switch its target.
A potential solution to the delayed response challenge is to terminate options
prematurely. Figure 2 shows the performance of a multi-agent taxi experiment
where the agents' current options are interrupted after T timesteps. By reduc-
ing T , the agents gain higher flexibility for option switching, which also leads to
increasing rewards. This has been studied previously to address the problem of
imperfect options in single-agent settings, where an agent can improve its per-
formance by terminating and switching to an optimal option at each step [18].
However, this approach may no longer prove advantageous in a multi-agent sce-
nario. When an agent frequently switches options, the broadcast option will be
inconsistent with its subsequent behaviour. Consequently, the agent's behaviour
becomes less predictable and the advantage of broadcasting options is dimin-
ished.
010000200003000040000episodes101234567average rewards per episode45673000040000T = 1T = 2T = 3T = 4T = 5Multi-agent Hierarchical Reinforcement Learning with Dynamic Termination
3
This poses a dilemma that is specific to multi-agent systems: excessive termi-
nations makes an agent's behaviour unpredictable, while insufficient termination
of options results in agents' inflexibility towards changes[8]. We will refer to an
agent's flexibility as the ability to switch options in response to changes in oth-
ers or the environment. Furthermore, we will use predictability to measure how
far an agent will commit to its broadcast option. In this paper, we propose an
approach called dynamic termination, which allows an agent to choose whether
to terminate its current option according to the state and others' options. This
approach balances flexibility and predictability, combining the advantages of
both.
An obvious approach to modelling dynamic termination is to use an addi-
tional controller, which decides whether to terminate or to continue with the
current option at each step. In this paper, we incorporate termination as an
additional option for the high-level controller. In this way, the Q-value of the
newly introduced option is associated consistently with the Q-values of the orig-
inal options, and our approach introduces negligible additional complexity to the
original model. We evaluate our model on the standard multi-agent pursuit and
taxi coordination tasks across a range of parameters. The results demonstrate
that our dynamic termination model can significantly improve hierarchical multi-
agent coordination and that it outperforms relevant state-of-the-art algorithms.
The contributions of our work are as follows:
1. Based on the decentralized multi-agent options framework, we propose a
novel dynamic termination scheme which allows an agent to flexibly termi-
nate its current option. We show empirically that our model can greatly
improve multi-agent coordination
2. We propose a delayed communication method for an agent to approximate
the joint Q-value. This method allows us to use intra-option learning, and
reduces potentially costly communication
3. We incorporate dynamic termination as an option to the high level controller
network. This design introduces little additional model complexity, and al-
lows us to represent the termination of all options in a consistent manner
In addition, we adopted several methods that benefits the model architecture
and training: deep Q networks and parameter sharing reduce state space and
model complexity; adapting intra-option learning [18] to multiple agents yields
better sample efficiency; and an off-policy training scheme [7] for exploration.
2 Related Work
Makar et al.[11] appear to have been the first to combine multi-agent and hi-
erarchical RL, through the MaxQ framework [2]. We build on their work, with
the following changes: First, the use of tabular Q-learning is insufficient for large
state spaces. Therefore, we adopt deep Q networks for parameterizing state and
action spaces. Second, we adapt intra-option learning to multi-agent systems [18],
4
D. Han et al.
which greatly improves the sample efficiency. Third, we adopt a delayed com-
munication channel to prevent costly communication, and joint optimization.
And finally, as options cannot be terminated before their predefined termination
condition, tasks are limited to the use of perfect options and agents experience
the delayed response problem.
Our solution to the delayed response problem is related to works on inter-
rupting imperfect options, i.e., when the set of available options are not perfectly
suited to the task, an agent can choose to terminate its options dynamically in
order to improve its performance. Sutton et al.[18] introduced a mechanism for
interrupting options whenever a better option appears, and Harutyunyan et al.[7]
proposed a termination framework which improves upon this idea with better
exploration. This is achieved by off-policy learning, which uses an additional
behaviour policy for longer options.
Bacon et al.[1] proposed a dynamically terminating model for their Option-
critic framework. In comparison, we use the Q-learning framework instead of
policy gradient; and we focus on addressing the coordination problems in a
multi-agent system. Moreover, our Q-value for dynamic termination does not
depend on the currently executing option, which significantly reduces the model
complexity and also improve sample efficiency due to off-policy training, i.e., the
value of terminating can be learned with any executed option.
In the multi-agent learning literature, Riedmiller et al.[15] proposed the
multi-option framework. This is a centralized model in which multiple agents are
considered as a single meta-agent that chooses a joint option o = (o1, . . . , on).
In contrast, our model uses a decentralized scheme where each agent i chooses
and executes its own option oi. This reduces the action space of the high level
controller from On to O, where O is the set of all options, and n is the number
of agents.
Our model also draws upon the independent Q-learning framework proposed
by Tan[20], where each agent independently learns its own policy on primitive
actions, while treating other agents as part of the environment. Additionally
in our model, each agent conditions on the others' broadcast options as part
of its observation when choosing the next option. We will discuss the detailed
formulation in section 4.
3 Basic Definitions
We first introduce the essential concepts in reinforcement learning (RL), fol-
lowed by multi-agent RL, hierarchical RL, intra-option learning and off-policy
termination.
A Markov Decision Process [17] is given by a tuple (cid:104)S,A, R, P, γ(cid:105), where S
denotes a set of states, A a set of actions, P the stationary transition probability
P (st+1st, at) from state st to state st+1 after executing action at, R is the aver-
age reward function rt := R(st, at), and γ ∈ [0, 1) is the discount factor. A policy
π(atst) is a distribution over actions at given the state st. The objective of a
RL agent is to learn an optimal policy π∗, which maximizes the expected cumu-
Multi-agent Hierarchical Reinforcement Learning with Dynamic Termination
5
lative discounted future rewards. The Q-value of the optimal policy conditions
this return on an action at that has been selected in a state st:
(st, at) = E(cid:104) ∞(cid:80)
∗
Q
(cid:105)
γτ rt+τ
τ =0
= rt + γ max
a(cid:48)
E(cid:2)Q
∗
(cid:48)
(st+1, a
)(cid:3).
(1)
Q-learning learns the Q-value of the optimal policy by interacting with a discrete
environment [22]. Continuous and high-dimensional states require function ap-
proximation [17], for example deep convolutional neural networks (DQN) [12,13].
To improve the stability of gradient decent, DQN introduces an experience replay
buffer to store transitions that have already been seen. Each update step samples
a batch of past transitions and minimizes the mean-squared error between the
left and right side of Equation 1.
In multi-agent reinforcement learning, n agents interact with the same envi-
ronment. The major difference to the single agent case is that the joint action
space A = A1 × ··· × An of all agents grows exponential in n. Independent
Q-learning addresses this by decentralizing decisions [20]: each agent learns a Q-
value function that is independent of the actions of all other agents. This treats
others as part of the environment and can lead to unstable DQN learning [5].
Other approaches combine decentralized functions with a learned centralized
network [14] or train decentralized Actor-Critic architectures with centralized
baselines [4].
We now describe some important concepts related to hierarchical reinforce-
ment learning (HRL). The Options Framework [18] is one of the most common
HRL frameworks, which defines a two-level hierarchy, and introduces options as
temporally extended actions. Options o are defined as triples (cid:104)I o, βo, πo(cid:105), where
I o ⊆ S is the initiation set and βo : S → [0, 1] is the option termination condi-
tion. πo : S → A is a deterministic option policy that selects primitive actions
to achieve the target of the option. On reaching the termination condition in
state s(cid:48), an agent can select a new option from the set O(s(cid:48)) := {o s(cid:48) ∈ I o}. A
Semi-Markov Decision Process (SMDP) [18] defines the optimal Q-value:
Q(st, ot) = E(cid:104)k−1(cid:80)
γτ rt+τ + γk max
o(cid:48)∈O(st+k)
τ =0
Q(st+k, o(cid:48))
,
(2)
(cid:105)
where k refers to the number of steps until the termination condition βot(st+k) =
1 is fulfilled.
To improve sample efficiency, Intra-option Learning [18,19] was proposed as
an off-policy learning method which at each time step t updates all options that
are in agreement with the executed action, i.e. ∀o ∈ {o πo(st) = at} holds:
Q(st, o) = rt + γ E(cid:2)U (st+1, o)(cid:3)
U (s, o) =(cid:0)1 − βo(s)(cid:1) Q(s, o) + βo(s) max
(3)
Q(s, o(cid:48)).
o(cid:48)∈O(s)
Here U (st+1, o) is the TD-target [21]: if o is terminating in the next state, the
TD-target will be the value of choosing the next optimal option. If not, the
target will be the value of continuing with option o. Updating multiple options
vastly improves the efficiency of training. Consider a grid-world navigation case
6
D. Han et al.
Fig. 3: Dynamic termination Q-value network architecture.
where an agent is going for some goal location, and each coordinate corresponds
to the sub-goal of an option. When the agent takes a primitive action aj
t and
reaches the next position, all options oj that would have chosen that action
will be updated. Each transition updates therefore a significant fraction of the
options, which massively improves sample efficiency.
As introduced by Sutton et al. [18], when the set of available options are
not suited to the task, an agent can improve its performance by terminating at
each step and switching to an optimal option. Harutyunyan et al. [7] have shown
that this approach improves the agent's performance significantly, but has an
adverse effect on exploration: temporally extended options can explore the state
space more consistently, which is lost by early termination. The authors therefore
advocate the use of intra-option learning to update the Q-value off-policy, while
executing a different exploration policy that follows a selected option for multiple
steps before terminating.
4 Method
In this section we will present our framework for deep decentralized hierarchical
multi-agent Q-learning. Our model uses delayed communication to approximate
the decisions of a centralized joint policy, which avoids many problems usually
associated with joint optimization. This induces new challenges such as a delayed
response of agents, and requires us to define a novel dynamic termination update
equation.
Delayed Communication: A straightforward application of decentralized multi-
agent approaches like independent Q-learning (IQL) [20] to the Options frame-
work [18] would yield agents that make decisions independent of each other.
Agent j would estimate the Q-value (see Equation 2)
t ) := E(cid:104)k−1(cid:80)
τ =0
Qj
iql(st, oj
γτ rt+τ +γk max
o(cid:48) j∈Oj
(cid:105)
iql(st+k, o(cid:48)j)
Qj
,
(4)
and select the option oj
t that maximizes it. Here other agents are treated as
stationary parts of the environment, which can lead to unstable training when
ConvolutionFully-connectedO1O2O3…Oi…OnTOther agents' options (0,1)(0,1)Gridworld ImageAgentOther AgentsPassengersGridworld ImageMulti-agent Hierarchical Reinforcement Learning with Dynamic Termination
7
those agents change their policy. The best way to avoid this instability would
be learn the Q-value w.r.t. the joint option of all agents ot := (o1
t ),
i.e. Qjoint(st, ot) [15]. While these joint Q-values allow training in a stationary
environment, decisions require to maximize over Q-values of all possible joint
options. As the number of joint options grows exponentially in the number of
agents n, and joint optimization would require a vast communication overhead,
this approach is not feasible in decentralized scenarios.
t , . . . , on
Instead we propose to use a delayed communication channel over which agents
signal the new option they switched to after each termination. This reduces po-
tentially costly communication and allows each agent j access to all other agents'
t−1 , . . . , on
t−1). Agents
options of the previous time step o
can approximate the joint Q-value by conditioning on this information, that is,
−j
t−1, oj
by choosing options oj
t ). Note
that the approximation is exact if no other agent terminates at time t. The op-
timality of the agents' decisions depends therefore on the frequency with which
agents terminate their options.
t that maximize the delayed Q-value Qj(st, o
t−1, . . . , oj−1
−j
t−1 := (o1
t−1 , oj+1
Multi-agent Intra-Option Learning: As introduced in the previous section,
the intra-option learning method (Equation 3) efficiently associates options with
primitive actions. In our decentralized multi-agent options model, agent j selects
an option according to Qj(st, o
−j
t−1, oj), which is defined as
t−1, oj) := E(cid:2)rt + γU j(st+1, o
, oj) :=(cid:0)1 − βoj
, oj)(cid:3)
(st+1)(cid:1) Qj(st+1, o
−j
−j
t
−j
t
Qj(st, o
U j(st+1, o
−j
t
−j
Qj(st+1, o
t
, oj)
, o(cid:48)j).
+ βoj
(st+1) max
o(cid:48)j∈Oj
(5)
t as the actually executed option oj
We can learn Qj by, for example, minimizing the mean-squared TD error [17]
between the left and right side of Equation 5. In line with intra-option learning,
we update the Q-values of all options oj that would have executed the same
action aj
t . Note that due to our delayed com-
munication channel, the executed options of all other agents are known after the
transition to st+1 and can thus be used to compute the target U j(st+1, o
, oj),
that is, the Q-value of either following the option oj if βoj
(st+1) = 0, or termi-
nating and choosing another option greedily if βoj
Dynamic Option Termination: As mentioned above, the delayed Q-value
defined in Equation 5 only approximates the joint Q-value function. This ap-
proximation will deteriorate when other agents terminate, but sometimes agents
can also benefit from early termination, as shown in Figure 1(b). Additionally,
options are usually pre-trained and have to cover a large range of tasks, without
being able to solve any one task perfectly. Being able to prematurely terminate
options can increase the expressiveness of the learned policy dramatically.
(st+1) = 1.
−j
t
The easiest way to use partial options is to modify the termination conditions
βoj
(s). In particular, we denote choosing the option with the largest Q-value
(Eq. 5) at each time step as greedy termination. Following [7] we combined this
approach with an exploration policy that terminates executed options with a
8
D. Han et al.
fixed probability ρ = 0.5 to allow for temporally extended exploration. During
testing the agent is nonetheless allowed to terminate greedily at every step if the
Q-value of another option is larger.
Although greedy termination has been shown to improve the performance of
individual agents with imperfect options [7], the agent's behaviour will become
less predictable for others. In particular, agents that utilize the delayed Q-value
of Equation 5 will make sub-optimal decisions whenever another agent termi-
nates. To increase the predictability of agents, while allowing them to terminate
flexibly when the task demands it, we propose to put a price δ on the deci-
sion to terminate the current option. Option termination is therefore no longer
hard-coded, but becomes part of the agent's policy, which we call dynamic ter-
mination. This can be represented by an additional option oj = T for agent j
to terminate. Note that, unlike in the Options framework, we no longer need
a termination function βoj
(st) for each option oj. It is sufficient to compare
the value of the previous option Qj(st, o
t−1) with the value of termination
−j
Qj(st, o
t−1, T ). Evaluating oj = T is computationally similar to evaluating the
termination condition βo. Dynamic termination therefore has a similar cost to
traditional termination.
−j
t−1, oj
The optimal behaviour for a given punishment δ is the fix-point of the novel
dynamic termination Bellman equation:
o(cid:48)j∈{oj ,T} Qj(st+1, o
−j
t−1, o(cid:48)j) − δ .
Qj(st, o
(6)
t−1, oj (cid:54)= T ) := E(cid:2)rt + γ max
−j
Qj(st, o
Qj(st, o
−j
t−1, oj = T ) := max
o(cid:48)j∈Oj
t , o(cid:48)j)(cid:3),
−j
Similarly to Equation 5, Equation 6 allows intra-option learning and can be
applied to all options oj that would have selected the same action as the executed
option oj
t . Note that the termination option T can always be updated, as it does
not depend on the transition.
Deep Q-learning: A group of n agents can be trained using a deep Q-network
Qθ [12], parameterized by θ. The architecture is shown in Figure 3: each agent
j selects and executes the next option based on the current state (i.e. grid-word
−j
t−1 of all the other agents. A centralized
image) st and the last known options o
manager is not needed, and the options must only be broadcast after an agent
chose to select a new option. The Q-value of choosing an option is updated
by temporal difference learning with experience replay, which is the established
standard procedure in deep Q-learning [12]. To reduce the number of parameters,
we let all the agents share θ, and the model is thus updated using the experiences
collected by all the agents. To differentiate the behaviour of different agents, the
presented grid-world image contains a dedicated channel that encodes the current
agent's state. These design decisions follow previous work in deep multi-agent
learning [4,14] and drastically reduce training time with very little impact on
the performance in large domains.
At each transition t, the Q-values of all options oj, that would execute the
t , and the termination option T are updated
same action as the executed option oj
Multi-agent Hierarchical Reinforcement Learning with Dynamic Termination
9
predictability
flexibility
option
changes
option
changes
steps to
change
all
near
far
all
dynamic 24.1% 28.1% 16.8%
63%
greedy 59.9% 57.9% 52.8% 77%
option 10.9% 10.9% 9.5%
3%
all
1.61
1.15
6.86
Table 1: Flexibility and Predictability Results.
Near/far refers to whether an agent is within
distance = 4 to a passenger. Steps to change
denotes the number of steps from the new pas-
senger is placed to the agent's option change.
Fig. 4: Example 16 × 16 Grid-world
by gradient descent on the sum of their respective losses
j,t
Lo
LT
j,t
(cid:16)
(cid:16)
(cid:2)θ(cid:3) :=
(cid:2)θ(cid:3) :=
L(cid:2)θ(cid:3)
rt +γ max
o(cid:48)∈{o,T} Qθ(st+1, o
Qθ(st, o
max
o(cid:48)∈Oj
−j
t , o(cid:48)) − Qθ(st, o
−j
t−1, T )
−j
t−1, o(cid:48)) − δ − Qθ(st, o
(cid:88)
n(cid:88)
m−1(cid:88)
(cid:2)θ(cid:3) +
(cid:16)LT
j,t
t=0
j=1
Lo
πo(st)=aj
t
j,t
:=
1
mn
(cid:17)2
−j
t−1, o)
.
(cid:17)2
(cid:2)θ(cid:3)(cid:17)
.
,
(7)
The total loss for a batch of m transitions with n agents is
5 Experiments
We will first evaluate the flexibility and predictability of our dynamically ter-
minating agent, followed by the impact of dynamic termination on the agents'
performance.
Experimental Setup: Figure 4 shows a 16×16 grid-world of the taxi pickup as
observed by the green agent, which includes the passengers, the other agents and
their broadcast options. The landmarks of distance L = 3 show the destinations
of options that are currently visible to the agent. This raises our first challenge:
in order to reach a passenger that stands outside the landmarks, an agent needs
to correctly switch between options.
In the Taxi Pickup Task m passengers are randomly distributed in each
episode. An agent is rewarded r = 1 when occupying the same grid as a passen-
ger, and each step incurs a cost of −0.01. Apart from landmark switching, the
agents need to interpret others' behaviours to avoid choosing the same passen-
ger, as well as responding quickly to changes such as when a passenger is picked
up by another agent.
In the Pursuit Task agents try to catch randomly distributed prey by coop-
erating with others. We refer to the task as k-agent pursuit, where a successful
capture requires at least k agents occupying k positions adjacent to the prey,
10
D. Han et al.
which rewards each participating agent r = 1. This task relies heavily on agents
coordination. In particular, when close to a specific prey, agents need to observe
others and switch between options to surround the prey; whereas when faraway,
agents need to agree on and commit to go for the same prey.
Algorithms and Training: Having described the settings, we now introduce
the detailed training procedures of the SMDP and option policies, before com-
paring the four types of agents.
The Policy of Options adopts a local perspective, and navigates the agent
to the option's destination. Specifically, we use a DQN of 2 convolutional lay-
ers (kernel size 2) with max-pooling, followed by 4 fully-connected layers (size
300). The input is the destination coordinate with the grid-world image, and the
output is a primitive action in {N, S, E, W, Stay}.
The SMDP Policies are trained through intra-option learning for all agent
types. The inputs are 4-channel grid-world images as in Figure 3, which rep-
resents the agent, the preys (or passengers), the other agents, and lastly, the
options broadcast by other agents (except for IQL). The DQN contains 2 con-
volutional layers (kernel size 3), max pooling, and 4 fully-connected layers (size
512). We use experience replay with a replay buffer of size 100,000.
Self-Play is used in the experiments, and our decentralized agents share the
same DQN parameters (not states) [14]. This allows us to scale up the number
of agents without additional parameters; and the trained model can directly
transfer to more agents during testing. Moreover, self-play creates an important
link between the predictability of an individual agent and of the society.
The four types of agents are as follows:
1. Option Termination Agent executes its option until the natural termination
condition is met.
2. Greedy Termination Agent terminates every step and switches to the optimal
option. For better exploration during training, an additional behaviour policy
is used for experience collection. For fairness of comparison, this exploration
policy which terminates with probability ρ = 0.5 (tuned for the greedy agent)
is applied across all agent types.
3. Dynamic Termination Agent is our proposed algorithm that chooses whether
to terminate the current option at each step. δ is the termination penalty.
4. IQL is independent Q-learning, where agents option broadcasts are disabled.
IQL (greedy) and IQL (δ) refers to IQL agents using greedy or dynamic
termination.
Results: The delayed response problem reveals that agents need to be flexible
enough to change their options when the situation changes, but also predictable
enough not to interfere in other agents' plans too frequently. Table 1 shows
experimental measurements to showcase these conflicting goals for the investi-
gated termination methods. We measure the agents' flexibility in the single-agent
taxi domain. 100 episodes are initialized with 5 random passengers. During each
episode, one additional passenger is placed near the agent at step T and we
Multi-agent Hierarchical Reinforcement Learning with Dynamic Termination
11
(a) 19 × 19 taxi with 10 agents
(b) 19 × 19 pursuit with 10 agents
Fig. 5: Results from Taxi Pickup and Pursuit Tasks
Note: Every point per 500 episode is the testing result averaged over 100 random
episodes and 5 seeds. The shaded area shows standard deviation across seeds.
taxi
2 agent pursuit
3 agent pursuit
n=5, m=10 n=10, m=20 n=3, m=5 n=10, m=10
n=3, m=5
Agents
19x19 25x25
19x19
16x16
(r=1)
19x19
(r=1)
Dynamic
Greedy
Option
IQL
δ = 0.1 7.89 5.75
15.29
10.24 9.30
δ = 0
6.58
3.28
6.62
3.23
-0.32 -0.94
δ = 0.1 7.11
5.09
greedy
6.08
2.79
11.81
12.39
0.52
12.02
9.06
6.73
4.07
7.36
3.74
5.47 -1.82
-1.57 -2.29
-2.12 -2.49
19x19
(r=1)
12.50
5.38
4.65
-1.42
-0.84
-1.64
10x10
(r=1)
16x16
(r=2)
6.71
10.38
5.53
5.89
-3.77
-1.62
-2.13
6.54
6.40
5.20
-0.59
-0.42
Table 2: Average reward after training for Taxi and Pursuit tasks. n is the number
of agents and m is the number of passengers (preys). NxN denotes grid-world
size, k agent pursuit denotes the required number of agents for capture, and r is
the capture range.
observe how quickly the agent adjusts to the new situation. We report the per-
centage of option changes at step T + 1 and the average number of steps till the
agent changes options. Note that dynamic termination allows to react almost as
flexible to the changed situation as the greedy termination.
For predictability, we measure the average probability to change the option
in the multi-agent taxi task for two cases: when the agent is near (within dis-
tance 4) or far from its closest passenger. This is an imperfect measurement, as
we cannot distinguish the effect of termination on other agents. While options
need to change close to a passenger due to imperfect options, the behavior of
dynamic termination is much closer to standard option termination when far
away. Note that this effect is marginal for the other techniques, which indicates
that our method may purposefully refrain from changing to better options to
avoid interrupting other agent's plans.
0100002000030000400005000060000episodes−20246810121416averagerewardsperepisodedynamic(δ=0.15)dynamic(δ=0)greedyoptionIQL(δ=0.15)IQL(greedy)0500010000150002000025000300003500040000episodes−202468101214averagerewardsperepisodedynamic(δ=0.1)dynamic(δ=0)greedyoptionIQL(δ=0.1)IQL(greedy)12
D. Han et al.
Performance: Figure 5(a) shows the results from the taxi pickup task. The
option termination agent fails due to its inflexibility to switch options. In con-
trast, our dynamic (δ = 0.15) agent is highly flexible. Moreover compared with
greedy and IQL, its high predictability indeed helps the agents to interpret oth-
ers' intentions and better distribute their target passengers. Figure 5(b) shows
the results on the pursuit task, where at least two agents need to surround a prey
within capture range = 1. Seen from the IQL agents' low performance, option
broadcasting and interpreting others' behaviours are crucial to this task. Our
dynamic termination agent (δ = 0.1) significantly outperforms all other agents.
Compared with the greedy agents, we can conclude that predictability signifi-
cantly helps our dynamic agents to stay committed and succeed in cooperation.
Finally, we present the performance of all agents across different tasks and
varying parameters in Table 2. Firstly, the option termination agent has diffi-
culty with tasks which require higher level of accuracy and quick responses, such
as the taxi tasks and pursuit with capture range = 1. However, it works well
with tasks which require coordination but less flexibility, such as the 16 × 16 3
agent pursuit with capture range 2, which shows the advantage of predictability
on cooperation. The performance of greedy termination agents decreases signif-
icantly in larger grid-world sizes, and when commitment is essential, such as
the 16 × 16 3 agent pursuit with capture range 2. Our dynamically terminating
agent performs well across all tasks, as it balances well between flexibility and
predictability. The IQL agents performs well in the taxi task. However, they
fail to learn the pursuit tasks where foreseeing others' behaviours is essential to
coordination.
6 Conclusions and Future Work
In this paper, we identified the delayed response problem, that occurs when hi-
erarchical RL is combined with multi-agent learning. To address this challenge,
we investigated existing approaches of greedy option termination in single agent
learning. However, this method introduces a new dilemma specific to multi-agent
systems: as an agent broadcasts its current options to indicate its subsequent
behaviours, frequent changes in options will result in its behaviour being less
predictable by others. Therefore, to balance flexibility with predictability, we in-
troduced dynamic termination, which enables agents to terminate their options
flexibly according to the current state. We compared our model with current
state of the art algorithms on multi-agent pursuit and taxi tasks with varying
task parameters, and demonstrated that our approach outperformed the base-
lines through flexibly adapting to the task requirements. For future work, we are
interested in applying the dynamic termination framework to traffic simulations,
such as junction and highway management.
References
1. Bacon, P.L., Harb, J., Precup, D.: The option-critic architecture. In: AAAI. pp.
1726 -- 1734 (2017)
Multi-agent Hierarchical Reinforcement Learning with Dynamic Termination
13
2. Dietterich, T.G.: Hierarchical reinforcement learning with the maxq value function
decomposition. Journal of Artificial Intelligence Research 13, 227 -- 303 (2000)
3. Foerster, J., Assael, I.A., de Freitas, N., Whiteson, S.: Learning to communicate
with deep multi-agent reinforcement learning. In: Advances in Neural Information
Processing Systems. pp. 2137 -- 2145 (2016)
4. Foerster, J., Farquhar, G., Afouras, T., Nardelli, N., Whiteson, S.: Counterfactual
multi-agent policy gradients. arXiv preprint arXiv:1705.08926 (2017)
5. Foerster, J., Nardelli, N., Farquhar, G., Afouras, T., Torr, P.H.S., Kohli, P., White-
son, S.: Stabilising experience replay for deep multi-agent reinforcement learn-
ing. In: Proceedings of the 34th International Conference on Machine Learn-
ing. Proceedings of Machine Learning Research, vol. 70, pp. 1146 -- 1155 (2017),
http://proceedings.mlr.press/v70/foerster17b.html
6. Giannakis, M., Louis, M.: A multi-agent based system with big data processing
for enhanced supply chain agility. Journal of Enterprise Information Management
29(5), 706 -- 727 (2016)
7. Harutyunyan, A., Vrancx, P., Bacon, P.L., Precup, D., Nowe, A.: Learning with
options that terminate off-policy. arXiv preprint arXiv:1711.03817 (2017)
8. Jennings, N.R.: Commitments and conventions: The foundation of coordination in
multi-agent systems. The knowledge engineering review 8(3), 223 -- 250 (1993)
9. Lesser, V., Ortiz Jr, C.L., Tambe, M.: Distributed sensor networks: A multiagent
perspective, vol. 9. Springer Science & Business Media (2012)
10. Lin, K., Zhao, R., Xu, Z., Zhou, J.: Efficient large-scale fleet management via
multi-agent deep reinforcement learning. arXiv preprint arXiv:1802.06444 (2018)
11. Makar, R., Mahadevan, S., Ghavamzadeh, M.: Hierarchical multi-agent reinforce-
ment learning. In: Proceedings of the fifth international conference on Autonomous
agents. pp. 246 -- 253. ACM (2001)
12. Mnih, V., Kavukcuoglu, K., Silver, D., Graves, A., Antonoglou, I., Wierstra, D.,
Riedmiller, M.: Playing Atari with deep reinforcement learning. In: NIPS Deep
Learning Workshop (2013)
13. Mnih, V., Kavukcuoglu, K., Silver, D., Rusu, A.A., Veness, J., Bellemare, M.G.,
Graves, A., Riedmiller, M., Fidjeland, A.K., Ostrovski, G., et al.: Human-level
control through deep reinforcement learning. Nature 518(7540), 529 (2015)
14. Rashid, T., Samvelyan, M., de Witt, C.S., Farquhar, G., Foerster, J., Whiteson, S.:
Qmix: Monotonic value function factorisation for deep multi-agent reinforcement
learning. arXiv preprint arXiv:1803.11485 (2018)
15. Riedmiller, M., Withopf, D.: Effective methods for reinforcement learning in large
multi-agent domains (leistungsfahige verfahren fur das reinforcement lernen in
komplexen multi-agenten-umgebungen). it-Information Technology 47(5), 241 -- 249
(2005)
16. Stone, P., Veloso, M.: Multiagent systems: A survey from a machine learning per-
spective. Autonomous Robots 8(3), 345 -- 383 (2000)
17. Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction. MIT Press
(1998)
18. Sutton, R.S., Precup, D., Singh, S.: Between mdps and semi-mdps: A framework
for temporal abstraction in reinforcement learning. Artificial intelligence 112(1-2),
181 -- 211 (1999)
19. Sutton, R.S., Precup, D., Singh, S.P.: Intra-option learning about temporally ab-
stract actions. In: ICML. vol. 98, pp. 556 -- 564 (1998)
20. Tan, M.: Readings in agents. chap. Multi-agent Reinforcement Learning: Indepen-
dent vs. Cooperative Agents, pp. 487 -- 494 (1998)
14
D. Han et al.
21. Tesauro, G.: Temporal difference learning and td-gammon. Communications of the
ACM 38(3), 58 -- 68 (1995)
22. Watkins, C., Dayan, P.: Q-learning. Machine Learning 8, 279 -- 292 (1992)
|
1010.0155 | 1 | 1010 | 2010-10-01T13:25:31 | An Investigation of the Advantages of Organization-Centered Multi-Agent Systems | [
"cs.MA"
] | Whereas classical multi-agent systems have the agent in center, there have recently been a development towards focusing more on the organization of the system. This allows the designer to focus on what the system goals are, without considering how the goals should be fulfilled. This paper investigates whether taking this approach has any clear advantages to the classical way of implementing multi-agent systems. The investigation is done by implementing each type of system in the same environment in order to realize what advantages and disadvantages each approach has. | cs.MA | cs |
An Investigation of the Advantages of
Organization-Centered Multi-Agent Systems
Andreas Schmidt Jensen
Department of Informatics and Mathematical Modelling
Technical University of Denmark
Richard Petersens Plads, Building 321, DK-2800 Kongens Lyngby, Denmark
Abstract. Whereas classical multi-agent systems have the agent in cen-
ter, there have recently been a development towards focusing more on the
organization of the system. This allows the designer to focus on what the
system goals are, without considering how the goals should be fulfilled.
This paper investigates whether taking this approach has any clear ad-
vantages to the classical way of implementing multi-agent systems. The
investigation is done by implementing each type of system in the same
environment in order to realize what advantages and disadvantages each
approach has.
1
Introduction
Within the area of multi-agent systems there has recently been a development
towards making the organization of such systems explicit [3,4,5]. However, while
[3] lists some drawbacks of classical (agent-centered) multi-agent systems, the
actual advantages of making the organization explicit has not been thoroughly
investigated.
This paper summarizes our work with such investigation of the organization
of multi-agent systems. The investigation was conducted by implementing two
systems: a classical (agent-centered) (ACMAS) and an organization-centered
(OCMAS).
In classical multi-agent systems the agent is in focus. The programmer de-
veloping the agents is able to decide what the agents can do and how the choose
to do it. In an OCMAS we are more concerned with the organization; i.e. the
structure of the multi-agent system. Naturally all multi-agent systems have a
structure, but it is most often implicitly defined by the agents and their rela-
tions.
By explicitly defining the organization it is possible to focus on what the
agents should do without at the same time deciding how they should do so. In
other words, the organization makes it possible to create the structure of the
system without specifying details about the implementation.
1
2 The Setup
The two types of systems have been compared using a team-based version of
the well-known game Bomberman. However, the nature of an implementation of
intelligent agents does not guarantee a certain quality and a comparison based
on the overall performance of a team of agents may not be adequate; the results
may merely be caused by better or worse strategies.
Since the two approaches are quite different in many ways, it seems more
natural to employ other measures of comparison. The comparison of ACMAS
and OCMAS is therefore based on the following measures:
-- Structure of the source code
-- Development speed
-- Performance
-- Error handling
-- Debugging
-- Complexity of the scenario
-- Number of intelligent agents
The original Bomberman game consists of five key elements: bombs, boxes,
solid obstacles, exitways and power-up panels. Whereas boxes are destructible,
solid obstacles are not. This means that Bomberman will always be able to take
cover behind solid obstacles. Most boxes must be destroyed since they hide both
power-ups and exitways. Exitways are what Bomberman must find to be able
to complete a level. A power-up can be used to enhance bomberman's abilities
and bombs. In the beginning, his bombs are weak, but by using power-ups he
will be able to drop several stronger bombs at a time.
In a multi-agent context, the enemies could be considered a team of agents
(i.e. a multi-agent system) with the general purpose of stopping Bomberman
from escaping and by implementing the enemies using each of the approaches
we could perform the comparison. However, to be able to experiment with the
cooperative aspects of intelligent agents we instead propose an altered version
of Bomberman in which two teams attempt to eliminate each other:
Definition 1 (Team-based Bomberman). The multi-agent system is similar
to Bomberman. It consists of two teams fighting against each other. Each team
consists of at least two "bombermen" (or agents). The teams are situated in
a maze-like environment consisting of solid obstacles and boxes. An agent can
place bombs which at some point will explode. An agent dies when he is hit by
an explosion. Explosions will also destroy boxes. A team wins when all players
from the other team have been eliminated.
This version of Bomberman consists of some of the same key elements as
the original game: a maze, destructible and indestructible obstacles, and bombs.
This should allow the agents to employ the strategies intended for the game,
while at the same time competing in teams. This fact creates a new aspect of
the game, since a group of agents potentially is able to trap enemies by placing
bombs strategically.
2
The concepts of exitways and power-ups have been excluded in this version.
Exitways have been removed, since the overall goal of "getting to the surface"
is no longer relevant (as the goal instead is to eliminate the other team). Power-
ups are not included to avoid making the overall system too complex since the
intention is not to make a perfect implementation of Bomberman; rather is it
to compare and discuss two different approaches to implementing multi-agent
systems. In this case we believe a simple, yet strategically challenging system
will be adequate.
2.1 Jason
The implementation of the ACMAS is done using Jason, "a Java-based inter-
preter for an extended version of AgentSpeak" 1. We provide an overview of the
interpreter by introducing how to program multi-agent system using it, however
we will not go into details with all parts of the system. The overview should give
a foundation for building simple systems using Jason. A thorough description
of Jason is found in [2].
The language of Jason, AgentSpeak, is a Prolog-like logic programming
language. AgentSpeak allows the developer to create a plan library for the agent.
A plan in AgentSpeak is basically of the form
+triggering event : context <- body.
Roughly speaking, if an event matches a trigger, the context is matched with
the current state of the agent. If the context matches the current state, the body
is executed; otherwise the engine continues to match contexts of plans with the
same trigger. If no plan is applicable, the event fails.
The fact that AgentSpeak is a logic programming language allows one to
easily transfer specifications written in logic formulas of a multi-agent system to
an implementation written in Jason. For instance, part of a plan for a vacuum
cleaner agent [9] is shown below:
+!cleaning : in(X,Y) & dirt(X,Y) <- do(suck).
The plan is triggered by the goal !cleaning, so if the vacuum cleaner is in a
"cleaning state", this triggering event would be applicable. The context specifies
that this plan is relevant if the agent currently is somewhere in the environment
which is dirty. If the context can be unified with data from the database of the
agent, it will perform the body, which in this case means that it will perform
the action do(suck). However, as mentioned it is possible to have several plans
for the same triggering event if those plans have different contexts:
+!cleaning : in(X,Y) & dirt(X+1,Y) <- do(right).
This plan will then be applicable if the agent has perceived dirt in an area to
the right of its current area. In that case, it will perform the action do(right).
1 http://jason.sourceforge.net/
3
2.2 The Moise+ organizational model
The implementation of the OCMAS is based on the Moise+ organizational
model, in which it is possible to create a structural, functional and deontic
specification of an organization. The organizational model has been combined
with Jason in the middleware called J -Moise+.
Moise+ is an organizational model for multi-agent systems which makes
it possible to specify the organization in a MAS structurally, functionally and
deontically. The model takes an organizations-centered approach, meaning that
an organization will exist a priori (created at design-time) and the agents ought
to follow it [5].
Structural Specification: Moise+ uses the concepts of roles, role relations and
groups in the structural specification of an organization. Each agent plays one
or more roles. The roles are related by links, which specify how agents are ac-
quainted and can communicate. In order to further structure the organization,
the agents can join different groups depending on the roles they play.
Functional Specification: The functional specification consists of a goal decom-
position tree, known as a Social Scheme (SCH), where the root is the goal of the
SCH and each node is a sub-goal that can be delegated to different agents. In
[5] three operators are defined for decomposing a goal into sub-goals: sequence,
choice and parallelism. These operators allow us to create complex schemes in
which the agents can commit to advanced missions.
Deontic Specification: The relation between the structural and functional speci-
fication is made explicit by the deontic specification. Using it, we can constrain
the agents further by specifying what missions an agent ought to follow and what
missions an agent is allowed to follow when playing certain roles. We write
obl(ρ, m, tc),
when agents playing role ρ are obliged to complete mission m under the time
constraint tc. Analogously we write per for permissions.
The Moise+ organizational model gives a foundation for defining and using
an organizational model for multi-agent systems -- in other words to create an
OCMAS. However, the model itself is not directly associated with any multi-
agent framework and the intention is that it should be usable for all kinds of
frameworks for multi-agent systems.
The software implementation called J -Moise+ is an implementation of
Moise+ which should enable multi-agent systems implemented in Jason to
follow an organizational structure [6].
2.3 Implementational details
The team-based Bomberman introduced above has been implemented in both an
ACMAS and OCMAS version. The following describes some of the implementa-
tional details of these systems. Both systems are built for the same environment,
4
and a lot of their abilities will be similar (if not identical). The differences are
mostly how the systems make use of their knowledge and actions, and not as
much what abilities they have. This ensures a somewhat identical setup for both
systems.
It is the intention that some cooperation
is implicitly present. When two agents pur-
sue the goal of killing the same enemy, they
should at least be able to avoid putting bombs
at the same spots, and instead attempt to
trap the enemy. This will generally be pos-
sible because of the autonomy of the agents;
they should choose paths and bomb locations
which seems reasonable, i.e. not place bombs
which will potentially hit allies or go through
a path in which a bomb may explode soon.
Fig. 1. The agent is stuck between
the boxes.
Some cooperation can, however, not be
done implicitly. Consider the situation in fig-
ure 1. Agent "26" is stuck between a number
of boxes without the possibility of placing a bomb to destroy them; it would kill
the agent as well.
In such situation the agent has two options: (1) wait for another agent to
autonomously choose to help the agent or (2) ask for help. Option (1) may be
possible but it seems irrational to wait for another agent to detect the situation
by himself. The agent being stuck should therefore always ask for help. This is
done using the contract net protocol [10].
The agents uses the well-known A*-algorithm [9] for pathfinding. In addition
to the heuristics used by the algorithm, we use a punishment value for every
location in the environment. The main difference of this algorithm compared to
A* is that included in the tentative value of a neighbor of the current location
is a punishment value depending on the objects on the location of that neigh-
bor. This will make the algorithm consider other, perhaps longer, paths, which
however may prove to be safer.
For instance, by specifying a punishment of 5 on a field containing a box, the
algorithm will consider paths, that avoids going through that box, which are up
to 5 steps longer. This may not seem as a big improvement, but it means that
if a single box is blocking a path, the agent will consider a path which is a little
longer. Compared to a situation where he blows up the box and continues, this
is usually more efficient, since he will have to wait for the bomb to explode and
the explosion to disappear. However, consider the situation depicted in figure
2(a). The agent wants to move from the current position, A, to the target, B, so
it will be highly inefficient to compute a path avoiding the boxes. A much more
efficient path would be to compute a path, in which a box must be destroyed.
To do this we introduce the notion of an intermediate target. An intermediate
target is a target in which a bomb should be placed in order to clear the way to
5
(a) A path avoiding boxes.
(b) A path with an intermediate target,
C.
Fig. 2. Different ways of computing a path from a location A to a target B.
the "real" target. In figure 2(b) we have an intermediate target, C. This path is
clearly preferred over the other.
The fact that AgentSpeak is Prolog-like makes it possible to specify a model
for the plans in a way that is easily transferable to Jason. The agent needs the
following predicates from its knowledge base:
-- pos(X, Y ): The current position of the agent.
-- target(X, Y ): A final target.
-- intermediate(X, Y ): A possible intermediate target.
-- clear(X, Y ): An intermediate target is clear, meaning that the targeted box
has been removed, creating a passage.
-- bombs(N ): The number of bombs currently available. As a shorthand we
write bombs(N>0) for (bombs(N ) ∧ N > 0).
We now present a model for agent a describing the situation above. Note
that in a scenario of Bomberman, there will generally be an enormous amount
of epistemic states, since there will be a state for each possible position, and
an agent will have different knowledge every time he is in a state, yielding even
more states. Therefore, we consider a more abstract and general model with
three possible locations: (XA, YA), (XB, YB) and (XC, YC), corresponding to
the agent's location, his target and intermediate target, respectively. These will
be referred to as A, B and C. We write pred( ) to match any value of that
predicate (i.e. only in the fact that the predicate exists in the knowledge base is
of interest).
For each of the three possible locations, a number of possible states exist.
In epistemic logic indistinguishable states are typically states the agent cannot
distinguish because of lack of knowledge. In the following we also refer to states
as indistinguishable if they, even though they are somewhat different in terms of
knowledge, will result in the agent performing the same action. This simplifies
the model greatly and can be considered as a model created from another agent's
point of view.
Figure 3 shows the model for the path-finding problem. The predicates in a
state are the predicates which the agent knows (or believes) to be true at that
6
Fig. 3. Model of the path-finding problem depicted in figure 2.
state. That is, if the agent is at the final target, B, and the intermediate target
is clear, he will be in the lower right state of the figure. We use this model to
create a plan for how to decide which path to choose.
Notice the two possible outcomes of moving towards C when the agent is
at A and has no bombs (with the intermediate target being blocked). This is
because of the fact that during the move towards C, a bomb may become avail-
able, meaning that the agent will be in a state where bombs(N>0) rather than
bombs(0).
Committing to a mission in J -Moise+ When the agents commit to a mission
in a scheme the J -Moise+ engine will generate goal achievement events for the
goals that are currently available. For instance, when an explorer commits itself
to the mission of exploration, it will automatically generate the goal achievement
event of finding an unexplored area. Whenever a goal is completed, an event for
the next goal of the plan is generated. In this case the next available goal will
be to move to the unexplored area. In this way, it is very easy to follow the plan
of a mission, since the goals are automatically generated when they have been
specified in the organization.
Basically, the explorer has the following plans:
+!exploreMap[scheme(Sch)]
<- jmoise.set_goal_state(Sch, exploreMap, satisfied).
7
pos(A)target(B)∧intermediate(C)∧¬clear(C)∧bombs(N>0)pos(A)target(B)∧intermediate(C)∧clear(C)pos(A)target(B)∧intermediate()pos(A)target(B)∧intermediate(C)∧¬clear(C)∧bombs(0)pos(B)target(B)∧clear(C)pos(B)target(B)∧¬clear(C)pos(C)target(B)∧intermediate(C)∧¬clear(C)∧bombs(N>0)pos(C)target(B)∧intermediate(C)∧clear(C)pos(C)target(B)∧intermediate()pos(C)target(B)∧intermediate(C)∧¬clear(C)∧bombs(0)movetowards(B)movetowards(B)movetowards(B)do(bomb)movetowards(B)movetowards(C)movetowards(C)movetowards(C)wait+!findUnexploredArea[scheme(Sch)]
: <context>
<- <plan to find unexplored area>;
jmoise.set_goal_state(Sch, findUnexploredArea, satisfied).
+!moveToUnexploredArea
: <context>
<- <plan to move to unexplored area>.
+near(_,_)
<- ?scheme(exploration, Sch);
jmoise.set_goal_state(Sch, moveToUnexploredArea, satisfied).
Notice that since the organizational specification shows exactly how to ex-
plore the map, it is only necessary to create plans for each goal event. When
the plan is successfully executed, the agent informs J -Moise+ that the goal
has been satisfied. It is then the responsibility of J -Moise+ to generate the
next goal event. Note that moving to an unexplored area is a bit different since
it uses the path-finding algorithm described in the previous chapter. Therefore,
the goal is satisfied only when the agent is near the unexplored area.
3 Results
We now present the main results gained during the work with Jason and J -
Moise+.
3.1 Agent-Centered Multi-Agent Systems
The ACMAS, along with its structure, is built form the ground. Having to build
everything from the ground gives a lot of freedom with regards to the structure of
the implementation; there are no constraints as to where specific details must be
implemented. This has lead to a solution where plans for achieving sub-goals and
reacting to percepts can be implemented concisely, while still doing as intended.
The resulting agents are therefore reacting quite fast to changes in the en-
vironment; with short code and only few precisely defined responsibilities, the
agents are easily able to prioritize during a game, if it, for instance, is necessary
to take cover from a bomb.
But the freedom one has with regards to structure has also been the biggest
issue during the implementation. Ensuring successful transition between goals
has caused some trouble during the implementation. The debugging functionality
can be quite tricky to master, and the only way to test the transition from one
goal to another is by executing the system. This can render the process quite
slow.
Overall though, we are quite satisfied with the resulting system; it satisfies
the proposed strategy and even though the agents may be quite simple, they are
8
able to cooperate to complete their tasks and use their knowledge to decide how
to move through the environment.
3.2 Organization-Centered Multi-Agent Systems
Building an OCMAS is a more well-structured process than that of building
an ACMAS, since it consists of two parts, (1) specifying organization and (2)
implementing the details of the organization where the latter depends on the
completion of the first. While this does not automatically result in a more struc-
tured program, it does force the user to think more about what, why and how.
When specifying the organization the focus is on what the overall goals are.
This leads to considering why these are the goals and in that way it allows us to
justify the choices made, even before they are implemented. Finally, when the
plans are implemented the focus is on how the agents are supposed to complete
their goals.
Generally, since only sub-goals, and not their relations, need to be imple-
mented, the code tends to be quite clear. However, without being able to study
the specification of the organization, it is not possible to see the relation be-
tween the goals (as it is handled automatically). Furthermore, as required by
J -Moise+, the code is often quite verbose, because of the statements required
to setup and manage the organizational structure (jmoise.create group(...)
etc.) and the extensive use of annotations (+!goal[scheme(Sch)] etc.). While
this in general makes the code quite clear, it also can result in situations where
one need to include a plan for a goal event in which the goal is simply set to be
satisfied. Consider the example below:
+!goal // available when subgoal is satisfied
<- jmoise.set_goal_state(goal, satisfied).
+!subgoal
<- <complete subgoal>;
jmoise.set_goal_state(subgoal,satisfied).
In this case, even though the primary goal is completed, when the subgoal
is completed, one has to explicitly state that the goal is satisfied even though
nothing else happens. This is not a serious problem, but in large scenarios with
complicated schemes, it may result in many "empty" plans.
Since the agents are part of an organization, they are required to do what-
ever their obligations tells them to do. To be able to do so, they need access
to the specification of the organization. As described, this access is provided
through a special agent. This means that when an agent has satisfied a goal,
this information is sent to the J -Moise+ agent which then determines what
the next goals are and informs the agent. This can decrease performance in very
active environments if the agent has no goals to pursue while waiting for new
information.
9
This can be seen quite clearly in the implementation of the explorer of the
OCMAS team. When the exploreMap goal is available, it is immediately satis-
fied. When this happens, the scheme for exploring is finished and a new scheme
must be created in order to continue the exploration. Compared to the explorer
of the ACMAS, the performance differences are quite clear; in the ACMAS,
the agent immediately chooses a new spot to move to, while in the OCMAS,
the agent waits for the generation of an appropriate goal events. The resulting
implementation fulfills the proposed strategy, however the road towards this re-
sult has been more bumpy than when working with the ACMAS. This will be
discussed below.
3.3 Using Jason and Moise+
Jason uses AgentSpeak which is an agent-oriented programming language. Such
a programming language is perfect for implementing goal-directed and reactive
behavior since one builds a set of plans for how to react to such events. AgentS-
peak is very similar to the logic programming language Prolog, and both the
language of AgentSpeak and the general features of Jason have been quite ex-
tensively documented in [2]. This makes it possible to quite easily understand
and exploit the features of the interpreter.
The debugging feature of Jason has lead to a few issues during the imple-
mentation. Often when attempting to debug, the entire system pauses and then
when attempting to perform a stepwise operation through the system, noth-
ing happens. This has lead to much trial and error and has overall slowed the
development process. Generally though, the system provides descriptive error
messages and the more acquainted one gets with the system, the easier errors
are spotted.
The J -Moise+ extension is built on Jason and uses the Moise+ model,
so in general the same things apply to this. However, since it is an extension, it
allows for more actions and there are a few more things one needs to be aware
of.
As mentioned, having an organization often leads to a very well structured
result since the user is required to really think about what the agents are sup-
posed to do. This is even more the case in J -Moise+ since goal events are
automatically generated, meaning that the user need not consider the transition
between the goals. Furthermore, the schemes that can be specified in the func-
tional specification of Moise+ makes coordination of tasks very easy. Simply
by specifying the cardinality of a goal in a scheme, the user specifies how many
agents must complete this goal before it is completed within the scheme. For
instance, a goal event can be synchronized by having a sub-goal that all agents
must satisfy before the actual goal event is created.
The Moise+ organizational model has been quite extensively described in
[5,6,7] along with a tutorial of the details of how to use it in [8]. This makes it
very easy to understand how the different concepts are related and should be
used.
10
Organizational knowledge When a group or scheme is created, the agents will
perceive certain events so that they are able to react accordingly. In order to be
able to distinguish between similar events, annotations are added that among
other things include which agent created the organizational object.
This can be used to let an agent decide not to join a group if a specific agent
has created it, or only committing to a mission it is permitted to commit to, if
it is related to a specific group. This is a great use of the Jason annotations,
as it is perfectly clear how to use them. Furthermore, because it is annotations
they will not be shown if the programmer chooses not to use them.
What Moise+ is lacking in term of organizational knowledge is the ability
for an agent to know whether it is allowed to join a group before it attempts to
join it. The reason for this is that if it is not permitted to join a group or play
a role, an error event is created. This should be okay, but it is not possible for
the agent to reason about the error in details so it will not know why it could
not join the group.
Overall, both tools are quite pleasant to work with once acquainted with
them.
4 OCMAS vs ACMAS: When to Use What?
The work with the two approaches has lead to a discussion of the implementation
of each team as well as the two tools used for building the implementations.
Generally speaking, one approach is not better than the other but given the
results above it is clear that there are situations more suited for one approach
than the other.
Figure 4 gives an overview of the main results of the comparison. The fig-
ure uses two parameters as basis: the number of agents in the system and the
structural complexity. When the system has a high structural complexity, there
are greater advantages of dividing the implementation into two distinct parts:
what and how. This means that while an organization can be applied to simple
systems, they will in most cases not benefit much from this.
Notice that the two approaches overlap. The reason is that there will always
be situations where it is not clear whether one system is an advantage over the
other. The Team-Based Bomberman is an example of such system. While the
results show a bias towards the ACMAS in this case, it is partly due to the
communication overhead in J -Moise+. If this problem is solved, the OCMAS
could be performing just as well as the ACMAS.
Personal software assistant: A personal software assistant is a simple agent
resposible for assisting an end-user with certain tasks that can be automated.
For such purpose it seems an organization will be inappropriate. The primary
reason for this is that the system will generally consist of very few agents (in
many cases only one) and the complexity will be low. In such cases there is not
much sense in creating an organization, since the system will not benefit from
the OS. It will probably consist of a single group with few roles that the agents
11
Fig. 4. An overview of the main results.
can play. Building an entire organization for very few agents can in most cases
not be justified.
Distributed calculations: Consider a system of intelligent agents, which have one
or more sensors. This could for instance be the "distributed sensing" scenario
described in [10]. Here an agent has a clear responsibility of sensing the environ-
ment and using its calculations in some well-defined way. The role of an agent
is defined by the sensors it can use, i.e. it has a static role. At all time the
information it is computing will be used for the same purpose.
In such cases there is no need to build an organization since the missions are
very simple and there is no explicit need of coordination. Furthermore, being in
a group would not change the behavior of an agent in the system since its role
and responsibilities remains.
In other words: Even though the system can contain many agents, the struc-
tural complexity remains low. Therefore the agents will not benefit much from
making the organization explicit.
12
manyagentsfewagentshighstructuralcomplexitylowstructuralcomplexityOCMASACMASPersonal SoftwareAssistantDistributedCalculationsPaper ReviewTeam-BasedBombermanMulti-AgentProgrammingContest 2009Multi-AgentProgrammingContest 2006Paper review process: In [3] an example of the "reviewing process" of papers
in a conference is considered. In this example we have a group for submission
of papers and one for evaluation. Being in a certain group then gives an agent
certain responsibilities, such as evaluating the papers that are being submitted.
This is a very specific example of the use of an organization but it can eas-
ily be generalized to situations where certain agents are depending on results
from other agents. By grouping such agents and creating schemes they can com-
mit to, the general structure of the dependence-relation is immediate and the
implementation is easily constructed using it.
While the number of agents may vary it is clear that the structural complexity
is higher than in the previous examples. An explicit organization will definitely
make the implementation much easier since responsibilities and acquaintances
are well-structured.
Games: Games can be quite different and naturally there is no definite answer to
whether using ACMAS or OCMAS would be better. In such situations it is impor-
tant to realize how complex the game is. If the game consists of one well-defined
type of controllable character, an organization is probably not a good choice.
However, if the game consists of several different characters, all with different
possibilities, it may be reasonable at least to consider whether an organization
could be useful.
This seems to indicate that using an organization for a Bomberman game
may not be the best choice. In this specific case the ACMAS solution is better
than the OCMAS; the agents react faster, can more easily adapt to changes
and is in general more robust. An organization can be justified in a game such
as Bomberman if we include features from the original game that would make
the game more complex (e.g. power-ups). An OCMAS will benefit in this case,
since it is possible to specify advanced roles and missions in the OS that would
otherwise be difficult to implement.
Multi-Agent Programming Contest: The area of multi-agent systems is quite
active, which for instance can be seen by the annual multi-agent programming
contest. The primary aim of the competition is to "stimulate research in the area
of multi-agent system development and programming" [1]. This is achieved by
developing a scenario of a dynamic environment in which cooperation is the key
to success. Different multi-agent systems are competing in the scenario in a set of
games to determine their performance. As illustrated in figure 4 the complexity
and number of agents in the contest has increased over the years. Therefore,
while the implementations would not benefit much from an explicit organization
in the first scenarios (where only a few agents where required to solve simple
tasks), the increased complexity has made this approach a reasonable choice
(in scenarios where more than 10 agents are required to cooperate in order to
succeed).
The overall complexity of the scenarios in the competition has increased,
meaning that it may be easier to implement a better strategy using OCMAS
13
simply because the complexity is easier handled when the structure of the solu-
tion has been made explicit.
5 Future Work & Conclusions
By taking both the agent-centered and organization-centered approach for im-
plementing the same strategy we have gained insights about both the advantages
and disadvantages of each approach. The focus has been on a single scenario,
which means that not all corners of the approaches have been investigated. Even
so, the results have made several differences of the approaches clear, differences
that in some situations makes one approach highly advantageous compared to
the other.
The focus has been on differences between different types of multi-agent
systems and in particular the use of two specific tools. However, it was shown
that both types of systems are useful in different situations and that there is
no definitive answer to when one system is a better choice than another. The
main reason is the many factors the programmer must consider when choosing
between the agent- and organization-oriented approaches. These factors include
the quality of the implementation, the actual tools used and the strategy to be
implemented.
While we have been able to discuss the differences and make suggestions
for which system is most suitable in different situations, it would be interesting
to be able to create systems of both types which exhibit the same behavior in
most situations. This would make it possible to compare the actual performance
difference between the systems. However, since this requires specialized systems,
there is a chance that the results would not apply to real-world applications.
The area of multi-agent systems is still somewhat new and is continuously
growing. With the addition of the organizational aspects it has been made pos-
sible to create even more sophisticated and advanced systems. This comparison
has shown that both approaches have advantages and disadvantages and are
well-suited for different situations.
In the end, it is hard to say which approach is better and a decision should
be justified by doing some research on the application at hand and the possible
tools for creating the system.
There is still much work to be done in the area of organizational multi-agent
systems, specifically in the Moise+ organizational model, but also the principles
of OCMAS in general.
The tools available makes it possible to implement advanced systems (both
ACMAS and OCMAS) which are very useful in both research and practical
applications and there is no doubt that the area will continue to develop even
more efficient and intelligent solutions to research problems and real-world ap-
plications.
14
References
1. Tristan M. Behrens, Jurgen Dix, Jomi Hubner, and Michael Koster. Multi Agent
Contest. http://www.multiagentcontest.org/, October 2010.
2. Rafael H. Bordini, Jomi Fred Hubner, and Michael Wooldridge. Programming
Multi-Agent Systems in AgentSpeak using Jason. John Wiley & Sons Ltd, 2007.
3. Jacques Ferber, Olivier Gutknecht, and Fabien Michel. From Agents to Organiza-
tions: an Organizational View of Multi-Agent Systems. Agent-Oriented Software
Engineering (AOSE) IV, pages 214 -- 230, 2004.
4. Mahdi Hannoun, Olivier Boissier, Jaime Simao Sichman, and Claudette Sayettat.
MOISE: An Organizational Model for Multi-agent Systems. Proceedings of the In-
ternational Joint Conference, 7th Ibero-American Conference on AI, 15th Brazilian
Symposium on AI, 2000.
5. Jomi Fred Hubner, Jaime Simao Sichman, and Olivier Boissier. A Model for the
Structural, Functional, and Deontic Specification of Organizations in Multiagent
Systems. Proceedings of the 16th Brazilian Symposium on Artificial Intelligence,
2002.
6. Jomi Fred Hubner, Jaime Simao Sichman, and Olivier Boissier. S-Moise+: A
Middleware for developing Organised Multi-Agent Systems. Proceedings of the
International Workshop on Organizations in Multi-Agent Systems, from Organiza-
tions to Organization Oriented Programming in MAS, 2005.
7. Jomi Fred Hubner, Jaime Simao Sichman, and Olivier Boissier. Developing Or-
ganised Multi-Agent Systems Using the Moise+ Model: Programming Issues at
the System and Agent Levels. International Journal of Agent-Oriented Software
Engineering, 2007.
8. Jomi Fred Hubner, Jaime Simao Sichman, and Olivier Boissier. Moise+ tutorial.
http: // moise. sourceforge. net/ , 2008.
9. Stuart Russell and Peter Norvig. Artificial Intelligence: A Modern Approach.
Prentice-Hall, 2nd edition, 2003.
10. Michael Wooldridge. An Introduction to MultiAgent Systems. John Wiley & Sons
Ltd, 2nd edition, 2009.
Acknowledgement
I thank associate professor Jørgen Villadsen, DTU Informatics, Denmark.
15
|
1904.12771 | 1 | 1904 | 2019-04-29T15:28:36 | Consensus Control for Leader-follower Multi-agent Systems under Prescribed Performance Guarantees | [
"cs.MA",
"eess.SY"
] | This paper addresses the problem of distributed control for leader-follower multi-agent systems under prescribed performance guarantees. Leader-follower is meant in the sense that a group of agents with external inputs are selected as leaders in order to drive the group of followers in a way that the entire system can achieve consensus within certain prescribed performance transient bounds. Under the assumption of tree graphs, a distributed control law is proposed when the decay rate of the performance functions is within a sufficient bound. Then, two classes of tree graphs that can have additional followers are investigated. Finally, several simulation examples are given to illustrate the results. | cs.MA | cs |
Consensus Control for Leader-follower Multi-agent Systems under
Prescribed Performance Guarantees
Fei Chen and Dimos V. Dimarogonas
Abstract -- This paper addresses the problem of distributed
control
for leader-follower multi-agent systems under pre-
scribed performance guarantees. Leader-follower is meant in
the sense that a group of agents with external
inputs are
selected as leaders in order to drive the group of followers
in a way that the entire system can achieve consensus within
certain prescribed performance transient bounds. Under the
assumption of tree graphs, a distributed control law is proposed
when the decay rate of the performance functions is within a
sufficient bound. Then, two classes of tree graphs that can have
additional followers are investigated. Finally, several simulation
examples are given to illustrate the results.
I. INTRODUCTION
The consensus problem has attracted great interest due
to its wide applications in robotics, cooperative control [7],
formation [1] and flocking [20]. Consensus or agreement is
achieved when a group of agents converge to a common
value. The first order consensus protocol was first introduced
in [15], where the authors discussed the consensus problem
of directed and undirected graphs with fixed or switching
topologies and time delays. Second order consensus protocol
has been investigated in [18], where the states of the agents
converge to a constant or a linear function.
In this work, we study the consensus problem in a
leader-follower framework, that is, one or more agents are
selected as leaders with external inputs in addition to the
first order consensus protocol. The remaining agents are
followers only obeying the first order consensus protocol.
Recent research that has been done in the leader-follower
framework can be divided into two parts. The first part
deals with the controllability of leader-follower multi-agent
systems. For instance, controllability of networked systems
was first investigated in [19] by deriving conditions on the
network topology, which ensures that the network can be
controlled by a particular member which acts as a leader.
In [6], [17], the authors identify necessary conditions for the
controllability of the corresponding leader-follower networks
using equitable partitions of graphs. Controllability condi-
tions for leader-follower multi-agent systems with double
integrator dynamics and their connection with graph topol-
ogy properties are addressed in [9]. The second part targets
leader selection problems [21], [16], [8]. These involve the
problem of how to choose the leaders among the agents such
This work was supported by the EU H2020 Co4Robots Project,
the
Swedish Research Council (VR) and the Knut och Alice Wallenberg
Foundation (KAW).
Fei Chen and Dimos V. Dimarogonas are with the Division of Decision
and Control Systems, KTH Royal Institute of Technology, SE-100 44
Stockholm, Sweden {fchen,dimos}@kth.se
that the leader-follower system satisfies the requirements
such as controllability, optimal performance or formation
maintenance.
Prescribed performance control (PPC) was originally pro-
posed in [3], with the aim to prescribe the evolution of
system output or the tracking error within some predefined
region. For example, an agreement protocol that can ad-
ditionally achieve prescribed performance for a combined
error of positions and velocities is designed in [13] for
multi-agent systems with double integrator dynamics, while
PPC for multi-agent average consensus with single integrator
dynamics is presented in [11]. In [2], the authors consider the
formation control problem for nonlinear multi-agent systems
with prescribed performance guarantees and connectivity
constraints. Funnel control, which uses a similar idea as PPC
was first introduced in [10] for reference tracking. In [4], the
authors utilize funnel control for uncertain nonlinear systems
that have arbitrary strict relative degree and input-to-state
stable internal dynamics.
In this work, we are interested in how to design control
strategies for the leaders such that the leader-follower multi-
agent system achieves consensus within certain performance
bounds. Compared with existing work of PPC for multi-agent
systems [13], we apply a PPC law only to the leaders while
most of the related work, including [13], applies PPC to all
the agents to achieve consensus. The benefit of this work
is to lower the cost and control effort since the followers
will follow the leaders by obeying first order consensus
protocols without any additional control. Unlike other leader-
follower consensus approaches using PPC [12], in which
the multi-agent system only has one leader and the leader
is treated as a reference for the followers, we focus on
a more general framework in the sense that we can have
more than one leader and the leaders are designed in order
to steer the entire system achieving consensus within the
prescribed performance bounds. The difficulties in this work
are due to the combination of uncertain topologies, leader
amount and leader positions. In addition, the leader can only
communicate with its neighbouring agents. The contributions
of the paper can be summarized as: i) within this general
leader-follower framework, under the assumption of tree
graphs, a distributed control law is proposed when the decay
rate of the performance functions is within a sufficient bound;
ii) the specific classes of chain and star graphs that can have
additional followers are investigated.
The rest of the paper is organized as follows. In Section
II, preliminary knowledge is introduced and the problem is
formulated, while Section III presents the main results, which
are further verified by simulation examples in Section IV.
Section V closes with concluding remarks and future work.
that Lx = 0. By stacking (1) and (2), the dynamics of the
leader-follower multi-agent system is rewritten as:
II. PRELIMINARIES AND PROBLEM STATEMENT
Σ : x = −Lx + Bu,
(3)
A. Graph Theory
i is defined as di = Pj∈Ni
An undirected graph [14] G = (V, E) comprises of the
vertices set V = {1, 2, . . . , n} and the edges set E =
{(i, j) ∈ V × V j ∈ Ni} indexed by e1, e2, . . . , em.
Here, m = E is the number of edges and Ni denotes the
agents in the neighbourhood of agent i that can commu-
nicate with i. The adjacency matrix A of G is the n × n
symmetric matrix whose elements aij are given by aij = 1,
if (i, j) ∈ E, and aij = 0, otherwise. The degree of vertex
aij . Then the degree matrix
is ∆ = diag(d1, d2, . . . , dn). The graph Laplacian of G is
L = ∆ − A. A path is a sequence of edges connecting two
distinct vertices. A graph is connected if there exists a path
between any pair of vertices. By assigning an orientation
to each edge of G we can define the incidence matrix
D = D(G) = [dij] ∈ Rn×m. The rows of D are indexed
by the vertices and the columns are indexed by the edges
with dij = 1 if the vertex i is the head of the edge (i, j),
dij = −1 if the vertex i is the tail of the edge (i, j) and
dij = 0 otherwise. Based on the incidence matrix, the graph
Laplacian of G can be described as L = DDT . In addition,
Le = DT D is the so called edge Laplacian [14] and cij
denotes the elemnts of Le.
B. System Description
In this work, we consider a multi-agent system with
vertices V = {1, 2, . . . , n}. Without loss of generality, we
suppose that the first nf agents are selected as followers
while the last nl agents are selected as leaders with respective
vertices set VF = {1, 2, . . . , nf }, VL = {nf + 1, nf +
2, . . . , nf + nl} and n = nf + nl.
Let xi ∈ R be the position of agent i, where we only
consider the one dimensional case, without loss of generality.
Specifically, the results can be extended to higher dimensions
with appropriate use of the Kronecker product. The state
evolution of each follower i ∈ VF is governed by the first
order agreement protocol:
xi = Xj∈Ni
(xj − xi),
(1)
while the state evolution of each leader i ∈ VL is governed by
the first order agreement protocol with an assigned external
input ui ∈ R:
where L is the graph Laplacian and B = h 0nf ×nl
Inl
C. Prescribed Performance Control
i .
The aim of PPC is to prescribe the evolution of the system
output or the tracking error within some predefined region
described as follows:
− Mijρij(t) < xij (t) < ρij(t)
if xij (0) > 0
− ρij(t) < xij (t) < Mijρij(t)
if xij (0) < 0
(4)
(5)
ρij(t) : R+ → R+ \ {0} are positive, smooth and stirctly de-
creasing performance functions that introduce the predefined
bounds for the target system outputs or the tracking errors.
One example choice is ρij(t) = (ρij0 − ρij∞)e−lij t + ρij∞
with ρij0, ρij∞ and lij positive parameters and ρij∞ =
limt→∞ρij (t) represents the maximum allowable tracking
error at
represents the maximum
allowed overshot.
the steady state; Mij
Normalizing xij (t) with respect to the performance func-
tion ρij (t), we define the modulated error as xij (t) and the
corresponding prescribed performance region Dij :
xij (t) =
xij (t)
ρij (t)
Dij , {xij : xij ∈ (−Mij, 1)}
if xij (0) > 0
Dij , {xij : xij ∈ (−1, Mij)}
if xij (0) < 0
(6)
(7)
(8)
Then the modulated error is transformed through the trans-
formed function Tij that defines the smooth and strictly
increasing mapping Tij : Dij → R and Tij(0) = 0. One
example choice is
Tij(xij ) = ln(cid:18)−
xij + 1
xij − Mij(cid:19) .
Hence the transformed error is defined as
εij(xij ) = Tij(xij )
(9)
(10)
if the transformed error εij (xij )
It can be verified that
is bounded, then the modulated error xij
is constrained
within the regions (7), (8). This also implies the error xij
evolves within the predefined performance bounds (4) and
(5), respectively. Differentiating (10) with respect to time,
we derive
xi = Xj∈Ni
(xj − xi) + ui.
(2)
where
Let x = [x1, . . . , xnf , . . . , xn]T ∈ Rn be the stack
the agents and u =
vector of absolute positions of all
[u1, . . . , unl]T ∈ Rnl be the control input vector . Denote
¯x = [¯x1, . . . , ¯xm]T as the stack vector of relative positions
between the pair of communicating agents (i, j) ∈ E, where
¯xk , xij = xi −xj, k = 1, 2, . . . , m. It can be easily verified
that Lx = D ¯x and ¯x = DT x. In addition, if ¯x = 0, we have
εij(xij ) = JTij (xij , t)[ xij + αij (t)xij ]
(11)
JTij (xij , t) ,
∂Tij(xij )
1
∂ xij
ρij (t)
> 0
αij (t) , −
ρij(t)
ρij(t)
> 0
(12)
(13)
are the normalized Jacobian of the transformation function
Tij and the normalized derivative of the performance func-
tion, respectively.
D. Problem Statement
In this work, we are interested in how to design a control
strategy for the leader-follower multi-agent system given by
(3) such that the controlled system can achieve consensus
within the prescribed performance requirements. The control
strategy is only applied to the leaders and these drive the
followers to guarantee the entire multi-agent system meet
the requirements. Formally,
Problem 1. Let the leader-follower multi-agent system Σ
defined by (3) with the communication graph G = (V, E) and
the prescribed performance functions ρij, (i, j) ∈ E. Derive
a control strategy such that the controlled leader-follower
multi-agent system achieves consensus within ρij .
III. MAIN RESULTS
In this section, we design the control for the leader-
follower multi-agent system (3) such that the system can
achieve consensus within the prescribed performance func-
tions
ρij(t) = (ρij0 − ρij∞)e−lij t + ρij∞.
(14)
Here the performance functions are chosen as (14) with-
out loss of generality and the communication agents share
information about their performance functions and trans-
formation functions, that is, ρij (t) = ρji(t), Mij = Mji
and Tij(xij ) = −Tji(xji). This means the communication
between the neighbouring agents are bidirectional and the
graph G is assumed undirected.
Consensus is achieved in the sense that the stack vector
¯x of relative positions converges to zero as t → ∞. We
then rewrite the dynamics of the leader-follower multi-agent
system (3) into the edge space in order to characterise
the dynamics of the relative positions. We first rewrite (3)
into the dynamics corresponding to followers and leaders,
respectively. The corresponding incidence matrix is denoted
with Df , Di denoting the incidence
matrices that characterise how followers and leaders are
connected with other agents. Then (3) is reorganised as
as D = (cid:2)DT
i (cid:3)T
f DT
load (less edges) for their implementation. Note however
that further results for a general graph could be built based
on the results of tree graphs, for example, through graph
decompositions [22]. For the leader-follower multi-agent
system (16), the proposed controller applied to the leader
agents is the composition of the term based on prescribed
performance of the positions of the neighbouring agents:
ui = − Xj∈Ni
gijJTij (xij , t)εij(xij ),
i ∈ VL,
(17)
where gij = gji is a positive scalar gain to be appropriately
tuned. Then the stack input vector is
u = −DiJT (¯x, t)Gε(¯x),
(18)
where ¯x is the stack vector of transformed errors xij , G ∈
Rm×m is a positive definite diagonal gain matrix with entries
gij . JT (¯x, t) ∈ Rm×m is a time varying diagonal matrix
with diagonal entries JTij (xij , t), ε(¯x) ∈ Rm is a stack
vector with entries εij (xij ). Then the edge dynamics (16)
with input (18) can be written as
¯x = −Le ¯x − DT
i DiJT (¯x, t)Gε(¯x),
(19)
In the sequel, we develop the following result and will use
Lyapunov-like methods to prove that the prescribed perfor-
mance can be guaranteed and consensus can be achieved.
Theorem 1. Consider the leader-follower multi-agent system
Σ under Assumption 1 with dynamics (3), the predefined
performance functions ρij as in (14) and the transformation
function s.t. Tij(0) = 0, ∀(i, j) ∈ E, and assume that the
initial conditions xij (0) are within the performance bounds
(4) or (5). If the following condition holds:
¯γ ≥ l = max
(i,j)∈E
(lij),
(20)
where l is the largest decay rate of ρij(t) and ¯γ is the
maximum value of γ that ensures:
Σ : (cid:20) xf
xl(cid:21) = (cid:20)Af Bf
BT
f Ai(cid:21)(cid:20)xf
(cid:2)x1 x2
xl(cid:21) +(cid:20)0nf ×nl
Inl (cid:21) u,
xnf(cid:3)T
=
, xl
f , Bf =
i . Multiplying with DT on both sides of
and Af = Df DT
xnf +nl(cid:3)T
· · ·
=
i , Ai = DiDT
Df DT
(15), we obtain the dynamics on the edge space as
xf
· · ·
where
(cid:2)xnf +1
(15)
Γ = (cid:20)
DT
i Di
1
2 (Le−γ(Im−DT
i Di))
1
2 (Le−γ(Im−DT
i Di))
γLe
(cid:21) ≥ 0. (21)
Then, the controlled system achieves consensus within the
prescribed performance bounds ρij (t) when applying the
control (18).
Proof. Consider the Lyapunov-like function
Σe : ¯x = −Le ¯x + DT
i u,
(16)
with the edge Laplacian Le. We know that Le is positive
definite if the graph is a tree [5]. We thus here assume the
following
Assumption 1. The leader-follower multi-agent system (3)
described by the graph G = (V, E) is a connected tree.
V (ε¯x, ¯x) =
1
2
εT
¯x Gε¯x +
γ
2
¯xT ¯x,
(22)
with ε¯x denoting ε(¯x) and JT ¯x denoting JT (¯x, t). Then,
V = εT
¯x G ε¯x + γ ¯xT ¯x. Replacing ε¯x according to (11), we
obtain
V = εT
¯x GJT ¯x ( ¯x + α(t)¯x) + γ ¯xT ¯x,
(23)
We consider tree graphs as a starting point since we
need the positive definiteness of Le in the analysis, and
motivated by the fact that they require less communication
where α(t) is the diagonal matrix with diagonal entries
αij (t). According to (13) and (14), we know that αij(t) <
lij, ∀t. Substituting (19), we can further derive that
V =εT
¯x GJT ¯x (−Le ¯x − DT
+ γ ¯xT (−Le ¯x − DT
¯x GJT ¯x Le ¯x + εT
¯x GJT ¯x DT
= − εT
− εT
− γ ¯xT DT
i DiJT ¯x Gε¯x
i DiJT ¯x Gε¯x + α(t)¯x)
i DiJT ¯x Gε¯x)
¯x GJT ¯x α(t)¯x
(24)
i DiJT ¯x Gε¯x − γ ¯xT Le ¯x
Adding and subtracting γεT
of (24), we obtain
¯x GJT ¯x ¯x on the right hand side
V = − εT
− εT
= − εT
¯x GJT ¯x (γIm − α(t))¯x − εT
¯x GJT ¯x Le ¯x − γ ¯xT Le ¯x + γεT
¯x GJT ¯x (γIm − α(t))¯x
¯x GJT ¯x DT
i DiJT ¯x Gε¯x
¯x GJT ¯x (Im − DT
i Di)¯x
− yT (cid:20)
DT
i Di
1
2 (Le−γ(Im−DT
i Di))
1
2 (Le−γ(Im−DT
i Di))
γLe
(cid:21) y
= − εT
¯x GJT ¯x (γIm − α(t))¯x − yT Γy
with
y = (cid:20)JT ¯x Gε¯x
¯x
(cid:21) .
t → ∞ by applying Barbalat's Lemma. This implies ¯x → 0
as t → ∞ and consensus will be achieved.
lim
t→∞
n Pn
n Pn
Remark 1. We are always interested in specifying the
state of the multi-agent system at the equilibrium. Denote
xc = 1
i=1 xi as the centroid of the network. In most of
xc(t) = xc(0) =
the work regarding PPC like [13],
1
i=1 xi(0). This is because a PPC input for every agent
exists. In our work, if we have an external input for every
agent, i.e. B = In in (3), we can also obtain lim
xc(t) =
t→∞
1
i=1 xi(0). This can be verified by multiplying 1T on
both sides of (3), where 1 ∈ Rn with all entries 1. Then, we
can conclude xc(t) = 0. The main difference is that when we
choose some leaders, we can achieve a varying equilibrium
state of each agent by tuning the gain matrix, which is quite
useful in practical design as we can decide where all the
agents should gather.
n Pn
(25)
(26)
In the sequel, we will discuss the results for two specific
classes of tree graphs: chain and star graph. First we con-
sider the chain graph, which is wildly used for instance in
autonomous vehicle platooning.
Since G, JT ¯x are both diagonal and positive definite matri-
ces, we have that GJT ¯x is also a diagonal positive definite
matrix. (γIm − α(t)) is a diagonal positive definite matrix
if γ ≥ l = max(lij) > ¯α = sup αij (t). Due to Tij(0) = 0,
we have εij(xij )xij ≥ 0. Then, by by setting γ := θ + ¯α,
with θ being a positive constant we get:
− εT
¯x GJT ¯x(γIm − α(t))¯x ≤ −θεT
¯x GJT ¯x ¯x
Then, according to (6), (12), we further obtain
− θεT
¯x GJT ¯x ¯x = −θεT
¯x G
∂ε¯x
∂ ¯x
¯x ≤ 0.
(27)
(28)
(28) holds because the transformed function is smooth and
strictly increasing and εij(xij )xij ≥ 0. Therefore, in order
V ≤ 0 to hold, it suffices that γ ≥ l = max(lij) >
for
sup αij(t) and in addition, Γ should be semi-positive def-
inite. Here, in order for Γ ≥ 0 to be feasible, we need
the assumption that the communication graph is a tree. This
further means that Le is positive definite and (21) is then
equivalent to:
DT
i Di≥ 1
4γ (Le−γ(Im−DT
i Di))L−1
e (Le−γ(Im−DT
i Di)).
(29)
Then, based on condition (20), and choosing γ = ¯γ, we
obtain −εT
¯x GJT ¯x(¯γIm − α(t))¯x ≤ 0 and Γ ≥ 0. Finally, we
V ≤ 0 when γ = ¯γ. This also implies
can conclude that
V (ε¯x, ¯x) ≤ V (ε¯x(0), ¯x(0)). Hence if ¯x(0)) is chosen within
the region (7) or (8) then V (ε¯x(0), ¯x(0)) is finite, which
implies that V (ε¯x, ¯x) is bounded ∀t. Therefore ε¯x, ¯x are
bounded and the boundedness of the transformed error ε¯x
implies that the relative position ¯x(t) evolves within the
prescribed performance bounds ∀t. Then we can prove the
boundedness of V (ε¯x, ¯x) based on the boundedness of ε¯x, ε¯x.
The boundedness of V (ε¯x, ¯x) implies the uniform continuity
V (ε¯x, ¯x) → 0 as
of
V (ε¯x, ¯x), which in turn implies that
Definition 1. A chain Gc = (V c, E c) is a tree graph with
vertices set V c = {1, 2, . . . , n}, n ≥ 2 and edges set E c =
{(i, i + 1) ∈ V c × V c i ∈ V c \ {n}} indexed by ei =
(i, i + 1), i = 1, 2, . . . , n − 1.
Note that (20) in Theorem 1 is a sufficient but not
necessary condition. For a chain graph, the matrix inequality
(21) may be actually infeasible when the graph has 2 or more
followers. The following result for Gc is derived.
Proposition 1. Consider the leader-follower multi-agent sys-
tem Σ described by (3) with the communication chain graph
Gc = (V c, E c) and the followers set V c
F = {1, 2, . . . , nf },
the predefined performance functions ρij as in (14) and
the transformation function s.t. Tij(0) = 0, ∀(i, j) ∈ E,
and assume that the initial conditions xij (0) are within the
performance bounds (4) or (5). Then, the chain can only
have at most 3 followers (nf ≤ 3) in order to achieve
consensus within the prescribed performance bounds ρij(t)
when applying (18). Specifically, when the chain has 2 and
3 followers,
max
(i,j)∈E
max
(i,j)∈E
(lij ) = l ≤ 2,
nf = 2;
(lij ) = l ≤ 1,
nf = 3
(30)
are the respective sufficient conditions under which the
chain achieves consensus within the prescribed performance
bounds ρij(t) when applying (18).
Proof. When the chain graph has only one follower, that
is nf = 1, the result can be proved by using Theorem
1. Let ¯γ be the maximum value of γ that ensures (21)
holds. By further choosing the decay rate of the performance
functions (14) to satisfy (20), we can conclude that the
controlled system achieves consensus within the prescribed
performance bounds by applying (18) based on Theorem
1. When the chain has additional followers, the condition
in Theorem 1 may be infeasible since it is a sufficient but
not necessary condition. But for this kind of special chain
structure, we can resort to checking the edge dynamics (16)
directly. It can be shown that −Le has elements given by
cij = −2 when i = j, cij = 1 when i − j = 1 and cij = 0
otherwise when the graph is a chain. We then rewrite (16)
as
(cid:20) ¯xf
¯xl (cid:21) = (cid:20) A B
BT C (cid:21)(cid:20) ¯xf
¯xl (cid:21) +(cid:20) 0
D (cid:21) u,
(31)
where ¯xf ∈ R(nf −1) represents the edges between followers,
while ¯xl ∈ Rnl represents the edge that connects the leader
node {nf +1} and the follower node {nf }, and the edges be-
tween leaders. Both A ∈ R(nf −1)×(nf −1), C ∈ Rnl×nl have
the same structure as −Le but with different dimensions, B
has an element 1 at row (nf − 1), column 1 (bottom left
corner) that represents the connection between the follower
node {nf } and the leader node {nf +1}. 0 is a (nf −1)×nl
zero matrix. D ∈ Rnl×nl has elements given by dij = 1
when i = j, dij = −1 when i − j = 1 and dij = 0
otherwise. Then we can analyse the leader part ¯xl and the
follower part ¯xf separately. For ¯xl, it can be proved that
¯xl achieves consensus within the performance bounds based
on the positive definiteness of DDT when applying control
(18). We further rewrite the follower part as
¯xf = A¯xf + b¯x⋆,
(32)
where b ∈ R(nf −1) is the first column of B, i.e., with the
last element equals to 1 and all other elements equal to 0.
¯x⋆ represents the edge between the follower node {nf } and
the leader node {nf + 1}. We can furture solve the state
evolution of (32) as follows:
¯xf (t) = eAt ¯xf (0) +Z t
0
eA(t−τ )b¯x⋆(τ )dτ
= M T eΛtM ¯xf (0) +Z t
0
eA(t−τ )b¯x⋆(τ )dτ,
(33)
eA(t−τ )b¯x⋆(τ )dτ,
= ¯x0
f (t) +Z t
f (t) = (cid:2)¯x0
0
¯x0
. . .
1(t)
¯x0
2(t)
nf −1(t)(cid:3)T
where ¯x0
is zero
input trajectories, that is when ¯x⋆(t) = 0, ∀t; A = M T ΛM ,
where Λ is a diagonal matrix with diagonal entries negative
and equal to the eigenvalues of A, which is due to A
having the same structure as −Le, and M is the matrix
composed with the corresponding eigenvectors. Without loss
of generality, suppose all performance functions are the same
and described by
Then, ¯x1(t) is within the performance bound ρ(t),
¯x1(t) < ρ(t), ∀t, when l ≤ 2 and in addition,
i.e.,
Z t
0
e−2(t−τ )¯x⋆(τ )dτ < (ρ0 − ¯x1(0))e−2t + ρ∞(1 − e−2t),
(36)
which can be ensured by tuning a large enough gain g32
to the leader indexed by node 3. From (36), we know that
when the relative position between the two followers is close
to the boundary, we need to tune a larger gain for the leader
that connects the followers. When nf = 3, we can derive a
similar result. In particular, we now have that
(cid:20)¯x0
2(t)(cid:21) = M T eΛtM (cid:20)¯x1(0)
¯x2(0)(cid:21) < k(cid:20)ρ0
1(t)
¯x0
ρ0(cid:21) e−t,
(37)
i (t) < ρ0e−t, i = {1, 2}.
with k = 1, which implies that ¯x0
Similarly, we can conclude that when l ≤ 1, and in addition
the tuning gain g43 for the leader indexed by node 4
is large enough, the controlled system achieves consensus
within the prescribed performance bounds. When nf ≥ 4,
i (t) < kρ0eλmax(A)t, i =
it can be proved similarly that ¯x0
{1, 2, . . . , nf − 1}, but with k > 1. This means that ¯x0
i (t)
cannot be bounded by ρ0eλmax(A)t for any initial conditions
within the performance bounds. Therefore, we can conclude
that in order to achieve consensus within the performance
bounds for all initial condition xij (0) within the performance
bounds (4) or (5), nf should be less or equal to 3.
Remark 2. Proposition 1 indicates that for a chain graph,
in order to achieve consensus within the prescribed perfor-
mance bounds, we can only have at most 3 consecutive
followers at the end of the graph. In addition, when the
initial relative position between 2 followers is close to the
prescribed performance boundary, we need to tune a large
enough gain for the leader that connects the followers.
Now we consider another specific class, in particular the
star graph Gs = (V s, E s) which is defined as follows.
Definition 2. A star Gs = (V s, E s) is a tree graph with
vertices set V s = {1, 2, . . . , n}, n ≥ 2 where vertice n is
called the centering node, and the edges set E s = {(i, n) ∈
V s × V s i ∈ V s \ {n}} indexed by ei = (i, n), i =
1, 2, . . . , n − 1.
Then, the following result can be derived.
Proposition 2. Consider the leader-follower multi-agent
system Σ described by (3) with the communication star graph
Gs = (V s, E s) and the leader set V s
L = {n}, the predefined
performance functions ρij as in (14) and the transformation
function s.t. Tij(0) = 0, ∀(i, j) ∈ E, and assume that the
initial conditions xij (0) are within the performance bounds
(4) or (5). If
ρ(t) = (ρ0 − ρ∞)e−lt + ρ∞.
(34)
max
(i,j)∈E
(lij) = l ≤ 1.
(38)
When nf = 2, ¯xf = ¯x1 and A = −2, we have that
1(t) = M T eΛtM ¯x1(0) = e−2t ¯x1(0) < ρ0e−2t.
¯x0
(35)
Then, the controlled system achieves consensus within the
prescribed performance bounds ρij (t) when applying the
control (18).
i Di, DT
f Df = Le − DT
f Df have special structures. DT
Proof. For a star graph defined as Definition 2 with the
centering node n as the only leader, the edge Laplacian Le
and matrices DT
i Di
has all elements equal to 1, while DT
i Di is
an identity matrix. Le has the elements given by cij = 2
when i = j, and cij = 1 otherwise. Under this special
structure of star graphs and according to Theorem 1, it can
be verified that (20) is always feasible with ¯γ = 1, and from
(38), we know the condition ¯γ ≥ l = max
(lij) holds.
(i,j)∈E
Finally, by applying Theorem 1, for a star graph, when the
performance functions (14) are chosen such that (38) holds,
then we can conclude that the controlled system achieves
consensus within the prescribed performance bounds when
applying (18).
We conclude this section with the following observations.
A sufficient condition for a general tree graph was derived
in Theorem 1, under which the leader-follower multi-agent
system (3) achieves consensus within the prescribed perfor-
mance bounds (14). It can be seen that (20) may be infeasible
when the decay rate of the performance functions is too large.
This means that we need to constrain the decay rate of the
performance functions in order to achieve consensus under
prescribed performance guarantees within the leader-follower
framework. This is reasonable since the followers only obey
the first-order consensus protocol without any additional ex-
ternal input. And the decay rate constraint differs for different
graph topologies, leader amount and leader positions. For the
specific class of star graphs, we have proven that when the
largest decay rate of the performance functions is less than or
equal to 1, the closed loop system achieves consensus within
the prescribed performance bounds by applying Theorem 1.
We have also shown that the condition in Theorem 1 is
a sufficient but not necessary condition by discussing the
specific class of chain graphs. That is, for a chain graph
with 2 or 3 followers, we can still achieve the result of
consensus within performance bounds although the condition
in Theorem 1 may be infeasible.
IV. SIMULATIONS
In this section three simulation examples are presented
in order to verify the results of the previous sections. The
communication graphs are shown as Fig. 1, where the
leaders and followers are represented by grey and white
nodes, respectively. Regarding the prescribed performance
functions, for all (i, j) ∈ E, we choose Mij = 1 and
Tij(xij ) = ln(cid:18)−
xij + 1
xij − 1(cid:19) .
3
1
4
5
6
10
2
(a)(a)
1
2
9
8
11
7
6
5
3
4
1
2
3
4
5
(b)(b)
(c)(c)
Fig. 1. Communication graphs with tree topologies.
(cid:2)4.6 4.9 4.5 4.7 4.5(cid:3)T
In Fig. 1.(a), We first consider a tree graph with leaders set
as VL = {4, 5, 6}, and the relative positions are initialised as
. According to Theorem 1, the
matrix inequality is feasible with ¯γ = 1, hence it suffices
that l ≤ ¯γ = 1. The simulation result when applying the
PPC law (18) with a gain matrix G whose diagonal entries
are all equal to 1 is shown on the right side of Fig. 2. As
a comparison, the simulation result without PPC is shown
on the left side of Fig. 2. We can see from Fig. 2 that the
trajectories intersect the performance bound without extra
control, which can be improved by applying the PPC law (18)
such that the controlled system achieves consensus within the
performance bound. Here the decay rate of the prescribed
performance function is 1.
6
4
2
j
i
x
0
j
i
x
-2
-4
-6
0
1
2
3
4
5
t
5
4
3
2
1
0
-1
-2
-3
-4
-5
0
1
2
3
4
5
t
Fig. 2. The left figure shows the trajectories of relative positions without
PPC, while the controlled system with PPC law is shown in the right figure
under the communication graph as in Fig. 1.(a).
The prescribed performance bounds are chosen as in (39)
with different decay rate l for different simulation examples.
For each graph, choosing the same ρij for all edges is
done without loss of generality. In addition, the prescribed
performance bounds are depicted in black color for the
following simulation graphs.
ρij(t) = 4.9e−lt + 0.1.
(39)
are initialised as (cid:2)4.8 3 −2 1(cid:3)T
In Fig. 1.(b), we consider a chain graph with followers set
as VF = {1, 2} and VF = {1, 2, 3}, the relative positions
. When the system has
2 followers, we know that the performance function can have
a higher decay rate of 2, while the maximum decay rate is
1 when the system has one more follower (agent 3). When
VF = {1, 2}, the simulation results are shown in Fig. 3,
where the left figure shows the simulation result without ad-
ditional control. Here the decay rate of the prescribed perfor-
mance function is 2. We can see that the trajectories intersect
the performance bound, which is improved as shown in the
middle figure by applying the PPC law (18) with gain matrix
G = diag(1, 10, 1, 1), where diag(a1, a2, . . . , an) represents
the diagonal matrix with diagonal entries a1, a2, . . . , an and
g32 = 10 is tuned for leader {3} that connects the followers.
However, it can be seen that the trajectories still intersect
the performance bound. We then increase g32 to 200, and
the simulation result is shown in the right figure. We can
see that the controlled system achieves consensus within the
performance bound. When VF = {1, 2, 3}, the simulation
results are shown as in Fig. 4, in which the decay rate of
the prescribed performance function is 1. Similarly, it can
be seen in the left figure that the trajectories intersect the
performance bound when there is no extra input, which is
improved as shown in the middle and right figure by applying
the PPC law (18) with gain matrix G = diag(1, 1, 10, 1) and
G = diag(1, 1, 100, 1), respectively. Here, the large gain is
tuned for agent 4 because it is the leader that connects the
followers. We can also conclude that the controlled system
achieves consensus within the performance bound.
j
i
x
5
4
3
2
1
0
-1
-2
-3
-4
-5
0
5
t
j
i
x
5
4
3
2
1
0
-1
-2
-3
-4
-5
0
5
t
j
i
x
5
4
3
2
1
0
-1
-2
-3
-4
-5
j
i
x
5
4
3
2
1
0
-1
-2
-3
-4
-5
0
5
t
j
i
x
5
4
3
2
1
0
-1
-2
-3
-4
-5
0
5
t
j
i
x
5
4
3
2
1
0
-1
-2
-3
-4
-5
0
5
t
Fig. 4. The left figure shows the trajectories of relative positions without
PPC, while the controlled system with PPC law but different gain matrix is
shown in the middle and right figure, respectively under the communication
graph as in Fig. 1.(b) with VF = {1
3}.
2
,
,
j
i
x
5
4
3
2
1
0
-1
-2
-3
-4
-5
0
1
2
3
4
5
t
j
i
x
5
4
3
2
1
0
-1
-2
-3
-4
-5
0
1
2
3
4
5
t
Fig. 5. The left figure shows the trajectories of relative positions without
PPC, while the controlled system with PPC law is shown in the right figure
under the communication graph as in Fig. 1.(c).
0
5
t
V. CONCLUSIONS
Fig. 3. The left figure shows the trajectories of relative positions without
PPC, while the controlled system with PPC law but different gain matrix is
shown in the middle and right figure, respectively under the communication
graph as in Fig. 1.(b) with VF = {1
2}.
,
4.7 −4 1 4.8(cid:3)T
(cid:2)4 3 −2 −3 4.9 1
In Fig. 1.(c), We consider a star graph with only one leader
as VL = {11}, and the relative positions are initialised as
. The sim-
ulation result when applying PPC law (18) with a gain matrix
G whose diagonal entries are all equal to 1 is shown on the
right side of Fig. 5. As a comparison, the simulation result
without PPC is shown on the left side of Fig. 5. It is shown
that the trajectories intersect the performance bound when
there is no extra input, which can be improved by applying
the PPC law (18) such that the controlled system achieves
consensus within the performance bound. Here the decay rate
of the prescribed performance function is 1.
In this paper, we have studied consensus problems of
leader-follower multi-agent systems with prescribed perfor-
mance bounds. Under the assumption of tree graphs, a
distributed prescribed performance control
law has been
proposed for a group of selected leaders in order to drive
the followers such that the entire system can achieve con-
sensus under the prescribed performance guarantees. We
have proved that when the decay rate of the performance
functions is within a sufficient bound, consensus together
with performance guarantees can be obtained. In addition,
two specific classes of chain and star graphs that can have
additional followers have been investigated.
Future research directions include considering more gen-
eral graphs with circles, applying other transient approaches
to this leader-follower framework and also investigating
leader selection problems.
REFERENCES
[1] T. Balch and R. C. Arkin. Behavior-based formation control for
IEEE transactions on robotics and automation,
multirobot teams.
14(6):926 -- 939, 1998.
[2] C. P. Bechlioulis and K. J. Kyriakopoulos. Robust model-free forma-
tion control with prescribed performance and connectivity maintenance
for nonlinear multi-agent systems.
In 53rd IEEE Conference on
Decision and Control, pages 4509 -- 4514. IEEE, 2014.
[3] C. P. Bechlioulis and G. A. Rovithakis. Robust adaptive control
of feedback linearizable mimo nonlinear systems with prescribed
performance. IEEE Transactions on Automatic Control, 53(9):2090 --
2099, 2008.
[4] T. Berger, H. H. Le, and T. Reis. Funnel control for nonlinear systems
with known strict relative degree. Automatica, 87:345 -- 357, 2018.
[5] D. V. Dimarogonas and K. H. Johansson. Stability analysis for multi-
agent systems using the incidence matrix: quantized communication
and formation control. Automatica, 46(4):695 -- 700, 2010.
[6] M. Egerstedt, S. Martini, M. Cao, K. Camlibel, and A. Bicchi. Inter-
acting with networks: How does structure relate to controllability in
single-leader, consensus networks? IEEE Control Systems, 32(4):66 --
73, 2012.
[7] J. A. Fax and R. M. Murray. Information flow and cooperative control
of vehicle formations. 2003.
[8] A. Franchi and P. R. Giordano. Online leader selection for improved
collective tracking and formation maintenance. IEEE transactions on
control of network systems, 5(1):3 -- 13, 2018.
[9] D. Goldin and J. Raisch. Controllability of second order leader-
follower systems. In 2nd IFAC Workshop on Distributed Estimation
and Control in Networked Systems 2010-NecSys 10, pages 233 -- 238,
2010.
[10] A. Ilchmann, E. P. Ryan, and S. Trenn. Tracking control: Performance
funnels and prescribed transient behaviour. Systems & Control Letters,
54(7):655 -- 670, 2005.
[11] Y. Karayiannidis, D. V. Dimarogonas, and D. Kragic. Multi-agent
average consensus control with prescribed performance guarantees. In
Decision and Control (CDC), 2012 IEEE 51st Annual Conference on,
pages 2219 -- 2225. IEEE, 2012.
[12] I. Katsoukis and G. A. Rovithakis. Output feedback leader-follower
with prescribed performance guarantees for a class of unknown non-
linear multi-agent systems. In 2016 24th Mediterranean Conference
on Control and Automation (MED), pages 1077 -- 1082. IEEE, 2016.
[13] L. Macellari, Y. Karayiannidis, and D. V. Dimarogonas. Multi-agent
second order average consensus with prescribed transient behavior.
IEEE Transactions on Automatic Control, 62(10):5282 -- 5288, 2017.
[14] M. Mesbahi and M. Egerstedt. Graph theoretic methods in multiagent
networks, volume 33. Princeton University Press, 2010.
[15] R. Olfati-Saber and R. M. Murray. Consensus problems in networks
of agents with switching topology and time-delays. IEEE Transactions
on automatic control, 49(9):1520 -- 1533, 2004.
[16] S. Patterson and B. Bamieh. Leader selection for optimal network
coherence. In 49th IEEE Conference on Decision and Control (CDC),
pages 2692 -- 2697. IEEE, 2010.
[17] A. Rahmani, M. Ji, M. Mesbahi, and M. Egerstedt. Controllability of
multi-agent systems from a graph-theoretic perspective. SIAM Journal
on Control and Optimization, 48(1):162 -- 186, 2009.
[18] W. Ren and E. Atkins. Distributed multi-vehicle coordinated control
via local information exchange. International Journal of Robust and
Nonlinear Control: IFAC-Affiliated Journal, 17(10-11):1002 -- 1033,
2007.
[19] H. G. Tanner. On the controllability of nearest neighbor interconnec-
tions. In Decision and Control, 2004. CDC. 43rd IEEE Conference
on, volume 3, pages 2467 -- 2472. IEEE, 2004.
[20] H. G. Tanner, A. Jadbabaie, and G. J. Pappas. Flocking in fixed
IEEE Transactions on Automatic control,
and switching networks.
52(5):863 -- 868, 2007.
[21] A. Y. Yazicioglu and M. Egerstedt. Leader selection and network
assembly for controllability of leader-follower networks. In American
Control Conference (ACC), 2013, pages 3802 -- 3807. IEEE, 2013.
[22] D. Zelazo and M. Mesbahi. Edge agreement: Graph-theoretic perfor-
mance bounds and passivity analysis. IEEE Transactions on Automatic
Control, 56(3):544 -- 555, 2011.
|
1502.03212 | 2 | 1502 | 2015-02-12T15:09:34 | Mathematical Modeling of Insurance Mechanisms for E-commerce Systems | [
"cs.MA"
] | Electronic commerce (a.k.a. E-commerce) systems such as eBay and Taobao of Alibaba are becoming increasingly popular. Having an effective reputation system is critical to this type of internet service because it can assist buyers to evaluate the trustworthiness of sellers, and it can also improve the revenue for reputable sellers and E-commerce operators. We formulate a stochastic model to analyze an eBay-like reputation system and propose four measures to quantify its effectiveness: (1) new seller ramp up time, (2) new seller drop out probability, (3) long term profit gains for sellers, and (4) average per seller transaction gains for the E-commerce operator. Through our analysis, we identify key factors which influence these four measures. We propose a new insurance mechanism which consists of an insurance protocol and a transaction mechanism to improve the above four measures. We show that our insurance mechanism can reduce the ramp up time by around 87.2%, and guarantee new sellers ramp up before the deadline $T_w$ with a high probability (close to 1.0). It also increases the long term profit gains and average per seller transaction gains by at least 95.3%. | cs.MA | cs | Mathematical Modeling of Insurance Mechanisms for E-commerce
Systems
Hong Xie
John C.S. Lui
Department of Computer Science & Engineering
The Chinese University of Hong Kong
{hxie,cslui}cse.cuhk.edu.hk
5
1
0
2
b
e
F
2
1
]
A
M
.
s
c
[
2
v
2
1
2
3
0
.
2
0
5
1
:
v
i
X
r
a
Abstract
Electronic commerce (a.k.a. E-commerce) systems such as eBay and Taobao of Alibaba are becoming
increasingly popular. Having an effective reputation system is critical to this type of internet service
because it can assist buyers to evaluate the trustworthiness of sellers, and it can also improve the revenue
for reputable sellers and E-commerce operators. We formulate a stochastic model to analyze an eBay-like
reputation system and propose four measures to quantify its effectiveness: (1) new seller ramp up time, (2)
new seller drop out probability, (3) long term profit gains for sellers, and (4) average per seller transaction
gains for the E-commerce operator. Through our analysis, we identify key factors which influence these
four measures. We propose a new insurance mechanism which consists of an insurance protocol and a
transaction mechanism to improve the above four measures. We show that our insurance mechanism can
reduce the ramp up time by around 87.2%, and guarantee new sellers ramp up before the deadline Tw
with a high probability (close to 1.0). It also increases the long term profit gains and average per seller
transaction gains by at least 95.3%.
1 Introduction
E-commerce systems are becoming increasingly popular and typical examples include eBay[9], Amazon[1],
and Taobao [22] of Alibaba (the largest E-commerce system in China), etc. Through an E-commerce system,
geographically distributed sellers and buyers can transact online. Sellers advertise products in their online
stores (which reside in the E-commerce's website), while buyers can purchase products from any online
stores. The E-commerce system charges a transaction fee from sellers for each completed transaction. In an
E-commerce system, it is possible to purchase products from a seller whom the buyer has never transacted
with, and this seller may not even be trustworthy[19]. This situation results in a high risk of buying low
quality products. To overcome such problems, E-commerce systems deploy reputation systems[19].
Usually, E-commerce operators maintain and operate a reputation mechanism to reflect the trustworthi-
ness of sellers[9, 22]. A high reputation seller can attract more transactions leading to higher revenue[19].
The eBay-like reputation system is the most widely deployed reputation policy, which is used in eBay and
Tabao, etc. This type of reputation system is a credit based system. More precisely, a seller needs to collect
enough credits from buyers in order to improve his reputation. These credits are obtained in form of feedback
ratings, which are expressed by buyers after each transaction. Feedback ratings in eBay and Taobao are of
three levels: positive (+1), neutral (0), and negative (−1). The cumulative sum of all the past feedback
ratings (i.e., reputation score) reflects the trustworthiness of a seller. The reputation score and feedback
ratings are public information and accessible by all buyers and sellers in such an E-commerce system.
Consider this eBay-like reputation system, a new seller may spend a long time to collect enough credits
(i.e., ramp up). This is because new sellers are initialized with a reputation score of zero, and buyers are
less willing to buy products from a seller with low reputation scores. The ramp up time is critical to the
effectiveness of a reputation system. A long ramp up time discourages new sellers to join an E-commerce
system. Furthermore, a new user starts an online store with certain budgets, and maintaining such online
stores involves cost. If a new seller uses up his entire budget and has not yet ramped up his reputation,
he may discontinue his online business (i.e, or drops out) due to low revenue. Therefore, a long ramp up
time increases the risk that a new seller drops out and discourages potential new sellers to join. Finally, a
long ramp up time also results in a low profit gain for a seller. Because before ramping up, a seller can only
attract few transactions due to his low reputation score. To an E-commerce operator, this also results in an
indirect loss on transaction gains. This paper aims to identify key factors that influence the ramp up time
and to design a mechanism to improve this measure.
1
Reducing ramp up time is challenging and to the best of our knowledge, this is the first work which
explores how to reduce the ramp up time for an eBay-like reputation system. This paper aims to explore
the following fundamental questions: (1) How to identify key factors which influence the ramp up time? (2)
How to take advantage of these factors to reduce the ramp up time? Our contributions are
• We propose four performance measures to quantify the effectiveness of eBay reputation systems: (1)
new seller ramp up time, (2) new seller drop out probability, (3) long term profit gains for sellers, and
(4) average per seller transaction gains for an E-commerce operator.
• We develop a stochastic model to identify key factors which many influence these four measures.
Through we gain important insights on how to design a new mechanism these performance measures.
• We propose and design an insurance mechanism which can reduce the ramp up time and the new seller
drop out probability. We show that our insurance mechanism can reduce the ramp up time by around
87.2%, and guarantee new sellers ramp up before the deadline Tw with a high probability (close to 1.0).
It also increases the long term profit gains and average per seller transaction gains by at least 95.3%.
This paper organizes as follows.
In §3
we formulate four measures to explore the ramp up time problem, i.e., ramp up time, new seller drop out
probability, long term profit gains and average per seller transaction gains.
In §4, we derive analytical
expressions for these four measures. In §5 present the design of our insurance mechanism. Related work is
given in §6 and we conclude in §7.
In §2, we present the system model for E-commerce systems.
2 E-commerce System Model
An E-commerce system consists of users, products and a reputation system. A user can be a seller or a
buyer or both. Sellers advertise products in their online stores and set a price for each product. Buyers,
on the other hand, purchase products through online stores and provide feedbacks to indicate whether a
buyer advertises products honestly or not. A reputation system is maintained by E-commerce operators to
reflect the trustworthiness of sellers. A high reputation seller can attract more transactions leading to a high
revenue. The reputation system aggregates all the feedbacks, and computes a reputation score for each seller.
The reputation score is public information which is accessible by all buyers and sellers.
Products are categorized into different types. For example, eBay categorizes products into "Fashion",
"Electronics", "Collectibles & Art", etc [9]. We consider L ≥ 1 types of product. Consider a type ℓ ∈
{1, . . . , L} product. A seller sets a price pℓ ∈ [0, 1] and the E-commerce operator charges a transaction fee of
T , αpℓ, where α ∈ (0, 1), after the product is sold1. It has a manufacturing cost of cℓ ∈ [0, 1]. A seller earns
a profit of uℓ by selling one product, we have
For the ease of presentation, our analysis focuses on one product type. It can be easily generalized to multiple
product types, and we omit the subscript unless we state otherwise.
uℓ = (1 − α)pℓ − cℓ.
(1)
2.1 Transaction Model
Sellers advertise the product quality in their online stores. Let Qa ∈ [0, 1] be the advertised quality. The larger
the value of Qa implies the higher the advertised quality. Buyers refer to the advertised quality Qa in their
product adoption. Each online store also has an intrinsic quality. Let Qi ∈ [0, 1] be the intrinsic quality (i.e.,
the ground truth of the product's quality). The larger the value of Qi implies the higher the intrinsic quality.
Since sellers aim to promote their products, so we have Qa ≥ Qi. We emphasize that the intrinsic quality Qi
is private information, e.g., it is only known to the seller. On the other hand, the advertised quality Qa is
public information which is accessible by all buyers and sellers.
Buyers estimate the product quality by referring to the advertised quality Qa (we will present the esti-
mating model later). Let Qe ∈ [0, 1] be the estimated quality. The larger the value of Qe implies the higher
the estimated quality. To purchase a product, a buyer must submit a payment p to the E-commerce system,
which will be given to the corresponding seller when he receives the product. There is usually a shipment
delay in any E-commerce systems. We denote the delay as d. Upon receiving a product, a buyer can evaluate
its quality and at that moment, he has the perceived quality, which we denote as Qp ∈ [0, 1]. The larger
the value of Qp implies the higher the perceived quality. We assume that buyers can perceive the intrinsic
1We can also consider a fixed transaction fee model and our analysis is still applicable. But for brevity, let us consider a
transaction fee which is proportional to the selling price.
2
quality, i.e., Qp = Qi. Buyers are satisfied (disappointed) if they find out that the product is at least as good
as (less than) it is advertised, or Qp ≥ Qa (Qp < Qa).
To attract buyers, an E-commerce system needs to incentivize sellers to advertise honestly, i.e., Qa = Qi.
Many E-commerce systems achieve this by deploying a reputation system. We next introduce a popular
reputation system used by many E-commerce systems such as eBay [9] or Taobao [22]. Table 1 summarizes
key notations in this paper.
p, c
T, u
Qa, Qi, Qe, Qp
d, CS
γ
F
r
rh, θ
β
P(Qe, p)
Pba, Pbr
λ1(λ2)
Tw
Tr, Pd
Gs, Ge
δ
λT (τ )
CI , DI, Td, Tc
bDI
λI
r , P I
T I
r
GI
s, GI
e
price and manufacturing cost of a product
transaction fee, unit profit of selling a product
advertised, intrinsic, estimated, perceived product quality
shipment delay, shipment cost
critical factor in expressing feedback ratings
reputation profile for a seller
reputation score for a seller
reputation threshold, consistency threshold
discounting factor in estimating product quality
probability that a buyer buys a product with
an estimated quality quality Qe and a price p
probability that a buyer buys a product from a seller
labelled as average (reputable)
buyer's arrival rate before (after) a seller ramps up
the maximum time that a seller
is willing to wait to get ramped up
ramp up time, new seller drop out probability
long term expected profit gains for a seller, average per
seller transaction gains for the E-commerce operator
discount factor in the long term expected profit gains Gs
transaction's arrival rate at time slot τ
insurance price, deposit, duration time and clearing time
insurance deposit threshold to revoke insurance certificate
transaction's arrival rate to an insured seller
ramp up time with insurance,
new seller drop out probability with insurance
long term expected profit gains with insurance,
average per seller transaction gains with insurance
Table 1: Notation list
2.2 Baseline Reputation System
The eBay-like system maintains a reputation system to reflect the trustworthiness of sellers. It consists of a
feedback rating system and a rating aggregation policy.
Buyers express feedback ratings to indicate whether a seller advertises honestly or not. The eBay-like
system adopts a feedback rating system consisting of three rating points2, i.e., {−1, 0, 1}. A positive rating
(rating 1) indicates that a product is at least as good as it is advertised, i.e., Qp ≥ Qa. A neutral rating
(rating 0) indicates that a buyer is indifferent about the product that he purchased. This happens when the
perceived quality is slightly lower than it is advertised, i.e., Qp ∈ [Qa − γ, Qa), where γ ∈ [0, 1] denotes the
critical factor. The smaller the value of γ implies that buyers are more critical in expressing ratings, e.g.,
γ = 0 means that buyers have zero tolerance on seller overstating the product quality. A negative rating
(rating −1) represents that the perceived quality is far smaller than the advertised quality, i.e., Qp < Qa − γ.
We have
All the historical ratings are known to all buyers and sellers.
2We can easily generalize the model to consider more rating points.
3
feedback rating =
1,
0,
− 1,
if Qp ≥ Qa,
if Qa − γ ≤ Qp < Qa,
if Qp < Qa − γ.
For the rating aggregation policy, each seller is associated with a reputation score, which is the summation
of all his feedback ratings. We denote it by r ∈ Z. A new seller who enters the E-commerce system is initialized
with zero reputation score, or r = 0. A positive feedback rating increases r by one, a negative feedback rating
decreases r by one, and a neutral feedback rating 0 does not change r. Figure 1 depicts the transition diagram
of a seller's reputation score. Note that r is a public information accessible by all buyers and sellers.
To assist buyers to evaluate the trustworthiness of a seller, E-commerce systems not only announce the
seller's reputation score r, but also his reputation profile. Let F , (r, n+, n0, n−) be the reputation profile,
where n+, n0, n− represent the cumulative number of feedback ratings equal to 1, 0, −1 respectively. Note that
this form of reputation is commonly deployed, say in eBay [9] and Taobao [22].
0
.!!.!!.
r - 1
0
r
1
-1
1
-1
0
r + 1
.!!.!!.
Figure 1: Transition diagram of a seller's reputation score r
Shipment delay in real-world E-commerce systems usually results in certain delay in the reputation up-
date. To characterize the dynamics of a reputation updating process, we consider a discrete time system
and divide the time into slots, i.e., [0, d), [d, 2d), . . ., where d is the shipment delay. We refer to a time
slot τ ∈ N as [τ d, (τ + 1)d). Let N (τ ) be the number of products sold in the time slot τ . Suppose
N +(τ ), N 0(τ ), N −(τ ) of these transactions result in positive, neutral and negative feedbacks respectively. Let
F (τ ) , (r(τ ), n+(τ ), n0(τ ), n−(τ )) be the reputation profile at time slot τ . Then we have F (0) = (0, 0, 0, 0).
We update the reputation profile F (τ ) as
n+(τ + 1) = n+(τ ) + N +(τ ),
n0(τ + 1) = n0(τ ) + N 0(τ ),
n−(τ + 1) = n−(τ ) + N −(τ ),
r(τ + 1) = r(τ ) + N +(τ ) − N −(τ ).
(2)
For simplicity, we drop the time stamp τ in the reputation profile, when no confusion involved.
We next present a model to characterize the impact of sellers' reputation profiles on buyers' product
adoption behavior. This model serves as an important building block to explore the effectiveness of this
baseline reputation system.
2.3 Model for Product Adoption Behavior
The reputation system forges trust among sellers and buyers. This trust plays a critical role in product
adoption. More precisely, buyers evaluate the trustworthiness of sellers from sellers' reputation profiles.
Buyers seek to minimize the risk in product purchase and they prefer to buy from reputable sellers.
Based on the reputation profile F , our model classifies sellers into two types: "reputable" and "average".
To be labeled as reputable, a seller's reputation profile must satisfy two conditions. The first one is that
a seller needs to collect enough credits, i.e., positive feedbacks from buyers. More precisely, his reputation
score must be at least greater than or equal to some positive reputation threshold rh, i.e., r ≥ rh. A new
seller is initialized with zero reputation score, i.e., r = 0. To accumulate a reputation score of at least rh,
he needs to accomplish enough number of honest transactions. The second condition is that a seller should
be consistently honest. More concretely, the fraction of positive feedbacks should be larger than or equal to
a consistency threshold θ ∈ (0, 1], i.e., n+/(n+ + n− + n0) ≥ θ. The larger the value of θ implies that the
E-Commerce operators are more critical about the honest consistency. We formally define a reputable seller
and an average seller as follows.
Definition 2.1. A seller is labeled as reputable if and only if the follwing two conditions are met
C1: r ≥ rh and,
C2: n+/(n+ + n− + n0) ≥ θ.
Otherwise, a seller is labeled as an average seller.
4
Hence, the reputation threshold rh and consistency threshold θ quantify how difficult is it to earn a reputable
label. The larger the rh and θ, the more difficult it is to earn a reputable label.
A buyer estimates the product quality referring to the advertised quality Qa and the reputation profile
of a seller. More concretely, if a seller's reputation profile indicates that this seller is reputable, then a
buyer believes that this seller advertises honestly. This buyer therefore estimates the product quality as the
advertised quality, i.e., Qe = Qa. On the contrary, if the reputation profile indicates that a seller is average, a
buyer believes that this seller is likely to overstate the product quality. Hence the estimated quality is lower
than the advertised quality, i.e., Qe = βQa, where β ∈ [0, 1] denotes the discounting factor. The smaller the
value of β implies that buyers are less willing to trust an average seller. We have
Qe =( Qa,
βQa, otherwise.
if r ≥ rh and n+/(n+ + n− + n0) ≥ θ,
A buyer makes the purchasing decision based on the estimated quality Qe and the product price p. More
concretely, the probability that a buyer buys a product increases in Qe and decreases in p. Formally, we have
Pr[adopts a product] , P (Qe, p) ,
(3)
where the function P increases in Qe and decreases in p.
In the following section, we evaluate the effectiveness of the baseline reputation system in E-commerce
applications. Our goal is to identify key factors that influence the effectiveness of this reputation system and
if possible, improve it.
3 Problems Formulation
We propose four performance measures to quantify the effectiveness of the baseline reputation system men-
tioned in Section 2. These measures are: (1) ramp up time Tr, (2) new seller drop out probability Pd, (3) long
term expected profit gains for a seller Gs, and (4) average per seller transaction gains for the E-commerce
system operator Ge. We also present our problem formulations and our objective is to identify key factors
which can influence these measures. Lastly, we raise an interesting question of whether there are other mech-
anisms which can reduce the ramp up time and the new seller drop out probability, and improve the long
term expected profit gains and average per seller transaction gains.
3.1 Ramp Up Time
Sellers and E-commerce system operators are interested in the minimum time that a new seller must spend
to collect enough credits, i.e., positive feedbacks from buyers, so that the seller can be classified as reputable.
For one thing, a reputable seller can attract more buyers which may result in more transactions, and higher
transaction volume implies higher transaction gains to the E-commerce operator. We next formally define
the ramp up process and the ramp up condition.
Definition 3.1. A new seller's reputation is r = 0. He needs to collect enough credits, i.e., positive feedbacks
from buyers, so that his reputation r can increase to at least rh. The process of increasing his reputation
to rh is called the ramp up process. Furthermore, when r ≥ rh, then we say that the ramp up condition is
satisfied.
Recall that r(τ ) denotes the reputation score of a seller at time slot τ . We formally define the ramp up
time as follows.
Definition 3.2. Ramp up time is the minimum time that a seller must spend to accumulate a reputation
score of rh. Let Tr denote the ramp up time, we have
Tr , d · arg min
τ
{r(τ ) ≥ rh}.
(4)
The ramp up time quantifies how long it will take to collect enough credits from buyers. It is critical to the
profit gains for a seller. To see this, we next quantify how the ramp up time can affect the transaction's
arrival rate.
A seller can attract more buyers when he satisfies the ramp up condition because his online store will
receive higher click rate by buyers, therefore increasing his profit gains. Let λ1 (λ2) be the buyer's arrival
rate before (after) a seller satisfies the ramp up condition. We assume that the buyer's arrival process, either
before or after a seller satisfies the ramp up condition, follows a Poisson counting process with parameter
5
λ1 (before ramping up) and λ2 (after ramping up) respectively, where λ1 < λ2 to signify that a ramped up
seller can attract more buyers. Recall that in Equation (3) we express the probability that a buyer adopts
a product as P(Qe, p). If a buyer adopts a product, we say a seller obtains a transaction. Based on the
Poisson property, it is easy to see that the transaction's arrival process is also a Poisson counting process.
Let λT (τ ) be the transaction's arrival rate at time slot τ . Let P(Qe(τ ), p) be the probability that a buyer
adopts a product at time slot τ , where Qe(τ ) denotes the estimated quality at time slot τ . We can express
the transaction's arrival rate as
λT (τ ) =( λ1P(Qe(τ ), p),
λ2P(Qe(τ ), p),
if r(τ ) < rh,
if r(τ ) ≥ rh,
.
(5)
Equation (5) serves as an important building block for us to explore the key factors which influence the ramp
up time Tr. Let us formulate our first problem.
Problem 1: Identify key factors which influence the ramp up time Tr, and design a mechanism which can
take advantage of these factors to reduce Tr.
3.2 New Seller Drop Out Probability
In real-world E-commerce systems, a new seller may drop out, or move to another E-commerce system,
if he does not collect enough credits (i.e., ramp up) within certain time because he cannot obtain enough
transactions. For example, a new seller in eBay may drop out if he does not ramp up in one year. This is
because a new seller starts an online store with certain budgets and there are costs associated with maintaining
this online business. Let Tw > 0 denote the maximum time that a new seller is willing to wait to get ramped
up.
In other words, if the ramp up time is longer than Tw, a new seller will quit or drop out from that
E-commerce system. We assume Tw/d ∈ N to accommodate the delay (d) in reputation update.
Definition 3.3. A new seller drops out, if and only if Tr > Tw.
Sellers and the E-commerce operator are interested in this new seller drop out probability. Let
Pd , Pr[Tr > Tw]
(6)
denote the probability that a new seller drops out. The smaller the value of Pd implies that sellers are more
likely to continue his online business in the E-commerce system. This is an important measure since a small
Pd can attract more new sellers to join the E-commerce system, which will result in higher transaction gains
for the E-commerce operator. On the other hand, a large Pd discourages new sellers to participate and can
reduce the transaction gains for the E-commerce operator. We therefore consider the second problem.
Problem 2: Identify key factors which influence the new seller drop out probability Pd, and design a mech-
anism which can take advantage of these factors to reduce Pd.
3.3 Long Term Profit Gains and Transaction Gains
The profit gain (transaction gain) is critical to sellers (E-commerce system operators). We focus on the
scenario that sellers are long lived and they aim to maximize their long term profit gains. Recall that u, the
unit profit of selling one product, is expressed in Equation (1). Also recall that N (τ ) denotes the number
of products sold in the time slot τ . We emphasize that N (τ ) is a random variable and follows a Poisson
distribution with parameter λT (τ )d, where λT (τ ) is derived in Equation (5). A seller earns a profit of uN (τ )
in the time slot τ . We consider a discounted long term profit gain with a discounting factor of δ ∈ (0, 1]. Let
Gs denote the long term expected profit gains for a seller. We express it as
Gs , E" ∞Xτ =0
δτ uN (τ )# .
(7)
Note that when a seller earns a profit u, he also contributes a transaction fee T = αp to the E-commerce
operator. Let Ge denote the average per seller transaction gains that a seller pays to the E-commerce operator.
We can express it as
αp
u
Gs.
(8)
Note that Gs is important to a seller while Ge is important to the E-commerce operator. We consider the
following problem.
Ge , E" ∞Xτ =0
δτ T N (τ )# = E" ∞Xτ =0
δτ αpN (τ )# =
6
Problem 3: Identify key factors which influence the profit gains Gs and average per seller transaction gains
Ge, and design a mechanism to use these factors to improve Ge and Gs.
We next derive E[Tr], Pd, Gs, and Ge. Through this analysis, we identify key factors which influence
the above mentioned performance measures. These insights will serve as important building blocks for us to
design a mechanism.
4 Analyzing the Baseline Reputation System
We derive analytical expressions for the expected ramp up time (E[Tr]), the new seller drop out probability
(Pd), the long term expected profit gains (Ge) and the average per seller transaction gains (Ge). Through
this we identify that the reputation threshold (rh), as well as the probability that a buyer buys a product
from an "average labeled" seller (Pab) are two critical factors which influence Tr, Pd, Gs and Ge. Our results
indicates that the baseline reputation mechanism described in Section 2, suffers from long ramp up time,
high new seller drop out probability, and small long term profit gains or transaction gains. These insights
show that one need to have a new mechanism to reduce Tr, Pd, and to improve Gs and Ge. We will present
this new mechanism in Section 5.
4.1 Deriving the Expected Ramp Up Time E[Tr]
Let us derive the analytical expression for the expected ramp up time E[Tr]. This measure quantifies on
average, how long it will take to ramp up a new seller under the baseline reputation mechanism mentioned
in Section 2. We consider the scenario that buyers advertise the product quality honestly, i.e., Qa = Qi. As
to how an eBay-like reputation mechanism can guarantee rational sellers to advertise honestly, one can refer
to [8]. We like to point out that new sellers can achieve the lowest ramp up time by advertising honestly
(Qa = Qi). Hence, the assumption that Qa = Qi can be viewed as deriving the best case of Tr for the baseline
reputation system. Let us first define the following notations.
Definition 4.1. Let Pba , P(βQi, p) and Pbr , P(Qi, p) denote the probability that a buyer buys a product
from an "average labeled" seller and a "reputable" seller respectively.
In the following theorem, we state the expected ramp up time.
Theorem 4.1. The expected ramp up time is
E[Tr] = d
∞Xτ =1 1 −
∞Xk=rh
e−λ1Pba(τ −1)d (λ1Pba(τ − 1)d)k
k!
! .
The E[Tr] increases in the reputation threshold rh, and decreases in the transaction's arrival rate λ1Pba.
Proof: Please refer to the appendix for derivation.
Remark: Theorem 4.1 states that a new seller is more difficult to get ramped up if the E-Commerce operator
sets a high reputation threshold rh, or the transaction's arrival rate to an "average labeled" seller (λ1Pba) is
low.
Table 2 presents numerical examples on the expected ramp up time E[Tr], where we fix Pba = 0.02, i.e.,
buyers buy products from an "average labeled" seller with probability 0.02, and fix d = 3, i.e., it takes three
days to ship a product to a buyer (or for the E-commerce operator to update sellers' reputation). We vary
the buyer's arrival rate λ1 from 5 to 25, i.e., on average each day an "average labeled" seller attracts 5 to 25
buyers to visit his online store. We vary the reputation threshold (rh) from 100 to 200. When rh = 200, as
λ1 increases from 5 to 25, the expected ramp up time (E[Tr]) drops from 2001.7 to 401.6 days, a deduction
ratio of 80%. When the buyer's arrival rate is low, say λ1 = 5, as the reputation threshold rh drops from 200
to 100, the expected ramp up time E[Tr] drops from 2001.7 to 1001.4 days, a reduction ratio of 50%. These
results indicates that the expected ramp up time (E[Tr]) is large in general. Namely, it is difficult for new
sellers to quickly get ramped up under the baseline reputation system. We next explore the new seller drop
out probability.
4.2 Deriving the New Seller Drop Out Probability Pd
We now derive the analytical expression for Pd. This probability quantifies how difficult it is for a new seller
to survive in the E-commerce system. Note that Pd is also crucial for new sellers to decide whether or not to
open an online store in an E-commerce system. Namely, a low drop out probability Pd is attractive to new
sellers, while a high Pd discourages new sellers to join.
7
λ1
E[Tr] (rh = 200)
E[Tr] (rh = 150)
E[Tr] (rh = 100)
5
2001.7
1501.4
1001.4
10
1001.4
751.5
501.5
15
668.2
501.5
334.8
20
501.5
376.5
251.5
25
401.6
301.5
201.5
Table 2: Expected ramp up time E[Tr] in days (Pba = 0.02, d = 3).
Theorem 4.2. The new seller drop out probability is
Pd =
rh−1Xk=0
e−λ1PbaTw (λ1PbaTw)k
k!
.
The Pd decreases in λ1Pba, Tw and increases in rh.
Proof: Please refer to the appendix for derivation.
Remark: Theorem 4.2 states that a new seller can reduces the drop out probability by extending his ramp
up deadline line (Tw), and a new seller is more likely to drop out if the reputation threshold (rh) increases
or the transaction's arrival rate to an "average labeled" seller (λ1Pba) decreases.
Table 3 presents numerical examples on the new seller drop out probability Pd, where we set λ1 = 20, i.e.,
on average, each day an "average labeled" seller attracts 20 buyers to visit his store, d = 3, and Tw = 180, i.e.,
sellers drops out if they do not ramp up in 180 days. We vary Pba, the probability that a buyer buys products
from an "average labeled" seller, from 0.01 to 0.05, and vary the reputation threshold rh from 100 to 200.
Consider rh = 200. As Pba increases from 0.01 to 0.05, the new seller drop out probability Pd decreases from
1 to 0.92514. This implies a very high drop out probability. Consider Pba = 0.03. As the reputation threshold
rh drops from 200 to 100, we see that Pd drops from 1 to 0.20819, a reduction ratio of around 80%. It is
interesting to observe that when the Pba is small, the new seller drop out probability is quite high. In fact
when Pba = 0.01, Pd is very close to 1. In other words, if buyers are less willing to buy from "average labeled"
sellers, new sellers will be more likely to drop out. We next explore key factors which influence long term
expected profit gains and average per seller transaction gains.
Pba
0.01
0.02
0.03
0.04
0.05
Pd (rh = 200)
Pd (rh = 150)
Pd (rh = 100)
1.00000
1.00000
1.00000
1.00000
1.00000
0.99897
1.00000
0.99992
0.20819
0.99999
0.68056
0.00005
0.92514
0.00991
0.00000
Table 3: New seller drop out probability Pd (λ1 = 20, Tw = 180, d = 3).
4.3 Deriving the Long Term Profit Gains Gs and Ge
Let us now derive analytical expressions for the long term expected profit gains Gs and the average per seller
transaction gains Ge respectively. They are important measures because a large Gs is attractive to new
sellers and a small Gs discourages new sellers to join the E-commerce system, while the average per seller
transaction gains Ge is crucial to the E-commerce system operator.
Theorem 4.3. The long term expected profit gains for a new seller can be expressed as
(λ1PbaTw)k
Gs =
rh−1Xk=0
δ⌈tj /d⌉dt1 . . . dtk +Z Tw
0
(λ1Pbatrh)rh−1
(rh − 1)!
Z
k!
T k
w
u
kXj=1
λ1Pbae−λ1Pbatrh
0<t1<...<tk<Tw
(k)!
e−λ1PbaTwZ . . .
Z
dtrhZ . . .
(trh )rh−1 u(cid:18) rhXj=1
(rh − 1)!
0<t1<...<trh−1<trh
δ⌈tj /d⌉ +λ2Pbrd
δ⌈trh /d⌉+1
1 − δ
+ δ⌈trh /d⌉λ1Pba(d⌈trh /d⌉ − trh )(cid:19)dt1 . . . dtrh−1.
Furthermore, Ge = αp
u Gs.
8
Proof: Please refer to the appendix for derivation.
Remark: Theorem 4.3 quantifies the impact of various factors on the long term expected profit gains (Gs)
and average per seller transaction gains (Ge), e.g., the reputation threshold rh, the buyer's arrival rate λ1, λ2,
etc. However the analytical expressions are in complicated forms. It is hard to draw some insights on how
critical are these factors in influencing Gs and Ge by directly examining these expressions. We next present
some numerical examples to illustrate their impact.
Table 4 presents numerical examples on the long term expected profit gains (Gs) and the average per
seller transaction gains (Ge), where we set λ1 = 20, T = αp = 0.1, λ2 = 50, u = 1, Tw = 180, d = 3, Pbr = 0.1
(i.e., buyers buy products from a reputable seller with probability 0.1). We vary Pba, the probability that a
buyer purchases products from an "average labeled" seller, and the ramp up threshold rh to examine their
impact on Gs and Ge. Consider rh = 200. As Pba increases from 0.01 to 0.05, Gs improves from 26.833 to
198.059, an improvement ratio of 6.38 time. Similarly, the average per seller transaction gains Ge is also
improved by 6.38 times. This implies that Pba is critical to both sellers' profit gains and the E-commerce
system operator's transaction gains. Consider Pba = 0.05. As rh drops from 200 to 100, Gs improves from
198.059 to 1142.670, an improvement ratio of 4.77. This improvement ratio also holds for the average per
seller transaction grains Ge. It is interesting to observe that when Pba is small, both Gs and Ge are quite
small. In fact when Pba = 0.01, the Gs is around 26.833 and Ge is around 2.6833. Namely, if buyers are less
willing to buy from "average labeled" sellers, sellers (E-commerce operators) will have low long term profit
gains (average per seller transaction gains).
Pba
Gs (rh = 200)
Gs (rh = 150)
Gs (rh = 100)
Ge (rh = 200)
Ge (rh = 150)
Ge (rh = 100)
0.01
26.833
26.980
26.941
2.6833
2.6980
2.6941
0.02
53.342
53.594
54.433
5.3342
5.3594
5.4433
0.03
80.705
80.812
760.511
8.0705
8.0812
76.0511
0.04
0.05
107.312
369.951
1054.507
10.7312
36.9951
105.4507
198.059
1006.017
1142.670
19.8059
100.6017
114.2670
Table 4: Long term expected profit gains Gs and average per seller transaction gains Ge (λ1 = 20, λ2 =
50, u = 1, T = αp = 0.1, δ = 0.99, Tw = 180, Pbr = 0.1, d = 3).
Summary: The reputation threshold rh and Pba are critical to the ramp up time, the new seller drop out
probability, the long term profit gains and the average per seller transaction gains. The baseline (or eBay-like)
reputation system presented in Section 2 suffers from long ramp up time, high seller drop out probability,
small long term profit gains and small average per seller transaction gains. Hence, it is important to ask
whether we can design a new mechanism that an E-commerce system can use to improve all the performance
measures E[Tr], Pd, Gs and Ge. We next explore this interesting question.
5 Insurance Mechanism
In the previous section, we showed that the baseline reputation system is not efficient. Here, we present a
new approach which we call the "insurance mechanism" to reduce both the expected ramp up time (E[Tr])
and new seller drop out probability (Pd), and to improve the long term expected profit gains (Gs) and
the average per seller transaction gains (Ge). We also quantify the impact of our insurance mechanism on
E[Tr], Pd, Gs and Ge. We show that our insurance mechanism can reduce the ramp up time by around
87.2%, and guarantee new sellers ramp up before the deadline Tw with a high probability (close to 1.0). It
also increases the long term profit gains and average per seller transaction gains by at least 95.3%.
5.1
Insurance Mechanism Design
The objective of our insurance mechanism is to help new sellers ramp up quickly. Reducing ramp up time
brings the benefit of reducing new seller drop out probability and improving long term expected profit gains
and average per seller transaction gains (Gs and Ge). Our insurance mechanism consists of an insurance
protocol and a transaction mechanism.
We first describe the insurance protocol. The E-commerce system operator provides an insurance service
to new sellers. Each insurance has a price of CI > 0, a duration time of Td > 0, and a clearing time of Tc > 0.
The insurance clearing time takes effect when an insurance expires. To buy an insurance, a seller must
provide the E-commerce operator an insurance deposit of DI . Hence, the total payment by the new seller
9
to the E-commerce system operator is CI + DI . We refer to this insurance as the (CI , Td, Tc, DI )-insurance.
Only new sellers can subscribe to this insurance. If a seller subscribes an insurance, the E-commerce system
operator issues an insurance certificate to him, and this certificate is known to the public (i.e., all buyers
and sellers). This certificate only takes effect within the insurance duration time Td. The E-commerce
system operator treats a seller with an insurance certificate as trustworthy. To guarantee that such sellers
will advertise their product quality honestly, the E-commerce system operator requires such sellers obey the
following transaction mechanism.
We now describe the transaction mechanism. Only sellers with an insurance certificate must obey this
transaction mechanism. Let us focus on a seller with an insurance certificate. When ordering a product from
this seller, a buyer sends his payment p to the E-commerce system operator. After receiving the product, if this
buyer express a positive feedback, then this transaction completes, i.e., the E-commerce operator forwards
the payment (1 − α)p to the seller and charges a transaction fee of αp. This transaction also completes
if this buyer expresses a neutral feedback. A neutral feedback means that a seller slightly overstated his
product quality, i.e. Qi < Qa < Qi + γ. To avoid such overstating, the E-commerce company revokes a
seller's insurance certificate once the fraction of positive feedbacks falls below the consistency factor (θ), i.e.,
n+/(n+ + n0 + n−) < θ. A negative feedback results in the transaction being revoked. More concretely, the
E-commerce operator gives the payment p back to the buyer and does not charge any transaction fee from
the seller (provided that it is within the duration time Td, or the clearing time Tc). The buyer needs to
ship the product back to the seller but the buyer does not need to pay for the shipment cost CS, for it will
be deducted from a seller's insurance deposit DI . If the insurance deposit is not enough to cover CS, the
E-commerce operator makes a supplemental payment. To avoid this undesirable outcome, the E-commerce
company revokes a seller's insurance certificate, once a seller's deposit reaches a threshold bDI < DI . The
insurance clearing time takes effect when an insurance is invoked. At the end of the clearing time, the
E-commerce company returns the remaining deposit of DI (if it is not deducted to zero) back to the seller.
Remark. Sellers may collude with buyers to inflate their reputation by fake transactions [10]. One way to
avoid such collusion is by increasing the transaction fee such as [2]. The shipment cost may exceed DI due to
a large number of products to be returned. This can be avoided with high probability by setting a large bDI
(Theorem 5.2). We also derive the minimum clearing time (Tc) to guarantee that a seller with an insurance
certificate needs to obey the transaction mechanism (Theorem 5.2).
5.2 Analyzing the Insurance Mechanism
We first show that buyers treat a seller having an insurance certificate as trustworthy. Through this, we
derive the transaction rate that a seller with an insurance certificate can attract. We then derive the improved
E[Tr], Pd, Gs and Ge.
Buyers treat sellers having an insurance certificate as trustworthy. This is an important property of
our insurance mechanism because it influences the probability that a buyer adopts a product from a seller.
Suppose in time slot τ , a seller has an insurance certificate. If this seller advertise honestly Qa = Qi, then
the buyer who buys a product from this seller will be satisfied (express positive feedback rating). In this
case, the payment from the buyer will be forwarded to the seller. Hence this seller earns a profit of u. If
this seller overstates his product quality beyond the lenient factor (γ), i.e., Qa > Qi + γ. Then according to
our insurance mechanism, the payment by the buyer will be returned back to the buyer. The seller needs
to pay a shipment cost of CS to ship back the product and CS will be deducted from his insurance deposit
DI . Hence, if a seller overstates the product quality beyond the lenient factor, he will lose a total shipment
cost of at least min{bDI, CSN (τ )} in time slot τ , where N (τ ) denotes the number of product selling. A seller
with an insurance certificate must obey the same consistency factor (θ) as reputable sellers in being honest,
i.e., n+/(n+ + n0 + n−) ≥ θ, because if not his insurance certificate will be revoked by the E-commerce
operator. Given these properties, buyers trust a seller with an insurance certificate. Recall that the E-
commerce operator also trusts a seller with an insurance certificate. Therefore, an insured seller can attract
transactions with an arrival rate being equivalent to those reputable sellers. Let λI
T denote the transaction's
arrival rate to a seller with an insurance certificate. We have
λI
T = λ2Pbr.
(9)
We now quantify the impact of our insurance mechanism on the four performance measures. Let
e denote the ramp up time, the new seller drop out probability, the long term profit gains
T I
r , P I
and the average per seller transaction gains respectively, when a new seller subscribes our insurance.
d , GI
s, GI
Theorem 5.1. Suppose a new seller subscribes to our proposed insurance mechanism. We express the
10
expected ramp up time and new seller drop out probability as
∞Xτ =1 1 −
e− PTw/d−1
ℓ=0
e− Pτ −2
∞Xk=rh
eλT (ℓ) (PTw /d−1
ℓ=0 eλT (ℓ) (Pτ −2
ℓ=0eλT (ℓ))k
eλT (ℓ))k
ℓ=0
k!
k!
,
! ,
E[Tr] = d
Pd =
rh−1Xk=0
whereeλT (ℓ) = λ2Pbrd for all ℓ = 0, 1, . . . , ⌊Td/d⌋−1, andeλT (⌊Td/d⌋) = λ2Pbr(Td −d⌊Td/d⌋)+λ1Pba(d⌊Td/d⌋+
d − Td), andeλT (ℓ) = λ1Pbad for all ℓ = ⌊Td/d⌋ + 1, . . . , ∞. The long term expected profit gains for an insured
seller is:
(λ2Pbr min{Td, Tw})k
e−λ2Pbr min{Td,Tw}
k!
0<t1<...<tk<min{Td,Tw}
rh−1Xk=0
GI
s =
Z . . .
Z
rh−1−kXi=0
Z
+ I{Td<Tw}
Td<tk+1<...<tk+i<Tw
Z . . .
+(cid:18)I{Td≥Tw}Z Tw
Z . . .
0<t1<...<trh −1<trh
(λ2PbrTd)k
0
k!dt1 . . . dtk
(min{Td, Tw})k(cid:18)I{Td≥Tw }
kXj=1
uδ⌈tj /d⌉
(λ1Pba(Tw − Td))i
i!
e−λ1Pba(Tw−Td)
i!
(Tw − Td)i dtk+1 . . . tk+i
uδ⌈tj /d⌉(cid:19)
k+iXj=1
λ2Pbre−λ2Pbr trh
(λ2Pbrtrh)rh−1
(rh − 1)!
dtrh
(rh − 1)!
(trh )rh−1 dt1 . . . dtrh−1 + I{Td<Tw}
rhXk=0
Z
k!
T k
d
dt1 . . . dtk
0<t1<...<tk<Td
Z
e−λ2Pbr TdZ . . .
k!
Td
Z Tw
Z . . .
λ1Pbae−λ1Pba(trn −Td) (λ1Pba(trn − Td))rh−k−1
dtrh
(rh − k − 1)!
Z
rhXj=1
+
(trh − Td)rh−k−1
(rh − k − 1)!dtk+1 . . . dtrh−1
(cid:19)u(cid:18)λ2dPbr
δ⌈tj /d⌉ + δ⌈trh /d⌉λ2Pbr(d⌈trh /d⌉ − trh)(cid:19)
Td<tk+1<...<trh−1<trh
δ⌈trh /d⌉+1
1 − δ
Furthermore, GI
e = αp
u GI
s.
Proof: Please refer to the appendix for derivation.
Remark: Theorem 5.1 quantifies the impact of our insurance mechanism on the four important performance
measures. Before we talk more about how to select the insurance price CI and deposit DI , let us illustrate
the effectiveness of our insurance mechanism using some numerical examples.
Table 5 presents numerical examples on E[T I
r ], P I
d , GI
s and GI
e. We use the following setting: λ1 = 20, λ2 =
50, u = 1, Tw = 180, d = 3, Pbr = 0.1, Pba = 0.03, CI = 100, DI = 100,bDI = 50, CS = 0.5, T = 0.1, Td = 100, Tc =
3, δ = 0.99. We also presents numerical examples on E[Tr], Pd, Gs and Ge for comparison studies. When
rh = 100, we have E[Tr] = 168.1 and E[T I
r ] = 21.5. In other words, our insurance mechanism reduces the
expected ramp up time from 168.1 days to only 21.5 days, or over 87.2% reduction.
It is interesting to
observe that our incentive mechanism reduces the new seller drop out probability from Pd = 0.20819 to
P I
d = 0. Namely, our insurance mechanism can guarantee that new sellers ramps up before the deadline line
Tw with a high probability (very close to 1.0). In addition, our insurance mechanism improves long term
expected profit gains from Gs = 760.51 to GI
s = 1485.04, a 95.3% improvement. This improvement ratio
also holds for average per seller transaction gains. As rh increases from 100 to 200, the improvement on the
E[Tr], Pd, Gs, Ge, becomes more significant. We next state the appropriate values for CI , DI, bDI and Tc in
the following theorem.
11
r ])
(E[Tr], E[T I
(Pd, P I
d )
(Gs, GI
s)
(Ge, GI
e)
rh = 100
(168.1, 21.5)
(0.20819, 0)
rh = 150
(251.6, 31.5)
(0.99992, 0)
rh = 200
(334.9, 41.5)
(1.0, 0)
(760.51, 1485.04)
(76.051, 148.504)
(80.81, 1485.03)
(8.081, 148.503)
(80.71, 1485.01)
(8.071, 148.501)
Table 5: Impact of our insurance on E[Tr], Pd, Gs and Ge.
Theorem 5.2. An upper bound for the insurance price CI is CI < GI
s − Gs. If DI and bDI satisfies
then Pr[shipment cost exceeds DI ] ≤ ǫ. If Tc ≥ d, then all products sold by a seller with an insurance certificate
can be guaranteed to obey the insurance mechanism.
DI > bDI ≥ CS max{ln ǫ−1 − λ2PbrTd, e2λ2PbrTd},
Proof: Please refer to the appendix for derivation.
Remark: The insurance price should be lower than GI
s − Gs. The clearing time should be larger or equal
to d. To guarantee that the insurance deposit covers the shipment cost for returning products with high
probability, DI and bDI need to be no less than CS max{ln ǫ−1 − λ2PbrTd, e2λ2PbrTd}.
6 Related Work
Research on reputation systems [19] for internet services has been quite active. Many aspects of reputation
systems have been studied, i.e., reputation metric formulation and calculation [11, 15, 20], attacks and defense
techniques for reputation systems [5, 10, 24, 23], and effectiveness of reputation systems [7]. A survey can be
found in [12].
Theoretical aspects of reputation system have been studied extensively. First, many works studied rep-
utation metric formulation and calculation. Two most representative reputation calculating models are the
eBay-like reputation model [11] and the transitive trust based model [5]. The eBay-like reputation system is
a typical example of reputation model which computes the reputation score by summarizing explicit human
feedbacks (or ratings) [3, 11, 21, 25]. The transitive trust based model [5, 6, 20, 15, 24] assumes that if user
A trusts user B and user B trusts user C, then user A trusts user C. More precisely, each user is represented
by a node in a graph, and the weighted directed link from A to B quantifies the degree that user A trusts
user B. For this model, many algorithms were developed to compute an overall reputation score for each
user [5, 6, 20, 15, 24]. These works provided theoretical foundations for reputation computing. Second,
many works explored attack and defense techniques for reputation systems. One type of potential attacks is
that users may not give honest feedbacks. Peer-prediction method based mechanisms were proposed to elicit
honest feedbacks [13, 14, 17]. Another type of potential attacks is reputation inflation, or self-promotion.
Many works have been done to address this issue [5, 10, 24, 23]. A survey on attack and defense techniques
for reputation systems can be found in [10]. The main difference between our work and theirs is that we
propose a new mechanism to improve eBay system.
The most closely related works are [2, 7, 8, 16], which studied the eBay reputation mechanism. Authors
in [2] derived the minimum transaction fee to avoid ballot stuffing (i.e., fake positive feedbacks). Authors
in [7] proposed an algorithm based on buyer friendship relationship to filter out unfair ratings. In [7], authors
explored the impact of buyers biases' (i.e., leniency or criticality) in express feedback ratings on sellers in
advertising product quality. The impact of negative feedbacks on buyers in expressing feedback ratings was
studied in [16]. The difference between our work and theirs is that we propose a new mechanism to improve
eBay system.
7 Conclusion
This paper presents an Insurance mechanism to improve eBay-like reputation mechanisms. We proposed
four performance measures to analyze eBay reputation system: (1) new seller ramp up time, (2) new seller
drop out probability, (3) long term profit gains for sellers and (4) average per seller transaction gains for an
E-commerce operator. We developed a stochastic model to identify key factors which influence the above
four measures. We proposed an insurance mechanism to improve the above four measures. We show that
our insurance mechanism can reduce the ramp up time by around 87.2%, and guarantee new sellers ramp up
12
before the deadline Tw with a high probability (close to 1.0). It also increases the long term profit gains and
average per seller transaction gains by at least 95.3%.
References
[1] Amazon. http://www.amazon.com/.
[2] R. Bhattacharjee and A. Goel. Avoiding ballot stuffing in ebay-like reputation systems.
In Proc. of
P2PECON, 2005.
[3] S. Buchegger and J.-Y. Le Boudec. A robust reputation system for peer-to-peer and mobile ad-hoc
networks. In Proc. of P2PECON, 2004.
[4] X. Chen and B. Miu. Stochastic processes. The University of Science and Technology of China Press,
2002.
[5] A. Cheng and E. Friedman. Sybilproof reputation mechanisms. In Proc. of P2PECON, 2005.
[6] R. Delaviz, N. Andrade, J. Pouwelse, and D. Epema. Sybilres: A sybil-resilient flow-based decentralized
reputation mechanism. In Proc. of IEEE ICDCS, 2012.
[7] C. Dellarocas. Immunizing online reputation reporting systems against unfair ratings and discriminatory
behavior. In Proc. ACM EC, 2000.
[8] C. Dellarocas. Analyzing the economic efficiency of ebay-like online reputation reporting mechanisms.
In Proc. of ACM EC, 2001.
[9] eBay. http://www.ebay.com/.
[10] K. Hoffman, D. Zage, and C. Nita-Rotaru. A survey of attack and defense techniques for reputation
systems. ACM Comput. Surv., 42(1):1:1 -- 1:31, Dec. 2009.
[11] D. Houser and J. Wooders. Reputation in auctions: Theory, and evidence from ebay. Journal of
Economics & Management Strategy, 15(2), 2006.
[12] A. Jøsang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision.
Decis. Support Syst., 43(2), 2007.
[13] R. Jurca and B. Faltings. Minimum payments that reward honest reputation feedback. In Proc. of ACM
EC, 2006.
[14] R. Jurca and B. Faltings. Collusion-resistant, incentive-compatible feedback payments. In Proc. of ACM
EC, 2007.
[15] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation manage-
ment in p2p networks. In Proc. of WWW, 2003.
[16] T. Khopkar, X. Li, and P. Resnick. Self-selection, slipping, salvaging, slacking, and stoning: The impacts
of negative feedback at ebay. In Proc. of ACM EC, 2005.
[17] N. Miller, P. Resnick, and R. Zeckhauser. Eliciting informative feedback: The peer-prediction method.
Management Science, 51(9):1359 -- 1373, Sept. 2005.
[18] M. Mitzenmacher and E. Upfal. Probability and computing. Cambridge University Press, 2005.
[19] P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman. Reputation systems. Commun. ACM,
43(12):45 -- 48, Dec. 2000.
[20] P. Resnick and R. Sami. Sybilproof transitive trust protocols. In Proc. of ACM EC, 2009.
[21] A. Singh and L. Liu. Trustme: anonymous management of trust relationships in decentralized p2p
systems. In Proc. of P2P, 2003.
[22] Taobao. http://www.taobao.com/.
[23] B. Viswanath, M. Mondal, K. P. Gummadi, A. Mislove, and A. Post. Canal: Scaling social network-based
sybil tolerance schemes. In Proc. of ACM EuroSys, 2012.
13
[24] H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Sybilguard: Defending against sybil attacks via
social networks. In Proc. of ACM SIGCOMM, 2006.
[25] R. Zhou and K. Hwang. Powertrust: A robust and scalable reputation system for trusted peer-to-peer
computing. IEEE TPDS, 18, 2007.
Appendix
We first state a lemma which will be used in our proof.
Lemma 7.1 ([4]). Let {N ′(t), t ≥ 0} denote a Poisson process with a rate parameter λ. Let tk denote the
arrival time of k-th event. Let f (t1, . . . , tnN ′(t′) = n) denote the conditional probability density function of
t1, . . . , tn given N ′(t′) = n. Then we have f (t1, . . . , tnN ′(t′) = n) = n!/(t′)n, where 0 < t1 < . . . < tn < t′.
Proof of Theorem 4.1: Note that each new seller advertise product quality honestly. In this scenario, each
transaction results in one positive feedback. Recall our reputation updating rule specified in Equation (2), we
have that the reputation score at time slot τ equals the number of transactions arriving within time slot 0 to
time slot τ − 1. Recall the definition of Tr in Equation (4), we have that Tr/d ∈ N. With these observations
and by some basic probability arguments, we have
E[Tr] =
τ d Pr[Tr = τ d] = d
τ Pr[Tr/d = τ ]
∞Xτ =1
Pr[Tr/d ≥ τ ] = d
(1 − Pr[Tr/d ≤ (τ − 1)])
∞Xτ =1
∞Xτ =1
= d
= d
∞Xτ =1
∞Xτ =1
(1 − Pr[r(τ − 1) ≥ rh]) = d
∞Xτ =1 1−
τ −2Xℓ=0
N (ℓ) ≥ rh! .
E[Tr] = d
(1 −
∞Xτ =1
∞Xk=rh
e−λ1Pba(τ −1)d (λ1Pba(τ − 1)d)k
k!
).
Note thatPτ −2
We have
ℓ=0 N (ℓ) is a random variable which follows a Poisson distribution with parameter λ1Pba(τ −1)d.
Evaluating the first order derivative on E[Tr] with respect to rh and λ1Pba respectively, one can easily obtain
the monotonous property of E[Tr].
Proof of Theorem 4.2: Applying similar derivation as Theorem 4.1, we have that the reputation score
at time slot τ equals the number of transactions arriving within time slot 0 to τ − 1. Note that Tw/d ∈ N.
Recall the definition in Equation (4) we have that Tr > Tw if and only if r(Tw/d) < rh. Using some basic
probability arguments, we have
τ =0
τ =0
Pd =
N (τ ) < rh(cid:21) .
Note thatPTw /d−1
We have
N (τ ) is a random variable which follows a Poisson distribution with parameter λ1PbaTw.
Pd = Pr[r(Tw/d) < rh] = Pr(cid:20)XTw /d−1
Pr
N (τ ) = k =
Tw/d−1Xτ =0
rh−1Xk=0
Proof of Theorem 4.3: Let bGs =P∞
τ =0 δτ uN (τ ). Then bGs is a random variable and Gs = E[bGs]. Based
on whether a seller ramps up or not, we divide E[bGs] into two parts, i.e.,
E[bGs] = Pr[Tr > Tw]E[bGsTr > Tw]
+ Pr[Tr ≤ Tw]E[bGsTr ≤ Tw]
Evaluating the first order derivative on Pd with respect to rh, Tw and λ1Pba respectively, one can easily
obtain the monotonous property of Pd.
e−λ1PbaTw (λ1PbaTw)k
.
rh−1Xk=0
k!
14
We next derive the above two terms individually.
We first derive Pr[Tr > Tw]E[bGsTr > Tw]. Note that each new seller advertise product quality honestly.
Hence each transaction earns one positive feedback. Recall that Tw/d ∈ N. Note that at time slot Tw/d
a seller drops out, i.e., there will be no transactions from time slot Tw/d. Let K denote the number of
transactions arriving within time slot 0 to Tw/d − 1. Then K satisfies 0 ≤ K ≤ rh − 1 since we are given
Tr > Tw. Note that K = k, where k ≤ rh − 1 implies that Tr > Tw and K is of a value larger than rh − 1
implies that Tr ≤ Tw. Then we have
k=0
Pr[Tr > Tw]E[bGsTr > Tw]
=Xrh−1
=Xrh−1
Pr [K = k, Tr > Tw] E[bGsTr > Tw, K = k]
Pr [K = k] E[bGsK = k].
k=0
N (τ ) is a random variable which follows a Poisson distribution with parameter
Observe that K =PTw /d−1
τ =0
λ1PbaTw. We then have
Pr[Tr > Tw]E[bGsTr > Tw]
e−λ1PbaTw (λ1PbaTw)k
=
k!
rh−1Xk=0
E[bGsK = k].
We next derive E[bGsK = k]. Let t1, . . . , tK denote the arrival time of transaction 1, . . . , K. Then t1, . . . , tK
satisfy 0 < t1 < . . . < tK < Tw. Let f (t1, . . . , tkK = k) denote the probability density function of t1, . . . , tk
given that K = k. By applying Lemma 7.1, we obtain that f (t1, . . . , tkK = k) = k!/(Tw)k. Then we have
E[bGsK = k]
=Z . . .
Z
Z
=Z . . .
0<t1<...<tk<Tw
dt1 . . . dtk
0<t1<...<tk<Tw
f (t1, . . . , tkK = k)E[bGst1, . . . , tk]
kXj=1
uδ⌈tj /d⌉dt1 . . . dtk,
k!
T k
w
where the first step follows that given t1, . . . , tk is equivalent to given K = k. The second step follows that
the payment of transaction 1 ≤ j ≤ k is forwarded to the seller in time slot ⌈tj/d⌉ because of the shipment
delay. Namely, in computing of the long term profit gains, the j-th transaction results in a discounted profit
j=1 uδ⌈tj /d⌉. Combining them all, we have
gain of uδ⌈tj /d⌉. Hence E[bGst1, . . . , tk] =Pk
rh−1Xk=0
Pr[Tr > Tw]E[bGsTr > Tw] =
Z . . .
k!
T k
w
0<t1<...<tk<Tw
Z
kXj=1
uδ⌈tj /d⌉dt1 . . . dtk.
e−λ1PbaTw (λ1PbaTw)k
k!
Based on our reputation updating rule specified in Equation (2), we obtain that trh < Tw implies Tr ≤ Tw.
Note that trh is a random variable. Let f (trh ) denote the probability density function of trh . Observe
e−λ1Pbat(λ1Pbat)k/k!. Performing the first order derivative on this term, we have
We now derive Pr[Tr ≤ Tw]E[bGsTr ≤ Tw]. Let trh denote the arrival time of the rh-th transaction.
that Pr[trh ≤ t] =P∞
f (trh) = λ1Pbae−λ1Pbatrh (λ1Pbatrh )rh−1/(rh − 1)!. Then it follows that
k=rh
Pr[Tr ≤ Tw]E[bGsTr ≤ Tw] =Z Tw
=Z Tw
λ1Pbae−λ1Pbatrh
0
0
(λ1Pbatrh )rh−1
(rh − 1)!
f (trh )E[bGstrh]dtrh
E[bGstrh ]dtrh.
We next derive E[bGstrh ]. Let t1, . . . , trh−1 denote the arrival time of the 1-st,. . . , (rh − 1)-th transaction.
Let f (t1, . . . , trh−1trh) denote the probability density function of t1, . . . , trh−1 given trh. Then applying
15
Lemma 7.1, we obtain that f (t1, . . . , trh−1trh ) = (rh − 1)!/(trh)rh−1. Then it follows that
f (t1, . . . , trh−1trh )
Z
0<t1<...<trh −1<trh
E[bGstrh ] =Z . . .
E[bGst1, . . . , trh−1, trh]dt1 . . . dtrh−1
Z
=Z . . .
(trh )rh−1 u(cid:16) rhXj=1
0<t1<...<trh−1<trh
(rh − 1)!
λ1Pba(d⌈trh /d⌉ − trh)+λ2Pbrd
δ⌈tj /d⌉ + δ⌈trh /d⌉
δ⌈trh /d⌉+1
1 − δ (cid:17)dt1 . . . dtrh−1.
We elaborate more on computing E[bGst1, . . . , trh−1, trh ]. The transactions arriving within time 0 to time
trh contribute Prh
j=1 uδ⌈tj /d⌉ to the long term profit gains. Consider the transactions arriving within time
trh to d⌈trh/d⌉. This time interval belongs to time slot ⌊trh/d⌋. Note that in this time slot the reputation
score is lower than rh. This means that the number of transactions arriving in this time interval follows a
Poisson distribution with parameter λ1Pba(d⌈trh /d⌉ − trh). In expectation, transactions arriving in this time
interval contribute δ⌈trh /d⌉λ1Pba(d⌈trh /d⌉ − trh)u. Consider transactions arriving from time slots ⌈trh/d⌉ to
∞. In these time slots, a seller's reputation satisfies the condition to be labeled as reputable. The number of
transactions arriving in each of these time slots follows a Poisson distribution with parameter λ2Pbrd. These
transactions, in expectation, contribute uλ2Pbrd δ⌈trh
in total. Summing these terms together we obtain
/d⌉+1
1−δ
E[bGst1, . . . , trh−1, trh]. We have
Pr[Tr ≤ Tw]E[bGsTr ≤ Tw]
=Z Tw
Z . . .
λ2Pbrd + δ⌈trh /d⌉λ1Pba(d⌈trh /d⌉ − trh )(cid:17)dt1 . . . dtrh−1
(trh )rh−1 u(cid:16) rhXj=1
λ1Pbae−λ1Pbatrh
(λ1Pbatrh)rh−1
0<t1<...<trh−1<trh
δ⌈tj /d⌉ +
(rh − 1)!
(rh − 1)!
δ⌈trh /d⌉+1
1 − δ
Z
dtrh
0
Combing them all, we prove this theorem.
Proof of Theorem 5.1: We first derive E[T I
d . Note that sellers advertise honestly. This means that
all transactions result in positive feedbacks. This implies that the insurance certificate expires at the end of
the duration time. Note that N (ℓ), the number of transactions at time slot ℓ = 0, 1, . . . , ∞ before a seller ramps
r ] and P I
the expected ramp up time E[T I
up, follows a Poisson distribution, and we denote its parameter by eλT (ℓ). Applying Equation (9), we have
eλT (ℓ) = λ2Pbrd for all ℓ = 0, 1, . . . , ⌊Td/d⌋−1, andeλT (⌊Td/d⌋) = λ2Pbr(Td −d⌊Td/d⌋)+λ1Pba(d⌊Td/d⌋+d−Td),
andeλT (ℓ) = λ1Pbad for all ℓ = ⌊Td/d⌋ + 1, . . . , ∞. Then with a similar derivation as Theorem 4.1 we obtain
Gs first. Let bGI
τ when a seller subscribes to an insurance. Then bGI
Let us now derive long term profit gains (Gs) and average per seller transaction gains (Ge). We derive
τ =0 δτ uN I(τ ), where N I (τ ) denotes the number of transactions arriving in time slot
s]. With a similar
r ]. Furthermore, with a similar derivation as Theorem 4.2 we obtain P I
d .
s is a random variable and GI
derivation as Theorem 4.3, we have
s = E[bGI
s =P∞
s] = Pr[T I
+ Pr[T I
E[bGI
sT I
r > Tw]E[bGI
r ≤ Tw]E[bGI
r > Tw]
sT I
r ≤ Tw]
(1) a seller ramps up (T I
t ∈ [Td, T I
Let bλT (t) denote the transaction's arrival rate at time t[0, ∞). Applying Equation (9), we have two cases:
r ≤ Tw), then we havebλT (t) = λ2Pbr for all t ∈ [0, min{Tw, Td}],bλT (t) = λ1Pba for all
r > Tw), then we havebλT (t) = λ2Pbr
for all t ∈ [0, min{Tw, Td}], bλT (t) = λ1Pba for all t ∈ [Td, Tw], and bλT (t) = 0 for all t ∈ [Tw, ∞]. With these
observations and using a similar derivation as Theorem 4.3, one can easily obtain analytical expressions for
sT I
the term Pr[T I
r ≤ Tw] respectively. Combing them
all we complete this theorem.
r ], andbλT (t) = λ2Pbr for all t ∈ [T I
r , ∞]; (2) a seller drops out (T I
r > Tw] and the term Pr[T I
sT I
r ≤ Tw]E[bGI
r > Tw]E[bGI
Proof of Theorem 5.2: We want to derive the reasonable price that an E-Commerce operator can charge for
the insurance. The marginal long term profit gain of an insured seller is GI
s − CI . Note that the marginal long
16
term profit gain without insurance is Gs. Thus sellers has the incentive to buy an insurance if the marginal
profit gain corresponds to buying an insurance is larger than the marginal profit gain without insurance, i.e.,
GI
s − CI > Gs, which yields CI < GI
s − Gs.
Note that sellers advertise honestly. Let N ′(Td) denote the total number of products sold in insurance
duration time. It is easy to see that N ′(Td) follows a Poisson distribution with parameter λ2PbrTd. The
worst case is that all buyers hold the product till the last minute of the clearing time Tc and then return it.
Using a Chernoof bound [18] argument, one can easily bound the shipment cost (at the worst case) as
Pr[N ′(Td)CS ≥ N ′CS] ≤ e−λ2Pbr Td (eλ2PbrTd)N ′
/N ′N ′
Setting N ′ = max{ln ǫ−1 − λ2PbrTd, e2λ2PbrTd} we have Pr[N ′(Td)CS ≥ N ′CS] ≤ ǫ. The clearing time
follows the shipment delay d.
17
|
1907.05636 | 2 | 1907 | 2019-07-25T12:46:04 | From Observability to Significance in Distributed Information Systems | [
"cs.MA",
"cs.AI",
"cs.DC",
"eess.SY",
"eess.SY"
] | To understand and explain process behaviour we need to be able to see it, and decide its significance, i.e. be able to tell a story about its behaviours. This paper describes a few of the modelling challenges that underlie monitoring and observation of processes in IT, by human or by software. The topic of the observability of systems has been elevated recently in connection with computer monitoring and tracing of processes for debugging and forensics. It raises the issue of well-known principles of measurement, in bounded contexts, but these issues have been left implicit in the Computer Science literature. This paper aims to remedy this omission, by laying out a simple promise theoretic model, summarizing a long standing trail of work on the observation of distributed systems, based on elementary distinguishability of observations, and classical causality, with history. Three distinct views of a system are sought, across a number of scales, that described how information is transmitted (and lost) as it moves around the system, aggregated into journals and logs. | cs.MA | cs | From Observability to Significance
in Distributed Information Systems
Mark Burgess
Aljabr Inc.
ChiTek-i AS
Abstract -- To understand and explain process be-
haviour we need to be able to see it, and decide
its significance,
i.e. be able to tell a story about its
behaviours. This paper describes a few of the modelling
challenges that underlie monitoring and observation of
processes in IT, by human or by software. The topic of
the observability of systems has been elevated recently
in connection with computer monitoring and tracing of
processes for debugging and forensics. It raises the issue
of well-known principles of measurement, in bounded
contexts, but these issues have been left implicit in
the Computer Science literature. This paper aims to
remedy this omission, by laying out a simple promise
theoretic model, summarizing a long standing trail of
work on the observation of distributed systems, based
on elementary distinguishability of observations, and
classical causality, with history. Three distinct views of
a system are sought, across a number of scales, that
described how information is transmitted (and lost) as
it moves around the system, aggregated into journals
and logs.
I.
INTRODUCTION
The desire to expose the chains of cause and effect
that lead to observable phenomena is irresistible, yet
we know that the ability to observe and interpret sys-
tems is both limited and compromised by availability,
relativity, signalling speeds, and even by the noise of
environment. In computer science, these limitations
have largely been set aside to prioritize other concerns,
but in the era of wide area cloud computing this will
become harder to do, as our ability to observe and
assess software behaviours is filtered through ever
more opaque layers of abstraction.
The state of the art in monitoring relies principally
on brute force data collection and graphical presen-
tation. There is surprisingly little discussion about
the semantics of the process [1] -- [6]. Only recently
has there been any serious interest in semantics for
distributed tracing [7] -- [9]. Uncertainties, accrued by
sensory instrumentation are left for human operators
to untangle on their own. With few exceptions, the
literature on logging and monitoring (prior to the
present wave of Machine Learning studies), singles
out the design of machinery to collect data, without
due consideration of relevance, accuracy, or semantics
of what is collected (some recent examples include
[10] -- [15]). This is regrettable, but not uncommon in
technological literatures. The machinery becomes an
end in and of itself, and its knowledge-related function
is subordinated to the prowess of its performance.
Interestingly, the collection of observational mea-
surements from a distributed system is related to the
far-more widely studied problem of data consensus,
in Computer Science [16], [17]. The latter considers
how we may distribute multiple copies of information
over a wide area, with integrity of order -- surely one
of the most frequently revisited problems tackled in
distributed systems. The fascination with consensus
stems from the attempt to cling onto approximate
determinism. The topic of observability, on the other
hand, (literally the ability to observe systems, as
contrasted with monitoring which is following what
you actually can see) is its approximate inverse: how
can we meaningfully integrate data from widespread
sources into a viewpoint consistent with a single
observer, also with integrity. It's an issue that has
hounded physics and engineering for centuries. Like
its dispersive counterpart, observability is a problem
dominated by relativistic issues of space and time. Un-
like consistency, it has not been studied with anything
like the same degree of care.
The 'measurement problem', as it is known in
physics, bedevils every corner of science in different
ways. We need to ask: is there a consistent viewpoint
that can be arrived at without doing such violence
to the system as to wipe out any other signal. In
this paper, I want to apply the language of Promise
Theory [18] and Semantic Spacetime [18] -- [23] to the
understanding and analysis of distributed systems on
any scale.
IT tends to favour action over understanding; this
has probably led to the neglect of detailed models
for process monitoring. The issues of how we cope
with preferential sampling (which may result in result
bias) and relative scaling of sample populations, for
instance,
is of serious importance, but completely
absent from monitoring literature. Statisticians talk
about biases and significance of populations, but the
normal state of affairs for any observer, watching in
band of the process (i.e. colloquially in 'realtime'), is
to see a small random sample of data whose larger
scale significance cannot easily be assessed without
long term studies. Decisions and value judgements
are inevitably based on samples that are small and
statistically inadequate, so this problem cannot be
9
1
0
2
l
u
J
5
2
]
A
M
.
s
c
[
2
v
6
3
6
5
0
.
7
0
9
1
:
v
i
X
r
a
argued away by Central Limit Theorems and the like.
Observability is a necessary but not sufficient criterion
for understanding.
between pairs of agents, which therefore serve as
documentation of intent. An offer promise with body
+bi made by Si to Rj is written:
None of this is not what monitoring software
purports to do -- rather it pretends to offer instant
insight, independent of scale. In this paper, I'll try
to set out some definitions as clearly as possible, with
a view to answering a few basic questions, especially:
can we feasibly collect enough information to en-
able reversible reconstruction of process history, thus
enabling forensic causal reconstruction of scenarios
past? I'll show that, if a sufficient level of information
is promised, and agents keep their promises with suffi-
cient fidelity, then trajectories can be traced reversibly
to causal roots. However, the reconstruction of an
agent's ealier state from its current state (the tracing
analogue of 'rollback'), or from promised data, should
be considered impossible in general [24].
I'll focus on the two necessary conditions for
assessing systems, from basic information theory [25],
[26]:
•
The ability to observe remote data with rea-
sonable fidelity.
The ability to aggregate and combine remote
observations with similar fidelity.
•
These points are never more important than in ex-
tended cloud computing, where data collection sys-
tems extend all the way out to the edge of user contact,
e.g. the Internet of Things.
II. NOTATION AND DEFINITIONS
Let's begin with some definitions for the purpose
of making more precise statements. Promise Theory
provides a useful language here, in terms of promises
(or impositions), and assessments. In a promise the-
oretic model, any system is a collection of agents.
Agents may be humans or machines, hardware or
software. Usually, agents will be active processes.
Agents represent internalized processes that can make
and keep generalized promises to one another [18].
The generic label for agents in Promise Theory
is Ai, where Latin subscripts i, j, k, . . . numbers dis-
tinguishable agents for convenience (these effectively
become coordinates for the agents). We shall often
use the symbols Si and Rj, instead, for agents to
emphasize their roles as source (initiator) and receiver
(reactive). So the schematic flow of reasoning is:
S offers (+ promises) data.
1)
2) R accepts (- promises) or rejects the data,
either in full or in part.
3) R observes and forms an assessment αR(.)
of what it receives.
+bi−−→ Rj,
Si
(1)
where the + refers to an offer of some information
or behaviour (e.g. a service). This is a part of Si's
autonomous behaviour, and the promise constrains
only Si. Rj may or may not accept this by making a
dual promise, marked −b to denote the orientation of
intent:
−bj−−→ Si.
Rj
(2)
If both of these promises are given, and kept, then
influence in the form of vital information about the
body b will pass from Si to Rj. In general, the offer
and acceptance may not match precisely, in which case
the propagated information will be the overlap (mutual
information)
b∩ = bi ∩ bj,
(3)
in the manner of mutual information [25], [26]. I'll
suppose that modern systems are cloud computing
systems. The elementary agents of cloud computing
are processes, any of which may express promises
about state and services. Processes are hosted at agent
locations Ai, Si, Ri etc.
I use the following nomenclature for message
agents M:
•
•
• Eγ is an event, for example Lγ ⊂ Eγ may
be a line of information reported in a log
or journal. Greek indices γ label information
agents successive packets, i.e. γ = 1, 2, 3, . . ..
{Eγ} or{Lγ} refers to a collection of such
events or lines.
Si, Ri ∈ Ai refer to processes running on
computers.
{Si} refers to a collection of sources, etc.
•
• Ai refers to a process checkpoint in some
kind of dataflow, which has its own interior
event log and counters. Checkpoints typically
make promises about their identity, location,
local counter values, and intent to pass on data
in the form of packets Pi, with some promised
order.
Pi refers to a data packet passed between
checkpoints agents. Packets typically make
promises about their identity, data content,
schema, and type.
•
Latin indices therefore label
indices label events at the same location.
locations, and Greek
This third and final stage is the moment at which data
can be said to arrive at the receiver.
The details of a physical network are not directly
relevant, but the topology of actual interactions be-
tween agents is. It depends on the promises made
III. DEFINING THE PROBLEM
A. What is intended and what is promised?
There are two ways in which we use data to
interrogate a number of processes:
2
•
•
Tracing: ('During') -- in band observation,
in which data are sampled intentionally and
recorded as a process unfolds to maintain
'situation awareness'. e.g. the ECG or life
monitor approach to medical monitoring.
Diagnosis: ('After') -- out of band forensic
reconstruction of a system using data one
can find after an incident, where intent to
comprehend kicks in only after the event has
occurred: e.g. the post mortem approach to
medical investigation.
Most users will
try to combine these approaches,
paying attention mainly when significant events occur.
The automation of alarms (usually based on simple-
minded absolute thresholds) tells human operators
when to pay attention, at which point they have to
rely on what has been traced. The promise to maintain
awareness is an expensive one, and we rely heavily on
our skills of reconstruction after the fact.
B. Three perspectives about scale and relativity
Distributed processes are composed of agents that
pass information in space and time (see figure 1). Mes-
sages or events propagate from one agent to another,
and we consider the arrival of such information to be
an advance in the 'state' of the distributed system,
which is what we mean by the proper time of the
process. Events that occur in parallel, as separate
logical locations, know nothing about one another --
they are causally disconnected and lead independent
lives. The time on the wall clock or system clock is
not a 'proper' time, as we'll see below1.
Fig. 1: Space and time as agent parallelism and serialism
respectively.
There are three kinds of story or explanation we
want to be able to tell about distributed systems (figure
2):
1)
2)
3)
The data traveller log. What a travelling data
packet experiences along its journey, e.g.
which software including version handled it
and in what order?
The checkpoint visitor log, from key sign-
posts around the data processing landscape.
The log of what each checkpoint along the
journey saw, i.e. which data packets passed
through the checkpoint and what happened
to them?
The map of combinatoric intent,
the
relationships between invariant elements and
i.e.
1In Einsteinian relativity, the term proper time is reserved for the
time experienced by an observer about its own states, so I keep to
this convention here.
concepts, including the topology of check-
the types of data
points and influences,
passed between them,
significant occur-
rences, and so forth; i.e. the semantics of
the data, software, and invariant qualities
and quantities that summarize the processes
within the system's horizon.
These viewpoints require separate data collections.
Present day logging systems focus almost entirely on
the second of these.
In Promise Theory, one reduces a system to a
collection of agents, their promises, and their assess-
ments. Agents include the checkpoints from which
data emerge and are collected. A second layer of
agents comprises the data packets that are transmitted.
The promises made by these agents include commu-
nication, data compression, speed, and integrity. They
may include data formats and ordered protocols. We
equip different agents in the system with promises to
report the information available to them to observers.
I shall not be concerned with matters of authorization
and permission in this paper, but rather focus on the
difficulties experienced by those who are promised
information.
C. Diagnosis
It's up to an observer to infer something about
the state and history of a system, based on what
is observed. This is not as straightforward as soft-
ware systems have come to assume, especially as
cloud computing pushes the limits of observability.
At some point, this reconstruction involves a form of
reasoning -- not necessarily rigid logical reasoning, but
at least a process of joining dots into an acceptable
story.
Fig. 2: 3 Views. Travelling passport documents, versus logs
of entry and exit from a checkpoint, versus the map of
checkpoints and routes.
D. Diagnostic messages
Process tracing is a simpler problem than rea-
soning, because it can be constructed as a purely
Markov process -- at least in principle. Tracing is the
construction of a totally ordered path through a set
of agents. Reasoning, on the other hand,
involves
semantic relationships between clusters of agents that
may be considered to have an invariant meaning,
and it may combine several traces into a satisfactory
explanation. According to the definitions in [22], [23],
I'll simply define the following:
3
spaceliketimelikeTHE MAPcheckpointstravellingdataDefinition 1 (Reasoning): Reasoning is a search
over a graph of ordered conceptual relationships.
This pragmatic and unconventional definition might
offend some logicians, but it's closer to what humans
call reasoning than a definition based on mathematical
logic. A few common issues crop up in diagnostics:
•
•
•
The predictability of agents' behaviours.
The distinguishability of agents and data mes-
sages.
Loss of information due to mixing of origin
sources.
Reordering of information due to latency.
•
The problem with the first two kinds of story in the
list, is the lack of a deterministic and universally de-
fined order between the transactions of 'event driven'
processes at separate source locations. The extent to
which we can write down spatially invariant orders,
process summaries, etc, which may be expected to
persist over a timescale useful for prediction, is the
essence of the difficulty in tracing causal history2.
IV. OBSERVABILITY OF MESSAGES
From the foregoing, we can define the concept of
observability between pairs of agents. It does not make
invariant sense to speak of 'observability' without
some qualifications, so we can be more precise:
Theorem 1 (Observability of X at S by R): A
range of promised set values X, sourced from an
agent S is observable by an agent R if and only if:
π+ : Si
π− : Rj
Xj
+Xi−−−→ Rj,
−Xj−−−→ Si.
⊆
Xi
(4)
(5)
(6)
Note that
the criterion for observability is not a
deterministic guarantee the ability to obtain a value on
demand. It is essentially a property of an information
channel, in the Shannon sense. There is only a finite
probability of all these promises being kept, which
makes observation a fundamentally non-deterministic
process. There are many impediments to keeping
promises in practice, not least of which the the law of
intermediaries3.
By assumption, agent's are autonomous and each
plays a role in the collaboration required to exchange
the information involved in monitoring. The defini-
tion of observability illuminates a basic dilemma in
monitoring: the autonomy of agents in any distributed
2The main approach to determining spacetime invariance in
science is by the use of statistics (aggregation or 'learning'): by
accumulating multiple samples, we hope to separate what is quickly
varying (fluctuation) from what is slowly varying (trend). Persistent
concepts are what remains during or after a process of learning has
separated these processes.
3See reference [18]. The law of intermediaries basically says
that intermediate agents cannot be relied upon to faithfully trans-
mit promises or intent, because all agents are fundamentally au-
tonomous.
process (i.e. their causal independence) means that
there is fundamental uncertainty about the process of
observation not just its outcome. Causal independence
is the very definition of a random variable. A source
of signals may believe it does all it can to ensure
correct transfer of information, and that any problems
lie in the delinquencies of the receiver; meanwhile,
the receiver believes it does all it can and trusts the
source and the network in between implicitly to report
with complete fidelity. The assessment of X by Rj
(denoted αj(π+)) is still a function of Rj's access and
capabilities at any given sample, and may be subject
to environmental interference.
A. Preliminaries about intent
Most
technologists believe that,
if they design
without 'bugs', they can achieve whatever outcome
they desire, given sufficient resources. This is not a
scalable view, so we need to be more cautious. In
the standard model of queueing theory [27], data are
produced by a source Si, at a rate λi messages per
unit time, and may be processed by a receiver Rj
(sometimes called a server) at a rate µj. The queue is
unstable and grows out of control as the traffic density
λi/µj → 1.
The terminology pulling and pushing data are
often used about attitudes to causal intent in commu-
nications. These lead to some confusion, so it's worth
mentioning them. I define these in accordance with
the same information channel principles.
Definition 2 (Push): A method of communication
in which a source agent S imposes its messages onto
a recipient R without invitation.
+M
S
R.
(7)
In data signalling, packets may be carried over a
wire, enter a network interface and be queued up for
sampling by a receiver, before the receiving process is
ready to accept them. This is imposition. The receiver
may then promise to sample (-) the messages from the
shared queue. The channel flow is thus controlled by
the sender.
Definition 3 (Pull): A method of communication
(sometimes called publish-subscribe) in which a re-
ceiver invites a source to provide a certain quota of
messages for sampling via an agreed channel.
−M−−→ S
R
which is then promised by the source
+M−−→ R
S
(8)
(9)
The flow along the channel is thus controlled by the
receiver.
Pull is always the fundamental 'last mile' stage of
a sampling operation; it may involve active polling
of the queue to match timescales that satisfy the
rigours of Nyquist's theorem. It optimizes message
transfer according to the downstream capabilities.
Push driven systems are sometimes associated with
4
reactive or event driven systems -- though this can be
misleading. Push and pull are effective on different
timescales. Push (notification) is useful in connection
with small signals when source data are sparse and
a receiver needs a short wake up message to collect
a package from the source, enabling it to conserve
resources. Push therefore provides non-redundant in-
formation when arrivals are sparse or infrequent, on
the timescale of the receiver's sampling [28]. Pull sys-
tems make more efficient use of queue processing, by
utilizing the information about autonomous capacity
to balance load.
B. Events and sampling
The concept of events plays a major role in the
language used for monitoring and data flow in IT, but
is seldom defined. Let's define it here in a way that
respects information theoretic transfer. Information is
only 'arrives' somewhere when it is sampled.
Definition 4 (Event): A discrete unit of process in
which an atomic change is observed or sampled.
We often imagine processes being driven by a flow of
events, like a stream4. Again, in terms of sampling,
this amounts to the following:
Definition 5 (Event or message driven agent):
An Event Driven Agent R makes a promise
conditionally on the sampling of message events M
from a S, with an average rate λ:
+EM
R
(10)
i.e. R can promise an observer O that it acknowledges
an event E on receipt of a message M. By Promise
Theory axioms, this assumes the prior promises:
O
+Mλ
S
R
R
or
S
−Mµ−−−−→ S
+Mλ−−−−→ R
(11)
(12)
Notice that by using the term sampling here, we do
not take a position on whether messages were imposed
by pushing from S to R, or whether R reached out to
S to pull the data. These distinctions are irrelevant to
the causal link that results from the message policy.
Data are not received until they are sampled by the
receiver. Note that there is no timescale implied by
the conditional promise in (10) -- the definition of
'immediate' or 'delayed' response is an assessment
to be made by the observer O.
The concept of reactive systems has been usurped
by a specific industry initiative [29], so it makes sense
to follow in the spirit of that:
Definition 6 (Reactive agent): An event driven
agent
that promises to keep its behaviour within
certain constraints relative to the sampling of events.
A simple example of these principles is to explain
data flow systems like Data Pipelines. These are scaled
combinations of reactive components.
Example 1: Pipelines and Petri Nets: Data pro-
cessing pipelines are hybrid networks of Event Driven
Agents, Reactive Agents, and Service Agents, that
promise to behave as an Event Driven Agent collec-
tively as well as component by component.
A simple fact of queueing theory, embodied as a
principle of autonomy in Promise Theory is to note
that: no amount of pressure or coercion will make an
agent process data faster than its maximum rate µ.
C. Missed and dropped samples
Observations inevitably get
lost
in any scien-
tific enterprise. In empirical science this contributes
to 'error bars' or uncertainties
in counting of
measurements -- but not usually to semantics of inter-
pretation. Interpretations are expected to be stable to
such small perturbations.
Reasoning in IT has its historical origins from
mathematical logic and precision: the avoidance of
doubt. But doubt is a central part of tolerance in sys-
tems. If we observe and inspect systems, we need to
do so in the framework of a stable intent that overrides
random fluctuations in measurement5. Monitoring and
measurement serve no actionable purpose unless there
is already a policy for behaviour in place. Ashby's
model of requisite complexity or 'good regulator'
in cybernetics [30], [31] summarizes how matching
information with information on the same level is
required when there is no intrinsic stability in a model
by which to compress such fluctuations.
V. THE TIME SERIES MODEL
Our received view of time -- as a river of events
that moves everything from past
the
same rate -- is a side effect of living in a rather slow
world, which is close to us, and which we see with
no perceptible delay. In IT, we cannot rely on this
privileged view, and we need to rethink time by going
back to the basics of how we measure it.
to future at
A. Events, clocks, and proper time
In an information theoretic sense, an event is an
observation of change in data sampled from a source
[25], [26]. In the Einsteinian sense, this signal is a tick
of a clock that an observer samples. When the tick
originates from within a process (e.g. a CPU kernel
tick), this defines a notion of 'proper time' for the
local process, indicating an advance in the state of
the process. When there are multiple agents involved,
working together, the language one often speaks of
'vector clocks' in IT, referring to Lamport [32].
Other agents, external to a ticking process, may
observe changes in it differently, either because they
lack access to observe the changes or because the sam-
pling of the changes require intermediary processes
like message passing to propagate the changes from
source to receiver. Thus the proper time experienced
4This illusion of a flow is maintained by a gradient of interme-
diate agents that accumulate samples in buffers.
5We see the effect of 'populism' in society today, when intentions
follow unstable polls instead of convictions.
5
by an agent may not correspond to the exterior time
generated by the sampling of remote events.
Example 2 (Thunder and lightning): When light-
ning strikes, observers in different contexts see and
hear it at different times. Observers very close, that
cannot sample faster than a certain rate, may not be
able to discriminate a difference between the flash and
the thundercrack. Light travels so fast the few agents
can detect a delay in the signal, so they conclude
that the flash occurs as 'the same time' (during the
same sample). But sounds travels more slowly, so
agents at different distances can discriminate the time
at which the sound reaches them. If they synchronize
their watches using light, they will measure different
times for the sound -- but the event happened due to
a process that took place in a single location, over
a tiny fraction of a second. What observers sample
is not always a high fidelity representation of what
happened at the source.
Using the language of Promise Theory [18], we
can define time from two perspectives. For conve-
nience, we'll make an identification between the con-
cept of an event Eγ and a line transaction Lγ in a
system log, or a data point recorded in a timeseries
database Dγ:
Lemma 1 (Events count time): The emission of
an event or 'log line' Eγ = {Lγ, Dγ} is a tick of
interior time clock.
This should be obvious, as events are changes that get
noticed. We can now define interior (proper) time and
exterior (relative) time:
Definition 7 (Interior time of process Si): An in-
dependent count of ticks originating from within a
process S, cannot be observed by any exterior agent
A?, unless promised and reported:
+ticki−−−→ A?.
Si
(13)
Interior time is the image of processes that originate
within the boundary of agent Si. At scale, we can con-
sider superagents of any scale, so interior time scales
and changes in meaning according to our definition of
local.
Definition 8 (Exterior time of process Si): An
independent count, by a remote receiver R, of
promised ticks (observed and aggregated from any
number of sources on a watchlist) that increases for
each sampled event arriving from a exterior process
source Si.
+ticki−−−→ R
−ticki−−−→ Si
+tickticki
−−−−−−→ A?.
Si
R
Si
(14)
(15)
(16)
Exterior time is attached to remote processes that may
originate on any scale. The recipient R that samples
events may itself be of any scale, with associated loss
of certainty about the definition of its interior clock
counters, but ideally R would use a single source from
an elementary agent, for precision.
On the timescales of computers, in our daily lives,
this sounds straightforward, but
the processes that
calibrate our normal idea of time (the system clocks)
are not faster than the sampling processes we are
trying to discriminate by. This leads to a breakdown in
the normal assumptions of universal time for all, and
forces precision agents to go back to basic definitions
of time in order to trace processes in band.
B. Clocks at different scales
We cannot avoid the effects that scaling has on
clocks. Even atomic clocks may not be considered
atomic, in the transactional meaning, on the scale of
subatomic processes. The lesson that Einstein taught
us is that processes need to embody their own clocks,
as single reference sources of truth.
Example 3 (System clock, e.g. Unix): The system
clock, provided by most operating systems derives
from a shallow hierarchy of exterior time services,
based on processes that promise approximate align-
ment. The clock timer C is an independent agent,
which promises a counter (UTC) to processes Pi,
C +UTC−−−→ Pi
−UTC−−−→ C
Pi
(17)
(18)
Using this as a conditional dependency, processes can
then promise timestamps based on the interior counter
+timestampUTC
−−−−−−−−−→ R.
Pi
(19)
Note that the coordination between duplicate redun-
dant clocks is weak. A time service like NTP, provided
by agent N, may be used to periodically align inde-
pendent clocks at a layer of the hierarchy above each
system clock:
C
C
N
Pi
−−−−−→ C
+UTCNTP
−UTCNTP
−−−−−→ N
+UTCUTCNTP
−−−−−−−−→ Pi
−UTC−−−→
C.
(20)
(21)
(22)
(23)
Each clock is independent, so it is only meaningful
to compare two timestamps from the same clock.
Moreover, the relationship between timestamps and
process ticks is indeterminate, since process ticks are
halted relative to the system clock during timesharing.
The use of timestamps in network protocols should
be considered unreliable, and only for round trip
comparisons.
Example 4 (Monotonic counters): Interior
process time can be obtained by incrementing a
counter by an atomic operation. A process P passes a
value v to a counter C, which is a persistent variable,
and promises to increment it as certain milestones
are passed:
+v−−→
−v−−→
C
P
+t=(v+1)v
−−−−−−−−→ P
C.
−t−−→
(24)
(25)
(26)
(27)
P
C
C
P
6
order at the source (figure 3). This requires the in-
troduction of a co-dependence between sender and
receiver, and a detailed explanation has been given in
[33]. Examples include the well-known TCP protocol,
and other more exotic variants.
This does not
imply that data are necessarily
observed in the same order by source and receiver.
Once data leave the agents that are entangled in this
way, the promise of order is not preserved, because
all agents are causally independent.
Lemma 5 (Promised Order Propagation): Data
exchanged without conditional sequence promises
may not be sampled in the same order as they were
promised.
The implication of this lemma is that predictable
coordination of sequences as invariant features be-
tween agents is expensive and unreliable: it does not
happen unintentionally, without chains of interdepen-
dent promises. This is a rather damning result for
monitoring that relies on timestamps for its depiction.
Order promises can be kept by labelled (sequence
numbering) or by waiting in lock-step for changes
one at a time. The independence of agents, and our
inability to make a promise on their behalf, means
that data passing through multiple intermediaries are
independent deliveries. Even a single agent cannot be
forced to deliver data in order, unless it has promised
(fully intends) to do so in advance, with full observ-
ability of the payload (and a receiver that can sample
at the Nyquist rate [22], [26]). Expecting clusters of
agents to preserve order, over possibly parallel routes
is even more unlikely, without prior intent. This can
be expressed by saying that unless there is a single
clock that determines when packets will be sampled
by a receiver, the order will not be preserved. The
default is that an incoming queue of samples serializes
them in a random order, without a surviving chain of
dependency.
We can arrange for such a single clock to be
authoritative (like a shared memory counter), but this
requires agents to make promises to abide by the
order, which in turn requires cooperation from end to
end throughout a channel, to preserve identity serially
and atomically (one agent sampled exclusively at a
time). Another approach to agreeing about time is
to bind clocks in lock-step to form a co-dependent
relationship between agents, known as entanglement
[33]. This is used, for example, in TCP's SYN-ACK
protocol. It promises synchronization at a possibly
unbounded cost in terms of interior time ticks.
Lemma 6 (Promised Order Propagation): The
intended order for events originating from more than
one Si may only be promised by interior cooperation
at the source, and assessed uniquely by an agent R
with observational capacity according to the Nyquist
law. Each rescaling of aggregated time ordering
introduces new uncertainty according to an observer's
clock.
There is no unique intent, for a collection of au-
tonomous agents, unless the multiple sources subor-
Fig. 3: A single agent, with a reference clock can be scaled
into a superagent provided the agents within promise to
coordinate their behaviours. Thus a collective formed from
independent sources can act as a single reliably ordered
source, but at a cost growing like N 2 in the number of
agents.
If independent agents need to coordinate their
clocks, they can build on a single source of truth,
by appointment to the role (see figure 3), essentially
transforming interior time into exterior time.
Lemma 2 (Interior consensus of clocks): The
promise to share interior time Ti from Si,
to an
agent Rj, with interior clocks Ti is equivalent to the
problem of data consensus between clock ticks.
This suggests that clock synchronization by voting in
band ('realtime') will lead to a significant delay in the
rate of time that can be promised as agreed ticks by
an entire superagent. This increased 'mass' of agent
clocks will slow the rate observable by an outside
sampler.
Lemma 3 (Aggregation of clocks): The aggrega-
tion of multiple sources of interior time Ti from Si,
by an agent Rj, with or without consensus, is not one
to one with the interior time of the receiver.
The proof of this may be seen from the Law of
Intermediate Agents [18], which tells us that, if there
are agents in between the source and receiver (which
is nearly always the case),
then no promises are
transferred automatically. We need a chain of delivery
promises to form an expectation of what we are
seeing. The outcome of this is that every agent may
see a different arrival order, assuming that
it can
distinguish between data transmissions. This is a well-
known result. Conversely:
Lemma 4 (Promised Order Propagation): The
order of a sequence of data, from a single agent, can
be promised by virtue of a single clock or counter.
this does not
Note that
imply that order will be
preserved, only that there is a set of promises between
sender and receiver that can be made to transfer
the order information (e.g. by numbering packets).
This is well known in 'reliable' data communications,
like TCP. Without proof, let's acknowledge that the
relative order of data can indeed be transferred reliably
between a sender and a receiver, if there is a promised
7
observer1A2A3A4clockAdinate themselves by cooperation to a single agreed
order, but any attempt
to coordinate between the
agents (and thus act as single superagent making a
common promise) would result in a change in the ticks
observed by R, unless the sampling resolution of R
is much less than the exterior time needed to assess
interior latency of interactions for agreement.
The conclusion of these extended remarks is that
there is no single clock by which to define the order
of events between different hosts. This is esssentially
because unrelated processes have no common time.
The whole idea is meaningless. What observers often
seek is a picture according to their own sense of time
(observer time) that integrates different processes into
a picture of the moment as they perceive it. Alas,
that impression cannot easily be reconstructed later,
even perhaps with a detailed 'post mortem', as it relies
on anchoring to out of band processes that were not
measured. If we introduce a single source of time for
a collection of hosts, by forming a superagent (with
all necessary interior cooperation), each agent within,
we can define a single reference time, but it is not the
proper time of any process.
C. Rule of thumb about time
Example 5 (Common assumptions of system time):
A commonly held belief is that, in interactions like
network protocols, we might define time in a number
of way.
•
•
•
•
The 'actual' time: there is a single source of
truth, by international convention, which is
the official value of UTC. This time standard
exists, but is only obtainable with latencies
that render it approximate. Through a hierar-
chy of services, like NTP, local system clocks
promise to approximate this time and to count
independently on their own at approximately
the same rate. These rates cannot be verified,
so in practice the closest we can obtain is the
current value of the local system clock, which
belongs to localhost.
The observed time: This is a timestamp ren-
dered by sampling the system clock, so it is
relative to localhost's assumed time standard
and has no significance beyond the agent that
sampled it. The observed time may not be
monotonic, for example if clock drift correc-
tions occur in between samples of the clock.
System time may therefore go backwards or
forwards at random, over extended processes.
The publication time: Timestamps may be
shared between processes, or recorded, incur-
ring additional processing delays. The reso-
lution of a timestamp may be quite low, al-
lowing processes to absorb processing delays,
but publication times are always later than the
timestamps they promise, e.g. the timestamp
when a log entry is written is always later
than the timestamp of the log entry.
The receipt or sampling time: If timestamps
are shared between agents, e.g. in recording
data in a log, or transmitting data across a
network, the published timestamp belongs to
the sender S's clock, and the receipt time
belongs to the receiver R's clock. These two
times are causally independent and their com-
parison is strictly meaningless. If all clocks
promise approximate alignment,
the differ-
ence between published and received times-
tamps may promise an accuracy whose un-
certainty is approximated by the Pythagorean
average of the uncertainties of the two times-
tamps at S and R.
Clearly, no protocol (except NTP) passes information
about its clock time uncertainties, so network time
falls foul of the Intermediate Agent law.
VI. THE ROLE OF TIMESCALES FOR
PREDICTABILITY
The purpose of monitoring is to be able to explain
behaviour and even predict problems in advance.
Without predictability, monitoring is little more than
somewhat arcane entertainment [1] -- [6]. One assumes
that, by learning about
the past or by building a
relationship with system behaviours in band, we are
able to predict something about the future behaviour.
This, in turn, assumes a stability under the repetition
of patterns.
Definition 9 (Predictability): A system that has
stable and repeated observable behaviour, on a
timescale much greater than the sampling rate, may
be called predictable.
It's, of course, paradoxical that the time when most
users want to monitor systems is when they are least
predictable and providing observations of no value.
A. Separation of timescales
We can make another observation about what
happens in interactions. The principle of separation
of timescales is a design principle for interacting
systems, based on the observation that dynamical in-
fluence causes timescales for change to mix. In earlier
work, I've referred to this as the most significant
principle for engineering -- more important than the
separation of concerns based on semantic (functional)
separation, such as data normalization or 'class',
which is the norm in Computer Science. Briefly, it
says:
Principle 1 (Separation of timescales):
robustly
processes
with
systems modularize
when
Functional
effectively
characteristic timescales are weakly coupled.
By 'robust', we refer to 'stability' [34]. This principle
makes a connection to the related problem of data
consensus, which is a strong coupling regime that
maintains data consistency over average timescales.
and
different
B. Dynamical coupling defined
The foregoing assertions can be justified by look-
ing at what coupling strength means for interacting
8
agents6. Phenomena that promise changes on very
different
timescales interact only weakly and can
therefore be treated as logically separate. By contrast,
agents that promise couplings on the same timescale
may influence one another and therefore belong to the
same class of phenomena. In terms of the foregoing
definitions, we can state the meaning of separation
more strongly, as a theorem:
Theorem 2 (Separation of causal influence): As
the ratio of timescales becomes large TR (cid:29) TS, the
effective coupling tends to zero
e → 0.
(28)
tends to zero (weak coupling).
To prove this, suppose a series of partially ordered
events at an agent S yields a series Eγ, γ = 1, 2, . . ..
Suppose a source agent S transmits the events, which
are aggregated into superagents E(n)(Eγ) of dimen-
sion n, by the receiver agent R,
S
R
−−−−−−−−−→ R
+E1,E2,...En
−E1,E2,...En
−−−−−−−−−→ S
+αEE1,E2,...En
−−−−−−−−−−−→ A?
(29)
(30)
(31)
so that the dimension of the information is reduced
by a factor of n by R:
R
α(E1, E2, . . . En) → R
(cid:12)(cid:12)(cid:12)E1, E2, . . . En
(cid:12)(cid:12)(cid:12)αE (E1, E2, . . . En)
(cid:12)(cid:12)(cid:12) = n
(cid:12)(cid:12)(cid:12) = 1
(32)
(33)
(34)
The average time between events, as assessed by R's
clock, may be denoted
TS (cid:39) 1
TR (cid:39) n.
(35)
(36)
So R assesses S's timescale to be 1 and its own
timescale to be n:
TR ≥ TS.
(37)
Thus the average interarrival times for the queue in
(31) λR ∼ 1/TR, etc, satisfy:
λR ≤ λS
(38)
and the effective influence, in fraction of messages
received compared to messages sent is expressed by
a coupling constant:
e ∼ λR
λS
≤ 1.
(39)
In a strongly coupled system e → 1, timescales
converge to the shortest timescale of the interacting
parts, making systems busier and more work intensive.
The utility of this observation is that, if one separates
causally independent parts of a system into super-
agents that make weaker promises to one another,
6The increasingly pervasive language of Complex Adaptive Sys-
tems leads to assertions about strong and weak coupling, but we
need to be able to define those things to use them.
9
that
any observed correlation between phenomena,
exceeds expectation, can be considered coincidental
or potentially faulty. This can be detected by a change
in the proper time event rate, measured by some agent
within a system. This principle therefore has signif-
icance to the use of observation for detecting faults
and design flaws in systems. It tends to maximize
the signal to noise ratio between promised and non-
promised behaviour [34].
C. Coupling strength, memory, and consensus
The concept of knowledge is already more uncer-
tain in a distributed system than in a local system
with random processes. Lamport's papers about seek-
ing the homogeneity of data sources is effectively a
monitoring problem in reverse. A collection of agents
monitors one or more sources and tries to equilibrate
the knowledge they promise. Data consensus is a con-
ditional promise of policy-determined values (called
quora), based on inputs reported from sources Si:
Si
R
R
+Eγ−−−→
−Eγ−−−→
R
Si
+Quorum(Eγ ) Eγ
−−−−−−−−−−−→ A?.
(40)
(41)
(42)
This strong coupling, represented by strong depen-
dency on data from a complete network of depen-
dencies, demonstrated that time and order of events
are fundamental obstacles in a system of distributed
computers in which observation has a finite latency
(usually agents that are spatially separated) [16], [17],
[32]. The topic touches on the relativity of simultane-
ity, and how to make sense of differing views about
what causes what.
The relationship with time is revealed by the 'FLP
result' [35], which exposed the essential impossibil-
ity of consistent distributed knowledge in an uncer-
tain 'asynchronous' environment. In an asynchronous
message-passing system, source or delivery agents
may delay messages indefinitely, duplicate them, or
deliver them out of order. In other words, there is no
fixed upper bound on how long a message will take
to be received. A consensus policy promises:
•
•
All trusted nodes promise the same result (a
non-local agreement).
All trusted nodes will eventually promise a
result.
Some approaches to working around the limitations of
asynchronicity play with strong synchrony promises in
order to eliminate these uncertainties [33].
In an asynchronous
interaction, each agent's
proper time may be used to define 'timeouts' to receiv-
ing data to keep a process from waiting for ever for
strong dependencies. Timeouts are a workaround that
weakens the effective coupling strength of an interac-
tion, by effectively measuring latency in interior time.
There is no unambiguous meaning to a timeout, except
the presence of a potential fault. Latency (round trip
time) is the only covariant measure in a relativistic
system, because it's one of the few measures that has
a purely local meaning.
In Promise Theory, the intermediate agent theorem
is the analogue of that result: it says that whenever
you rely on agents that are not yourself, to acquire
or deliver information, it no longer promises what its
originator intended. And if a remote agent promises
something, but doesn't promise it to you too, all bets
are off and there is a quadratically growing cost of
verifying. In monitoring, we are not usually interested
in a majority view, rather we are interested in what
happened specifically at what we believe was the
certain place and time of origin (though this is also
subject to uncertainty). We are sometimes interested
in a statistical view (which is not
the same as a
consensus view, because it admits and even measures
the statistical uncertainty of variations. If certain nodes
lie (sometimes called Byzantine behaviour) we want
to know about it, not merely cover it up.
There is clearly overlap in the concepts of dis-
tributed information, but monitoring seeks a picture
of actuality, rather than a cover-up operation to brush
uncertainty under the rug of consensus. Software
Engineering therefore has a conflict of intent with
monitoring: it wants to assure complete dependability
(promises always kept) by invoking protocols 'in
band', whereas monitoring is trying to expose when
promises are not kept, to 'out of band' human ob-
servers. These are the issues we need to deal with in
describing observability.
Readers may feel that the problem of distributed
ordering has been solved by distributed consensus
systems like Paxos and followers [16], [17], but this is
not the case. Consensus systems do not promise the
source order of observations, but rather an average
order by which observations are reported, which is a
policy decision.
D. Memory processes
It should be clear that memory is required to
stabilize values from multiple sources. To integrate
results from several sources, and to replace then with
an agreed result requires temporary memory, over the
necessary clock ticks of proper time -- at least as much
memory as there are source dependencies for each
outcome. The role of memory and its reliability also
play a role, but I don't want to discuss that here. In
most IT systems, memory unreliability is negligible.
VII. THE TIME-SERIES MODEL
Given a stream of trusted values reported by agent
interactions, the usual response is to try to build a
timeline for a system as a movie recording of past
history, using a panoramic lens. This throws us a
number of questions about how often one should
sample data.
A. Sampling rate
The naive view in the industry is that one should
collect as often as possible. Basic information theory
constrains our ability to extract information from data.
Many engineers feel that the virtues of fast sampling
are indisputable, just as the citing of many decimal
places leads to increased accuracy, but neither are true
(for the same reason). Excessive use of high resolution
sampling is a senseless arms race (a watched pot that
never boils). Continuous high density sampling of a
non-existent signal is not helpful. Nyquist's theorem
tells us that we can only know fully of changes that
occur half as fast as the rate at which we sample.
Shannon's theorem tells us that our information about
the system only increases when changes are observed.
Regarding the order of events, it's common to
rely on an independent clock service, located within
a network to try to synchronize clocks to some
calibrated count, and then rely on the homogeneity
of manufacturing in chip-sets that count time at a
more or less similar rate. Traditional clocks services
count time in seconds, but this sampling rate is much
too infrequent
to distinguish processes in modern
processes, where nanosecond timing discriminations
are becoming.
Physics tells us that relying on the counting of
an exterior agent is futile when clocks are located in
regions of very different gravitation, or when they are
moving with respect to one another. This already has
to be corrected for in satellite systems. The same effect
applies if agents are in virtual motion with respect to
one another. Only the interior proper time of a process
can be relied upon for comparisons.
Local measures of observables have to be aggre-
gated into coarse grains in order to measure them
against one another. Histograms of observational dis-
tributions are usually the best we can offer in terms
of observability. But distributions only tells the past
probability of behaviours in fairly static cases. When
we most want to know about a system, that's when
it's hardest to understand. 7
Time-like changes are normally assumed to be in-
stances of what may potentially be significant events.
The result is that human operators get excited by
graphical traces that suddenly rise or fall -- which has
an undoubtedly hypnotic appeal, but means nothing
without a larger context. Sliding windows are often
used to detect gradient changes in time series. En-
semble averages are used and even forced in data
distribution and consensus processes (see figure 4).
In other words, aggregation over time (not space) is
a necessary part of the learning that provides context
for prediction.
Principle 2 (The sampling rate): The
sampling
rate for a variable should typically be about half the
auto-correlation time for a variables in order to detect
meaningful stable variation.
This is the timescale suitable for learning. For the
purpose of anomaly detection, one might see a sudden
change in timescale as a result of an unexpected
7This is the paradox of weather forecasting: when nothing is
changing, we can predict the weather easily; but, when everything
is in flux, prediction is hopeless. [36].
10
coupling. Faster sampling could then be introduced
on suspicion of a transition in behaviour -- just as bi-
ological heart rates and attention spans quicken under
stress. Recording and storing reams of data that are
zero or constant cannot be in anyone's interest. Such
data is compressible. It contains no new information.
The potential problem with that approach is that the
cost of sampling is not free; the impact of sampling
on the system may become significant. Some authors
have advocated such adaptive sampling [37]. One then
has the decision about which part of the sampling
process to scale back: the act of measuring on each
local process has one cost, the act of aggregating the
samples in some central repository has another cost.
Neither of these is easily controllable, since multi-
tasking operating systems make the sharing decisions
to allocate cores, interrupts, network transmissions,
and tasks quite opaquely. It may be difficult to assess
which is the greater evil: uncertainty due to adaptive
sampling or uncertainty due to oversampling or un-
dersampling.
Fig. 4: Aggregation of observations from multiple sources
can happen at any node in a distributed process. When causal
influences come together, in this way, the confluence point
becomes an effective observer of the sources that feed into
it. Observers are not only human!
B. Shared resource counters (kernel metrics)
The consequence of lemma 6 is that scaling of ob-
servations causes not only a reduction of information
transmission rate, but possibly a loss of information
about the origins of shared assessments. Resources
counters, computed from the aggregation of data (like
most of the kernel resource metrics typically recorded
in popular monitoring tools), erase details that belong
to their higher resolution origins, in an unrecoverable
way (see section VIII). There are many such recorded
values in timesharing computer systems, because they
are useful mainly to the sharing agent. The fact that
they are shared with separate processes is a mixed and
slightly misleading blessing. It's sad to see so much
effort expended in sharing noise to observers desperate
for insight. I think we can do better.
Shared measures erase the information about data
origin, and thus such collective phenomena cannot be
traced backwards to an appointed cause. For example,
measuring the load average for a computer cannot
determine which programs caused a spike in the load
[38]. This is not, on the other hand, a reason to retain
every individual data characteristic for ever, because
the opposite is also true: some data cannot be exposed
without computing those high level functions.
11
C. Instrumentation of processes
Our symbolic representations of processes are al-
gorithms expressed as program 'code'. In a distributed
system, programmers have begun to instrument work-
loads for interprocess communication using service
meshes and centralized logging services. These do not
reveal behaviours interior to the processes, but may
provide traffic patterns by which to hypothesize about
process behaviours and intentions.
For process tracing, one needs to be in the inside
of the process, where the interior time ticks. From the
foregoing discussion, it's clear that the system clock
service is not the correct measure of time for process
diagnostics. The proper time of a process is measured
by the number of program counter transitions or
program steps incurred by its execution. This count
is significant because each increment
is the result
of an explicit causal jump instruction. The program
counter's value can be promised at each instruction
in code for debuggers to trace, forming a causal set
of correspondences between program locations and
increments. However, attempting to share these proper
times between processes is meaningless.
The system UTC clock, even an approximate local
copy of it, comes from an independent agent, and al-
though shared between many processes its increments
do not correspond to single channels of causation.
Rather they represent only the implicit increase of en-
tropy in collecting from all processes. When processes
are timeshared, they may be halted and interleaved in
complex ways.
D. Significant Events
As discussed above, the major drawback in time-
series thinking, for a distributed system, is that there
is no unique meaning to the order of transactions
originating from different sources when they are ag-
gregated from different locations. Each observer in
the universe sees events from their own perspective.
The lightning bolt and the thunder arrive earlier for
some than for others, because different processes
propagate information at different rates, over different
routes, and with different latent delays. Consensus is
expensive, heavy handed, and its goals are different
to the goals of observation.
Moreover, we have no uniform metric for time
other than the exterior clock, which has issues of its
own -- it doesn't represent local causation except for
the process that generates it. The question we want
to answer is: what was the reason for an event E?
i.e. can I infer the condition, state, or quality of the
system from this event, based on what I have observed
beforehand? Times are not causes.
A better approach, based in interior instrumen-
tation is to create a semantic counter that traces a
distributed process that we can trace backwards to
causal origins. Samples can be taken when something
is found to be significant within the context of the
process itself. This is the proper passage of signifi-
cant times. Regular sampling of processes is not an
SRSCCCSefficient way to record them because processes may
be busy or idle, etc. This is what system logging
enables -- but the opportunity is usually squandered
from a lack of a proper model.
Definition 10 (Significant event): An
Metric coordinates (clock times and numbered
locations) are not helpful when we have no invariant
measuring devices to define them by. The alternative
is to use descriptive labels, or semantic coordinates.
event
marker, provided by a source process, that signals
either an intentional change or an unintended
deviation from expected state.
Anomalies and faults fall into this. Processes that are
not able to keep their promises may also be significant
events.
When seeking the 'root cause' of an event, we
to go back to prior events that were
really want
significant. The rationale behind this is that,
in a
stable system (one that we expect to be predictable),
when all is as expected, unexpected events are most
likely to be caused by previous significant changes
and anomalies. Clearly, for every event there is a
prior one, until we reach the very beginning of time
(the system 'Big Bang'). However, we also have
episodic boundary conditions that act as 'Little Bangs'
for more constrained universes. Boundary conditions
are semantically special events that we attach special
significance to -- they are the origins of causation. We
aren't interested in every intermediate change, only in
prior events that make a splash.
We want to create a causal chain, a journal, some-
thing like a linked list. Instead of selecting data by
voting, we can select values based on their perceived
importance to outcomes of interest. This shifts the
focus of policy from the intermediate aggregator of
data to the observer: the observer is now expected to
have a specific question it wants answered, rather than
voyeuristically consuming data for entertainment.
E. From metric to semantic significance
The use of 'signposts' for labelling paths, as
semantic coordinates [39], traces back before maps
and calendars were invented by human civilizations.
Instead of imagining idealized coordinate grid sys-
tems, perhaps unmeasurable, signposts relate events
to less regular but highly recognizable things that we
can observe (the big tree at the river, Mount Fuji, the
Matterhorn, the year of the flood, the eclipse of the
moon, etc). This provides anchors for accessing mem-
ory and plausible anomalies that might have exerted
causal influence. We use these events as boundary
conditions on episodic sub-processes.
Descriptive naming (semantic coordinate assign-
ment) is thus more useful than ordinal naming (nu-
merical coordinates). The checkpoints and paths that
participate in processes may not be invariants, and
the numerical value of coordinates is irrelevant8. We
8One works hard to make this point in the physics of relativity
where coordinate systems get in our way of understanding space-
time processes
may need to identify a repeated pattern to some
degree of approximation in order to exemplify a
general concept from which lasting knowledge can be
derived. Anomalies that do not recur become effective
invariants,
in memory, because they are rare and
worth remembering. Featureless invariants (like empty
space) are indeed the most invariant of all, but have
such high entropy as to contain no information of
significance.
The significance or meaning of a signal is the
heuristic inverse of the (incompressible) information
within it. The more information we need to charac-
terize a room, the less stands out about it. If there is
one part that dominates, the rest is negligible -- hence
the principle of signalling significance.
Lemma 7 (Significance vs information):
Maximum entropy distributions contain no significant
events:
they are causally random, and all events
are observationally equivalent. Minimum entropy
distributions have the maximum significance, as they
imply strong correlation.
Entropy plays a subtle role in statistical distributions,
and therefore in ability to infer meaning from data.
F. Reversibility versus traceability
We want to be able to trace our knowledge of
a system back to know the cause of an effect. The
intended outcome is programmed into it, but there
are also unintended outcomes caused by environment
leaking into causal pathways. Because of the culture
of 'rollback' thinking in IT, which originates from
database transaction semantics, IT often muddles the
concept of traceability with reversibility9.
We must distinguish between the ability for an
observer to trace backwards from a sequence of obser-
vations to reconstruct the cause of a significant event,
and the ability to roll the state of a system back to
what it once was. For example, it's possible for an
observer to trace the source(s) of a river, but it is not
possible to reverse the river and roll it back to an
earlier state.
lost
In the former case, the enabling condition is for
in the chain of
no origin information to get
unfolding events (see figure 5). In the latter case, the
necessary condition for being able to undo a causal
sequence is that agents of the system itself have to
promise the inverse of every promise in the forward
direction conditionally on an undo condition -- this
is an additional set of promises pointing backwards
along the path, which is much more than an observer
being able to trace knowledge of promises backwards.
The necessary condition is insufficient even to promise
the result: agent processes must also be isolated from
external interference, else the precise inverse opera-
tions may be deflected off course by noise [24].
9Reversibility is something of a misunderstood concept in dy-
namics, especially as applied to IT system behaviours. The apparent
reversibility of the machinery is sometimes used as an argument
against causality, but the argument is built on a misunderstanding
that ignores the boundary conditions.
12
G. Partial order of agents and events
As a process propagates by passing messages, the
messages separate earlier times from later times on
the process's own clock or counter. Suppose this is
reflected in a sequence of messages, or lines in a log.
In a chain of lines Lγ belonging to a single source
Si, we can define a countable metric distance between
lines by the total ordering of the sequence, also in the
language of promises:
L1
+precedes
−−−−−→ L2
+precedes
−−−−−→ . . . Ln
−−−−−→ Ln+1. (43)
The observational binding is equivalent a more clas-
sical ordering relation <:
+precedes
L1 < L2 < . . . Ln < Ln+1.
where
S < R ↔
S
R
−−−−−→ R
+precedes
−precedes
−−−−−→ S
(44)
(45)
We need to be cautious about the interpretation of
these promises. Each agent
is making a separate
promise, but (by the law of agent autonomy) these
agents cannot make the assessment or promise it to
an observer who happens to be watching all of them.
Each agent can make its own promise available to the
observer, but it's up to the observer to order them
in the final
instance. This ordering may be come
mixed with other orderings as data are aggregated.
The promises indicate that the relationships are con-
Fig. 5: Causally ordered change in a process, and informa-
tion observed about the process are two distinct things. As
long as the observation of the process retains the order of the
process, inferences about causality can be made, regardless
of whether the system itself could be reversed. You can
trace the source of the Nile, but you can't make the river
flow backwards.
sidered persistent or even invariant by the promisers --
not merely local assessments made on the basis of
spurious data. However, if at any time the events being
ordered become indistinguishable, they can no longer
be ordered. This can happen when data are aggregated
without complete labelling.
Ordering reduces to the existence of (local) con-
ditional promises, whose scope may extend to other
observers in a scope σ [18]. The n-th agent in a
13
(cid:88)
sequence; by the axioms of Promise Theory, we must
have a chain of the form (figure 5):
An
An
An+1
+XnXn−1
−−−−−−−→ An+1
−Xn−1
−−−−−→ An+1
−Xn−−−→
An
(46)
(47)
(48)
(49)
And, in general, we may consider a general scope for
the above promises:
An
+XnXn−1
−−−−−−−→
+σ
An+1
(50)
Given such a set of promises, we can define a measure
of observable distance between agents An and Am
by assessment. Again, we note that interior relativity
makes distance an assessment by one agent about the
relationship between itself and one or two others.
H. Translation operator and Noether's theorem
If the agents were sufficiently homogeneous, we
could consider an operator interpretation for ∆, as the
generator of a translation on a set of states realized
by the positions (like ladder operations):
∆Ai(cid:105) → Ai+1(cid:105).
(51)
In fact, for every kind of promise there would be a
separate propagator, like a complete basis:
∆ =
cτ ∆τ .
(52)
τ
The problem with this kind of interpretation is that
is suggests the existence of a god's eye view once
again. It takes the existence of a privileged observer
to be able to order and rank the states in this way.
In classical physics, the continuity of the energy
function with respect to spacetime is what generates
conserved quantities like energy and momentum, thus
allowing these quantities to be used consistently as
counters for behavioural descriptions. We can see,
from the Promise Theory, that this conclusion also
follows from a privileged god's eye view of spacetime
locations.
This tells us that it is the assumption of continuity
by the observer that rationalizes the use of counting
metrics, including jumps and changes in metric be-
haviour. If source observability does not reveal dis-
continuities in the assumptions amongst independent
sources, the observer will not be able to discern that
information merely by monitoring.
If we assume the conservation of b as an axiom,
the ordering of b-influence must follow paths auto-
matically, even when the agents make unsynchronized
(asynchronous) promises, like a first order Markov
process. In order to explain conservation and causal
order over non-local regions, we need to extend the
promises to be conditional on non-local neighbouring
patches. Ordering information itself needs to propa-
gate.
observerAA2A3A4X X01X X12X X231I. Causality
The principle of causality can be stated simply
by saying that earlier events are followed by later
events, at a given point of action, as a result of the
transmission of some information that we may call an
influence.
Definition 11 (Causality): A causal graph is a
complete graph of conditional promises. We say that
S causes influences X at R with cause c iff:
+XS c
−−−−−→ R
−XR−−−→ S,
S
R
(53)
(54)
and XS ⊂ XR.
If every transfer of influence in a system obeys
this property, then we can define the system to be
reversible:
J. Traceability (inference)
Lemma 8 (Traceability): If an observer has com-
plete information about promise causality, a process
graph may be called reversible, i.e. for every pair
S
R
+XS c
−−−−−→ R
−XR−−−→ S,
(55)
(56)
provided XS ⊆ XR. We can infer origin by using
complementarity to interpret a reversal of causal trac-
ing: X R = c and c = XS, such that
+X S c
−−−−−→ S
−X R−−−→ R.
(57)
(58)
R
S
If a set of agents An precedes another set An+1
by a promise
An
An+1
+XnXn−1
−−−−−−−→ An+1
−Xn−−−→
An.
(59)
(60)
Traceability requires that O be in the scope of this
chain, and that it assumes reversible semantics for
X, as 'is followed by' (which is automatically inter-
pretable as 'follows').
K. Reversibility (causation)
This may not point out a unique 'root' cause, but
it will point out the causal sets that act as source
(spacelike hypersurfaces) of the process.
Lemma 9 (Reversibility): requires, much stronger:
•
•
A complete chain of prior origin data be
available across the graph.
There should be no acausal
loops in the
process, else there may be branch alternatives
(eigenstates) or divergent unstable behaviour.
Example 6 (Service lookup thunder and lightning):
Consider the order of a process (figure 6) described
in the following promises:
S
−dns−−−→
+dns−−−→
A
+relay(dns)dns
−−−−−−−−→ R
−relay(dns)
−−−−−−→ A
A
S
A
R
(63)
(64)
(65)
(66)
Fig. 6: Causal order may be different from clock time. It is
generated by prerequisite dependencies: either by underlying
topology or by constraint. Agents can only trust directly
agents that they are in scope of (in practice, their direct
neighbours), as they have no calibrated information about
the promises of agents.
Agent A promises to listen for a DNS lookup
(a query, i.e. an invitation to reply). As long as this
promise exists, it can be considered to be polling S
for a response. S promises to provide DNS data, but it
hasn't specified what or when. If there is a fortuitous
match between the two, data will be passed from S
to A. A, in turn, promises R to pass on the data it
receives from A. It does a better job of promising
conditionally, so it will only pass on fresh data from
S when a reply is received, because the promise in
(65) is conditional. R, in turn, promises to accept data,
which can only happen after they arrive. The effect in
each interaction is to order data, but we don't know,
from these promises, how many times data get passed
between A and S, nor do we know how much latency
is experienced by any of the agents.
The conditional promises (dependency) represent
causal ordering. We can't say anything about the rela-
tive order of promise keeping unless it is constrained
in some fashion. Often we rely on incidental or ad hoc
serialization at a single observation point (a queue) to
define the ticks of our process clock. The problem is
that this serialization does not represent an invariant
of the process, so it's unreliable.
An
An−1
+Inv(Xn)Inv(Xn−1)
−−−−−−−−−−−−−→ An−1
An.
−Inv(Xn)
−−−−−−→
(61)
(62)
This holds for any agent (or superagent) An.
The condition for forensic back-tracing of a system
state (detection of cause) is that
L. Metric distances
Order is important, when it can be distinguished
because it allows us
to measure intervals. We
sometimes use intervals as significant measurements,
though Einstein pointed out
intervals are not
invariants, they are only 'covariant', changing with
the system of measures we establish.
that
14
−DNSASR−dns+dns+DNS dnsPrinciple 3 (Distance semantics): Distance is an
assessment made by an observer with two comple-
mentary interpretations: distance suggests what might
lie in between the bounds of the interval, or it suggests
a measure of how similar two agents are, with respect
to location in some criterion 'space'.
The distance between two events Lγ and Lγ+β is
related to the ability of an observer to trace and count
the number of similar events in between. The distance
between events in a journal may contain implicit
information about what happens in between, but it
is not a substitute for the information itself. Metric
distance is therefore a counter that pays just enough
attention to agent properties to discriminate between
them on the basis of label, and be able to count, but not
necessarily enough to classify agents meaningfully. If
events follow on as nearest neighbours this tells us
something; if the same pattern is suddenly interleaved
by more lines this could be an indication of an
anomaly.
A histogram is a classification of multiple events
that get counted and form a distribution. The order of
the classes may (or may not) express a metric policy
about how near or far events are when they fall into
one of the classes. There is no a priori order to these
classes, but there might be a distance. It's therefore
an assessment policy of an observer to ensure proper
classification according to a model presumed by the
observer.
The proliferation of logs in IT systems means that
they get receive disproportionate focus, in the hope of
extracting far more than they are usually capable of
representing. The variety and standard of logging is
very poor indeed, in my view. What happens to order
and distance relationships in logs after aggregation?
There are many tools that imply log aggregation is a
good way to bring together all logs into one location,
but there is little discussion around the significance or
usefulness of the result [40] -- [42].
Aggregation of agents Lγ into superagents {Lγ}
may preserve or discard the order and interval dis-
tances between lines. Sometimes, data are not
in-
tentionally numbered by the sender and order is
assumed by the order to transmission (e.g. in UDP
transmissions). In that case, message packets may
become reordered by network redirection, or loss.
Some messages could be also be lost. Let's refer to
the cases by the common terminology
•
•
Reliable: promises all packets delivered in
order.
Unreliable: ad hoc, no promises about order
or loss.
In either case the latency between transmission and
final arrival is uncertain. Consensus of data is easy,
because the data are point to point and there is only a
single source and a single receiver for each message.
One way of trying to work around the law of
intermediate agents is to build up the notion of en-
tanglement between processes [33]. This takes sev-
eral cycles of mutual interaction between a pair of
15
agents, on some scale, as well as a small cache of
local memory. Entanglement can transform partially
reliable transmission of influence into fully reliable
transmission at the expense of some added sub-cycles
in the interaction.
The aggregation of messages without reference
to the agent and the interior timeline that generated
them implies that causal origins can never be traced
backwards. Timestamps have no value, because they
are unrelated to the process causation. We can thus
show that a log may preserve the reverse tracing of
causal history, but does not imply reversibility of state.
We can trace a story back to where events played
significant roles in the timelines of processes, but
we can't necessarily reconstruct the states of those
processes.
VIII. AGGREGATION OF SOURCE DATA
It's time to look more carefully about what aggre-
gation of data means. In the context of causality [40],
it matters both where and when signals come together,
and to what degree information is lost by mixing.
Distinguishability plays, again, a central role here. For
example, the commonly used metrics of load average,
CPU percentage, memory usage etc. The behaviour of
a process depends on the behaviour of the platform,
which in turn depends on the behaviours of the guest
processes [38]. These are measures of different scales,
since a platform is an aggregation of processes, and
so on.
When unexpected behaviour (signpost behaviour)
is observed in an aggregate variable, the culprit may
not even be in the same process. The relevant question
may seem to be: can we obtain information about
which process may have been responsible? But that is
not the right question, because it could be the accumu-
lation of many processes leading to an exhaustion of
resources which actually impacts the process we are
monitoring -- by undermining its critical dependencies.
When this is the case, we might be more interested
in why scheduling policies resulted in such a conflu-
ence of demand. Obviously, there are many layers of
decision behind such stress concentrations.
The causal connection between these cannot be
inferred with any certainty from quantitative mea-
surement however. One would rather expect to see
a process log fail to allocate memory from within
the privileged context of the process itself. Today, we
wrap processes in containers that are quite opaque.
In fact, processes are equally opaque when viewed
through kernel metrics, because there is unfortunately
little or no causal connection between the changes and
any particular process of interest.
A. Sampling resolution (timescales again)
We need to know when data belong together and
when they should be considered separate. For any col-
lector, this is a policy decision, but it can be informed
by the physics of the system. There is information
in the order, content, and volume of data. If that
information is squandered, it may be unrecoverable.
B. Erosion of metric significance
Experiments show that there is little correlation
between commonly collected quantitative metrics and
actual process semantics [43]. This is a historical
artifact that comes from the fact that observables were
designed for timesharing, not for process monitoring.
Measuring kernel metrics is something analogous to
watching the weather to plan for a crop. In some
cases, a change in a distant place may may trigger
outcomes that result from arbitrary choices in code
elsewhere. For example, if one sets an arbitrary thresh-
old for a value, in a conditional statement, the unusual
process weather originated elsewhere may push the
conditional over the limit unexpectedly and lead to
a discontinuous branch of behaviour. This is why
understanding relativity is so important in reasoning,
and why cloud computing is especially susceptible to
relativistic effects.
Entropy of mixing does not usually increase re-
lentlessly in IT systems, because new information is
being added in the form of semantic labels (boundary
conditions) all the time, e.g. when a particular set of
images is identified as belonging to the same person,
we name the set as the person; or when a sequence of
command instructions leads to the same failure mode,
we name the histories with the name of the failure
mode. This new information adds context.
As data scale, some information is lost, and new
information is added. Aggregating data and integrating
over time, throwing away time information, but build-
ing maps of invariant relationships. The map of what
remains distinguishable grows as more data are added,
because the number of possible storylines grows as
new invariants are added.
Lemma 10 (New data at all scales): Origin data
are lost by coarse graining, but combinatoric selec-
tions of aggregates leads to a new degree of freedom:
distinguishable routes or paths through the composite
variables.
Each story has its own semantics: the loss of event in-
dexing leads to the addition of fewer semantically sta-
ble storylines. Distances that require distinct labelling
become meaningless, but new emergent distinctions
lead to new possibilities for classification. If sufficient
information is retained to point backwards along to
causal signposts, specific paths can be traced without
muddying the global picture.
C. Learning and coarse graining defined
We can track the different scales of a system
by seeking to separate invariants from microscopic
local changes, using the principle of separation of
timescales. Learning over sequences (in a timelike
direction) effectively form Bayesian processes that can
act as aggregate state discriminators [44], [45].
Example 7 (Learning): The collection of data to
train a statistical algorithm may take weeks or months,
and involve large amounts of data that are compressed
into a composite form, irreversibly. The composite ag-
gregate is used as part of an algorithm that recognizes
images on a timescale of seconds. These processes
can be naturally decoupled.
The degree of separation of timescales corresponds
to what we call supervised learning (highly separated
timescales for learning and using) and unsupervised
learning (where timescales for learning and using are
approximately the same).
Even a single unique episode may eventually be-
come viewed as an invariant if it is not repeated and
hence is never challenged, but its significance may be
limited. We can only know this by learning over time.
The significance of concepts grows by the frequency
by which they become repeated. Thus learning and
garbage collection of insignificant concepts is needed
to prevent all the information from becoming noise.
For full episodic reconstruction, the invariant con-
nections that generate process stories need to integrate
with one another, like a linked list, using the a map
of invariant concepts as glue. The invariants represent
the aspects of processes that are not specific to a
single source. See the earlier work on characterizing
spacetime semantics [20] -- [23], based on earlier ex-
periments [46].
All causality is a representation of Shannon's basic
model of an information channel. The distinguisha-
bility of information is the key to following and
tracing processes, but where does the significance
of information lie? The significance of information
(associated with labels to it) is necessarily diluted by
scale, or the entropy of signal aggregation.
D. The Mashed Potato Theorem
Mixing of signals leads to loss of traceability.
Suppose you are at a restaurant and you receive some
mashed vegetables. You first assume that it's potato,
because that is common, but something doesn't taste
quite right. There are some other vegetables mixed in.
Closer inspection reveals some orangy colour (perhaps
carrots, or sweet potato, etc). How could you know
what was in the potato without accurate knowledge
from the source?
The loss of distinguishability (entropy of mixing)
tells us that we can't easily discern the content of
mashed potato without the recipe because we cannot
separate (classify) the parts of the signal.
Theorem 3 (Loss of distinguishability): Let Σ be
an alphabet of class categories that are distinguishable
by a set of source agents Si. Data aggregated from Si
without complete causal labelling σ ∈ Σ, from the
source cannot be separated into its original categories
Cσ with certainty, i.e. the promise
+Cσdata∩
−−−−−−→ A?
πcateg : R
(67)
is kept with equal probability for all Cσ.
To see this, we note that
the aggregation of data
16
involves promises:
=
+dataS−−−−→ R
−dataR−−−−→ S
dataS ∩ dataR.
πdata : S
πlisten : R
data∩
(68)
(69)
(70)
and we take data to be a collection of line signals
data ∼ {Lγ}. In order for the conditional promise
(67) to be causal, the promise of data in (68) have
to be a reversible function of the Cσ. But if data are
indistinguishable, then the Cσ must also be indistin-
guishable, thus
Cσ = Cτ ,
(71)
thus, the probability of discerning a signal Cσ, pσ ≡
P (Cσ) = pσ, and the entropy
∀σ, τ
pσ log pσ → max(Sent).
(72)
Sent = −(cid:88)
σ
If one rescales all the Cσ = Cτ into a single category
to indicate that all such categories are the same,
then the entropy is zero, Sent = 0, indicating that
the information per transmission, in the mixture, is
actually trivial. Thus, we must keep all labels from dif-
ferent sources and classifiers in order to retain useful
information. This does not depend on the amount of
data (or mashed potato). Moreover, if data are passed
on, the dependence of a reconstruction by (machine)
learning is unstable to the datasets10. The definition
of entropy in computer processes has been examined
recently to address its semantics [48].
E. Separation of concerns
The practical question remains: how should one
separate variant and invariant data when designing
systems? This depends partly on the structure of
intent and observations. Programmers are trained to
recognize what values are variable and abstract them
into parameters to invariant functions.
If we think about how we formulate stories, as hu-
mans, we embed variable fragments of causal history
(episodes) into larger assemblies of more invariant
concepts, which provide context for reasoning. This
is how experiences are organized around conceptual
models. I'll come back to this in section X on model
extraction.
Example 8 (Logging text compression): As
a
simple example, consider the generation of a log
message from a typical format string in code:
•
•
A separate format string is an invariant class
of messages. It can be replaced by a single
numerical value and looked up in a hash table
to compress data.
Standard data format can record format string
and variables in an indexed structure with
named members.
• Message significance level or priority (policy)
- imposed + or -?
10I won't consider this here, but see the signals lemma in [47].
17
•
Variable Substitutions in the format string are
variants with respect to the message. Some
of these may be invariants too (the name of
a host or function), while other data have no
long term significance (the time or date).
If we compare these points to a Unix syslog message,
the glog library, and many more examples, it's clear
that syslog satisfies none of these promises. Lines of
text are basically random.
F. Retaining semantic context for events
Concepts are the result of dimensional reduction
over contextual learning sets Ci from a number of
sources Si [22]. In invariant cases, the context can be
learnt by accumulation of evidence over time, because
it doesn't change. In general, significance may be
assessed based on a number of contextual sets Ci,
so when an alert message M is reported to an agent
R, this is in fact a conditional promise that depends
on the context:
+MC1,...,Cσ ∀i
−−−−−−−−−−−→ R
S
(73)
This means, by the conditional promise law, that the
promises supplying this context to S:
S
Ai
S
+Ci−−−→ S
−Ci−−−→ Ai,
−Ci−−−→ R,
(74)
(75)
(76)
are not available to R. The context is lost. This means
R has to trust the alert and its significance as a random
variable. This is no problem if the goal is to bring an
unrecognized condition to the attention of an operator.
However,
is to perform contextualized
reasoning on an aggregate scale, the graph of invariant
context also needs to be promised:
+Ci−−−→ R
−Ci−−−→ Ai,
(77)
(78)
and the conditional dependencies also need to be
captured:
if the goal
Ai
R
−(MCi, ∀i)
−−−−−−−−→ S
R
(79)
If we didn't apply this idempotently only to sparsely
occurring invariant concepts, the cost of the aggre-
gation would rise sharply. An expedient separation of
scales allows the context to be contained at the sources
as 'smart sensors' [22], [23].
Context can be framed and localized using names-
paces. Namespaces also provide unifying labels that
can usually be treated as invariants in information sys-
tems. Aggregation of messages, without cataloging,
indexing, or other labelling leads to ensemble entropy:
the irreversible loss of structural
information and
contextual semantics.
Transporting too much context is a questionable
idea. If the environment in which context originates
is lost, then the meaning of the context is also lost,
and the ability to reconstruct scenarios based on it
•
•
•
Same text (signal) as the same interpretation.
Information is encapsulated as transactions to
show partial order.
Every significant transaction needs to point to
its previous significant event.
These principles have been embodied in a proof of
concept implementation [49].
B. Dropping hints
To record useful events, from within the mean-
ingful context of a process, processes need an API
that constrains authors to produce information that
can be consumed later. For example, in the Koalja
history package, based on the principles in this paper,
significant events can be marked with signposts [49].
H.SignPost(&ctx,"Milestone 1...")
H.SignPost(&ctx,"Milestone 2...")
...
H.SignPost(&ctx,"Commence testing")
And these signposts can be detailed, using the four
spacetime semantic relations from [22], [23]:
H.SignPost(&ctx,"code signpost X").
Intent("open file X").
ReliesOn(H.NR("/etc/passed","file")).
FailedBecause("xxx").
PartOf(H.NR("main","coroutine"))
We shall explain this point further in a sequel [47].
X. MODEL EXTRACTION
If we pursue a concrete strategy of separating
timescales and extracting invariants from the chaff
of noisy variation, we can expect to infer causal and
conceptual relationships over long aggregate times by
learning. Learning is a process that happens across
several timescales, as noted in [22]. In modern Ma-
chine Learning parlance, we would say that acquiring
and stabilizing training data is a long term process,
while recognition and classification is a short term
process. Monitoring tries to achieve both processes as
an unsupervised in band single-scale process, so it has
to deal with the instabilities in band too.
The spacetime model in [22], [23] allows us to
define a partial ordering of semantics, represented as
agents in a virtual knowledge space. The future and
past cones are generated by the first two spacetime
semantic relations: for generalization or scope and
causal order. Ordered relationships are the most im-
portant ones because they tell the stories we seek.
Data may arrive in incidental order, for a variety of
reason that involve causal mixing. We need to extract
the intended order of system cooperation from the
incidental or unintended order of side channels that
muddle behaviour.
Fig. 7: As data get propagated farther from their initial con-
text, their original meaning is degraded, unless all context is
transported with them. Each of the rings may represent an
intermediate agent that may or may only promise to forward
data selectively or after distortion.
becomes of largely forensic interest. System designers
need to find expedient ways to compress context and
filter it: what can remain local at the source, and what
can be aggregated and assigned wider meaning? Thus
is remains a policy decision to balance the cost of
preservation against the actionable usefulness of doing
so.
IX. HISTORIES: LOGS AND JOURNALS
Now aware of the issues around sequentialism and
observability in distributed systems, we can tackle
the first two story types in section III-B. Logging of
process conditions may well be the most popular and
common approach to tracing in computer programs.
Isolated single-agent logs are simple serial queues,
or time-series databases, of varying degrees of so-
phistication, for keeping informative messages about
what transpires in a process. This is no longer true
for log aggregation unless complete causal linkage is
preserved.
A. Causal linkage
In most shared logging services, messages are
imposed by multiple process agents Si onto a queue
and are strongly ordered by a single receiver R.
Si
+L
R.
R accepts requests indiscriminately
−L−−→ Si.
R
(80)
(81)
Individual processes can voluntarily write their own
logs but this is not a common practice because the end
goal of logging, in modern practice, is to aggregate all
messages as 'big data' to be trawled.
Modern logging services,
like Prometheus etc,
provide more nuanced semantics with structured data
formats that can incorporate key-values; but
these
trust data to be useful. They are abused greatly by
programmers, who tend to dump any and all data into
a stream without regard for meaning or consequence,
in the hope of sorting it all out later. Logs need to
promise invariant causation:
18
ContextUsageNew process timeline for ( myApp_name21.2.3 ) originally started as pid 17778
code signpost X
Beginning of test code
[dns lookup: 123.456.789.123]
[btw: example code]
[remarked: : look up a name]
[btw: xxx]
[coroutine: main]
MainLoop start
[function: main]
[intent: : open file X]
[file: /etc/passed]
[remarked: : Start process]
[go package: cellibrium]
root --> NOW,delta
Comment indented by subtime
Unix clock context
------------------------------------------------------------------------------------------
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:04 +0200 CEST
2019-06-03 13:40:07 +0200 CEST
2019-06-03 13:40:10 +0200 CEST
2019-06-03 13:40:13 +0200 CEST
2019-06-03 13:40:16 +0200 CEST
2019-06-03 13:40:19 +0200 CEST
2019-06-03 13:40:19 +0200 CEST
0 -->
->
1 -->
->
->
->
->
2 -->
->
->
->
->
->
3 -->
3 go>
->
->
->
->
->
->
->
3 go>
->
->
6 -->
->
7 -->
->
6 go>
->
->
->
->
->
6 go>
10 -->
1,1
1,2
2,1
2,2
2,3
2,4
2,5
3,1
3,2
3,3
3,4
3,5
3,6
4,1
5,1
4,2
5,2
5,3
5,4
5,3
5,4
4,3
6,1
6,2
6,3
7,1
7,2
8,1
8,2
9,1
9,2
9,3
9,3
9,3
9,3
10,1
11,1
The end!
Show the signposts
Run ps command
TEST1---------
[btw: Commence testing]
End of sideline concept test
[btw: Commence testing]
Starting Kubernetes deployment
[btw: Commence testing]
[remarked: : file read failed]
[remarked: : Finished ps command]
Commence testing
[remarked: : Starting kubernetes pod]
[remarked: : File drop in pipeline]
[remarked: : Querying data model]
[remarked: : Submit transformation result]
[btw: /bin/ps -eo user,pcpu,pmem,vsz,stime,etime,time,args]
[btw: Testing suite 1]
[intent: : read whole file of data]
[file: file://URI]
[system error message: open file://URI: no such file or directory]
[remarked: : Possibly anomalous CPU spike for this virtual CPU]
[anomalous CPU spike: CPU 22117.000000 > average 22115.000000]
A sideline to test some raw concept mapping
Fig. 8: An expanded view of a compressed local checkpoint log for a process. The first column is system clock timestamp
which provides approximate time of day context for relating events to human scales. The next fields use interior monotonic
counters that increment on SignPost events, even through concurrent coroutines. Each event points back to the preceding
event, to give actual causal history. Explanations of the event semantics are shown on the right.
A. Invariant sequences form explanations
In order to generate a map of invariants, we need
to not only identify them, but consider what they can
promise about one another, so that we may position
them in relative terms. In [22], it was shown that we
can plausibly define four kinds of semantic relation-
ship based on elementary spacetime considerations.
These ought to apply between pairs of agents in any
distributed system.
on the other hand, is a promise of belonging to a
common class. These two promises therefore represent
assembly versus classification of agents.
The extent to which we have the ability to localize
a causal influence is the essence of 'root cause' anal-
ysis: the ability to contain the process within a virtual
boundary which itself can make promises on a new
level. This is part of the motivation for virtualization
and containerization.
•
•
•
•
i) Contains: localization in spacetime (scope
of containment or ordering by scale)
ii) Follows: order, causation (Markov pro-
cesses or order by influence)
iii) Expresses:
tribute at any scale)
iv) Near to: measure, distance (assessment of
distance at any scale)
local distinction (scalar at-
Notice that order is distinct from distance, i.e. di-
rection and proximity are different concepts. These
concepts are not clearly distinguished in a vector
space.
Agents may promises exemplifiers, symbolic and
metric discriminators, or regional classifiers.
The relationship between a discriminator iii) and
a classifier iv) is subtle, and is easy to promise incon-
sistently. The essence of expressing an attribute is to
label the type, which can be combined with something
else to form a union of different promises (a kind
of semantic chemistry). A promise of containment,
19
B. Promising semantic maps
The four spacetime semantic relationships, de-
scribed in [22], [23] may be assigned between pairs of
concepts, originating by signal (+) or by inference (-),
entirely at the behest of an observer, and according to
the following 'selection rules':
1)
Distinguishability: Descriptive properties
that distinguish, describe, and embellish the
name of a concept are EXPRESS promise
types. These are scalar promises used to ex-
plain attributes that may form compositions
of attributes for aggregate 'hub concepts'.
For example: a banana may express the
colour yellow, ripeness, and sweetness. It
does not express fruit or Del Monte.
2) Generalization: membership in classes and
informal categories use the CONTAINS
promise type. These express subordination
to one or more umbrella concepts, and su-
perordination to instances and exemplars of
the named concept. Generalization is strictly
transitive.
ships between concepts, these assessments
may form the basis for a shared local co-
ordinate system.
The semantics of these relationships are not au-
tomatically orthogonal to one another, so we have to
maintain the incompatibility of the types by assign-
ment. The local promises are mutually incompatible,
which is to say the no two agents may promise more
than one of the three types CONTAINS, FOLLOWS,
EXPRESSES (or their inverses11.
•
•
•
EXPRESSES
CONTAINS.
CONTAINS
FOLLOWS.
FOLLOWS
EXPRESSES.
is
incompatible
with
is
is
incompatible
with
incompatible
with
The semantics are easily illustrated with an example.
The concepts blue and yellow are expressed by objects
that combine them as part of their identity: e.g. a
blue and yellow pattern, like the Swedish national
flag, and green paint may be composed of blue and
yellow paint, but neither the Swedish flag nor green
are generalizations of blue and yellow. The concept
of colour, on the other hand does not express blue or
yellow, but generalizes them as members.
The promise of proximity is slightly different:
•
NEAR is potentially compatible with any of
the above, since it is an informal assessment
of non-locality.
The assessment of proximity between agents
may seem to imply something about the or-
thogonal semantics above, but this is ambigu-
ous (see figure 12). For example, because
proximity is a type of relationship, not a
standardized metric constraint, relations may
vary in their interpretation:
A EXPRESSES 'close to B'
A EXPRESSES 'close to C'
(82)
(83)
'close to B' FOLLOWS 'close to C' (84)
Together these might suggest that A, B, C all
lie in a certain region and that there must
therefore be a category (dotted line in figure
12) that generalizes all of them. That kind of
inference is dangerous, because it is based on
coarse inference,
These selection rules can be applied in order to join
similar objects into hubs. Each observed instance
maps to a hub that can be broken down into atomic
concepts by expression. Containment promises are
generally learned on a much longer timescale (e.g.
11We must be cautious and pay attention to the Promise Theory
principle that just because one agent promises to contain another or
be followed by another, it does not imply that the agent concerned
agrees with this, and may not promise it. For example, firewalls
may create a one-way glass effect that prevents the inverse from
being implemented)
20
Fig. 9: The four kinds of promise that spacetime can
express: i) containment, ii) succession, iii) local attributes,
and iv) proximity. Although we can distinguish different
sub-types of these four, it's hypothesize that the four are
necessary and sufficient for describing observable phenom-
ena.
3)
4)
i.e.
follow-up concepts
Generalization is not as in taxonomy: a con-
cept may have any number of generaliza-
tions,
there is no unique typology to
concepts. The utility of recognition lies in
the overlapping nature of classes [50].
For example, a banana is generalized by fruit
and desserts, and has instances such as Del
Monte. It does not express these as attributes.
Dependency: promises of dependency --
prerequisite or
are
FOLLOWS type promises. They may link
concepts of any type into some meaningful
order, by any interpretation of the observer.
For example,
the beginning precedes the
end. "One" precedes "two" which precedes
"three", etc. Dependency is usually transi-
tive, but may contain loops (in feedback
cycles).
Similarity: the degree of similarity between
two concepts is an assessment that may be
promised by any observer,
to represent a
degree of similarity or closeness. This is
represented by promises of type NEAR. This
is an ad hoc assessment and should not be
taken too seriously.
In the case where several agents form an
agreement about the metric distance relation-
i)iv)iii)ii)<begin NON-LOCAL CAUSE>
(program start) --b(precedes)--> "MainLoop start"
(MainLoop start) --b(precedes)--> "Beginning of test code"
(Beginning of test code) --b(precedes)--> "code signpost X"
(code signpost X) --b(precedes)--> "Run ps command"
(code signpost X) --b(precedes)--> "TEST1---------"
(code signpost X) --b(precedes)--> "Commence testing"
(Commence testing) --b(precedes)--> "The end!"
(Commence testing) --b(precedes)--> "[remarked: : Possibly anomalous CPU spike for this CPU]"
(Commence testing) --b(precedes)--> "A sideline to test some raw concept mapping"
(Commence testing) --b(precedes)--> "Starting Kubernetes deployment"
(Commence testing) --b(precedes)--> "The end!"
(Commence testing) --b(precedes)--> "[remarked: : Possibly anomalous CPU spike for this CPU]"
(Commence testing) --b(precedes)--> "A sideline to test some raw concept mapping"
(Commence testing) --b(precedes)--> "Starting Kubernetes deployment"
(The end!) --b(precedes)--> "Show the signposts"
(A sideline to test some raw concept mapping) --b(precedes)--> "End of sideline concept test"
(The end!) --b(precedes)--> "Show the signposts"
(A sideline to test some raw concept mapping) --b(precedes)--> "End of sideline concept test"
(code signpost X) --b(may determine)--> "[dns lookup: 123.456.789.123]"
(TEST1---------) --b(may determine)--> "[file: file://URI]"
(TEST1---------) --b(may determine)--> "[file: file://URI]"
<end NON-LOCAL CAUSE>
Fig. 10: An excerpt of a map of invariants, generated by a search. Invariants are accumulated from distributed and concurrent
processes and their relationships are classified by the four spacetime types. The pathways through these relationships tell
different kinds of stories. The excerpt shown involves expansive reasoning: combining generalization and causality.
Fig. 11: The propagation cones indicate the past and future
as 'timelike' trajectories generated by the causal relation-
ship, and semantic scale or scope of meaning accumulated
in 'spacelike' directions around the average time axis in
rings of increasing generalization.
added by human expertise), and causal dependency
promises are added by processes that generate them
or observe them.
C. Storytelling from spacetime semantics
Once constructed,
the graph may be parsed to
generate stories, or automated reasoning. A reason-
ing process may be viewed as an expansive search
along alternating (+) axes (causal outcomes that are
related by generalization or exemplification by specific
instance), and tempered by elimination by relevance
criteria (-).
•
Starting from a topic of interest, we follow
promises of type FOLLOWS independently
in the forward and backward directions, to
explore the causal cone (figure 13).
21
Fig. 12: The assessment of proximity between agents may
seem to imply something about the orthogonal semantics
above, but this is ambiguous.
•
Arriving at each new concept, we follow
promises to generalize and specialize the con-
cept to find all links arising from the col-
lective generalized concept, and follow these
along different story paths. In other words,
we multiply the number of stories by concep-
tual associations that imply examples of the
same idea -- expanding the scope of meaning
without going off the rails.
Such promised relationships cannot be easily found
by in band machine learning techniques: this is an
orthogonal and complementary method, but learning
may form the basis for collapsing experience into an
arrangement of similar concepts on longer timescales
(see figure 13).
The algorithmic rules for parsing stories from the
concept graph come in several forms. A conceptual
reasoning search might be bounded at the start (re-
tarded), at the end (advanced) or at both ends (causal).
The first two are a form of brainstorming that ends
with a single concept: 'tell me all about X'. The latter
scopePast (retarded)Future (advanced)causalitycase asks for a specific explanation of 'Y given X'.
There is no unique path for any search, in general.
The paths most frequently trodden, i.e. have the most
frequently observed transitions, or most frequently
searched for concepts, become 'classical paths' and
may be favoured, someone analogous to a PageRank
search [51], [52].
Loops in causal relationships may be significant,
so we should detect them. Some loops may be errors
of identification, others may be cyclic reasoning (e.g.
self-consistent ideas, like eigenvalue problems).
Fig. 13: The scope of knowledge about spacelike informa-
tion is accumulated as memory from past events propagated
into a model of the present.
XI. MODELS, SHARDING, IDEMPOTENCE, AND
FORGETTING
From sampling of data at the edge of a network,
to actionable insight, there is a chain of reasoning to
monitoring that starts with observability and ends with
the deletion of irrelevant and antiquated data:
Data collection,
Stability or convergence to fixed points,
1)
2)
3) Model extraction,
4)
5)
Classification into buckets,
Controlled forgetting.
Each of these steps plays an important role. Data
collection provides the basic observability to trace sys-
tems at different scales and tell stories about them that
bring valued insights. The convergence of phenomena
to fixed points is an incredibly important principle in
dynamics, but one that receives too little attention12.
When systems fly all over the place, they are not
telling us anything significant. It's only when they
converge onto repeated patterns or stable attractors
that we can build on them as part of a reliable. Models
need to expose those differences. Today, there is a fas-
cination with using machine learning to try to expose
such fixed points, but the technique is only possible if
there is sufficient stability. When monitoring reaches
a level of maturity in IT, we will place as much value
in attending to semantics as we do in recording noise
12This is a principle that I have reiterated many times since
CFEngine [53] to stabilize and guide us towards invariant meaning.
22
today. Data that have the same semantics need not be
recorded twice. Once one has identified the invariants
of a system, these can be made idempotent. Model
identification classifies inputs into discrete alphabets.
Repeated symbols can be compressed, and if they are
repeated no harm need be done if they have fixed point
semantics.
For example, it is not a problem if we accidentally
collect the same data twice as long as they map to the
same place. Storing the same data twice is idempotent
unless we are counting frequencies. Frequency count-
ing can be made idempotent by labelling intervals.
The general principle is that we should engineer data
sources to permit convergence. Promise Theory re-
veals the mutual responsibility for information transfer
between sender and receiver.
Principle 4 (Convergent data): The safest way to
avoid data inconsistency is to design messages in such
a way that repeated messages always map to the same
location and update them without breaking a promise.
Fixed points lead to stable models, which lead
to efficient
indexing of knowledge. This helps in
scaling storage (e.g.
in sharding), and it helps in
fault tolerance. When data are recorded around proper
index points, it doesn't matter if data get delivered
multiple times (idempotence) or even out of order:
everything will find its proper place in the end. Model
extraction tells us how to compress the data into an
alphabet or catalogue of meaningful and significant
ideas, and therefore separate into buckets or shards.
Finally, perhaps the most important issue of all is
how to forget what is no longer of value. Keeping
data and even models around forever is a senseless
squandering of resources and an irresponsible and
unsustainable use of technology. One wonders how
many of the photos now being eagerly accumulated
in the cloud will be preserved in ten years' time. The
same is true of monitoring data that were collected last
week. If we don't understand the timescales, context,
and relevance of data,
then we have no business
collecting it, because it cannot tell us anything of
value. A policy for forgetting can usually be built into
a definition of context from the start, e.g. through finite
windows and sliding sets, running averages, and so on
[54].
Example 9 (Model based collection): In
CFEngine, weekly data were mapped idempotently
to a finite number of buckets marked by 5 minute
intervals
throughout a week, based on a prior
measurement survey using autocorrelations. After a
weekly period, the buckets would wrap around, like
a clockface and data would update the corresponding
image in the map. This approach was able to
promise a limited stability of expectations, as well
as automated forgetting (constant weight gradient
of
temporal history), and thus effective garbage
collection
What's remarkable is how few of these issues
actually get any attention in the literature. One hears
arguments like 'its cheap to keep all data forever' --
which smacks of the sudden realization of global
scopePast (retarded)Future (advanced)causalitywarming or the plastic crisis. Every time we advocate
increasing something, we need to think about
the
balancing garbage collection process.
XII. SUMMARY AND CONCLUSIONS
The collection of accurate data is not in question.
Today, there is increasing interest capturing 'digital
twin' representations of agents in the real world,
with every detail available for possible inspection. No
one could resist the idea of such knowledge, unless
it invades their privacy. The question in technology
monitoring is rather whether every detail should be
centralized and whether data can be compressed with-
out loss.
In this summary of what can be observed about
distributed systems, we see that tracing events back
to 'root cause' is an ill-defined problem, but tracing
back a significant likely cause is indeed possible with
careful labelling (especially of time). This kind of
labelling is not commonly provided in current tooling.
Assuming access to data, we might hypothesize that
a complete monitoring system would promise to:
•
•
•
•
•
•
Separate timescales.
Identify the alphabet of system invariants
Capture local histories of instances, in the
context in which they happen.
Identify significant events at different scales
and measure their invariance.
Tools for reconstructing and backtracing of
histories from local data.
Tools for generating semantic past-future
cones for causal reasoning.
Today, many IT monitoring systems transmit raw data
in large quantities to a central point for analysis,
without attempting to alphabetize the data before
transmission. In effect, by ignoring the existence of a
model (summarized by an alphabet of non-overlapping
signals) one is repeatedly sending the same model over
the network again and again, wastefully, and to no
gain. If we can classify observations at their source,
and condense them into an alphabet of signals, a vast
data compression can be accomplished for both faster
recognition and potentially greater semantic content.
That will be the subject for a sequel [47].
It should be clear that nothing about the ability
to trace systems enables full reversibility of state,
which should be considered difficult to impossible,
depending on scale [24] -- so ultimately monitoring
may be of little value. More value could be captured
by building intrinsic stability into systems in the first
place.
The elephant in the monitoring system is an essen-
tial attitude in the industry concerning the purpose of
monitoring. Systems are only sustainable, knowable,
and predictable when they seek stability -- not when
they labour under the burden of intrusive inspection.
For a lot of practitioners there is a conflict of interest
here. If we seek to measure all that is random or
unstable, by oversampling and consuming resources
wastefully, it will be neither stable nor sustainable.
Consensus protocols, for instance, promise semantic
stability, and are popular (if somewhat over-used)
in software engineering13. They draw attention to a
preoccupation with semantics in software engineering,
i.e. a desire for stable qualitative outcomes, at the ex-
pense of quantitative delay. Software engineers seem
not to trust concepts like intrinsic dynamical stability
i.e. systems that promise to converge to predictable
quantitative outcomes. Monitoring tends to treat all
software as adversarial, and we put more faith in ill-
designed monitoring than in an initial software design.
This is a paradox that will
inevitably lead to big
surprises and catastrophic events.
By focusing on essentials, there are many issues
I've not had time to mention in this paper. I hope to
return to some of these in future work.
Acknowledgements: I am especially grateful to
William Louth for discussions. I'd also like to thank
Nicolas Charles, Simon Lucy, Colm MacC´arthaigh,
and Adrian Cockcroft for helpful comments and ref-
erences.
REFERENCES
[1] P. Hoogenboom and J. Lepreau. Computer system perfor-
mance problem detection using time series models. Pro-
ceedings of the USENIX Technical Conference, (USENIX
Association: Berkeley, CA), page 15, 1993.
[2] C Hogan. Metrics for management. Proceedings of the Ninth
Systems Administration Conference (LISA IX) (USENIX As-
sociation: Berkeley, CA, page 125, 1995.
J.L. Hellerstein. An approach to selecting metrics for
detecting performance problems in information systems. Per-
formance Evaluation Review, 24:266, 1996.
[3]
[4] A. Gonzalez Prieto and R. Stadler. Adaptive distributed
ACM SIGCOMM
monitoring with accuracy objectives.
workshop on Internet Network Management (INM 06), Pisa,
Italy, 2006.
[5] R. Sekar, T. Bowen, and M. Segal. On preventing intru-
sions by process behaviour monitoring. Proceedings of the
workshop on intrusion detection and network monitoring,
USENIX, 1999.
[6] D. Dasgupta and S. Forest. An anomaly detection algorithm
inspired by the immune system. Artifical immune systems
and their applications, page 262, 1998.
[7] The open tracing initiative. opentracing.io, 2017.
[8] W. Louth. ObservabilityŁŁtraces and trees. Medium article
(@autoletics), 2019.
[9] W. Louth. ObservabilityŁŁtraces and tags. Medium article
(@autoletics), 2019.
[10] M.I. Seltzer and C. Small. Self-monitoring and self-adapting
operating systems. Proceedings of the Sixth workshop on
Hot Topics in Operating Systems,Cape Cod, Massachusetts,
USA. IEEE Computer Society Press, 1997.
J. Cradley Chen, Y. Endo, D. Mazieres, A. Dias, M. Seltzer,
and M.D. Smith. The measured performance of personal
computer operating systems. ACM transactions on computing
systems and Proceedings of the 15th ACM symposium on
Operating System Principles, 1995.
[11]
13The question of whether to invest in promising an expensive
and late consensus over a coarse grain of space, or whether to
expose its divergences as a feature remains a policy choice -- one
that currently aligns with opposite poles of Dev and Ops.
23
[12] P. A. Porras and P. G. Neumann. EMERALD: Event mon-
itoring enabling responses to anomalous live disturbances.
In Proc. 20th NIST-NCSC National Information Systems
Security Conference, pages 353 -- 365, 1997.
[13] H. Abdu, H. Lutfiya, and M. Bauer. A model for adaptive
monitoring configurations. Proceedings of the VI IFIP/IEEE
IM conference on network management, page 371, 1999.
[14] A. Balliu, D. Olivetti, O. Babaoglu, M. Marzolla,
A. Sirbu.
A big data analyzer
arXiv:1509.00773v1 [cs.DC], 2015.
, and
large trace logs.
for
[15] Paul Barford and Mark Crovella. Generating representative
web workloads for network and server performance evalua-
tion. In SIGMETRICS '98/PERFORMANCE '98: Proceed-
ings of the 1998 ACM SIGMETRICS joint international con-
ference on Measurement and modeling of computer systems,
pages 151 -- 160, New York, NY, USA, 1998. ACM Press.
[16] Leslie Lamport.
Paxos Made Simple.
32(4):51 -- 58, December 2001.
SIGACT News,
[17] Diego Ongaro and John Ousterhout.
In search of an un-
In Proceedings of the
derstandable consensus algorithm.
2014 USENIX Conference on USENIX Annual Technical
Conference, USENIX ATC'14, pages 305 -- 320, Berkeley,
CA, USA, 2014. USENIX Association.
J.A. Bergstra and M. Burgess. Promise Theory: Principles
and Applications. χtAxis Press, 2014.
[18]
[19] Mark Burgess. An approach to understanding policy based
on autonomy and voluntary cooperation. In IFIP/IEEE 16th
international workshop on distributed systems operations and
management (DSOM), in LNCS 3775, pages 97 -- 108, 2005.
[20] M. Burgess. Spacetimes with semantics (i).
http://arxiv.org/abs/1411.5563, 2014.
[21] M. Burgess. Spacetimes with semantics (ii).
http://arxiv.org/abs/1505.01716, 2015.
[22] M. Burgess. Spacetimes with semantics (iii).
http://arxiv.org/abs/1608.02193, 2016.
[23] M. Burgess. A spacetime approach to generalized cognitive
reasoning in multi-scale learning.
https://arxiv.org/abs/1702.04638, 2017.
[24] M. Burgess and A. Couch. On system rollback and totalized
J. Log.
fields: An algebraic approach to system change.
Algebr. Program., 80(8):427 -- 443, 2011.
[25] C.E. Shannon and W. Weaver. The mathematical theory of
communication. University of Illinois Press, Urbana, 1949.
[26] T.M. Cover and J.A. Thomas. Elements of Information
Theory. (J.Wiley & Sons., New York), 1991.
[27] Leonard Kleinrock. Queueing Systems: Computer Applica-
tions, volume 2. John Wiley & Sons, Inc., 1976.
[28] R. Badonnel and M. Burgess. Service load balancing with
autonomic servers: Reversing the decision making process.
In Resilient Networks and Services, Second International
Conference on Autonomous Infrastructure, Management and
Security, AIMS 2008, Bremen, Germany, July 1-3, 2008,
Proceedings, pages 92 -- 104, 2008.
J. Bon´er, D. Farley, R. Kuhn, and M. Thompson. The reactive
manifesto. https://www.reactivemanifesto.org/.
[29]
[30] W.R. Ashby. Design for a brain. J. Wiley & Sons, 1952.
[31] W.R. Ashby. An introduction to cybernetics.
J. Wiley &
Sons, 1956.
[32] Leslie Lamport. Time, clocks, and the ordering of events in
a distributed system. Commun. ACM, 21(7):558 -- 565, July
1978.
[33] P. Borrill, M. Burgess, A. Karp, and A. Kasuya. Spacetime-
entangled networks (i) relativity and observability of stepwise
consensus. arXiv:1807.08549 [cs.DC], 2018.
[34] M. Burgess. A Treatise on Systems: Volume 2: Intentional
systems with faults, errors, and flaws. in progress, 2004-.
[35] M.J. Fischer, N.A. Lynch, and M.S. Paterson. Impossibility
of distributed consensus with one faulty process. J. ACM,
32(2):374 -- 382, April 1985.
[36] M. Burgess.
In Search of Certainty: the science of our
information infrastructure. Xtaxis Press, 2013.
[37] White paper. The new rules of sampling. Technical report,
Honeycomb.com, 2019.
[38] A. Cockcroft. Utilization is virtually useless as a metric! In
Proceedings of Int. CMG Conference, pages 557 -- 562, 2006.
[39] M. Burgess. Smart Spacetime. χtAxis Press, 2019.
[40] M. Dam and R. Stadler. A generic protocol for network state
aggregation. RVK 05, Linkping, Sweden, June 14-16, 2005.
[41] M. Burgess and M. Disney. Understanding scalability in
In Lec-
network aggregation with continuous monitoring.
ture Notes on Computer Science, Proc. 18th IFIP/IEEE
Distributed Systems: Operations and Management (DSOM
2007), volume (submitted). Springer, 2007.
[42] F. Wuhib, M. Dam, R. Stadler, and A. Clemm. Robust
monitoring of network-wide aggregates through gossiping.
In 10th IFIP/IEEE International Symposium on Integrated
Management (IM 2007), 2007.
[44]
[43] M. Burgess, H. Haugerud, T. Reitan, and S. Straumsnes.
Measuring host normality. ACM Transactions on Computing
Systems, 20:125 -- 160, 2001.
J. Pearl. Probabilistic Reasoning in Intelligent Systems:
Networks of Plausible Inference. Morgen Kaufmann, San
Francisco, 1988.
J. Pearl. Causality. Cambridge University Press, Cambridge,
2000.
[45]
[46] A. Couch and M. Burgess. Compass and direction in topic
maps. (Oslo University College preprint), 2009.
[47] M. Burgess and W. Louth. Preserving the significance of
distributed observations. unpublished, 2019.
[48] H. Zenil, N.A. Kiani, and J. Tegn´er. The thermodynamics
of network coding and an algorithmic refinement of the
principle of maximum entropy. Entropy, 21(560), 2019.
[49] Aljabr
Inc.
Koalja
history
package.
https://github.com/AljabrIO/ koalja-operator/tree/master/pkg/history.
[50] M. Burgess. A tiny overview of cfengine: convergent main-
tenance agent. In Proceedings of the 1st International Work-
shop on Multi-Agent and Robotic Systems, MARS/ICINCO,
2005.
[51] L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank
citation ranking: Bringing order to the web. Technical report,
Stanford University, Stanford, CA, 1998.
J. Bjelland, M. Burgess, G. Canright, and K. Eng-Monsen.
Eigenvectors of directed graphs and importance scores:
dominance, t-rank, and sink remedies. Data Mining and
Knowledge Discovery, 20(1):98 -- 151, 2010.
[52]
[53] M. Burgess. A site configuration engine. Computing systems
(MIT Press: Cambridge MA), 8:309, 1995.
[54] M. Burgess.
Two dimensional
time-series for anomaly
detection and regulation in adaptive systems. Lecture Notes
in Computer Science, IFIP/IEEE 13th International Work-
shop on Distributed Systems: Operations and Management
(DSOM 2002), 2506:169, 2002.
24
|
0904.3669 | 1 | 0904 | 2009-04-23T11:54:55 | Collaborative systems and multiagent systems | [
"cs.MA"
] | This paper presents some basic elements regarding the domain of the collaborative systems, a domain of maximum actuality and also the multiagent systems, developed as a result of a sound study on the one-agent systems. | cs.MA | cs | (cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:7)(cid:1)(cid:8)(cid:6)(cid:9)(cid:10)(cid:4)(cid:1)(cid:11)(cid:3)(cid:12)(cid:13)(cid:9)(cid:14)(cid:4)(cid:15)(cid:10)(cid:16)(cid:17)(cid:7)(cid:1)(cid:18)(cid:13)(cid:5)(cid:7)(cid:1)(cid:11)(cid:18)(cid:1)(cid:12)(cid:4)(cid:19)(cid:16)(cid:7)(cid:1)(cid:11)(cid:1)(cid:20)(cid:1)(cid:21)(cid:22)(cid:22)(cid:23)(cid:1)
(cid:2)(cid:3)(cid:3)(cid:4)(cid:5)(cid:19)(cid:7)(cid:1)(cid:24)(cid:13)(cid:14)(cid:25)(cid:26)(cid:15)(cid:6)(cid:9)(cid:1)(cid:8)(cid:16)(cid:10)(cid:6)(cid:3)(cid:16)(cid:6)(cid:1)(cid:8)(cid:6)(cid:9)(cid:10)(cid:6)(cid:19)(cid:7)(cid:1)(cid:27)(cid:15)(cid:28)(cid:1)(cid:29)(cid:13)(cid:14)(cid:6)(cid:1)(cid:30)(cid:19)(cid:15)(cid:1)(cid:31)(cid:4)(cid:19)(cid:16)(cid:7)(cid:1)(cid:20)(cid:1)(cid:21)(cid:22)(cid:22)(cid:23)(cid:1)
(cid:1)(cid:1)(cid:2)(cid:2) (cid:3)(cid:3) (cid:3)(cid:3)(cid:4)(cid:4)(cid:5)(cid:5)(cid:2)(cid:2)(cid:6)(cid:6)(cid:4)(cid:4) (cid:7)(cid:7) (cid:8)(cid:8)(cid:9)(cid:9)(cid:10)(cid:10) (cid:11)(cid:11) (cid:12)(cid:12)(cid:13)(cid:13) (cid:12)(cid:12) (cid:7)(cid:7)(cid:10)(cid:10)(cid:14)(cid:14) (cid:12)(cid:12) (cid:11)(cid:11)(cid:4)(cid:4)(cid:15)(cid:15)(cid:16)(cid:16) (cid:11)(cid:11)(cid:14)(cid:14)(cid:17)(cid:17) (cid:3)(cid:3) (cid:7)(cid:7) (cid:8)(cid:8)(cid:4)(cid:4)(cid:18)(cid:18)(cid:10)(cid:10)(cid:15)(cid:15) (cid:7)(cid:7) (cid:11)(cid:11) (cid:12)(cid:12)(cid:13)(cid:13) (cid:12)(cid:12) (cid:7)(cid:7)(cid:10)(cid:10)(cid:14)(cid:14) (cid:12)(cid:12) (cid:11)(cid:11)
(cid:19)(cid:12)(cid:12)(cid:8)(cid:12)(cid:7)(cid:20)(cid:21)(cid:6)(cid:2)(cid:22)(cid:20)(cid:11)(cid:19)(cid:3)(cid:8)(cid:15)(cid:11)(cid:23) (cid:17)(cid:15)(cid:7)(cid:10)(cid:4)(cid:15)(cid:17)(cid:24)(cid:11)(cid:21)(cid:25)(cid:26)(cid:11)
(cid:27)(cid:15)(cid:12)(cid:7)(cid:6)(cid:17)(cid:28)(cid:7)(cid:2)(cid:6)(cid:11)(cid:1)(cid:6)(cid:8)(cid:12)(cid:7)(cid:8)(cid:15)(cid:4)(cid:11)(cid:29)(cid:22)(cid:10)(cid:3)(cid:8)(cid:4)(cid:11)(cid:30)(cid:2)(cid:22)(cid:6)(cid:4)(cid:15)(cid:24)(cid:11)(cid:21)(cid:25)(cid:26)(cid:11)(cid:1)(cid:4)(cid:15)(cid:16)(cid:8)(cid:16)(cid:4)(cid:7)(cid:10)(cid:11)
(cid:31) (cid:8)(cid:5)(cid:8)(cid:12)(cid:28)(cid:17)(cid:12)!(cid:11)"(cid:15)(cid:8)(cid:9)(cid:10)(cid:6)(cid:12)(cid:8)(cid:7)(cid:13)(cid:11)(cid:2)(cid:22)(cid:11) (cid:8)(cid:14)(cid:8)#(cid:2)(cid:4)(cid:6)(cid:4)(cid:24)(cid:11)$(cid:2)(cid:14)(cid:4)(cid:15)(cid:8)(cid:4)(cid:11)
"#$%& (cid:2)(cid:29)(cid:7)(cid:1) ’(cid:26)(cid:16)(cid:9)(cid:4)(cid:9)(cid:6)(cid:4)(cid:1) (cid:25)(cid:9)(cid:6)((cid:10)(cid:3)(cid:15)(cid:17)(cid:1) (cid:16))(cid:15)(cid:6)*(cid:4)(cid:1) (cid:6)(cid:5)(cid:6)(cid:14)(cid:6)(cid:3)(cid:15)(cid:6)(cid:1) +(cid:6)(cid:1) ,(cid:4)((cid:17)(cid:1) (cid:16)(cid:26)(cid:1)
(cid:25)(cid:9)(cid:10)*(cid:10)(cid:9)(cid:6)(cid:1) (cid:5)(cid:4)(cid:1) +(cid:13)(cid:14)(cid:6)(cid:3)(cid:10)(cid:26)(cid:5)(cid:1) (cid:19)(cid:10)(cid:19)(cid:15)(cid:6)(cid:14)(cid:6)(cid:5)(cid:13)(cid:9)(cid:1) (cid:16)(cid:13)(cid:5)(cid:4),(cid:13)(cid:9)(cid:4)(cid:15)(cid:10)*(cid:6)-(cid:1) (cid:26)(cid:3)(cid:1) +(cid:13)(cid:14)(cid:6)(cid:3)(cid:10)(cid:26)(cid:1) +(cid:6)(cid:1)
(cid:14)(cid:4).(cid:10)(cid:14)(cid:17)(cid:1) (cid:4)(cid:16)(cid:15)(cid:26)(cid:4)(cid:5)(cid:10)(cid:15)(cid:4)(cid:15)(cid:6)-(cid:1) /(cid:10)(cid:1) (cid:16)(cid:26)(cid:1) (cid:25)(cid:9)(cid:10)*(cid:10)(cid:9)(cid:6)(cid:1) (cid:5)(cid:4)(cid:1) (cid:19)(cid:10)(cid:19)(cid:15)(cid:6)(cid:14)(cid:6)(cid:5)(cid:6)(cid:1) (cid:14)(cid:26)(cid:5)(cid:15)(cid:10)(cid:4)0(cid:6)(cid:3)(cid:15)-(cid:1)
+(cid:6)(*(cid:13)(cid:5)(cid:15)(cid:4)(cid:15)(cid:6)(cid:1) 1(cid:3)(cid:1) (cid:26)(cid:9)(cid:14)(cid:4)(cid:1) (cid:26)(cid:3)(cid:26)(cid:10)(cid:1) (cid:19)(cid:15)(cid:26)+(cid:10)(cid:26)(cid:1) (cid:15)(cid:6)(cid:14)(cid:6)(cid:10)(cid:3)(cid:10)(cid:16)(cid:1) (cid:4)(cid:19)(cid:26)(cid:25)(cid:9)(cid:4)(cid:1) (cid:19)(cid:10)(cid:19)(cid:15)(cid:6)(cid:14)(cid:6)(cid:5)(cid:13)(cid:9)(cid:1) (cid:16)(cid:26)(cid:1)
(cid:26)(cid:3)(cid:1)(cid:19)(cid:10)(cid:3)0(cid:26)(cid:9)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:7)(cid:1)
(cid:1)
(cid:1)
%(cid:20)(cid:11)(cid:1)(cid:2)(cid:3)(cid:3)(cid:4)(cid:5)(cid:2)(cid:6)(cid:4)(cid:7)(cid:8)(cid:9)(cid:10)(cid:11)(cid:4)(cid:12)(cid:11)&’(cid:2)(cid:8)(cid:15)(cid:7)(cid:3)(cid:13)(cid:11)((cid:8)(cid:7)(cid:25)!(cid:11)
(cid:1)
(cid:11)(cid:3)(cid:1)(cid:13)(cid:9)+(cid:6)(cid:9)(cid:1)(cid:15)(cid:13)(cid:1)(cid:26)(cid:3)+(cid:6)(cid:9)(cid:19)(cid:15)(cid:4)(cid:3)+(cid:1)(cid:16)(cid:13)(cid:5)(cid:5)(cid:4),(cid:13)(cid:9)(cid:4)(cid:15)(cid:10)*(cid:6)(cid:1)(cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1)(cid:10)(cid:15)(cid:1)(cid:10)(cid:19)(cid:1)(cid:3)(cid:6)(cid:16)(cid:6)(cid:19)(cid:19)(cid:4)(cid:9)2(cid:1)(cid:15)(cid:13)(cid:1)(cid:12)(cid:13)(cid:16)(cid:26)(cid:19)(cid:1)(cid:13)(cid:3)(cid:1)(cid:15)(cid:28)(cid:13)(cid:19)(cid:6)(cid:1)
(cid:10)(cid:3)(cid:12)(cid:13)(cid:9)(cid:14)(cid:4)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1) (cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1)3(cid:28)(cid:10)(cid:16)(cid:28)(cid:1) (cid:4)(cid:9)(cid:6)(cid:1) (cid:10)(cid:3)(cid:15)(cid:6)(cid:5)(cid:5)(cid:10)0(cid:6)(cid:3)(cid:15)(cid:1) (cid:25)(cid:4)(cid:9)(cid:15)(cid:3)(cid:6)(cid:9)(cid:19)-(cid:1) (cid:16)(cid:13)(cid:5)(cid:5)(cid:4),(cid:13)(cid:9)(cid:4)(cid:15)(cid:10)(cid:3)0(cid:1) (cid:10)(cid:3)(cid:1) (cid:19)(cid:13)(cid:5)*(cid:10)(cid:3)0(cid:1)
(cid:25)(cid:9)(cid:13),(cid:5)(cid:6)(cid:14)(cid:19)(cid:7)(cid:1) (cid:29)(cid:28)(cid:6)(cid:9)(cid:6)(cid:1) (cid:10)(cid:19)(cid:1) (cid:3)(cid:13)(cid:1) +(cid:13)(cid:26),(cid:15)(cid:1) (cid:15)(cid:28)(cid:4)(cid:15)(cid:1) (cid:4)(cid:3)(cid:1) (cid:10)(cid:14)(cid:25)(cid:9)(cid:13)*(cid:6)(cid:14)(cid:6)(cid:3)(cid:15)(cid:1) (cid:13)(cid:12)(cid:1) (cid:10)(cid:3)(cid:12)(cid:13)(cid:9)(cid:14)(cid:4)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1) (cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1)
3(cid:13)(cid:26)(cid:5)+(cid:1),(cid:6)(cid:1)(cid:4)(cid:25)(cid:25)(cid:9)(cid:13)(cid:25)(cid:9)(cid:10)(cid:4)(cid:15)(cid:6)(cid:7)(cid:1)(cid:29)(cid:28)(cid:6)(cid:1)(cid:26)(cid:19)(cid:6)(cid:1)(cid:13)(cid:12)(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)(cid:11)(cid:3)(cid:15)(cid:6)(cid:9)(cid:3)(cid:6)(cid:15)(cid:1)(cid:28)(cid:4)(cid:19)(cid:1),(cid:6)(cid:6)(cid:3)(cid:1)(cid:10)(cid:3)(cid:16)(cid:9)(cid:6)(cid:4)(cid:19)(cid:10)(cid:3)0(cid:1) (cid:5)(cid:6)(cid:4)+(cid:10)(cid:3)0(cid:1)(cid:15)(cid:13)(cid:1)
,(cid:6)(cid:15)(cid:15)(cid:6)(cid:9)(cid:1) (cid:16)(cid:13)(cid:14)(cid:14)(cid:26)(cid:3)(cid:10)(cid:16)(cid:4)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1) ,(cid:6)(cid:15)3(cid:6)(cid:6)(cid:3)(cid:1) (cid:25)(cid:6)(cid:13)(cid:25)(cid:5)(cid:6)-(cid:1) (cid:3)(cid:13)(cid:1) (cid:14)(cid:4)(cid:15)(cid:15)(cid:6)(cid:9)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:25)(cid:5)(cid:4)(cid:16)(cid:6)(cid:1) (cid:15)(cid:28)(cid:6)2(cid:1) (cid:12)(cid:10)(cid:3)+(cid:1) (cid:15)(cid:28)(cid:6)(cid:10)(cid:9)(cid:1)
(cid:19)(cid:6)(cid:5)*(cid:6)(cid:19)(cid:7)(cid:1) (cid:8)(cid:15)(cid:10)(cid:5)(cid:5)-(cid:1) (cid:14)(cid:4)(cid:3)2(cid:1) (cid:26)(cid:19)(cid:6)(cid:9)(cid:19)(cid:1) (cid:4)(cid:9)(cid:6)(cid:1) (cid:12)(cid:4)(cid:16)(cid:10)(cid:3)0(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:5)(cid:10)(cid:14)(cid:10)(cid:15)(cid:4)(cid:15)(cid:10)(cid:13)(cid:3)(cid:19)(cid:1) (cid:13)(cid:12)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:16)(cid:13)(cid:14)(cid:14)(cid:26)(cid:3)(cid:10)(cid:16)(cid:4)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1)
(cid:14)(cid:6)(cid:4)(cid:3)(cid:19)(cid:1) (cid:15)(cid:28)(cid:4)(cid:15)(cid:1) (cid:6).(cid:10)(cid:19)(cid:15)(cid:1) (cid:19)(cid:13)(cid:1) (cid:12)(cid:4)(cid:9)(cid:7)(cid:1) (cid:29)(cid:28)(cid:6)(cid:1) (cid:10)(cid:3)(cid:15)(cid:6)(cid:9)(cid:12)(cid:4)(cid:16)(cid:6)(cid:19)(cid:1) (cid:15)(cid:28)(cid:4)(cid:15)(cid:1) (cid:16)(cid:4)(cid:3)(cid:1) ,(cid:6)(cid:1) +(cid:10)(cid:9)(cid:6)(cid:16)(cid:15)(cid:5)2(cid:1) (cid:14)(cid:4)(cid:3)(cid:10)(cid:25)(cid:26)(cid:5)(cid:4)(cid:15)(cid:6)+(cid:1) (cid:4)(cid:9)(cid:6)(cid:1)
(cid:16)(cid:13)(cid:3)(cid:19)(cid:10)+(cid:6)(cid:9)(cid:6)+(cid:1) (cid:4)(cid:1) 3(cid:4)2(cid:1) (cid:12)(cid:13)(cid:9)(cid:1) (cid:4)(cid:3)2(cid:1) (cid:26)(cid:19)(cid:6)(cid:9)(cid:1) (cid:15)(cid:13)(cid:1) ,(cid:6)(cid:1) (cid:4),(cid:5)(cid:6)(cid:1) (cid:15)(cid:13)(cid:1) (cid:4)(cid:16)(cid:16)(cid:6)(cid:19)(cid:19)(cid:1) (cid:4)(cid:1) (cid:16)(cid:13)(cid:14)(cid:25)(cid:26)(cid:15)(cid:6)(cid:9)(cid:7)(cid:1) (cid:11)(cid:15)(cid:1) (cid:10)(cid:19)(cid:1)
(cid:16)(cid:13)(cid:3)(cid:19)(cid:10)+(cid:6)(cid:9)(cid:6)+(cid:1)(cid:15)(cid:28)(cid:4)(cid:15)(cid:1)(cid:4)(cid:3)2(cid:15)(cid:28)(cid:10)(cid:3)0(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)(cid:26)(cid:19)(cid:6)(cid:9)(cid:1)(cid:3)(cid:6)(cid:6)+(cid:19)(cid:1)(cid:10)(cid:19)(cid:1)4(cid:26)(cid:19)(cid:15)(cid:1)(cid:4)(cid:1)(cid:16)(cid:5)(cid:10)(cid:16)5(cid:1)(cid:4)3(cid:4)2-(cid:1)(cid:15)(cid:28)(cid:6)(cid:9)(cid:6)(cid:1)(cid:10)(cid:19)(cid:1)(cid:3)(cid:13)(cid:1)(cid:3)(cid:6)(cid:6)+(cid:1)
(cid:13)(cid:12)(cid:1) (cid:19)(cid:25)(cid:6)(cid:16)(cid:10)(cid:12)2(cid:10)(cid:3)0(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:16)(cid:13)(cid:14)(cid:25)(cid:26)(cid:15)(cid:6)(cid:9)(cid:1) (cid:28)(cid:13)3(cid:1) (cid:15)(cid:13)(cid:1) +(cid:13)(cid:1) (cid:4)(cid:1) (cid:16)(cid:6)(cid:9)(cid:15)(cid:4)(cid:10)(cid:3)(cid:1) (cid:15)(cid:28)(cid:10)(cid:3)0(cid:1) ,(cid:26)(cid:15)(cid:1) (cid:13)(cid:3)(cid:5)2(cid:1) (cid:15)(cid:13)(cid:1) (cid:4)(cid:19)5(cid:1) 3(cid:28)(cid:4)(cid:15)(cid:1)
(cid:15)(cid:28)(cid:4)(cid:15)(cid:1) (cid:15)(cid:28)(cid:10)(cid:3)0(cid:1) (cid:10)(cid:19)(cid:7)(cid:1) 6(cid:26)(cid:15)(cid:1) (cid:15)(cid:28)(cid:10)(cid:19)(cid:1) (cid:10)(cid:19)(cid:1) (cid:26)(cid:3)(cid:12)(cid:13)(cid:9)(cid:15)(cid:26)(cid:3)(cid:4)(cid:15)(cid:6)(cid:5)2(cid:1) (cid:4)(cid:1) (cid:19)(cid:28)(cid:4)(cid:5)(cid:5)(cid:13)3(cid:1) (cid:15)(cid:9)(cid:26)(cid:15)(cid:28)-(cid:1) (cid:4)(cid:19)(cid:1) (cid:12)(cid:13)(cid:9)(cid:1) (cid:14)(cid:4)(cid:3)2(cid:1)
(cid:4)(cid:25)(cid:25)(cid:5)(cid:10)(cid:16)(cid:4)(cid:15)(cid:10)(cid:13)(cid:3)(cid:19)(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)(cid:26)(cid:19)(cid:6)(cid:9)(cid:19)(cid:1)+(cid:13)(cid:3)7(cid:15)(cid:1)(cid:28)(cid:4)*(cid:6)(cid:1)(cid:15)(cid:13)(cid:1)3(cid:9)(cid:10)(cid:15)(cid:6)(cid:1)(cid:4)(cid:3)2(cid:1)(cid:16)(cid:13)+(cid:6)(cid:1)(cid:13)(cid:9)(cid:1)(cid:16)(cid:13)(cid:14)(cid:14)(cid:4)(cid:3)+(cid:19)-(cid:1)(cid:4)(cid:19)(cid:1)(cid:15)(cid:28)(cid:6)2(cid:1)+(cid:13)(cid:1)
3(cid:28)(cid:6)(cid:3)(cid:1) (cid:10)(cid:15)(cid:1) (cid:16)(cid:13)(cid:14)(cid:6)(cid:19)(cid:1) (cid:15)(cid:13)(cid:1) (cid:14)(cid:13)(cid:9)(cid:6)(cid:1) (cid:16)(cid:13)(cid:14)(cid:25)(cid:5)(cid:6).(cid:1) (cid:25)(cid:9)(cid:13),(cid:5)(cid:6)(cid:14)(cid:19)(cid:7)(cid:1) (cid:29)(cid:28)(cid:6)(cid:1) (cid:26)(cid:19)(cid:6)(cid:9)(cid:1) (cid:3)(cid:6)(cid:6)+(cid:19)(cid:1) (cid:15)(cid:13)(cid:1) 8(cid:15)(cid:6)(cid:5)(cid:5)9(cid:1) (cid:15)(cid:28)(cid:6)(cid:1)
(cid:16)(cid:13)(cid:14)(cid:25)(cid:26)(cid:15)(cid:6)(cid:9)(cid:1) (cid:28)(cid:13)3(cid:1) (cid:15)(cid:13)(cid:1) (cid:19)(cid:13)(cid:5)*(cid:6)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:25)(cid:9)(cid:13),(cid:5)(cid:6)(cid:14)(cid:7)(cid:1) (cid:2)(cid:5)(cid:15)(cid:28)(cid:13)(cid:26)0(cid:28)(cid:1) ,(cid:6)(cid:10)(cid:3)0(cid:1) (cid:16)(cid:13)(cid:14)(cid:25)(cid:5)(cid:6).(cid:1) (cid:15)(cid:13)(cid:13)(cid:5)(cid:19)-(cid:1) (cid:26)(cid:19)(cid:26)(cid:4)(cid:5)(cid:1)
(cid:10)(cid:3)(cid:12)(cid:13)(cid:9)(cid:14)(cid:4)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1) (cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1) (cid:4)(cid:9)(cid:6)(cid:1) (cid:3)(cid:13)(cid:15)(cid:1) (cid:4)3(cid:4)(cid:9)(cid:6)(cid:1) (cid:13)(cid:12)(cid:1) 3(cid:28)(cid:4)(cid:15)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:26)(cid:19)(cid:6)(cid:9)(cid:19)(cid:1) (cid:4)(cid:9)(cid:6)(cid:1) (cid:15)(cid:9)2(cid:10)(cid:3)0(cid:1) (cid:15)(cid:13)(cid:1) +(cid:13)(cid:1) ,2(cid:1)
(cid:26)(cid:19)(cid:10)(cid:3)0(cid:1) (cid:15)(cid:28)(cid:6)(cid:14)-(cid:1) (cid:4)(cid:3)+(cid:1) (cid:4)(cid:9)(cid:6)(cid:1) (cid:3)(cid:13)(cid:15)(cid:1) (cid:13)(cid:12)(cid:1) 0(cid:9)(cid:6)(cid:4)(cid:15)(cid:1) (cid:28)(cid:6)(cid:5)(cid:25)(cid:1) (cid:10)(cid:3)(cid:1) (cid:19)(cid:13)(cid:5)*(cid:10)(cid:3)0(cid:1) (cid:25)(cid:9)(cid:13),(cid:5)(cid:6)(cid:14)(cid:19)(cid:7)(cid:1) (cid:11)(cid:3)(cid:12)(cid:13)(cid:9)(cid:14)(cid:4)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1)
(cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1) (cid:4)(cid:9)(cid:6)(cid:1) (cid:19)(cid:26)(cid:25)(cid:25)(cid:13)(cid:19)(cid:6)+(cid:1) (cid:15)(cid:13)(cid:1) (cid:19)(cid:13)(cid:5)*(cid:6)(cid:1) (cid:25)(cid:9)(cid:13),(cid:5)(cid:6)(cid:14)(cid:19)(cid:1) 3(cid:10)(cid:15)(cid:28)(cid:13)(cid:26)(cid:15)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:26)(cid:19)(cid:6)(cid:9)(cid:1) (cid:19)(cid:25)(cid:6)(cid:16)(cid:10)(cid:12)2(cid:10)(cid:3)0(cid:1) (cid:6)(cid:4)(cid:16)(cid:28)(cid:1)
(cid:19)(cid:15)(cid:6)(cid:25)(cid:1)(cid:15)(cid:13)(cid:1),(cid:6)(cid:1)(cid:6).(cid:6)(cid:16)(cid:26)(cid:15)(cid:6)+(cid:7)(cid:1)(cid:1)
(cid:1)
(cid:30) !(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:7)(cid:1)(cid:8)(cid:6)(cid:9)(cid:10)(cid:4)(cid:1)(cid:11)(cid:3)(cid:12)(cid:13)(cid:9)(cid:14)(cid:4)(cid:15)(cid:10)(cid:16)(cid:17)(cid:7)(cid:1)(cid:18)(cid:13)(cid:5)(cid:7)(cid:1)(cid:11)(cid:18)(cid:1)(cid:12)(cid:4)(cid:19)(cid:16)(cid:7)(cid:1)(cid:11)(cid:1)(cid:20)(cid:1)(cid:21)(cid:22)(cid:22)(cid:23)(cid:1)
(cid:2)(cid:3)(cid:3)(cid:4)(cid:5)(cid:19)(cid:7)(cid:1)(cid:24)(cid:13)(cid:14)(cid:25)(cid:26)(cid:15)(cid:6)(cid:9)(cid:1)(cid:8)(cid:16)(cid:10)(cid:6)(cid:3)(cid:16)(cid:6)(cid:1)(cid:8)(cid:6)(cid:9)(cid:10)(cid:6)(cid:19)(cid:7)(cid:1)(cid:27)(cid:15)(cid:28)(cid:1)(cid:29)(cid:13)(cid:14)(cid:6)(cid:1)(cid:30)(cid:19)(cid:15)(cid:1)(cid:31)(cid:4)(cid:19)(cid:16)(cid:7)(cid:1)(cid:20)(cid:1)(cid:21)(cid:22)(cid:22)(cid:23)(cid:1)
(cid:29)(cid:13)(cid:1) (cid:9)(cid:6)(cid:4)(cid:5)(cid:10)((cid:6)(cid:1) (cid:16)(cid:13)(cid:5)(cid:5)(cid:4),(cid:13)(cid:9)(cid:4)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1) ,(cid:6)(cid:15)3(cid:6)(cid:6)(cid:3)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1) (cid:4)(cid:3)+(cid:1) (cid:15)(cid:28)(cid:6)(cid:10)(cid:9)(cid:1) (cid:26)(cid:19)(cid:6)(cid:9)(cid:19)-(cid:1) (cid:10)(cid:3)(cid:1)
(cid:13)(cid:9)+(cid:6)(cid:9)(cid:1) (cid:15)(cid:13)(cid:1) (cid:13),(cid:15)(cid:4)(cid:10)(cid:3)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:3)(cid:6)(cid:6)+(cid:6)+(cid:1) (cid:10)(cid:3)(cid:12)(cid:13)(cid:9)(cid:14)(cid:4)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1) (cid:15)(cid:13)(cid:1) ,(cid:6)(cid:1) (cid:4),(cid:5)(cid:6)(cid:1) (cid:15)(cid:13)(cid:1) (cid:19)(cid:13)(cid:5)*(cid:6)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:25)(cid:9)(cid:13),(cid:5)(cid:6)(cid:14)(cid:19)(cid:1) (cid:13)(cid:12)(cid:1)
(cid:15)(cid:28)(cid:6)(cid:1) (cid:26)(cid:19)(cid:6)(cid:9)(cid:19)-(cid:1) (cid:10)(cid:15)(cid:1) (cid:10)(cid:19)(cid:1) (cid:10)(cid:14)(cid:25)(cid:13)(cid:19)(cid:6)+(cid:1) (cid:15)(cid:13)(cid:1) (cid:26)(cid:19)(cid:6)(cid:1) (cid:19)(cid:13)(cid:14)(cid:6)(cid:1) (cid:4)(cid:9)(cid:15)(cid:10)(cid:12)(cid:10)(cid:16)(cid:10)(cid:4)(cid:5)(cid:1) (cid:10)(cid:3)(cid:15)(cid:6)(cid:5)(cid:5)(cid:10)0(cid:6)(cid:3)(cid:16)(cid:6)(cid:1) ,(cid:4)(cid:19)(cid:6)+(cid:1)
(cid:15)(cid:6)(cid:16)(cid:28)(cid:3)(cid:13)(cid:5)(cid:13)0(cid:10)(cid:6)(cid:19)-(cid:1)(cid:9)(cid:6)(cid:12)(cid:6)(cid:9)(cid:9)(cid:10)(cid:3)0(cid:1)(cid:3)(cid:13)(cid:15)(cid:1)(cid:13)(cid:3)(cid:5)2(cid:1)(cid:15)(cid:13)(cid:1)(cid:10)(cid:3)+(cid:10)*(cid:10)+(cid:26)(cid:4)(cid:5)(cid:1)(cid:10)(cid:3)(cid:15)(cid:6)(cid:5)(cid:5)(cid:10)0(cid:6)(cid:3)(cid:15)(cid:1)(cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1),(cid:26)(cid:15)(cid:1)(cid:15)(cid:13)(cid:1)(cid:14)(cid:4)(cid:3)2(cid:1)
(cid:10)(cid:3)(cid:15)(cid:6)(cid:5)(cid:5)(cid:10)0(cid:6)(cid:3)(cid:15)(cid:1) (cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1) (cid:15)(cid:28)(cid:4)(cid:15)(cid:1) (cid:4)(cid:9)(cid:6)(cid:1) 3(cid:13)(cid:9)5(cid:10)(cid:3)0(cid:1) (cid:15)(cid:13)0(cid:6)(cid:15)(cid:28)(cid:6)(cid:9)-(cid:1) (cid:16)(cid:13)(cid:5)(cid:5)(cid:4),(cid:13)(cid:9)(cid:4)(cid:15)(cid:10)(cid:3)0(cid:7)(cid:1) (cid:29)(cid:28)(cid:10)(cid:19)(cid:1)
(cid:16)(cid:13)(cid:5)(cid:5)(cid:4),(cid:13)(cid:9)(cid:4)(cid:15)(cid:10)*(cid:6)(cid:1) ,(cid:6)(cid:28)(cid:4)*(cid:10)(cid:13)(cid:9)(cid:1) (cid:10)(cid:19)(cid:1) (cid:4)(cid:3)(cid:1) (cid:10)(cid:14)(cid:25)(cid:13)(cid:9)(cid:15)(cid:4)(cid:3)(cid:15)(cid:1) (cid:25)(cid:4)(cid:9)(cid:15)(cid:1) (cid:13)(cid:12)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:10)(cid:3)(cid:15)(cid:6)(cid:5)(cid:5)(cid:10)0(cid:6)(cid:3)(cid:15)(cid:1) ,(cid:6)(cid:28)(cid:4)*(cid:10)(cid:13)(cid:9)-(cid:1) (cid:4)(cid:3)+(cid:1)
(cid:15)(cid:28)(cid:6)(cid:1) (cid:16)(cid:13)(cid:5)(cid:5)(cid:4),(cid:13)(cid:9)(cid:4)(cid:15)(cid:10)*(cid:6)(cid:1) ,(cid:6)(cid:28)(cid:4)*(cid:10)(cid:13)(cid:9)(cid:1) (cid:16)(cid:4)(cid:3)(cid:1) (cid:13)(cid:3)(cid:5)2(cid:1) ,(cid:6)(cid:1) (cid:26)(cid:3)+(cid:6)(cid:9)(cid:19)(cid:15)(cid:13)(cid:13)+(cid:1) (cid:4)(cid:12)(cid:15)(cid:6)(cid:9)(cid:1) (cid:26)(cid:3)+(cid:6)(cid:9)(cid:19)(cid:15)(cid:4)(cid:3)+(cid:10)(cid:3)0(cid:1) (cid:15)(cid:28)(cid:6)(cid:1)
(cid:10)(cid:3)+(cid:10)*(cid:10)+(cid:26)(cid:4)(cid:5)(cid:1) ,(cid:6)(cid:28)(cid:4)*(cid:10)(cid:13)(cid:9)(cid:7)(cid:1) (cid:11)(cid:15)(cid:1) (cid:10)(cid:19)(cid:1) (cid:10)(cid:14)(cid:25)(cid:13)(cid:9)(cid:15)(cid:4)(cid:3)(cid:15)(cid:1) (cid:15)(cid:13)(cid:1) 5(cid:3)(cid:13)3(cid:1) (cid:28)(cid:13)3(cid:1) (cid:14)(cid:26)(cid:16)(cid:28)(cid:1) (cid:13)(cid:12)(cid:1) (cid:4)(cid:1) ,(cid:6)(cid:28)(cid:4)*(cid:10)(cid:13)(cid:9)(cid:1) (cid:10)(cid:19)(cid:1)
(cid:16)(cid:13)(cid:5)(cid:5)(cid:4),(cid:13)(cid:9)(cid:4)(cid:15)(cid:10)*(cid:6)(cid:1) (cid:4)(cid:3)+(cid:1) (cid:3)(cid:13)(cid:15)(cid:1) (cid:16)(cid:13)(cid:13)(cid:9)+(cid:10)(cid:3)(cid:4)(cid:15)(cid:6)+(cid:1) (cid:13)(cid:9)(cid:1) (cid:10)(cid:3)(cid:15)(cid:6)(cid:9)(cid:4)(cid:16)(cid:15)(cid:10)*(cid:6)(cid:7)(cid:1) (cid:29)(cid:28)(cid:6)(cid:1) +(cid:10)(cid:19)(cid:15)(cid:10)(cid:3)(cid:16)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1) ,(cid:6)(cid:15)3(cid:6)(cid:6)(cid:3)(cid:1)
(cid:16)(cid:13)(cid:5)(cid:5)(cid:4),(cid:13)(cid:9)(cid:4)(cid:15)(cid:10)*(cid:6)(cid:1)(cid:4)(cid:3)+(cid:1)(cid:10)(cid:3)(cid:15)(cid:6)(cid:9)(cid:4)(cid:16)(cid:15)(cid:10)*(cid:6)(cid:1)(cid:10)(cid:19)(cid:1)(cid:15)(cid:28)(cid:4)(cid:15)(cid:1)(cid:10)(cid:3)(cid:15)(cid:6)(cid:9)(cid:4)(cid:16)(cid:15)(cid:10)*(cid:6)(cid:1)(cid:13)(cid:3)(cid:5)2(cid:1)(cid:9)(cid:6)(cid:12)(cid:6)(cid:9)(cid:19)(cid:1)(cid:15)(cid:13)(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)(cid:4)(cid:16)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1)(cid:26)(cid:25)(cid:13)(cid:3)(cid:1)
(cid:4)(cid:3)(cid:13)(cid:15)(cid:28)(cid:6)(cid:9)(cid:1) (cid:15)(cid:28)(cid:10)(cid:3)0(cid:1) (cid:13)(cid:9)(cid:1) (cid:25)(cid:6)(cid:9)(cid:19)(cid:13)(cid:3)-(cid:1) 3(cid:28)(cid:10)(cid:5)(cid:6)(cid:1) (cid:16)(cid:13)(cid:5)(cid:5)(cid:4),(cid:13)(cid:9)(cid:4)(cid:15)(cid:10)*(cid:6)(cid:1) (cid:9)(cid:6)(cid:12)(cid:6)(cid:9)(cid:19)(cid:1) (cid:15)(cid:13)(cid:1) 3(cid:13)(cid:9)5(cid:10)(cid:3)0(cid:1) 4(cid:13)(cid:10)(cid:3)(cid:15)(cid:5)2(cid:1) 3(cid:10)(cid:15)(cid:28)(cid:1)
(cid:15)(cid:28)(cid:6)(cid:1)(cid:13)(cid:15)(cid:28)(cid:6)(cid:9)(cid:19)(cid:7)(cid:1)(cid:1)(cid:1)
(cid:1) (cid:11)(cid:3)(cid:1)(cid:13)(cid:9)+(cid:6)(cid:9)(cid:1)(cid:15)(cid:13)(cid:1),(cid:6)(cid:1)(cid:4),(cid:5)(cid:6)(cid:1)(cid:15)(cid:13)(cid:1),(cid:26)(cid:10)(cid:5)+(cid:1)(cid:16)(cid:13)(cid:5)(cid:5)(cid:4),(cid:13)(cid:9)(cid:4)(cid:15)(cid:10)*(cid:6)(cid:1) (cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1)(cid:10)(cid:15)(cid:1)(cid:10)(cid:19)(cid:1) (cid:3)(cid:6)(cid:16)(cid:6)(cid:19)(cid:19)(cid:4)(cid:9)2(cid:1)(cid:15)(cid:13)(cid:1)
(cid:10)+(cid:6)(cid:3)(cid:15)(cid:10)(cid:12)2(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)(cid:16)(cid:4)(cid:25)(cid:4),(cid:10)(cid:5)(cid:10)(cid:15)(cid:10)(cid:6)(cid:19)(cid:1)(cid:15)(cid:28)(cid:4)(cid:15)(cid:1)(cid:4)(cid:9)(cid:6)(cid:1)(cid:15)(cid:13)(cid:1),(cid:6)(cid:1)(cid:4)++(cid:6)+(cid:1)(cid:15)(cid:13)(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)(cid:10)(cid:3)+(cid:10)*(cid:10)+(cid:26)(cid:4)(cid:5)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)(cid:1) (cid:19)(cid:13)(cid:1)(cid:15)(cid:28)(cid:4)(cid:15)(cid:1)
(cid:15)(cid:28)(cid:6)2(cid:1),(cid:6)(cid:16)(cid:13)(cid:14)(cid:6)(cid:1)(cid:4),(cid:5)(cid:6)(cid:1)(cid:15)(cid:13)(cid:1)3(cid:13)(cid:9)5(cid:1)3(cid:10)(cid:15)(cid:28)(cid:1)(cid:13)(cid:15)(cid:28)(cid:6)(cid:9)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)(cid:7)(cid:1)(cid:29)(cid:28)(cid:6)(cid:1)(cid:14)(cid:13)+(cid:6)(cid:5)(cid:10)(cid:3)0(cid:1)(cid:13)(cid:12)(cid:1)(cid:16)(cid:13)(cid:5)(cid:5)(cid:4),(cid:13)(cid:9)(cid:4)(cid:15)(cid:10)*(cid:6)(cid:1)
(cid:28)(cid:4)(cid:19)(cid:1) ,(cid:6)(cid:16)(cid:13)(cid:14)(cid:6)(cid:1) (cid:4)(cid:1) (cid:25)(cid:9)(cid:10)(cid:13)(cid:9)(cid:10)(cid:15)2(cid:1) (cid:4)(cid:19)(cid:1) +(cid:26)(cid:9)(cid:10)(cid:3)0(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:5)(cid:4)(cid:19)(cid:15)(cid:1) +(cid:6)(cid:16)(cid:4)+(cid:6)(cid:1) (cid:19)(cid:13)(cid:14)(cid:6)(cid:1) (cid:10)(cid:14)(cid:25)(cid:13)(cid:9)(cid:15)(cid:4)(cid:3)(cid:15)(cid:1) (cid:25)(cid:9)(cid:13)0(cid:9)(cid:6)(cid:19)(cid:19)(cid:1)
3(cid:10)(cid:15)(cid:28)(cid:10)(cid:3)(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)(cid:4)(cid:9)(cid:15)(cid:10)(cid:12)(cid:10)(cid:16)(cid:10)(cid:4)(cid:5)(cid:1)(cid:10)(cid:3)(cid:15)(cid:6)(cid:5)(cid:5)(cid:10)0(cid:6)(cid:3)(cid:16)(cid:6)(cid:1)(cid:12)(cid:10)(cid:6)(cid:5)+(cid:1)(cid:28)(cid:4)(cid:19)(cid:1),(cid:6)(cid:6)(cid:3)(cid:1)(cid:4)(cid:16)(cid:28)(cid:10)(cid:6)*(cid:6)+(cid:7)(cid:1)
(cid:1)
(cid:1)
)(cid:20)(cid:11)(cid:23) (cid:17)(cid:3)(cid:7)(cid:8)(cid:4)(cid:18)(cid:10)(cid:15)(cid:7)(cid:11)(cid:30)(cid:13)(cid:12)(cid:7)(cid:10)(cid:14)(cid:12)(cid:11)((cid:8)(cid:7)(cid:25)(cid:8)(cid:15)(cid:11)(cid:4)(cid:15)(cid:11)(cid:8)(cid:15)(cid:7)(cid:10)(cid:3)(cid:3)(cid:8)(cid:18)(cid:10)(cid:15)(cid:7)(cid:11)(cid:10)(cid:15)(cid:9)(cid:8)(cid:6)(cid:2)(cid:15)(cid:14)(cid:10)(cid:15)(cid:7)(cid:11)
(cid:1)
& (cid:26)(cid:5)(cid:15)(cid:10)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1) ’(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:1) (cid:10)(cid:19)(cid:1) (cid:4)(cid:15)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:10)(cid:3)(cid:15)(cid:6)(cid:9)(cid:19)(cid:6)(cid:16)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1) (cid:13)(cid:12)(cid:1) (cid:14)(cid:26)(cid:5)(cid:15)(cid:10)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1) (cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1) (cid:4)(cid:3)+(cid:1)
& (cid:4)(cid:16)(cid:28)(cid:10)(cid:3)(cid:6)(cid:1) ’(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0-(cid:1) (cid:15)3(cid:13)(cid:1) (cid:19)(cid:26),+(cid:13)(cid:14)(cid:4)(cid:10)(cid:3)(cid:19)(cid:1) (cid:13)(cid:12)(cid:1) (cid:4)(cid:9)(cid:15)(cid:10)(cid:12)(cid:10)(cid:16)(cid:10)(cid:4)(cid:5)(cid:1) (cid:10)(cid:3)(cid:15)(cid:6)(cid:5)(cid:5)(cid:10)0(cid:6)(cid:3)(cid:16)(cid:6)(cid:7)(cid:1) : (cid:6)(cid:10)(cid:19)(cid:19)(cid:1) (cid:28)(cid:4)(cid:19)(cid:1)
+(cid:6)(cid:12)(cid:10)(cid:3)(cid:6)+(cid:1)& (cid:26)(cid:5)(cid:15)(cid:10)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1)’(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:1)(cid:4)(cid:19)(cid:1)8(cid:5)(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:1)(cid:15)(cid:28)(cid:4)(cid:15)(cid:1)(cid:10)(cid:19)(cid:1)+(cid:13)(cid:3)(cid:6)(cid:1),2(cid:1) (cid:19)(cid:6)*(cid:6)(cid:9)(cid:4)(cid:5)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)(cid:1)(cid:4)(cid:3)+(cid:1)
3(cid:28)(cid:10)(cid:16)(cid:28)(cid:1)(cid:10)(cid:19)(cid:1)(cid:13)(cid:3)(cid:5)2(cid:1)(cid:25)(cid:13)(cid:19)(cid:19)(cid:10),(cid:5)(cid:6)(cid:1)+(cid:26)(cid:6)(cid:1)(cid:15)(cid:13)(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)(cid:25)(cid:9)(cid:6)(cid:19)(cid:6)(cid:3)(cid:16)(cid:6)(cid:1)(cid:13)(cid:12)(cid:1)(cid:19)(cid:6)*(cid:6)(cid:9)(cid:4)(cid:5)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)9(cid:7)(cid:1)
(cid:29)(cid:9)(cid:4)+(cid:10)(cid:15)(cid:10)(cid:13)(cid:3)(cid:4)(cid:5)(cid:1) & (cid:4)(cid:16)(cid:28)(cid:10)(cid:3)(cid:6)(cid:1) ’(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:1) (cid:15)(cid:6)(cid:16)(cid:28)(cid:3)(cid:13)(cid:5)(cid:13)0(cid:10)(cid:6)(cid:19)(cid:1) (cid:26)(cid:19)(cid:26)(cid:4)(cid:5)(cid:5)2(cid:1) (cid:10)(cid:14)(cid:25)(cid:5)2(cid:1) (cid:4)(cid:1) (cid:19)(cid:10)(cid:3)0(cid:5)(cid:6)(cid:1)
(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1) (cid:15)(cid:28)(cid:4)(cid:15)(cid:1) (cid:10)(cid:19)(cid:1) (cid:15)(cid:9)2(cid:10)(cid:3)0(cid:1) (cid:15)(cid:13)(cid:1) (cid:14)(cid:4).(cid:10)(cid:14)(cid:10)((cid:6)(cid:1) (cid:19)(cid:13)(cid:14)(cid:6)(cid:1) (cid:26)(cid:15)(cid:10)(cid:5)(cid:10)(cid:15)2(cid:1) (cid:12)(cid:26)(cid:3)(cid:16)(cid:15)(cid:10)(cid:13)(cid:3)(cid:19)(cid:1) 3(cid:10)(cid:15)(cid:28)(cid:13)(cid:26)(cid:15)(cid:1) (cid:28)(cid:4)*(cid:10)(cid:3)0(cid:1) (cid:4)(cid:3)2(cid:1)
5(cid:3)(cid:13)3(cid:5)(cid:6)+0(cid:6)(cid:1) (cid:4),(cid:13)(cid:26)(cid:15)(cid:1) (cid:13)(cid:15)(cid:28)(cid:6)(cid:9)(cid:1) (cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)(cid:1) 3(cid:10)(cid:15)(cid:28)(cid:10)(cid:3)(cid:1) (cid:10)(cid:15)(cid:19)(cid:1) (cid:6)(cid:3)*(cid:10)(cid:9)(cid:13)(cid:3)(cid:14)(cid:6)(cid:3)(cid:15)(cid:7)(cid:1) (cid:29)(cid:28)(cid:6)(cid:1) (cid:14)(cid:26)(cid:5)(cid:15)(cid:10)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1)
(cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1) (cid:9)(cid:6)(cid:12)(cid:6)(cid:9)(cid:1) (cid:15)(cid:13)(cid:1) +(cid:13)(cid:14)(cid:4)(cid:10)(cid:3)(cid:19)(cid:1) 3(cid:10)(cid:15)(cid:28)(cid:1) (cid:14)(cid:4)(cid:3)2(cid:1) (cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)(cid:1) (cid:4)(cid:3)+(cid:1) (cid:15)(cid:28)(cid:6)(cid:9)(cid:6)(cid:1) (cid:4)(cid:9)(cid:6)(cid:1) (cid:16)(cid:13)(cid:3)(cid:19)(cid:10)+(cid:6)(cid:9)(cid:6)+(cid:1) (cid:19)(cid:13)(cid:14)(cid:6)(cid:1)
(cid:14)(cid:6)(cid:16)(cid:28)(cid:4)(cid:3)(cid:10)(cid:19)(cid:14)(cid:19)(cid:1)(cid:12)(cid:13)(cid:9)(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)(cid:10)(cid:3)(cid:15)(cid:6)(cid:9)(cid:4)(cid:16)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1)(cid:13)(cid:12)(cid:1)(cid:10)(cid:3)+(cid:6)(cid:25)(cid:6)(cid:3)+(cid:6)(cid:3)(cid:15)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)7(cid:1),(cid:6)(cid:28)(cid:4)*(cid:10)(cid:13)(cid:9)(cid:7)(cid:1)(cid:1)
(cid:29)(cid:28)(cid:6)(cid:1)(cid:14)(cid:26)(cid:5)(cid:15)(cid:10)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1) (cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1)+(cid:13)(cid:14)(cid:4)(cid:10)(cid:3)(cid:1) (cid:9)(cid:6)(cid:12)(cid:6)(cid:9)(cid:19)(cid:1)(cid:15)(cid:13)(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)+(cid:13)(cid:14)(cid:4)(cid:10)(cid:3)(cid:19)(cid:1)3(cid:28)(cid:6)(cid:9)(cid:6)(cid:1) (cid:19)(cid:6)*(cid:6)(cid:9)(cid:4)(cid:5)(cid:1)
(cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)(cid:1)(cid:4)(cid:9)(cid:6)(cid:1)(cid:10)(cid:3)*(cid:13)(cid:5)*(cid:6)+(cid:1)(cid:4)(cid:3)+(cid:1)(cid:14)(cid:6)(cid:16)(cid:28)(cid:4)(cid:3)(cid:10)(cid:19)(cid:14)(cid:19)(cid:1)(cid:12)(cid:13)(cid:9)(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)(cid:10)(cid:3)+(cid:6)(cid:25)(cid:6)(cid:3)+(cid:6)(cid:3)(cid:15)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)7(cid:1),(cid:6)(cid:28)(cid:4)*(cid:10)(cid:13)(cid:26)(cid:9)(cid:19)(cid:1)
(cid:10)(cid:3)(cid:15)(cid:6)(cid:9)(cid:4)(cid:16)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1) (cid:28)(cid:4)*(cid:6)(cid:1) (cid:15)(cid:13)(cid:1) ,(cid:6)(cid:1) (cid:16)(cid:13)(cid:3)(cid:19)(cid:10)+(cid:6)(cid:9)(cid:6)+(cid:7)(cid:1) (cid:29)(cid:28)(cid:6)(cid:1) (cid:14)(cid:26)(cid:5)(cid:15)(cid:10)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1) (cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1) (cid:10)(cid:3)(cid:16)(cid:5)(cid:26)+(cid:6)(cid:1) (cid:4)(cid:3)2(cid:1)
(cid:19)(cid:10)(cid:15)(cid:26)(cid:4)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1)3(cid:28)(cid:6)(cid:9)(cid:6)(cid:1)(cid:4)(cid:3)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1)(cid:10)(cid:19)(cid:1) (cid:5)(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:1)(cid:15)(cid:13)(cid:1)(cid:10)(cid:3)(cid:15)(cid:6)(cid:9)(cid:4)(cid:16)(cid:15)(cid:1)3(cid:10)(cid:15)(cid:28)(cid:1)(cid:13)(cid:15)(cid:28)(cid:6)(cid:9)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)-(cid:1)(cid:6)*(cid:6)(cid:3)(cid:1)(cid:10)(cid:12)(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)
(cid:13)(cid:15)(cid:28)(cid:6)(cid:9)(cid:1) (cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)(cid:1) (cid:28)(cid:4)*(cid:6)(cid:1) (cid:4)(cid:1) (cid:19)(cid:15)(cid:4)(cid:15)(cid:10)(cid:16)(cid:1) ,(cid:6)(cid:28)(cid:4)*(cid:10)(cid:13)(cid:9)(cid:7)(cid:1) (cid:29)(cid:28)(cid:6)(cid:1) (cid:14)(cid:4)(cid:10)(cid:3)(cid:1) (cid:6).(cid:25)(cid:5)(cid:4)(cid:3)(cid:4)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1) (cid:12)(cid:13)(cid:9)(cid:1) (cid:16)(cid:13)(cid:3)(cid:19)(cid:10)+(cid:6)(cid:9)(cid:10)(cid:3)0(cid:1)
(cid:14)(cid:26)(cid:5)(cid:15)(cid:10)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1) (cid:5)(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)(cid:19)(cid:10)(cid:15)(cid:26)(cid:4)(cid:15)(cid:10)(cid:13)(cid:3)(cid:19)(cid:1)3(cid:28)(cid:6)(cid:3)(cid:1)(cid:4)(cid:1)(cid:19)(cid:10)(cid:3)0(cid:5)(cid:6)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1)(cid:10)(cid:19)(cid:1)(cid:4)(cid:16)(cid:15)(cid:26)(cid:4)(cid:5)(cid:5)2(cid:1) (cid:5)(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:1)(cid:10)(cid:19)(cid:1)
(cid:15)(cid:28)(cid:4)(cid:15)(cid:1) (cid:10)(cid:15)(cid:19)(cid:1) *(cid:6)(cid:9)2(cid:1) (cid:5)(cid:6)(cid:4)(cid:9)(cid:3)(cid:6)+(cid:1) ,(cid:6)(cid:28)(cid:4)*(cid:10)(cid:13)(cid:9)(cid:1) (cid:10)(cid:19)(cid:1) ,(cid:6)(cid:10)(cid:3)0(cid:1) (cid:13)(cid:12)(cid:15)(cid:6)(cid:3)(cid:1) (cid:26)(cid:19)(cid:6)+(cid:1) (cid:4)(cid:19)(cid:1) (cid:4)(cid:1) ,(cid:4)(cid:19)(cid:10)(cid:19)(cid:1) (cid:12)(cid:13)(cid:9)(cid:1) (cid:4)(cid:1) (cid:14)(cid:13)(cid:9)(cid:6)(cid:1)
(cid:16)(cid:13)(cid:14)(cid:25)(cid:5)(cid:6).(cid:1)(cid:4)(cid:3)+(cid:1)(cid:10)(cid:3)(cid:15)(cid:6)(cid:9)(cid:4)(cid:16)(cid:15)(cid:10)*(cid:6)(cid:1),(cid:6)(cid:28)(cid:4)*(cid:10)(cid:13)(cid:9)(cid:7)(cid:1)(cid:2)(cid:5)(cid:15)(cid:28)(cid:13)(cid:26)0(cid:28)(cid:1)(cid:4)(cid:1)(cid:19)(cid:10)(cid:3)0(cid:5)(cid:6)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1)(cid:10)(cid:19)(cid:1),(cid:6)(cid:10)(cid:3)0(cid:1)(cid:10)(cid:3)*(cid:13)(cid:5)*(cid:6)+(cid:1)
(cid:10)(cid:3)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:5)(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:1) (cid:25)(cid:9)(cid:13)(cid:16)(cid:6)(cid:19)(cid:19)-(cid:1) (cid:10)(cid:15)(cid:19)(cid:1) ,(cid:6)(cid:28)(cid:4)*(cid:10)(cid:13)(cid:9)(cid:1) (cid:10)(cid:19)(cid:1) (cid:13)(cid:3)(cid:5)2(cid:1) (cid:13),*(cid:10)(cid:13)(cid:26)(cid:19)(cid:1) 3(cid:28)(cid:6)(cid:3)(cid:1) (cid:13)(cid:15)(cid:28)(cid:6)(cid:9)(cid:1) (cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)(cid:1) (cid:4)(cid:9)(cid:6)(cid:1)
(cid:25)(cid:9)(cid:6)(cid:19)(cid:6)(cid:3)(cid:15)-(cid:1)(cid:4)(cid:3)+(cid:1)+(cid:6)(cid:15)(cid:6)(cid:9)(cid:14)(cid:10)(cid:3)(cid:6)(cid:19)(cid:1)(cid:15)(cid:28)(cid:6)(cid:19)(cid:6)(cid:1)(cid:13)(cid:15)(cid:28)(cid:6)(cid:9)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)(cid:1)(cid:15)(cid:13)(cid:1)(cid:25)(cid:4)(cid:9)(cid:15)(cid:10)(cid:16)(cid:10)(cid:25)(cid:4)(cid:15)(cid:6)(cid:1)(cid:15)(cid:13)(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)(cid:16)(cid:13)(cid:5)(cid:5)(cid:4),(cid:13)(cid:9)(cid:4)(cid:15)(cid:10)*(cid:6)(cid:1)
(cid:1)(cid:30)(cid:27)(cid:22)(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:7)(cid:1)(cid:8)(cid:6)(cid:9)(cid:10)(cid:4)(cid:1)(cid:11)(cid:3)(cid:12)(cid:13)(cid:9)(cid:14)(cid:4)(cid:15)(cid:10)(cid:16)(cid:17)(cid:7)(cid:1)(cid:18)(cid:13)(cid:5)(cid:7)(cid:1)(cid:11)(cid:18)(cid:1)(cid:12)(cid:4)(cid:19)(cid:16)(cid:7)(cid:1)(cid:11)(cid:1)(cid:20)(cid:1)(cid:21)(cid:22)(cid:22)(cid:23)(cid:1)
(cid:2)(cid:3)(cid:3)(cid:4)(cid:5)(cid:19)(cid:7)(cid:1)(cid:24)(cid:13)(cid:14)(cid:25)(cid:26)(cid:15)(cid:6)(cid:9)(cid:1)(cid:8)(cid:16)(cid:10)(cid:6)(cid:3)(cid:16)(cid:6)(cid:1)(cid:8)(cid:6)(cid:9)(cid:10)(cid:6)(cid:19)(cid:7)(cid:1)(cid:27)(cid:15)(cid:28)(cid:1)(cid:29)(cid:13)(cid:14)(cid:6)(cid:1)(cid:30)(cid:19)(cid:15)(cid:1)(cid:31)(cid:4)(cid:19)(cid:16)(cid:7)(cid:1)(cid:20)(cid:1)(cid:21)(cid:22)(cid:22)(cid:23)(cid:1)
(cid:4)(cid:3)+(cid:1) (cid:4)+*(cid:6)(cid:9)(cid:19)(cid:10)(cid:4)(cid:5)(cid:1) (cid:5)(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:1) (cid:19)(cid:10)(cid:15)(cid:26)(cid:4)(cid:15)(cid:10)(cid:13)(cid:3)(cid:19)(cid:7)(cid:1) (cid:11)(cid:3)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:16)(cid:4)(cid:19)(cid:6)(cid:1) 3(cid:28)(cid:6)(cid:3)(cid:1) (cid:14)(cid:26)(cid:5)(cid:15)(cid:10)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1) (cid:5)(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:1) (cid:10)(cid:19)(cid:1)
(cid:28)(cid:4)(cid:25)(cid:25)(cid:6)(cid:3)(cid:10)(cid:3)0(cid:1),2(cid:1)(cid:5)(cid:4)2(cid:6)(cid:9)(cid:10)(cid:3)0(cid:1),(cid:6)(cid:28)(cid:4)*(cid:10)(cid:13)(cid:9)(cid:19)-(cid:1)(cid:4)(cid:5)(cid:5)(cid:1)(cid:5)(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:1)(cid:5)(cid:6)*(cid:6)(cid:5)(cid:19)(cid:1)3(cid:28)(cid:10)(cid:16)(cid:28)(cid:1)(cid:10)(cid:14)(cid:25)(cid:5)2(cid:1)(cid:10)(cid:3)(cid:15)(cid:6)(cid:9)(cid:4)(cid:16)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1)
3(cid:10)(cid:15)(cid:28)(cid:1) (cid:13)(cid:15)(cid:28)(cid:6)(cid:9)(cid:1) (cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)(cid:1) (cid:4)(cid:9)(cid:6)(cid:1) (cid:4)(cid:16)(cid:15)(cid:26)(cid:4)(cid:5)(cid:5)2(cid:1) (cid:16)(cid:13)(cid:3)(cid:15)(cid:9)(cid:10),(cid:26)(cid:15)(cid:10)(cid:3)0(cid:1) (cid:15)(cid:13)(cid:1) (cid:4)(cid:3)+(cid:1) (cid:10)(cid:3)(cid:16)(cid:5)(cid:26)+(cid:6)+(cid:1) (cid:10)(cid:3)(cid:1) (cid:14)(cid:26)(cid:5)(cid:15)(cid:10)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1)
(cid:5)(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:7)(cid:1)
(cid:8)(cid:13)(cid:1) (cid:12)(cid:4)(cid:9)-(cid:1) (cid:14)(cid:13)(cid:19)(cid:15)(cid:1) (cid:13)(cid:12)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:5)(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:1) (cid:4)(cid:5)0(cid:13)(cid:9)(cid:10)(cid:15)(cid:28)(cid:14)(cid:19)(cid:1) (cid:28)(cid:4)*(cid:6)(cid:1) ,(cid:6)(cid:6)(cid:3)(cid:1) +(cid:6)*(cid:6)(cid:5)(cid:13)(cid:25)(cid:6)+(cid:1) (cid:12)(cid:13)(cid:9)(cid:1) (cid:4)(cid:1)
(cid:19)(cid:10)(cid:3)0(cid:5)(cid:6)(cid:1) (cid:4)0(cid:6)(cid:3)(cid:15)(cid:7)(cid:1) (cid:29)(cid:28)(cid:6)(cid:1) (cid:5)(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:1) (cid:13)(cid:12)(cid:1) (cid:4)(cid:1) (cid:19)(cid:10)(cid:3)0(cid:5)(cid:6)(cid:1) (cid:4)0(cid:6)(cid:3)(cid:15)(cid:1) (cid:10)(cid:19)(cid:1) (cid:12)(cid:13)(cid:16)(cid:26)(cid:19)(cid:6)+(cid:1) (cid:13)(cid:3)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) 3(cid:4)2(cid:1) (cid:4)(cid:1) (cid:19)(cid:10)(cid:3)0(cid:5)(cid:6)(cid:1)
(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1) (cid:10)(cid:14)(cid:25)(cid:9)(cid:13)*(cid:6)(cid:19)(cid:1) (cid:10)(cid:15)(cid:19)(cid:1) (cid:13)3(cid:3)(cid:1) (cid:16)(cid:28)(cid:4)(cid:9)(cid:4)(cid:16)(cid:15)(cid:6)(cid:9)(cid:10)(cid:19)(cid:15)(cid:10)(cid:16)(cid:19)(cid:7)(cid:1) & (cid:26)(cid:5)(cid:15)(cid:10)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1) (cid:5)(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:1) (cid:10)(cid:19)(cid:1) (cid:13)(cid:26)(cid:15)(cid:1) (cid:13)(cid:12)(cid:1)
;(cid:26)(cid:6)(cid:19)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1) (cid:4)(cid:19)(cid:1) (cid:5)(cid:13)(cid:3)0(cid:1) (cid:4)(cid:19)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:19)(cid:10)(cid:3)0(cid:5)(cid:6)(cid:1) (cid:4)0(cid:6)(cid:3)(cid:15)(cid:1) (cid:5)(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:1) +(cid:13)(cid:6)(cid:19)(cid:1) (cid:3)(cid:13)(cid:15)(cid:1) (cid:4)(cid:12)(cid:12)(cid:6)(cid:16)(cid:15)(cid:1) (cid:13)(cid:9)(cid:1) (cid:10)(cid:19)(cid:1) (cid:3)(cid:13)(cid:15)(cid:1)
(cid:4)(cid:12)(cid:12)(cid:6)(cid:16)(cid:15)(cid:6)+(cid:1) ,2(cid:1) (cid:4)(cid:1) (cid:3)(cid:6)(cid:10)0(cid:28),(cid:13)(cid:9)(cid:1) (cid:4)0(cid:6)(cid:3)(cid:15)(cid:7)(cid:1) (cid:2)(cid:5)(cid:15)(cid:28)(cid:13)(cid:26)0(cid:28)(cid:1) (cid:4)(cid:3)(cid:1) (cid:4)0(cid:6)(cid:3)(cid:15)(cid:1) (cid:10)(cid:19)(cid:1) (cid:3)(cid:13)(cid:15)(cid:1) *(cid:6)(cid:9)2(cid:1) (cid:4)3(cid:4)(cid:9)(cid:6)(cid:1) (cid:13)(cid:12)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1)
(cid:13)(cid:15)(cid:28)(cid:6)(cid:9)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)7(cid:1) (cid:6).(cid:10)(cid:19)(cid:15)(cid:6)(cid:3)(cid:16)(cid:6)-(cid:1)(cid:10)(cid:15)(cid:1)3(cid:10)(cid:5)(cid:5)(cid:1)(cid:16)(cid:13)(cid:3)(cid:19)(cid:10)+(cid:6)(cid:9)(cid:1)(cid:15)(cid:28)(cid:6)(cid:14)(cid:1)(cid:4)(cid:19)(cid:1)(cid:25)(cid:4)(cid:9)(cid:15)(cid:1)(cid:13)(cid:12)(cid:1)(cid:10)(cid:15)(cid:19)(cid:1) (cid:6)(cid:3)*(cid:10)(cid:9)(cid:13)(cid:3)(cid:14)(cid:6)(cid:3)(cid:15)(cid:1)(cid:4)(cid:3)+(cid:1)
(cid:15)(cid:28)(cid:6)(cid:10)(cid:9)(cid:1) ,(cid:6)(cid:28)(cid:4)*(cid:10)(cid:13)(cid:9)(cid:1) 3(cid:10)(cid:5)(cid:5)(cid:1) ,(cid:6)(cid:1) (cid:10)(cid:3)(cid:15)(cid:6)0(cid:9)(cid:4)(cid:15)(cid:6)+(cid:1) (cid:10)(cid:3)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:5)(cid:6)(cid:4)(cid:9)(cid:3)(cid:6)+(cid:1) (cid:28)2(cid:25)(cid:13)(cid:15)(cid:28)(cid:6)(cid:19)(cid:10)(cid:19)(cid:7)(cid:1) (cid:24)(cid:13)(cid:13)(cid:9)+(cid:10)(cid:3)(cid:4)(cid:15)(cid:10)(cid:3)0(cid:1) (cid:4)(cid:1)
0(cid:9)(cid:13)(cid:26)(cid:25)(cid:1),(cid:6)(cid:28)(cid:4)*(cid:10)(cid:13)(cid:9)(cid:1)(cid:19)(cid:6)(cid:6)(cid:14)(cid:19)(cid:1)(cid:15)(cid:13)(cid:1),(cid:6)(cid:1)(cid:25)(cid:13)(cid:19)(cid:19)(cid:10),(cid:5)(cid:6)(cid:1),2(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)(cid:5)(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:1)(cid:13)(cid:12)(cid:1)(cid:4)(cid:1)(cid:19)(cid:10)(cid:3)0(cid:5)(cid:6)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:7)(cid:1)(cid:1)
<(cid:3)(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)(cid:13)(cid:15)(cid:28)(cid:6)(cid:9)(cid:1)(cid:19)(cid:10)+(cid:6)-(cid:1)(cid:15)(cid:28)(cid:6)(cid:1) (cid:5)(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:1)(cid:13)(cid:12)(cid:1)(cid:4)(cid:1)(cid:19)(cid:10)(cid:3)0(cid:5)(cid:6)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1)3(cid:10)(cid:5)(cid:5)(cid:1)(cid:3)(cid:13)(cid:15)(cid:1)(cid:4)(cid:5)3(cid:4)2(cid:19)(cid:1) (cid:5)(cid:6)(cid:4)+(cid:1)
(cid:15)(cid:13)(cid:1) ,(cid:6)(cid:19)(cid:15)(cid:1) (cid:9)(cid:6)(cid:19)(cid:26)(cid:5)(cid:15)(cid:19)(cid:1) 3(cid:10)(cid:15)(cid:28)(cid:10)(cid:3)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:14)(cid:26)(cid:5)(cid:15)(cid:10)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1) (cid:5)(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:1) (cid:15)(cid:13)(cid:1) (cid:10)(cid:3)(cid:16)(cid:9)(cid:6)(cid:4)(cid:19)(cid:6)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:6)(cid:12)(cid:12)(cid:10)(cid:16)(cid:10)(cid:6)(cid:3)(cid:16)2(cid:7)(cid:1)
(cid:29)(cid:28)(cid:6)(cid:9)(cid:6)(cid:1)(cid:10)(cid:19)(cid:1)(cid:4)(cid:1)+(cid:10)(cid:12)(cid:12)(cid:6)(cid:9)(cid:6)(cid:3)(cid:16)(cid:6)(cid:1)(cid:13)(cid:12)(cid:1)(cid:16)(cid:13)(cid:3)(cid:19)(cid:16)(cid:10)(cid:13)(cid:26)(cid:19)(cid:3)(cid:6)(cid:19)(cid:19)(cid:1)(cid:13)(cid:12)(cid:1)(cid:13)(cid:15)(cid:28)(cid:6)(cid:9)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)-(cid:1)(cid:4)(cid:3)+(cid:1)(cid:16)(cid:13)(cid:13)(cid:9)+(cid:10)(cid:3)(cid:4)(cid:15)(cid:10)(cid:13)(cid:3)-(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)
;(cid:26)(cid:6)(cid:19)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1) (cid:4)(cid:9)(cid:10)(cid:19)(cid:10)(cid:3)0(cid:1) (cid:10)(cid:12)(cid:1) (cid:28)(cid:10)0(cid:28)(cid:6)(cid:9)(cid:1) (cid:5)(cid:6)*(cid:6)(cid:5)(cid:1) (cid:5)(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:1) 3(cid:10)(cid:5)(cid:5)(cid:1) (cid:10)(cid:14)(cid:25)(cid:5)(cid:10)(cid:16)(cid:10)(cid:15)(cid:5)2(cid:1) (cid:5)(cid:6)(cid:4)+(cid:1) (cid:15)(cid:13)(cid:1) (cid:28)(cid:10)0(cid:28)(cid:6)(cid:9)(cid:1)
(cid:25)(cid:6)(cid:9)(cid:12)(cid:13)(cid:9)(cid:14)(cid:4)(cid:3)(cid:16)(cid:6)(cid:19)(cid:7)(cid:1)
=(cid:10)(cid:19)(cid:15)(cid:9)(cid:10),(cid:26)(cid:15)(cid:6)+(cid:1)(cid:2)(cid:9)(cid:15)(cid:10)(cid:12)(cid:10)(cid:16)(cid:10)(cid:4)(cid:5)(cid:1)(cid:11)(cid:3)(cid:15)(cid:6)(cid:5)(cid:5)(cid:10)0(cid:6)(cid:3)(cid:16)(cid:6)(cid:1)>=(cid:2)(cid:11)?(cid:1)(cid:10)(cid:19)(cid:1)(cid:4)(cid:1) (cid:19)(cid:26),+(cid:13)(cid:14)(cid:4)(cid:10)(cid:3)(cid:1)(cid:13)(cid:12)(cid:1)(cid:4)(cid:9)(cid:15)(cid:10)(cid:12)(cid:10)(cid:16)(cid:10)(cid:4)(cid:5)(cid:1)
(cid:10)(cid:3)(cid:15)(cid:6)(cid:5)(cid:5)(cid:10)0(cid:6)(cid:3)(cid:16)(cid:6)(cid:1) >(cid:2)(cid:11)?-(cid:1) (cid:16)(cid:13)(cid:3)(cid:16)(cid:6)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:1) (cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1) (cid:15)(cid:28)(cid:4)(cid:15)(cid:1) (cid:16)(cid:13)(cid:3)(cid:19)(cid:10)(cid:19)(cid:15)(cid:1) (cid:10)(cid:3)(cid:1) (cid:19)(cid:6)*(cid:6)(cid:9)(cid:4)(cid:5)(cid:1) (cid:10)(cid:3)+(cid:6)(cid:25)(cid:6)(cid:3)+(cid:6)(cid:3)(cid:15)(cid:1)
(cid:6)(cid:3)(cid:15)(cid:10)(cid:15)(cid:10)(cid:6)(cid:19)(cid:1) 3(cid:28)(cid:10)(cid:16)(cid:28)(cid:1) (cid:10)(cid:3)(cid:15)(cid:6)(cid:9)(cid:4)(cid:16)(cid:15)(cid:1) (cid:10)(cid:3)(cid:1) (cid:4)(cid:1) (cid:16)(cid:6)(cid:9)(cid:15)(cid:4)(cid:10)(cid:3)(cid:1) +(cid:13)(cid:14)(cid:4)(cid:10)(cid:3)(cid:7)(cid:1) (cid:2)(cid:15)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) ,(cid:6)0(cid:10)(cid:3)(cid:3)(cid:10)(cid:3)0-(cid:1) =(cid:2)(cid:11)(cid:1) 3(cid:4)(cid:19)(cid:1)
+(cid:10)*(cid:10)+(cid:6)+(cid:1)(cid:10)(cid:3)(cid:15)(cid:13)(cid:1)(cid:15)3(cid:13)(cid:1)(cid:19)(cid:26),+(cid:10)(cid:19)(cid:16)(cid:10)(cid:25)(cid:5)(cid:10)(cid:3)(cid:6)(cid:19)@(cid:1)+(cid:10)(cid:19)(cid:15)(cid:9)(cid:10),(cid:26)(cid:15)(cid:6)+(cid:1)(cid:25)(cid:9)(cid:13),(cid:5)(cid:6)(cid:14)(cid:1)(cid:19)(cid:13)(cid:5)*(cid:10)(cid:3)0(cid:1)>=A(cid:8)?-(cid:1)(cid:12)(cid:13)(cid:16)(cid:26)(cid:19)(cid:6)+(cid:1)
(cid:13)(cid:3)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:14)(cid:4)(cid:3)(cid:4)0(cid:6)(cid:14)(cid:6)(cid:3)(cid:15)(cid:1) (cid:13)(cid:12)(cid:1) (cid:10)(cid:3)(cid:12)(cid:13)(cid:9)(cid:14)(cid:4)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1) 3(cid:10)(cid:15)(cid:28)(cid:10)(cid:3)(cid:1) (cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1) (cid:15)(cid:28)(cid:4)(cid:15)(cid:1) (cid:16)(cid:13)(cid:3)(cid:15)(cid:4)(cid:10)(cid:3)(cid:1) (cid:19)(cid:6)*(cid:6)(cid:9)(cid:4)(cid:5)(cid:1)
(cid:19)(cid:26),(cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1) 3(cid:13)(cid:9)5(cid:10)(cid:3)0(cid:1) (cid:15)(cid:13)0(cid:6)(cid:15)(cid:28)(cid:6)(cid:9)(cid:1) (cid:12)(cid:13)(cid:9)(cid:1) (cid:4)(cid:1) (cid:16)(cid:6)(cid:9)(cid:15)(cid:4)(cid:10)(cid:3)(cid:1) 0(cid:13)(cid:4)(cid:5)(cid:1) (cid:4)(cid:3)+(cid:1) (cid:14)(cid:26)(cid:5)(cid:15)(cid:10)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1) (cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1)
>& (cid:2)(cid:8)?-(cid:1) (cid:9)(cid:6)(cid:12)(cid:6)(cid:9)(cid:9)(cid:10)(cid:3)0(cid:1) (cid:15)(cid:13)(cid:1) (cid:14)(cid:4)(cid:3)(cid:4)0(cid:10)(cid:3)0(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) ,(cid:6)(cid:28)(cid:4)*(cid:10)(cid:13)(cid:9)(cid:1) (cid:13)(cid:12)(cid:1) (cid:4)(cid:1) (cid:16)(cid:13)(cid:5)(cid:5)(cid:6)(cid:16)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1) (cid:13)(cid:12)(cid:1) (cid:10)(cid:3)+(cid:6)(cid:25)(cid:6)(cid:3)+(cid:6)(cid:3)(cid:15)(cid:1)
(cid:6)(cid:3)(cid:15)(cid:10)(cid:15)(cid:10)(cid:6)(cid:19)(cid:1)(cid:13)(cid:9)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)(cid:7)(cid:1)(cid:1)
& (cid:26)(cid:5)(cid:15)(cid:10)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1) (cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1) >& (cid:2)(cid:8)?(cid:1) (cid:9)(cid:6)(cid:25)(cid:9)(cid:6)(cid:19)(cid:6)(cid:3)(cid:15)(cid:1) (cid:4)(cid:1) (cid:19)(cid:26),+(cid:13)(cid:14)(cid:4)(cid:10)(cid:3)(cid:1) (cid:13)(cid:12)(cid:1) (cid:4)(cid:9)(cid:15)(cid:10)(cid:12)(cid:10)(cid:16)(cid:10)(cid:4)(cid:5)(cid:1)
(cid:10)(cid:3)(cid:15)(cid:6)(cid:5)(cid:5)(cid:10)0(cid:6)(cid:3)(cid:16)(cid:6)(cid:1) 3(cid:28)(cid:10)(cid:16)(cid:28)(cid:1) (cid:13)(cid:12)(cid:12)(cid:6)(cid:9)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:25)(cid:9)(cid:10)(cid:3)(cid:16)(cid:10)(cid:25)(cid:5)(cid:6)(cid:19)(cid:1) (cid:12)(cid:13)(cid:9)(cid:1) ,(cid:26)(cid:10)(cid:5)+(cid:10)(cid:3)0(cid:1) (cid:16)(cid:13)(cid:14)(cid:25)(cid:5)(cid:6).(cid:1) (cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1) (cid:15)(cid:28)(cid:4)(cid:15)(cid:1)
(cid:10)(cid:14)(cid:25)(cid:5)2(cid:1) (cid:19)(cid:6)*(cid:6)(cid:9)(cid:4)(cid:5)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)(cid:1)(cid:4)(cid:3)+(cid:1)(cid:14)(cid:6)(cid:16)(cid:28)(cid:4)(cid:3)(cid:10)(cid:19)(cid:14)(cid:19)(cid:1)(cid:12)(cid:13)(cid:9)(cid:1)(cid:16)(cid:13)(cid:13)(cid:9)+(cid:10)(cid:3)(cid:4)(cid:15)(cid:10)(cid:3)0(cid:1)(cid:10)(cid:3)+(cid:6)(cid:25)(cid:6)(cid:3)+(cid:6)(cid:3)(cid:15)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)7(cid:1)
,(cid:6)(cid:28)(cid:4)*(cid:10)(cid:13)(cid:9)(cid:7)(cid:1) (cid:2)(cid:19)(cid:1) (cid:15)(cid:28)(cid:6)(cid:9)(cid:6)(cid:1) (cid:10)(cid:19)(cid:1) (cid:3)(cid:13)(cid:1) 0(cid:6)(cid:3)(cid:6)(cid:9)(cid:4)(cid:5)(cid:5)2(cid:1) (cid:4)(cid:16)(cid:16)(cid:6)(cid:25)(cid:15)(cid:6)+(cid:1) +(cid:6)(cid:12)(cid:10)(cid:3)(cid:10)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1) (cid:12)(cid:13)(cid:9)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:4)0(cid:6)(cid:3)(cid:15)-(cid:1) (cid:10)(cid:15)(cid:1) (cid:10)(cid:19)(cid:1)
(cid:16)(cid:13)(cid:3)(cid:19)(cid:10)+(cid:6)(cid:9)(cid:6)+(cid:1)(cid:15)(cid:28)(cid:4)(cid:15)(cid:1)(cid:4)(cid:3)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1)(cid:10)(cid:19)(cid:1)(cid:4)(cid:3)(cid:1)(cid:6)(cid:3)(cid:15)(cid:10)(cid:15)2-(cid:1)(cid:4)(cid:1) (cid:19)(cid:13)(cid:9)(cid:15)(cid:1)(cid:13)(cid:12)(cid:1) (cid:9)(cid:13),(cid:13)(cid:15)-(cid:1)3(cid:10)(cid:15)(cid:28)(cid:1)0(cid:13)(cid:4)(cid:5)(cid:19)-(cid:1)(cid:4)(cid:16)(cid:15)(cid:10)(cid:13)(cid:3)(cid:19)(cid:1)(cid:4)(cid:3)+(cid:1)
5(cid:3)(cid:13)3(cid:5)(cid:6)+0(cid:6)(cid:1)(cid:10)(cid:3)(cid:1)(cid:4)(cid:1)(cid:16)(cid:6)(cid:9)(cid:15)(cid:4)(cid:10)(cid:3)(cid:1)+(cid:13)(cid:14)(cid:4)(cid:10)(cid:3)-(cid:1)(cid:5)(cid:13)(cid:16)(cid:4)(cid:15)(cid:6)+(cid:1)3(cid:10)(cid:15)(cid:28)(cid:10)(cid:3)(cid:1)(cid:4)(cid:1)(cid:16)(cid:6)(cid:9)(cid:15)(cid:4)(cid:10)(cid:3)(cid:1)(cid:6)(cid:3)*(cid:10)(cid:9)(cid:13)(cid:3)(cid:14)(cid:6)(cid:3)(cid:15)(cid:7)(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:30)(cid:27)(cid:30)(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:7)(cid:1)(cid:8)(cid:6)(cid:9)(cid:10)(cid:4)(cid:1)(cid:11)(cid:3)(cid:12)(cid:13)(cid:9)(cid:14)(cid:4)(cid:15)(cid:10)(cid:16)(cid:17)(cid:7)(cid:1)(cid:18)(cid:13)(cid:5)(cid:7)(cid:1)(cid:11)(cid:18)(cid:1)(cid:12)(cid:4)(cid:19)(cid:16)(cid:7)(cid:1)(cid:11)(cid:1)(cid:20)(cid:1)(cid:21)(cid:22)(cid:22)(cid:23)(cid:1)
(cid:2)(cid:3)(cid:3)(cid:4)(cid:5)(cid:19)(cid:7)(cid:1)(cid:24)(cid:13)(cid:14)(cid:25)(cid:26)(cid:15)(cid:6)(cid:9)(cid:1)(cid:8)(cid:16)(cid:10)(cid:6)(cid:3)(cid:16)(cid:6)(cid:1)(cid:8)(cid:6)(cid:9)(cid:10)(cid:6)(cid:19)(cid:7)(cid:1)(cid:27)(cid:15)(cid:28)(cid:1)(cid:29)(cid:13)(cid:14)(cid:6)(cid:1)(cid:30)(cid:19)(cid:15)(cid:1)(cid:31)(cid:4)(cid:19)(cid:16)(cid:7)(cid:1)(cid:20)(cid:1)(cid:21)(cid:22)(cid:22)(cid:23)(cid:1)
(cid:8)(cid:6)(cid:3)((cid:13)(cid:9)(cid:19)(cid:1)
#(cid:12)(cid:12)(cid:6)(cid:16)(cid:15)(cid:13)(cid:9)(cid:19)(cid:1)
B(cid:13)(cid:4)(cid:5)(cid:19)(cid:1)
(cid:2)(cid:16)(cid:15)(cid:10)(cid:13)(cid:3)(cid:19)(cid:1)
=(cid:13)(cid:14)(cid:4)(cid:10)(cid:3)(cid:1)
C(cid:3)(cid:13)3(cid:5)(cid:6)+0(cid:6)(cid:1)
(cid:2)(cid:3)(cid:4)(cid:5)(cid:1)(cid:6)(cid:7)(cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:7)(cid:1)(cid:8)(cid:5)(cid:7)(cid:4)(cid:9)(cid:1)(cid:10)(cid:11)(cid:10)(cid:9)(cid:7)(cid:12)(cid:1)
(cid:2)0(cid:6)(cid:3)(cid:15)(cid:1)
(cid:1)
(cid:1)
=(cid:26)(cid:6)(cid:1) (cid:15)(cid:13)(cid:1) (cid:14)(cid:26)(cid:5)(cid:15)(cid:10)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1) (cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)7(cid:1) (cid:16)(cid:13)(cid:14)(cid:25)(cid:5)(cid:6).(cid:10)(cid:15)2-(cid:1) (cid:15)(cid:28)(cid:6)(cid:9)(cid:6)(cid:1) (cid:28)(cid:4)*(cid:6)(cid:1) (cid:15)(cid:13)(cid:1) ,(cid:6)(cid:1) (cid:12)(cid:13)(cid:26)(cid:3)+(cid:1)
(cid:19)(cid:13)(cid:5)(cid:26)(cid:15)(cid:10)(cid:13)(cid:3)(cid:19)(cid:1) (cid:12)(cid:13)(cid:9)(cid:1) (cid:26)(cid:19)(cid:10)(cid:3)0(cid:1) & (cid:4)(cid:16)(cid:28)(cid:10)(cid:3)(cid:6)(cid:1) ’(cid:6)(cid:4)(cid:9)(cid:3)(cid:10)(cid:3)0(cid:1) (cid:15)(cid:6)(cid:16)(cid:28)(cid:3)(cid:13)(cid:5)(cid:13)0(cid:10)(cid:6)(cid:19)(cid:1) (cid:15)(cid:13)(cid:1) (cid:14)(cid:4)(cid:3)(cid:4)0(cid:6)(cid:1) (cid:15)(cid:28)(cid:10)(cid:19)(cid:1)
(cid:16)(cid:13)(cid:14)(cid:25)(cid:5)(cid:6).(cid:10)(cid:15)2(cid:7)(cid:1)6(cid:6)(cid:12)(cid:13)(cid:9)(cid:6)(cid:1) (cid:19)(cid:15)(cid:26)+2(cid:10)(cid:3)0(cid:1)(cid:14)(cid:26)(cid:5)(cid:15)(cid:10)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)(cid:4)(cid:5)(cid:15)(cid:6)(cid:9)(cid:3)(cid:4)(cid:15)(cid:10)*(cid:6)(cid:1) (cid:19)(cid:28)(cid:13)(cid:26)(cid:5)+(cid:1),(cid:6)(cid:1)(cid:15)(cid:4)5(cid:6)(cid:3)(cid:1)(cid:10)(cid:3)(cid:15)(cid:13)(cid:1)
(cid:16)(cid:13)(cid:3)(cid:19)(cid:10)+(cid:6)(cid:9)(cid:4)(cid:15)(cid:10)(cid:13)(cid:3)-(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)(cid:4)(cid:5)(cid:15)(cid:6)(cid:9)(cid:3)(cid:4)(cid:15)(cid:10)*(cid:6)(cid:1),(cid:6)(cid:10)(cid:3)0(cid:1)(cid:16)(cid:6)(cid:3)(cid:15)(cid:9)(cid:4)(cid:5)(cid:10)((cid:6)+(cid:1) (cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1)3(cid:10)(cid:15)(cid:28)(cid:1)(cid:4)(cid:1) (cid:19)(cid:10)(cid:3)0(cid:5)(cid:6)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:7)(cid:1)
(cid:29)(cid:28)(cid:6)(cid:1)(cid:16)(cid:6)(cid:3)(cid:15)(cid:9)(cid:4)(cid:5)(cid:10)((cid:6)+(cid:1)(cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1)(cid:28)(cid:4)*(cid:6)(cid:1)(cid:4)(cid:1)(cid:19)(cid:10)(cid:3)0(cid:5)(cid:6)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1)(cid:15)(cid:28)(cid:4)(cid:15)(cid:1)(cid:10)(cid:19)(cid:1)(cid:14)(cid:4)5(cid:10)(cid:3)0(cid:1)(cid:4)(cid:5)(cid:5)(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)+(cid:6)(cid:16)(cid:10)(cid:19)(cid:10)(cid:13)(cid:3)(cid:19)-(cid:1)
3(cid:28)(cid:10)(cid:5)(cid:6)(cid:1) (cid:13)(cid:15)(cid:28)(cid:6)(cid:9)(cid:19)(cid:1) (cid:4)(cid:9)(cid:6)(cid:1) (cid:13)(cid:3)(cid:5)2(cid:1) (cid:28)(cid:6)(cid:5)(cid:25)(cid:10)(cid:3)0(cid:7)(cid:1) (cid:8)(cid:10)(cid:3)0(cid:5)(cid:6)(cid:1) (cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)(cid:1) (cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1) (cid:14)(cid:26)(cid:19)(cid:15)(cid:1) ,(cid:6)(cid:1) (cid:4)(cid:16)(cid:16)(cid:6)(cid:25)(cid:15)(cid:6)+(cid:1) (cid:4)(cid:19)(cid:1)
(cid:16)(cid:6)(cid:3)(cid:15)(cid:9)(cid:4)(cid:5)(cid:10)((cid:6)+(cid:1)(cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1)(cid:12)(cid:9)(cid:13)(cid:14)(cid:1)(cid:4)(cid:1)+(cid:13)(cid:14)(cid:4)(cid:10)(cid:3)(cid:1)(cid:15)(cid:28)(cid:4)(cid:15)(cid:1)(cid:4)(cid:5)(cid:19)(cid:13)(cid:1)(cid:4)(cid:5)(cid:5)(cid:13)3(cid:19)(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)(cid:14)(cid:26)(cid:5)(cid:15)(cid:10)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1)(cid:4)(cid:25)(cid:25)(cid:9)(cid:13)(cid:4)(cid:16)(cid:28)(cid:7)(cid:1)
(cid:2)(cid:1) (cid:19)(cid:10)(cid:3)0(cid:5)(cid:6)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1) (cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:1)(cid:16)(cid:4)(cid:3)(cid:1)(cid:28)(cid:4)*(cid:6)(cid:1) (cid:19)(cid:6)*(cid:6)(cid:9)(cid:4)(cid:5)(cid:1)(cid:10)(cid:3)(cid:25)(cid:26)(cid:15)(cid:1)+(cid:4)(cid:15)(cid:4)(cid:1)(cid:4)(cid:3)+(cid:1) (cid:19)(cid:6)*(cid:6)(cid:9)(cid:4)(cid:5)(cid:1)(cid:4)(cid:16)(cid:15)(cid:13)(cid:9)(cid:19)(cid:7)(cid:1)6(cid:26)(cid:15)(cid:1)(cid:10)(cid:12)(cid:1)
(cid:6)(cid:4)(cid:16)(cid:28)(cid:1) (cid:6)(cid:3)(cid:15)(cid:10)(cid:15)2(cid:1) (cid:10)(cid:19)(cid:1) (cid:15)(cid:9)(cid:4)(cid:3)(cid:19)(cid:14)(cid:10)(cid:15)(cid:15)(cid:10)(cid:3)0(cid:1) (cid:25)(cid:6)(cid:9)(cid:16)(cid:6)(cid:25)(cid:15)(cid:10)(cid:13)(cid:3)(cid:19)(cid:1) (cid:15)(cid:13)3(cid:4)(cid:9)+(cid:19)(cid:1) (cid:4)(cid:1) (cid:19)(cid:10)(cid:3)0(cid:5)(cid:6)(cid:1) (cid:16)(cid:13)(cid:9)(cid:6)(cid:1) (cid:25)(cid:9)(cid:13)(cid:16)(cid:6)(cid:19)(cid:19)(cid:1) (cid:4)(cid:3)+(cid:1)
(cid:9)(cid:6)(cid:16)(cid:6)(cid:10)*(cid:6)(cid:19)(cid:1)(cid:4)(cid:16)(cid:15)(cid:10)(cid:13)(cid:3)(cid:19)(cid:1)(cid:12)(cid:9)(cid:13)(cid:14)(cid:1)(cid:10)(cid:15)-(cid:1)(cid:15)(cid:28)(cid:6)(cid:3)(cid:1)(cid:15)(cid:28)(cid:6)(cid:9)(cid:6)(cid:1)(cid:10)(cid:19)(cid:1)(cid:13)(cid:3)(cid:5)2(cid:1)(cid:13)(cid:3)(cid:6)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1)(cid:9)(cid:6)(cid:25)(cid:9)(cid:6)(cid:19)(cid:6)(cid:3)(cid:15)(cid:6)+(cid:1),2(cid:1)(cid:15)(cid:28)(cid:6)(cid:1)(cid:16)(cid:13)(cid:9)(cid:6)(cid:1)
(cid:25)(cid:9)(cid:13)(cid:16)(cid:6)(cid:19)(cid:19)(cid:7)(cid:1) : (cid:10)(cid:15)(cid:28)(cid:10)(cid:3)(cid:1) (cid:4)(cid:1) (cid:19)(cid:10)(cid:3)0(cid:5)(cid:6)(cid:1) (cid:4)0(cid:6)(cid:3)(cid:15)(cid:1) (cid:25)(cid:9)(cid:13)(cid:16)(cid:6)(cid:19)(cid:19)-(cid:1) (cid:10)(cid:15)(cid:1) (cid:10)(cid:19)(cid:1) (cid:14)(cid:13)+(cid:6)(cid:5)(cid:10)(cid:3)0(cid:1) (cid:10)(cid:15)(cid:19)(cid:6)(cid:5)(cid:12)-(cid:1) (cid:14)(cid:13)+(cid:6)(cid:5)(cid:10)(cid:3)0(cid:1) (cid:15)(cid:28)(cid:6)(cid:1)
(cid:6)(cid:3)*(cid:10)(cid:9)(cid:13)(cid:3)(cid:14)(cid:6)(cid:3)(cid:15)(cid:1)(cid:4)(cid:3)+(cid:1)(cid:10)(cid:15)(cid:19)(cid:1)(cid:10)(cid:3)(cid:15)(cid:6)(cid:9)(cid:4)(cid:16)(cid:15)(cid:10)(cid:13)(cid:3)(cid:19)(cid:1)3(cid:10)(cid:15)(cid:28)(cid:1)(cid:10)(cid:15)(cid:7)(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)(cid:30)(cid:27)(cid:21)(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:7)(cid:1)(cid:8)(cid:6)(cid:9)(cid:10)(cid:4)(cid:1)(cid:11)(cid:3)(cid:12)(cid:13)(cid:9)(cid:14)(cid:4)(cid:15)(cid:10)(cid:16)(cid:17)(cid:7)(cid:1)(cid:18)(cid:13)(cid:5)(cid:7)(cid:1)(cid:11)(cid:18)(cid:1)(cid:12)(cid:4)(cid:19)(cid:16)(cid:7)(cid:1)(cid:11)(cid:1)(cid:20)(cid:1)(cid:21)(cid:22)(cid:22)(cid:23)(cid:1)
(cid:2)(cid:3)(cid:3)(cid:4)(cid:5)(cid:19)(cid:7)(cid:1)(cid:24)(cid:13)(cid:14)(cid:25)(cid:26)(cid:15)(cid:6)(cid:9)(cid:1)(cid:8)(cid:16)(cid:10)(cid:6)(cid:3)(cid:16)(cid:6)(cid:1)(cid:8)(cid:6)(cid:9)(cid:10)(cid:6)(cid:19)(cid:7)(cid:1)(cid:27)(cid:15)(cid:28)(cid:1)(cid:29)(cid:13)(cid:14)(cid:6)(cid:1)(cid:30)(cid:19)(cid:15)(cid:1)(cid:31)(cid:4)(cid:19)(cid:16)(cid:7)(cid:1)(cid:20)(cid:1)(cid:21)(cid:22)(cid:22)(cid:23)(cid:1)
#(cid:3)*(cid:10)(cid:9)(cid:13)(cid:3)(cid:14)(cid:6)(cid:3)(cid:15)(cid:1)
(cid:8)(cid:6)(cid:3)((cid:13)(cid:9)(cid:1)
#(cid:12)(cid:12)(cid:6)(cid:16)(cid:15)(cid:13)(cid:9)(cid:1)
B(cid:13)(cid:4)(cid:5)(cid:19)(cid:1)
(cid:2)(cid:16)(cid:15)(cid:10)(cid:13)(cid:3)(cid:19)(cid:1)
=(cid:13)(cid:14)(cid:4)(cid:10)(cid:3)(cid:1)
C(cid:3)(cid:13)3(cid:5)(cid:6)+0(cid:6)(cid:1)
(cid:1)
(cid:2)0(cid:6)(cid:3)(cid:15)(cid:1)
(cid:8)(cid:6)(cid:3)((cid:13)(cid:9)(cid:1)
#(cid:12)(cid:12)(cid:6)(cid:16)(cid:15)(cid:13)(cid:9)(cid:1)
(cid:1)
B(cid:13)(cid:4)(cid:5)(cid:19)(cid:1)
(cid:2)(cid:16)(cid:15)(cid:10)(cid:13)(cid:3)(cid:19)(cid:1)
=(cid:13)(cid:14)(cid:4)(cid:10)(cid:3)(cid:1)
C(cid:3)(cid:13)3(cid:5)(cid:6)+0(cid:6)(cid:1)
(cid:1)
(cid:2)0(cid:6)(cid:3)(cid:15)(cid:1)
(cid:2)(cid:3)(cid:4)(cid:5)(cid:8)(cid:7)(cid:1)(cid:13)(cid:14)(cid:6)(cid:9)(cid:3)(cid:8)(cid:5)(cid:7)(cid:4)(cid:9)(cid:1)(cid:10)(cid:11)(cid:10)(cid:9)(cid:7)(cid:12)(cid:1)
(cid:1)
(cid:1)
(cid:29)(cid:28)(cid:6)(cid:1)(cid:14)(cid:26)(cid:5)(cid:15)(cid:10)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1) (cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)(cid:1)(cid:4)(cid:9)(cid:6)(cid:1)+(cid:10)(cid:12)(cid:12)(cid:6)(cid:9)(cid:6)(cid:3)(cid:15)(cid:1)(cid:12)(cid:9)(cid:13)(cid:14)(cid:1)(cid:15)(cid:28)(cid:6)(cid:1) (cid:19)(cid:10)(cid:3)0(cid:5)(cid:6)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:1) (cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)-(cid:1)
(cid:4)(cid:3)+(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) +(cid:10)(cid:12)(cid:12)(cid:6)(cid:9)(cid:6)(cid:3)(cid:16)(cid:6)(cid:1) (cid:16)(cid:13)(cid:3)(cid:19)(cid:10)(cid:19)(cid:15)(cid:19)(cid:1) (cid:10)(cid:3)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:6).(cid:10)(cid:19)(cid:15)(cid:6)(cid:3)(cid:16)(cid:6)(cid:1) (cid:13)(cid:12)(cid:1) (cid:19)(cid:6)*(cid:6)(cid:9)(cid:4)(cid:5)(cid:1) (cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)(cid:1) 3(cid:28)(cid:10)(cid:16)(cid:28)(cid:1) (cid:4)(cid:9)(cid:6)(cid:1)
(cid:14)(cid:13)+(cid:6)(cid:5)(cid:10)(cid:3)0(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) 0(cid:13)(cid:4)(cid:5)(cid:19)(cid:1) (cid:4)(cid:3)+(cid:1) (cid:4)(cid:16)(cid:15)(cid:10)(cid:13)(cid:3)(cid:19)(cid:1) ,(cid:6)(cid:15)3(cid:6)(cid:6)(cid:3)(cid:1) (cid:15)(cid:28)(cid:6)(cid:14)(cid:19)(cid:6)(cid:5)*(cid:6)(cid:19)(cid:7)(cid:1) 6(cid:6)(cid:15)3(cid:6)(cid:6)(cid:3)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)(cid:1)
(cid:15)(cid:28)(cid:6)(cid:9)(cid:6)(cid:1) (cid:10)(cid:19)(cid:1) (cid:26)(cid:19)(cid:26)(cid:4)(cid:5)(cid:5)2(cid:1) (cid:4)(cid:1) +(cid:10)(cid:9)(cid:6)(cid:16)(cid:15)(cid:1) (cid:10)(cid:3)(cid:15)(cid:6)(cid:9)(cid:4)(cid:16)(cid:15)(cid:10)(cid:13)(cid:3)-(cid:1) ,(cid:26)(cid:15)(cid:1) (cid:4)(cid:5)(cid:15)(cid:28)(cid:13)(cid:26)0(cid:28)(cid:1) (cid:15)(cid:28)(cid:10)(cid:19)(cid:1) (cid:10)(cid:3)(cid:15)(cid:6)(cid:9)(cid:4)(cid:16)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1) (cid:10)(cid:19)(cid:1) (cid:19)(cid:6)(cid:6)(cid:3)(cid:1) (cid:4)(cid:19)(cid:1)
(cid:19)(cid:15)(cid:10)(cid:14)(cid:26)(cid:5)(cid:10)(cid:1) (cid:13)(cid:12)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:6)(cid:3)*(cid:10)(cid:9)(cid:13)(cid:3)(cid:14)(cid:6)(cid:3)(cid:15)-(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:16)(cid:13)(cid:14)(cid:14)(cid:26)(cid:3)(cid:10)(cid:16)(cid:4)(cid:15)(cid:10)(cid:13)(cid:3)(cid:1) ,(cid:6)(cid:15)3(cid:6)(cid:6)(cid:3)(cid:1) (cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)(cid:1) (cid:10)(cid:19)(cid:1) +(cid:10)(cid:19)(cid:15)(cid:10)(cid:3)(cid:16)(cid:15)(cid:1)
(cid:12)(cid:9)(cid:13)(cid:14)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) (cid:6)(cid:3)*(cid:10)(cid:9)(cid:13)(cid:3)(cid:14)(cid:6)(cid:3)(cid:15)(cid:7)(cid:1) (cid:11)(cid:3)(cid:1) (cid:16)(cid:4)(cid:19)(cid:6)(cid:1) (cid:13)(cid:12)(cid:1) (cid:15)(cid:28)(cid:6)(cid:19)(cid:6)(cid:1) (cid:19)2(cid:19)(cid:15)(cid:6)(cid:14)(cid:19)-(cid:1) (cid:15)(cid:28)(cid:6)(cid:1) +2(cid:3)(cid:4)(cid:14)(cid:10)(cid:16)(cid:1) (cid:13)(cid:12)(cid:1) (cid:15)(cid:28)(cid:6)(cid:1)
(cid:6)(cid:3)*(cid:10)(cid:9)(cid:13)(cid:3)(cid:14)(cid:6)(cid:3)(cid:15)(cid:1)(cid:16)(cid:4)(cid:3)(cid:1),(cid:6)(cid:1)+(cid:6)(cid:12)(cid:10)(cid:3)(cid:6)+(cid:1),2(cid:1)(cid:13)(cid:15)(cid:28)(cid:6)(cid:9)(cid:1)(cid:4)0(cid:6)(cid:3)(cid:15)(cid:19)(cid:7)(cid:1)
(cid:1)
(cid:1)
$(cid:10)(cid:22)(cid:10)(cid:6)(cid:10)(cid:15)(cid:28)(cid:10)(cid:12)(cid:11)
D& (cid:10)(cid:15)!EF(cid:1) (cid:1) & (cid:10)(cid:15)(cid:16)(cid:28)(cid:6)(cid:5)(cid:5)(cid:1)(cid:29)(cid:7)(cid:1)(cid:20)(cid:1)(cid:13)(cid:8)(cid:15)(cid:16)(cid:3)(cid:4)(cid:7)(cid:1)(cid:17)(cid:7)(cid:8)(cid:18)(cid:4)(cid:3)(cid:4)(cid:5)-(cid:1)& (cid:16)B(cid:9)(cid:4)3(cid:20)G(cid:10)(cid:5)(cid:5)-(cid:1)(cid:30)!!E(cid:7)(cid:1)
(cid:1)
DA(cid:13)(cid:25)(cid:22)(cid:27)F(cid:1) A(cid:13)(cid:25)(cid:1) G(cid:7)(cid:31)(cid:7)(cid:1) (cid:20)(cid:1) (cid:2)(cid:3)(cid:10)(cid:9)(cid:7)(cid:12)(cid:7)(cid:1) (cid:3)(cid:4)(cid:9)(cid:7)(cid:6)(cid:3)(cid:5)(cid:7)(cid:4)(cid:9)(cid:7)(cid:1) (cid:19)(cid:4)(cid:1) (cid:20)(cid:18)(cid:21)(cid:22)(cid:6)(cid:7)(cid:12)(cid:7)(cid:1) (cid:23)(cid:7)(cid:1) (cid:15)(cid:6)(cid:8)(cid:10)(cid:3)(cid:24)(cid:3)(cid:15)(cid:8)(cid:18)(cid:7)-(cid:1)
& (cid:6)+(cid:10)(cid:4)(cid:14)(cid:10)(cid:9)(cid:4)(cid:1)A(cid:26),(cid:5)(cid:10)(cid:19)(cid:28)(cid:10)(cid:3)0(cid:1)(cid:24)(cid:13)(cid:7)-(cid:1)(cid:24)(cid:5)(cid:26)4(cid:20)H(cid:4)(cid:25)(cid:13)(cid:16)(cid:4)-(cid:1)(cid:21)(cid:22)(cid:22)(cid:27)(cid:1)
(cid:1)
(cid:1)
DI(cid:26)(cid:10)! F(cid:1)
(cid:1)
(cid:1)
I(cid:26)(cid:10)(cid:3)(cid:5)(cid:4)(cid:3)(cid:1) J(cid:7)"(cid:7)(cid:1) (cid:20)(cid:1) (cid:25)(cid:26)(cid:27)(cid:28)(cid:27)(cid:29)(cid:1) (cid:30)(cid:18)(cid:21)(cid:5)(cid:18)(cid:8)(cid:12)(cid:10)(cid:1) (cid:24)(cid:21)(cid:18)(cid:1) (cid:13)(cid:8)(cid:15)(cid:16)(cid:3)(cid:4)(cid:7)(cid:1) (cid:17)(cid:7)(cid:8)(cid:18)(cid:4)(cid:3)(cid:4)(cid:5)-(cid:1) & (cid:13)(cid:9)0(cid:4)(cid:3)(cid:1)
C(cid:4)(cid:26)(cid:12)(cid:14)(cid:4)(cid:3)(cid:3)-(cid:1)(cid:8)(cid:4)(cid:3)(cid:1)& (cid:4)(cid:15)(cid:6)(cid:13)-(cid:1)(cid:24)(cid:4)(cid:5)(cid:10)(cid:12)(cid:13)(cid:9)(cid:3)(cid:10)(cid:4)(cid:7)(cid:1)(cid:30)!! (cid:1)
(cid:30)(cid:27) (cid:1)
(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:7)(cid:1)(cid:8)(cid:6)(cid:9)(cid:10)(cid:4)(cid:1)(cid:11)(cid:3)(cid:12)(cid:13)(cid:9)(cid:14)(cid:4)(cid:15)(cid:10)(cid:16)(cid:17)(cid:7)(cid:1)(cid:18)(cid:13)(cid:5)(cid:7)(cid:1)(cid:11)(cid:18)(cid:1)(cid:12)(cid:4)(cid:19)(cid:16)(cid:7)(cid:1)(cid:11)(cid:1)(cid:20)(cid:1)(cid:21)(cid:22)(cid:22)(cid:23)(cid:1)
(cid:2)(cid:3)(cid:3)(cid:4)(cid:5)(cid:19)(cid:7)(cid:1)(cid:24)(cid:13)(cid:14)(cid:25)(cid:26)(cid:15)(cid:6)(cid:9)(cid:1)(cid:8)(cid:16)(cid:10)(cid:6)(cid:3)(cid:16)(cid:6)(cid:1)(cid:8)(cid:6)(cid:9)(cid:10)(cid:6)(cid:19)(cid:7)(cid:1)(cid:27)(cid:15)(cid:28)(cid:1)(cid:29)(cid:13)(cid:14)(cid:6)(cid:1)(cid:30)(cid:19)(cid:15)(cid:1)(cid:31)(cid:4)(cid:19)(cid:16)(cid:7)(cid:1)(cid:20)(cid:1)(cid:21)(cid:22)(cid:22)(cid:23)(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)
(cid:1)(cid:30)(cid:27)(cid:27)(cid:1)
|
1811.09306 | 1 | 1811 | 2018-11-22T21:04:52 | Second-Order Agents on Ring Digraphs | [
"cs.MA",
"eess.SY",
"math.OC"
] | The paper addresses the problem of consensus seeking among second-order linear agents interconnected in a specific ring topology. Unlike the existing results in the field dealing with one-directional digraphs arising in various cyclic pursuit algorithms or two-directional graphs, we focus on the case where some arcs in a two-directional ring graph are dropped in a regular fashion. The derived condition for achieving consensus turns out to be independent of the number of agents in a network. | cs.MA | cs | Second-Order Agents on Ring Digraphs
Sergei Parsegov
Pavel Chebotarev
Skolkovo Institute of Science and Technology;
V.A. Trapeznikov Institute of Control Sciences
V.A. Trapeznikov Institute of Control Sciences
of Russian Academy of Sciences;
of Russian Academy of Sciences
V.A. Kotelnikov Institute of Radioengineering and Electronics
Moscow, Russia
[email protected]
of Russian Academy of Sciences
Moscow, Russia
[email protected]
8
1
0
2
v
o
N
2
2
]
A
M
.
s
c
[
1
v
6
0
3
9
0
.
1
1
8
1
:
v
i
X
r
a
Abstract -- The paper addresses the problem of consensus
seeking among second-order linear agents interconnected in a
specific ring topology. Unlike the existing results in the field
dealing with one-directional digraphs arising in various cyclic
pursuit algorithms or two-directional graphs, we focus on the case
where some arcs in a two-directional ring graph are dropped in
a regular fashion. The derived condition for achieving consensus
turns out to be independent of the number of agents in a network.
Index Terms -- ring digraph, cyclic pursuit, second-order agents
I. INTRODUCTION
Simple averaging control laws based on local interactions
have paved the way to a new class of models in modern control
theory and, more widely,
in the interconnected dynamical
systems theory. Such systems consist of a large (as usual)
number of identical subsystems and are supposed to achieve
certain global goals. The subsystems, or agents, are coupled
in some way and therefore share an amount of common
information. During the last 15 years,
the complexity of
models of networked systems increased significantly starting
from a simple continuous-time consensus model (suprisingly
first proposed by sociologists in 1964 and rediscovered much
later), see [1] for details. It
to analyze the
evolution of these models considering separately three main
entities comprising a dynamical network: agent complexity,
interaction structure complexity, and link complexity. Recent
results and challeging problems in this field may be found
in the lecture course [2] and monographs [3] and [4]. In this
paper, we focus on specific interaction structures and analyze
their properties in the case of second-order agents.
is convenient
Control problems related to networks with specific com-
munication patterns play an important
role in coopera-
tive/decentralized control. Within this trend, it is supposed
that each agent
interacts with a predefined number of its
indexed neighbors. A pioneering work on consensus where
a simple averaging rule was proposed and thoroughly studied
was published in 1878 by J.G. Darboux [5]. Although this
problem dealt with the evolution of planar polygons, it turned
out to be the first theoretical result on discrete-time cyclic
The results were obtained with support of the Russian Science Foundation,
project no. 16-11-00063 granted to IRE RAS.
pursuit. This class of algorithms has a long history (see, e.g.,
[6], [7], [8], [9], and references therein), and has a wide
range of applications including but not
limited to numer-
ous formation control tasks as patrolling, boundary mapping,
etc. The cyclic pursuit is a strategy where agent i pursues
its neighbor i − 1 , while agent 1 pursues agent n, thus
the topology of communication is a Hamiltonian cycle. The
extensions to hierarchical structures are considered in [10]
and [11]; [12] addresses the case of heterogeneous agents;
geometrical problems related to cyclic pursuit-like algorithms
are investigated in [13] and [14]. Some pursuit algorithms
utilize the rotation operator in order to follow the desired
trajectories, see [15] and references therein. Another group of
strategies/protocols are based on two-directional topologies,
i.e., each agent i has the relative information of the neighbors
i − 1 and i + 1 (with 0 ≡ n). For example, in [16] the
agents are interconnected by a two-directional ring. The row
straightening problems studied in [17], [18], [19] also imply
symmetric communications except for the fixed "anchors"
(the endpoints of the segment). Theoretical motivation behind
studying regular network structures is that for some cases, this
may lead to the closed-form computation of the spectra of the
corresponding Laplacian matrices.
In what follows, we study the problem of reaching consen-
sus for second-order agents with velocity damping (friction).
The models of such kind naturally arise, e.g.,
in energy
systems [20] and formation control [2], [21], [22]. The com-
munication topology studied in the present paper is a digraph
G with a specific structure: it has n = 2m vertices, m ≥ 3,
and contains a Hamiltonian cycle supplemented by the inverse
cycle, where every second arc is dropped, see Fig. 1. In some
sense, this "intermediate" digraph with regular structure lies
between the two-directional ring and the Hamiltonian cycle
appearing in cyclic pursuit algorithms. The obtained results
fill the gap between undirected and directed ring topologies
for this special case: the loss of arcs may result in instability
of the whole system and therefore a challenging problem is to
derive a suitable condition on the tunable damping parameter
that guarantees convergence to consensus irrespective of the
number of agents in the network. Alternatively, one may
consider the opposite transformation, that is addition of arcs
to an unidirected communication structure in order to reduce
relatively high damping coefficients of agents.
The paper is organized as follows. The next section presents
the notations used in the paper. Section 3 introduces some
mathematical preliminaries needed for further exposition and
discusses the statement of the problem. The main theoretical
result is formulated and proved in Section 4. Finally, the results
of numerical simulation and conclusions are given.
II. NOTATIONS
are reserved for indices;
The following notation will be used throughout the paper:
√−1 denotes the imaginary unit, the letters i and k
• j :=
• the unit vector is defined by 1n := [1, 1, . . . , 1](cid:62) ∈ Rn;
• ⊗ denotes the Kronecker product of two matrices.
Below we consider some definitions and auxiliary lemmas
needed for further discussion and give an exact problem
formulation.
III. PRELIMINARIES AND PROBLEM STATEMENT
Throughout the paper, we consider a group of n identical
agents with a directed communication topology and suppose
that n = 2m, where m ≥ 3. Each agent obeys the second-
order dynamics of the form
i ∈ 1 : n,
vi = −γvi + ui,
(1)
where xi, vi, ui ∈ R are the position coordinate of the ith
agent, its velocity and control input, respectively; γ > 0
denotes the damping coefficient.
The state-space representation of system (1) writes as
(cid:26) xi = vi,
ξi = Aξi + Bui,
(cid:21)
(cid:20)0
1
0 −γ
where ξi = [xi, vi]
(cid:62), A =
, and B = [0, 1]
Suppose that the agents interact through the topology de-
picted in Fig. 1. Thus, each agent knows the relative distances
(2)
(cid:62).
These conditions turn out to be independent on the number of
agents comprising the network system.
The following definitions and results are used in the further
considerations.
A. Graph Theory
We suppose that the communication network is represented
by a fixed, directed graph G = (V,E), where V = {1, . . . , n}
denotes the vertex (or node) set and E is the set of arcs. We
also assume that the graph is simple, i.e., it has no self-loops,
and no multiple arcs. Let us define the Laplacian matrix of an
unweighted digraph G as follows:
Definition 1 ([23]). The Laplacian matrix of a digraph G is
the matrix L = (lik) ∈ Rn×n in which, for k (cid:54)= i, lik =
−1 whenever (i, k) ∈ E(G), otherwise lik = 0. The diagonal
k(cid:54)=i lik, i, k ∈ V(G).
Lemma 1 ([24], [25]). The Laplacian matrix L of a directed
graph G has at least one zero eigenvalue with 1n as a corre-
sponding right eigenvector and all nonzero eigenvalues have
positive real parts. Furthermore, zero is a simple eigenvalue
of L if and only if G has a spanning converging tree, i.e., it
has at least one vertex accessible from all other vertices.
entries of L are of the form lii = −(cid:80)
Obviously,
the digraph G depicted in Fig. 1 is simple,
unweighted, and contains a spanning converging tree.
The system of n agents (1) with feedback protocol (3) obeys
the following dynamics:
x + γ x = −Lx,
(5)
where x = [x1, . . . , xn](cid:62) and L is the Laplacian matrix
associated with the dependency digraph G:
0 −1
0
0
0
0
···
0
0
···
0
0
2 −1
···
...
...
...
...
...
0 −1
1
0
0
0 −1
2 −1
0
0 −1
1
0
0
2 −1
−1
1
0 −1
...
...
···
···
···
this closed-loop network system can be
(6)
L =
0
0
0
Also note that
.
equivalently described by
Fig. 1. The interaction topology between agents (1).
ξ = F ξ,
where F ∈ R2n×2n has the form
between itself and the nearest one or two indexed neighbors.
Let K ∈ R1×2 be the matrix K = [1, 0],
therefore the
decentralized control protocol has the form
(cid:26)K(ξi+1 − ξi) + K(ξi−1 − ξi), i is odd,
i ∈1 : n. (3)
ui =
K(ξi−1 − ξi),
i is even,
The main objective of the paper is to establish conditions for
a network of second-order agents (1), (2) governed by protocol
(3) that guarantee consensus in the sense of
t→∞(cid:107)ξi(t) − ξk(t)(cid:107) = 0, ∀i, k ∈ 1 : n.
lim
(4)
F = I ⊗ A − L ⊗ BK,
and I ∈ Rn×n denotes the identity matrix.
Although the consensus conditions (5), (7) can be verified in
a straightforward way, this may be computationally expensive
in the case of a large number of agents. The framework
presented below allows to reduce the problem to a couple
of simpler ones using the notion of consensus region. The
criterion for scalar agents was first proposed by Polyak and
Tsypkin in [26]; similar results were obtained later in [28] and
[27]. Some other extensions may be found in [3] and [4].
(7)
(8)
B. Consensus Region
Suppose that the consensus problem is studied for a net-
worked dynamical system described by the equation
φ(s)x = −Lx,
dt, and L is the
where φ(s) is a scalar polynomial, s := d
Laplacian matrix of the dependency digraph containing a
spanning converging tree.
Definition 2 ([4], [26], [27]). The Ω-region of the function
φ(s) is the set of points λ on the complex plane for which the
function φ(s) − λ has no zeros in the closed right half-plane:
Ω = {λ ∈ C : φ(s) − λ (cid:54)= 0 whenever Re(s) ≥ 0}.
Note that Ω is precisely the region of parameters λ such
that the matrix A − λBK is Hurwitz stable. The function
φ(s) is sometimes referred to as the generalized frequency
variable [27], [28].
Lemma 2 ( [4], [26], [27]). The system described by (2)
reaches consensus under protocol (3) if and only if
λi ∈ Ω,
i ∈ 2 : n,
where λi, i ∈ 2 : n, are the nonzero eigenvalues of −L.
The details of determining the consensus region may be
found in [26]; in the case of φ(s) = s2 + γs, γ > 0, this
region has form of the interior of a parabola in the complex
plane: φ(jω) = −ω2 + jγω, −∞ < ω < ∞.
C. Cyclotomic Equation
Lemma 3 ([29]). The roots of the cyclotomic equation
zm − 1 = 0
are the de Moivre numbers
zk = ej 2πk
m , k ∈ 0 : m − 1.
They form a regular polygon with each vertex lying on the
unit circle in the complex plane.
D. Cassini Ovals
Definition 3 ([30]). The Cassini curve (or the Cassini ovals)
is a quartic curve defined as the set of points in the plane such
that the product of the distances (denoted by b2) to two fixed
points (a, 0) and (−a, 0) is constant:
[(x − a)2 + y2][(x + a)2 + y2] = b4.
(9)
IV. MAIN RESULTS
Based on the above problem formulation and preliminary re-
sults, in this section we derive analytic conditions of achieving
consensus for network systems (5), (7). These conditions turn
out to be independent of the number of agents.
First, we study the spectrum of the Laplacian matrix de-
fined by (6) and obtain the curves which are the loci of its
eigenvalues.
(cid:113)
and its roots are
λ(1,2)
k
= 1.5 ± 0.5
Let the kth root of unity zk = ej 2πk
m − 1. Then
5 + 4ej 2πk
(12)
m .
m be ak + jbk, k ∈ 0 :
(cid:113)
√
Lemma 4. The eigenvalues of Laplacian matrix (6) have the
form
λ(1,2)
k
= 1.5 ± 0.5
5 + 4ej 2πk
m
and lie on the Cassini ovals defined by
√
[(x −
5)2 + y2] = 24,
5)2 + y2][(x +
where x = 2(x − 3/2), y = 2y.
Proof. According to Theorem 4 in [31] our graph is essentially
cyclic (i.e., the spectrum of L contains non-real eigenvalues)
and the characteristic polynomial of L is of the form
(10)
(Z2(λ))m − 1,
where Zn(λ) = (λ − 2)Zn−1(λ) − Zn−2(λ) is a modified
Chebyshev polynomial of the second kind with the initial
conditions Z0(λ) ≡ 1, Z1(λ) ≡ λ − 1, see [31] for details.
Armed with the knowledge gained from Theorem 4 in [31]
and Lemma 3 we find Z2 = λ2 − 3λ + 1, the characteristic
polynomial of L is
(λ2 − 3λ + 1)m − 1,
(11)
a2
k + b2
k = 1.
(13)
The 2m roots of (11) can be found from the equation
λ2 − 3λ + 1 − ak − jbk = 0, k = 0, 1, . . . , m − 1.
Let λ = x + jy. Then from
x + jy = 1.5 ± 0.5(cid:112)5 + 4ak + j4bk
we find ak = (x − 3/2)2 − y2 − 5/4 and bk = 2yx − 3y.
Taking into account (13) one arrives at
((x − 3/2)2 − y2 − 5/4)2 + 4y2(x − 3/2)2 = 1.
The last equation can be simply rewritten in the form of (10).
The eigenvalues of L with n = 16 and n = 44 are shown in
Fig. 2. The egg-shaped Cassini ovals can be recognized easily.
Corollary 1. The eigenvalues of −L are
(cid:113)
λ(1,2)
k
= −1.5 ± 0.5
5 + 4ej 2πk
m
(14)
and the equation of the corresponding Cassini curve is
((x + 3/2)2 − y2 − 5/4)2 + 4y2(x + 3/2)2 − 1 = 0.
(15)
Remark 1. According to consensus criterion [4], [26], [27]
for the second-order agents (1), the consensus is reached if
and only if all the nonzero eigenvalues of −L lie in the Ω-
region of φ(s) = s2 + γs. Checking this criterion requires
Fig. 2. The eigenvalues of L with n = 16 and n = 44.
computation of the spectrum. Below we propose a condition
independent of the number of agents. It is sufficient yet simple
and not that much conservative.
Theorem 1. The system of interconnected second-order agents
(7) reaches a consensus in the sense of (4) for all γ >
7 .
Proof. Since φ(jω) = −ω2 + jγω,
the equation can be
rewritten as y2 = −γ2x. Therefore, the consensus condition
can be reduced to the condition that the Cassini ovals described
by (15) in Corollary 1 belong to the interior of the parabola
y2 = −γ2x without intersection (except for the one at the
origin), see Fig. 3. Substituting this into (15) we arrive at the
(cid:113) 6
Fig. 4. Ω-region bounded by y2 = −γ2x and the Cassini ovals, γ = 0.7.
Remark 2. In this paper, we limit ourselves to the case of
m ≥ 3 due to the fact that for m = 1, the considered graph
does not exist and the case of m = 2 results in a real spectrum
of L [31] which implies reaching consensus for any γ > 0.
Remark 3. By virtue of the consensus region approach, a
similar condition for second-order agents whose dependency
digraph is a Hamiltonian cycle (Fig. 5) can be derived. In this
case, the corresponding Laplacian matrix is a circulant matrix
(see, e.g., [32] for details). Its eigenvalues are located on a unit
circle centered at (−1, j0). Recall that the consensus region
Fig. 5. Diraph of the cyclic pursuit.
Fig. 3. Ω-region bounded by y2 = −γ2x and the Cassini ovals, γ = 2.
equation in x with parameter γ:
x(x3 + (6− 2γ2)x2 + (γ4 − 6γ2 + 11)x + 6− 7γ2) = 0. (16)
The zero root is out of our interest, thus let us study the
properties of the cubic polynomial
x3 + (6 − 2p)x2 + (p2 − 6p + 11)x + 6 − 7p = 0,
(17)
where p = γ2. The case that determines the required condition
corresponds to one intersection, and therefore one real negative
root and a pair of roots with the same sign of their real parts.
According to Vieta's formulas, a product of the roots satisfies
x1x2x3 = 7p − 6 and is negative. Therefore, p > 6/7 implies
the absence of any intersection except for the one at (0, 0).
The consensus condition independent of the number of
agents follows immediately.
Fig. 6. Ω-region bounded by y2 = −γ2x and the unit circle, γ = 2.
defined by the transfer function of agent (1) is the interior
of a parabola. It can be verified that the equation for the
intersection writes as x2 + 2x − γ2x = 0, which implies that
the absence of intersection (except for the one at the origin)
holds true for γ >
2. This demonstrates that the consensus
√
condition for second-order agents (1) in cyclic pursuit can be
derived easier as compared to, e.g., [7].
The consensus condition for the case of undirected (or, in
terms of digraph, two-directional) ring topology is even sim-
pler. Since the spectrum of the Laplacian matrix is completely
real, the eigenvalues λ2, . . . , λn all belong to the Ω-region for
any γ > 0 providing consensus in the sense of (4).
V. NUMERICAL EXAMPLES
criterion.
First, we demonstrate the low conservatism of the proposed
The sufficient condition of Theorem 1 guarantees conver-
gence to consensus in the sense of (4) whenever γ >(cid:112)6/7.
with dampings γ ≤ (cid:112)6/7: if all the nonzero eigenvalues
However, small groups of agents may still reach consensus
λi, i ∈ 2 : n, of −L lie inside the Ω-region,
then the
conditions of the general criterion formulated in Lemma 2 are
satisfied (which implies that the corresponding eigenvalues λi,
i ∈ 2 : 2n, of the system matrix F represented by (8) lie in the
open left half-plane of the complex plane). This can be verified
as follows. Let us set γ =(cid:112)6/7 and compute the eigenvalues
of F for various numbers of agents n = 6, 8, 10, . . .. Taking
the maximum of their real parts we observe that this maximum
approaches zero as the number of agents increases, see Fig. 7.
Fig. 7. The values of max
i∈2:2n
(logarithmic scale); the damping coefficient is γ =(cid:112)6/7.
Re(λi) subject
to n = 6, 8, 10, . . . , 60
Now, to illustrate the dynamics of convergence to consensus,
consider a formation of n = 50 identical second-order agents
(1) linked by the topology depicted in Fig. 1. Let the initial
state of each agent be randomly generated within [0, 10].
System (7) exhibits stable behavior of the transients with
a damping coefficient γ = 2, see Fig. 8. Computation of the
eigenvalues of F yields max
i∈2:2n
stability margin γ =(cid:112)6/7 ≈ 0.926 presented by Theorem 1
In the case of smaller gain γ = 0.95 close enough to the
Re(λi) = −0.0032.
we still observe similar behavior, see Fig. 9.
Fig. 8. The trajectories of the system (5) with n = 50 agents, γ = 2.
Fig. 9. The trajectories of the system (5) with n = 50 agents, γ = 0.95.
The dynamics becomes different when the consensus con-
dition is violated. For example, for γ = 0.9 the transients
Re(λi) = 0.000633. Fig. 10 presents the results
diverge; max
i∈2:2n
of simulations for this unstable case.
Table 1 illustrates the dependence of the actual consensus
margin γ on the number of agents n.
TABLE I
CONSENSUS MARGINS
n
γ
10
0.8195
20
0.8999
30
0.9149
40
0.9195
50
0.9218
60
0.9230
Therefore,
the simulation results confirm the theoretical
conclusions of Theorem 1 and demonstrate low conservatism
of the provided sufficient condition of consensus for a large
number of agents.
[9] J. A. Marshall, M. E. Broucke and B. A. Francis,
"Formations of
Vehicles in Cyclic Pursuit," IEEE Transactions On Automatic Control,
vol. 49, no. 11, pp. 1963 -- 1974, 2004.
[10] S. L. Smith, M. E. Broucke, and B. A. Francis, "A Hierarchical Cyclic
Pursuit Scheme for Vehicle Networks," Automatica, vol. 41, no. 6, pp.
1045 -- 1053, 2005.
[11] D. Mukherjee and D. Ghose,"Generalized Hierarchical Cyclic Pursuit,"
Automatica, vol. 71, pp. 318 -- 323, 2016.
[12] A. Sinha and D. Ghose, "Generalization of Linear Cyclic Pursuit with
Application to Rendezvous of Multiple Autonomous Agents," IEEE
Transactions on Automatic Control, vol. 51, no. 11, pp. 1819 -- 1824,
2006.
[13] A. N. Elmachtoub and C. F. van Loan, "From Random Polygon to
Ellipse. An Eigenanalysis," SIAM Rev., vol. 52, no. 1, pp. 151 -- 170,
2010.
[14] P. S. Shcherbakov, "Formation Control: The Van Loan Scheme and Other
Algorithms," Autom. Remote Control, vol. 72, no. 10, pp. 2210 -- 2219,
2011.
[15] J. L. Ramirez-Riberos, M. Pavone, E. Frazzoli, and D. W. Miller, "Dis-
tributed Control of Spacecraft Formations via Cyclic Pursuit. Theory
and Experiments," AIAA J. Guidance, Control, Dynamics, vol. 33, no.
5, pp. 1655 -- 1669, 2010.
[16] D. Mukherjee and D. Zelazo, "Robust Consensus of Higher Order
Agents over Cycle Graphs," in Proc. of the 58th Israel Annual Con-
ference on Aerospace Sciences, pp. 1072 -- 1083, 2018.
[17] I. A. Wagner and A. M. Bruckstein, "Row Straightening via Local
Interactions," Circuits Syst. Signal Process., vol. 16, no. 2, pp. 287 --
305, 1997.
[18] Ya. I. Kvinto and S. E. Parsegov, "Equidistant Arrangement of Agents
on Line: Analysis of the Algorithm and Its Generalization," Autom.
Remote Control, vol. 73, no. 11, pp. 1784 -- 1793, 2012.
[19] A. V. Proskurnikov and S. E. Parsegov, "Problem of Uniform Deploy-
ment on a Line Segment for Second-Order Agents," Autom. Remote
Control, vol. 77, no. 7, pp. 1248 -- 1258, 2017.
[20] D. Goldin, "Double Integrator Consensus Systems with Application to
Power Systems," in Proc. 4th IFAC Workshop NecSys-2013, pp. 206 --
211, 2013.
[21] W. Ren and Y. C. Cao, Distributed Coordination of Multi-Agent Net-
works, Springer, London, 2011.
[22] W. Ren. "On Consensus Algorithms for Double-Integrator Dynamics,"
IEEE Trans. Autom. Control, vol. 53, no. 6, pp. 1503 -- 1509, 2008.
[23] P. Chebotarev and R. Agaev, "Forest Matrices around the Laplacian
Matrix," Linear Algebra and Its Applications, vol. 356, pp. 253 -- 274,
2002.
[24] R. P. Agaev and P. Y. Chebotarev, "The Matrix of Maximum Out Forests
of a Digraph and Its Applications," Autom. Remote Control, vol. 61, no.
9, pp. 1424 -- 1450, 2000.
[25] R. P. Agaev and P. Yu. Chebotarev, "Spanning Forests of a Digraph
and Their Applications," Autom. Remote Control, vol. 62, no. 3, pp.
443 -- 466, 2001.
[26] B. T. Polyak and Y. Z. Tsypkin,"Stability and Robust Stability of
Uniform Systems," Autom. Remote Control, vol. 57, no. 11, pp. 1606 --
1617, 1996.
[27] S. Hara, H. Tanaka, and T. Iwasaki, "Stability Analysis of Systems with
Generalized Frequency Variables," IEEE Trans. Autom. Control, vol. 59,
no. 2, pp. 313 -- 326, 2014.
[28] S. Hara, T. Hayakawa, and H. Sugata, "Stability Analysis of Linear
Systems with Generalized Frequency Variables and Its Applications to
Formation Control," in Proc. IEEE Conf. Decision Control, pp. 1459 --
1466, 2007.
[29] O. Neumann, "Cyclotomy: From Euler through Vandermonde to Gauss,"
in Leonhard Euler: Life, Work and Legacy, R. E. Bradley and C. E. San-
difer, Eds. Amsterdam: Elsevier, 2007, pp. 323 -- 362.
[30] J. D. Lawrence, A Catalog of Special Plane Curves, New York: Dover,
1972.
[31] R. P. Agaev and P. Yu. Chebotarev, "Which Digraphs with Ring Structure
are Essentially Cyclic?" Adv. Appl. Math. vol. 45, pp. 232 -- 251, 2010.
[32] D. Bernstein, Matrix Mathematics: Theory, Facts, and Formulas, Prince-
ton University Press, 2009.
Fig. 10. The trajectories of the system (5) with n = 50 agents, γ = 0.9.
VI. CONCLUSIONS
The contribution of the paper is threefold:
• First, the specific communication ring topology was in-
vestigated; it was discovered that the eigenvalues of the
corresponding Laplacian matrix lie on the Cassini ovals;
• Second, the criterion for reaching consensus was pro-
posed that relies solely on the value of the damping
coefficient of a single agent and neglects the number of
them;
• Third, the theoretical results were supplemented by nu-
merical experiments. It was shown that for a large number
of interacting agents, the sufficient condition presented by
Theorem 1 is quite close to the necessary one.
The possible extensions include establishing consensus con-
ditions for second-order agents distributed on other regular
topologies together with the control protocols that use solely
local measurements. These problems will be the subject of
continuing research.
REFERENCES
[1] A. V. Proskurnikov and R. Tempo, "A Tutorial on Modeling and Analysis
of Dynamic Social Networks. Part I," Annual Reviews in Control, no.
43, pp. 65 -- 79, 2017.
[2] F. Bullo, Lectures on Network Systems (With contributions by J. Cort´es,
F. Dorfler, and S. Mart´ınez), 2018, http://motion.me.ucsb.edu/book-lns/
[3] F. L. Lewis, H. Zhang, K. Hengster-Movric, and A. Das, Cooperative
Control of Multi-Agent Systems: Optimal and Adaptive Design Ap-
proaches, London: Springer, 2014.
[4] Z. Li and Z. Duan, Cooperative Control of Multi-Agent Systems: A
Consensus Region Approach, CRC Press, 2017.
[5] J. G. Darboux, "Sur un Probl`eme de G´eom´etrie ´El´ementaire," Bulletin
des Sciences Math´ematiques et Astronomiques, vol. 2, no. 1, pp. 298 --
304, 1878.
[6] P. J. Nahin, Chases and Escapes: The Mathematics of Pursuit and
Evasion, Princeton University Press, 2007.
[7] B. R. Sharma, S. Ramakrishnan, and M. Kumar, "Cyclic Pursuit in a
Multi-Agent Robotic System with Double-Integrator Dynamics under
Linear Interactions," Robotica, vol. 31, no. 7, pp. 1037 -- 1050, 2013.
[8] Y. Elor and A. M. Bruckstein, "Uniform Multi-Agent Deployment on a
Ring," Theor. Comput. Sci., vol. 412, no. 8 -- 10, pp. 783 -- 795, 2011.
|
1204.1581 | 1 | 1204 | 2012-04-07T00:10:33 | A new approach of designing Multi-Agent Systems | [
"cs.MA",
"cs.AI"
] | Agent technology is a software paradigm that permits to implement large and complex distributed applications. In order to assist analyzing, conception and development or implementation phases of multi-agent systems, we've tried to present a practical application of a generic and scalable method of a MAS with a component-oriented architecture and agent-based approach that allows MDA to generate source code from a given model. We've designed on AUML the class diagrams as a class meta-model of different agents of a MAS. Then we generated the source code of the models developed using an open source tool called AndroMDA. This agent-based and evolutive approach enhances the modularity and genericity developments and promotes their reusability in future developments. This property distinguishes our design methodology of existing methodologies in that it is constrained by any particular agent-based model while providing a library of generic models | cs.MA | cs | (IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 2, No. 11, 2011
A new approach of designing Multi-Agent Systems
With a practical sample
Sara Maalal
Team of Systems‟ Architecture, Laboratory of computing,
Systems and Renewable Energy
National and High School of Electricity and Mechanic
ENSEM BP 8118, Oasis
Casablanca, Maroc
Abstract—Agent technology is a software paradigm that permits
to implement large and complex distributed applications [1]. In
order to assist analyzing, conception and development or
implementation phases of multi-agent systems, we’ve tried to
present a practical application of a generic and scalable method
of a MAS with a component-oriented architecture and agent-
based approach that allows MDA to generate source code from a
given model. We’ve designed on AUML the class diagrams as a
class meta-model of different agents of a MAS. Then we
generated the source code of the models developed using an open
source tool called AndroMDA. This agent-based and evolutive
approach enhances the modularity and genericity developments
and promotes their reusability in future developments. This
property distinguishes our design methodology of existing
methodologies in that it is constrained by any particular agent-
based model while providing a library of generic models [2].
Keyword- Software agents; Multi-agents Systems (MAS); Analysis;
Software design; Modeling; Models; Diagrams; Architecture;
Model Driven Architecture (MDA); Agent Unified Modeling
Language (AUML); Agent Modeling Language (AML).
I.
INTRODUCTION
Currently the computer systems are increasingly complex,
often distributed over several sites and consist of software
interacting with each other or with humans. The need for model
human behavior in specific computer programs has prompted
officials to use technology that affected the last decade and
whose movements are very remarkable. In this context,
designing multi-agent systems (MAS) is complex because they
require the inclusion of several parts of the system which can
often be approached from different angles. We must identify
and analyze all system problems to find models for multi-
agents to implement and integrate them into a coherent system.
This is the software engineering and well justifies the use of a
method of analysis, design and development of multi-agents
systems [2].
This paper describes a practical example of a new generic
model designed for modeling multi-agent systems and based on
a class diagram, defining the different types of agents and
meeting our needs for development and testing of MAS
applications.
Malika Addou
Team of Systems‟ Architecture Laboratory of computing,
Systems and Renewable Energy
Hassania School of Public
Works EHTP BP 8108, Oasis
Casablanca, Maroc
II. MULTI-AGENT SYSTEMS
A. Definitions
- An agent is a computer system within an environment and
with an autonomous behavior made for achieving
the
objectives that were set during its design [3].
- A multi-agents system is a system that contains a set of
agents that interact with communication s protocols and are able
to act on their environment. Different agents have different
spheres of influence, in the sense that they have control (or at
least can influence) on different parts of the environment.
These spheres of influence may overlap in some cases; the fact
that they coincide may cause dependencies reports between
agents [4].
The MAS can be used in several application areas such as
e-commerce, economic systems, distributed
information
systems, organizations...
B. Types of agent
Starting from the definitions cited above, we can identify
the following agent types [5]:
The reactive agent is often described as not being
"clever" by itself. It is a very simple component that
perceives the environment and is able to act on it. Its
capacity meets mode only stimulus-action that can be
considered a form of communication.
The cognitive agent is an agent more or less intelligent,
mainly characterized by a symbolic representation of
knowledge and mental concepts. It has a partial
representation of the environment, explicit goals, it is
capable of planning their behavior, remember his past
actions, communicate by sending messages, negotiate,
etc..
The intentional agent or BDI (Belief, Desire and
Intention) is an intelligent agent that applies the model
of human intelligence and human perspective on the
world using mental concepts such as knowledge,
beliefs, intentions, desires, choices, commitments. Its
behavior can be provided by the award of beliefs,
desires and intentions.
www.ijacsa.thesai.org
148 P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 2, No. 11, 2011
The rational agent is an agent that acts in a manner
allowing it to get the most success in achieving the
tasks they were assigned. To this end, we must have
measure of performance,
if possible objective
associated with a particular task that the agent should
run.
The AAII methodology was developed based on the
experience accumulated during the construction of BDI
systems. In this methodology, we have a set of
templates that, when they have been fully elaborated,
define the specifications of agents such as desires,
beliefs and intentions [9].
The adaptive agent is an agent that adapts to any
changes that the environment can have. He is very
intelligent as he is able to change its objectives and its
knowledge base when they change.
The communicative agent is an agent that is used to
communicate information to all around him. This
information can be made of his own perceptions as it
may be transmitted by other agents.
Figure 1. Types of agents
III. THE DESIGN METHODOLOGIES – STATE OF THE ART
Building high quality software for real-world applications is
a difficult task because of the large number and the flexibility
of components but also because of the complexity of
interconnections required. The role of software engineering is
precisely that of providing methodologies that can facilitate
control of this complexity. A methodology by definition can
facilitate the process of engineering systems. It consists of
guides that cover the entire lifecycle of software development.
Some are technical guides; others are managing the project [6].
We‟ll name “method” the approach to use a rigorous
process for generating a set of models that describe various
aspects of software being developed using a well- defined
notation.
To this end, several software engineering paradigms have
been proposed, such as object-oriented design patterns, various
software architectures. These paradigms fail especially when it
concerns the development of complex distributed systems for
two reasons: the interactions between the various entities are
defined in a too rigid way and there is no mechanism complex
enough to represent the organizational structure system [7]. The
paradigm of agents and multi-agent systems can be a good
answer
to
these problems, because
the agent-oriented
approaches significantly increase our ability to model, design
and build complex distributed systems [8].
There are many methodologies for analysis and design of
multi-agent systems. We cite below some examples of existing
methodologies [2]:
The first version of Gaia methodology, which modeled
agents from the object-oriented point of view, was
revisited 3 years later by the same authors in order to
represent a MAS as an organized society of individuals
[10]. In fact, the agent entity, which is a central
element of the meta-model of Gaia, can play one or
more roles. A role is a specific behavior to be played
by an agent (or kind of agents), defined in term of
permissions, responsibilities, activities, and interactions
with other roles. When playing a role, an agent updates
its behavior in terms of services that can be activated
according to some specific pre- and post- conditions. In
addition, a role is decomposed in several protocols
when agents need to communicate some data. The
environment abstraction specifies all the entities and
resources a multi-agent system may interact with,
restricting the interactions by means of the permitted
actions [1].
The Gaia methodology gives the possibility to design
MAS using an organizational paradigm and to traverse
systematically the path that begins by setting out the
demands of the problem and to lead to a fairly detailed
and immediate implementation [9]. Gaia permits to
design a hierarchical non-overlapping structure of
agents with a limited depth. From the organizational
point of view, agents form teams as they belong to a
unique organization, they can explicitly communicate
with other agents within the same organization by
means of collaborations, and organizations can
communicate between them by means of interactions.
If
inter-organization communication
is omitted,
coalitions and congregations may also be modeled [1].
However, this methodology is somewhat limited since
we can describe MAS with different architectures of
agents [9].
The main contribution of MESSAGE was
the
definition of meta-models for specification of the
elements that can be used to describe each of the
aspects that constitute a multi-agent system (MAS)
from five viewpoints: organization, agents, goals/tasks,
interactions and domain. MESSAGE adopted the
Unified Process and centered on analysis and design
phases of development [11].
INGENIAS starts from the results of MESSAGE and
provides a notation to guide the development process
of a MAS from analysis to implementation [12] [13].
It is both a methodology and a set of tools for
development of multi-agent systems (MAS). As a
methodology, it tries to integrate results from other
from
proposals and considers
the MAS
five
complementary viewpoints: organization,
agent,
www.ijacsa.thesai.org
149 P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 2, No. 11, 2011
tasks/goals,
is
It
interactions, and environment.
supported by a set of tools for modeling (graphical
editor), documentation and code generation (for
different
INGENIAS
platforms). The
agent
methodology does not explicitly model social norms,
although
they are
implicit
in
the organizational
viewpoint. Organizational dynamics are not considered
i.e., how agents can join or leave the system, how they
can form groups dynamically, what their life-cycle is,
etc [14]. The authors have developed an agent-oriented
software tool called INGENIAS Development Kit
(IDK) [15]. It allows to edit consistent models
(according
to
INGENIAS specification) and
to
generate documented code in different languages such
as JADE [16], Robocode, Servlets or Gracias Agents
[1].
Multi-agent systems Software Engineering (MaSE) is a
start-to-end methodology that covers from the analysis
to the implementation of a MAS [17]. The main goal of
MaSE is to guide a designer through the software life-
cycle
from a documented specification
to an
implemented agent system, with no dependency of a
particular MAS architecture, agent architecture,
programming language, or message-passing system.
AUML (Agent Unified Modeling Language) is an
evolving standard for a design methodology to support
MAS. It is based on the UML methodology used with
object oriented systems. This notation was proposed to
adapt the UML‟s one in order to describe the agent-
oriented modeling [18].
AUML provides tools for:
Specification protocol of interaction between
agents,
Representation of the internal behaviour of an
agent,
Specification of roles, package interface agent,
mobility, etc [2].
The Agent Modeling Language (AML) is a semiformal
visual modeling language for specifying, modeling and
documenting systems that incorporate concepts drawn
from multi-agents systems (MAS) theory [19].
ASPECS
for
(Agent-oriented Software Process
Engineering Complex Systems) provides a holonic
perspective to design MAS [20]. Considering that
complex systems
typically exhibit a hierarchical
configuration, on the contrary to other methodologies,
it uses holons instead of atomic entities. Holons, which
are agents recursively composed by other agents,
permit to design systems with different granularities
until the requested tasks are manageable by individual
entities.
The goal of the proposed meta-model of ASPECS is to
gather the advantages of organizational approaches as
well as of those of the holonic vision in the modeling
of complex system [1].
All these methodologies presented above are still quite
recent. They are mainly focused on the analysis phase, whereas
design and implementation phases are missing or are redirected
to agent-oriented methodologies, which do not offer enough
tools to model organizational concepts. Therefore, there is still
a gap between analysis and design, which must be specified
clearly, correctly and completely [14].
Finally, the maturity of methodologies can be analyzed by
the number of systems that have adopted them. Most of
analyzed methodologies have associated applications that show
their feasibility. These methodologies have been applied in
different fields such as medical informatics [21], manufacturing
[20] [22], and e-commerce [23]. MaSE and INGENIAS are the
most used ones. Unfortunately, the number of real world
applications that use agent-oriented methodologies is still low
[1].
IV. THE MDA APPROACH
The MDA (Model Driven Architecture) proposes a
methodological framework and architecture for systems
development that focuses first on the functionality and
application behavior, without worrying about the technology
implemented. The
the application will be
with which
implementation of
the application goes
through
the
transformation of business models in specific models to a target
platform (Fig.2). One research was done in this area as the
dissertation of Jarraya T. [24]
Figure 2. The MDA approach
of automation,
process independent
business
The
of need, is
from the
which comes
expression
described as a "CIM"
(Computation Independent
functional analysis,
Model). The detailed
the heart of
the process is
concentrated
in
the "PIM" (Platform
Independent Model), which, as its name suggests, is strictly
independent of the
technical architecture
and the target
language.
the
The "PSM" (Platform Specific Model) is
model
for engineering design obtained by transformation
of PIM by projection on the target technical architecture. It is
this model that is based on code generation [5].
The benefits to businesses on the MDA are primarily:
www.ijacsa.thesai.org
150 P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 2, No. 11, 2011
The fact that architectures based on MDA are ready
for technological developments.
The ease of integrating applications and systems
around a shared architecture
Broader interoperability for not being tied to a
platform.
One of the main tools of MDA, we have AndroMDA who
takes as its input a business model specified in the Unified
Modeling Language (UML) and generates significant portions
of the layers needed to build, for example, a Java application
[25]. AndroMDA's ability to automatically translate high-level
business specifications into production quality code results in
significant time savings when implementing Java applications.
The diagram below maps various application layers to, for
examples, Java technologies supported by AndroMDA [5].
providing a platform independent way for clients to
access
their functionality. AndroMDA can even
generate business processes and workflows for the
jBPM workflow engine (part of the JBoss product
line).
Data Access Layer: AndroMDA
the
leverages
tool
mapping
popular
object-relational
called Hibernate to generate the data access layer for
applications. AndroMDA does this by generating Data
Access Objects (DAOs) for entities defined in the
UML model. These data access objects use the
Hibernate API to convert database records into objects
and vice-versa. AndroMDA also supports Enterprise
Java Beans EJB3/Seam [26] for data access layer (pre-
release).
Data
Stores: Since
AndroMDA
generated
applications use Hibernate to access the data, you can
use any of the databases supported by Hibernate.
The generation process of AndroMDA is as follows [5] :
Figure 3. Application layers suppor ted by AndroMDA
Presentation Layer: AndroMDA currently offers two
technology options to build web based presentation
layers: Struts and JSF.
It accepts UML activity
diagrams as input to specify page flows and generates
Web components that conform to the Struts or JSF
frameworks.
Business Layer: The business layer generated by
AndroMDA consists primarily of services that are
configured using
the Spring Framework. These
services are implemented manually in AndroMDA-
generated blank methods, where business logic can be
defined. These generated services can optionally be
front-ended with EJBs, in which case the services
must be deployed in an EJB container (e.g.,JBoss).
Services can also be exposed as Web Services,
Figure 4. Generation process of AndroMDA
Preparation of the project in MagicDraw
Preparing use cases
Preparation of class diagram
Preparation of state charts
Code Generation
Generating the database
Deploy the application
V. PROPOSED APPROACH
Our approach is based on model driven architecture (MDA)
which aims to establish the link between the existing agent
architectures and models or meta-model multi-agent systems
that we build based on AUML. Our idea is to offer a design
methodology based on agents AUML notation for establishing
a generic class diagram that the designer can use to design his
system [3]. This diagram is considered as a meta-model which
www.ijacsa.thesai.org
151 P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 2, No. 11, 2011
is not generated by any tool and must be defined by the
modeler himself.
Figure 5. An AUML generic cla ss diagram for a MAS
Our approach has a lot of benefits, it allows:
Reducing costs and development times for new
applications.
Improving quality of applications.
Reducing complexity of application development.
Ability to generate all the necessary components
described.
Modularity and reusability of the developments.
Coercion by the MDA model.
Generating a library of generic models.
A. Description of the AUML generic Class Diagram
The diagram is conceived in three layers, each one is
represented by a relationship between classes: A first part
which is a relation between agent and its environment, a second
part of specialisation of the agent class, and at the last part, a
specialisation of the cognitive agent class [3].
1- The first part
The first part consists of two important classes:
Perceptions. Attributes can be all the information that
an environment should have, plus the following
common information:
Deterministic when the next state of the
environment is determined in a unique way
by the current state and action of the agent,
so the environment is deterministic. If the
outcome is uncertain (especially if, as a result
of action of the agent, the environment can
evolve in different ways), we are in the non-
deterministic case.
Static if the environment cannot change its
state without the intervention of the agent.
The environment is dynamic if its state can
change without the action of the agent in the
time interval between two perceptions of the
agent.
Continuous if any portion of an environment
state to another requires passing through a
sequence of intermediate states, otherwise
the environment is discrete.
Perception is a section where the designer should
determinate all environment perceptions, example:
number of agents.
Environment contains several functions allowing to
start running, to perceive information from agents
linked to it and to modify its state after each action
from
those agents,
that
is respectively Run(),
Perceive() and ModifState().
Agent is the main class on the diagram that allows the
designer
to express all agent properties. The
constructor of Agents takes three sections: Roles,
Attributes
agent
are
and Perception. Roles
functionalities. Attributes are all information that an
agent should possess. And finally Perception which is
a section where the designer should determinate all
agents‟ perceptions about his environment or the other
agents.
Agent contains several functions who allows starting
running and perceiving information from environment
or agents linked to it and to execute all its actions, that
is respectively Run(), Perceive() and Act().
The first part consists also of two important association
classes:
-Action, between agent and his environment.
-Interaction, between agents.
Action is an association class between agent and
environment. It lists all possible actions that an agent
can execute on his environment.
- Environment,
- Agent
Environment is an important class on the diagram
because it influences all the system. Environment‟s
data is represented by two sections, Attributes and
Interaction is a reflexive association class between
agents. Agent can request
information by
the
getInformation() function and send it by the inform()
function. Agent may also deal with some constraints
www.ijacsa.thesai.org
152 P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 2, No. 11, 2011
the function
inform by
that
to
is possible
it
informaboutConstraintes(). The
acceptance
of
partnership is added also to the main functionalities
of Agent by the function acceptPartnerShip().
2- The second part
The second part represents a specialisation relation of the
Agent class. It consists of three important classes:
- Reactive agent,
- Cognitive agent,
- Communicative agent.
Reactive agent is a type of agent. It possesses the
same properties of the Agent class.
Cognitive agent is another specialization of the Agent
class. In this class, the designer should determinate the
representations of the agent that he must have during
its execution. The class possesses also one important
function “Decide()” where agent can decide to execute
an action or not according to his goals.
Communicative agent is the last specialization of the
Agent
class. Like Cognitive
agent
class,
Communicative agent class has representations but
possesses a different function called “Communicate()”
where agent must use to communicate his information
to the other agents.
3- The third part
The third part represents a specialization relation of the
Cognitive agent class. It consists of three important classes:
- Adaptive agent,
- Intentional agent,
- Rational agent.
Adaptive agent is a type of cognitive agent. It
possesses the same properties of the Agent class, the
knowledge base and the “Decide()” function. As
mentioned in the types of agent section above, an
adaptive agent is able to change its objectives and its
knowledge base as and when these changes. This
functionality
the
by
expressed
is
“Change_information()” function.
Intentional agent or BDI Agent is designed from the
"Belief-Desire-Intention” model. It is a type of
cognitive agent. In the same case of Adaptive Agent
class, this class possesses the same properties of the
Agent class, the knowledge base and the “Decide()”
function.
In this class, the designer should determinate the
agent‟s beliefs represented by the Beliefs section. The
beliefs of an agent are the information that the agent
has on the environment and other agents that exist in
the same environment. Beliefs may be incorrect,
incomplete or uncertain, and because of that, they are
different from knowledge of the agent, which is
information still true. Beliefs can change over time as
the agent by its ability to perceive or interact with
other agents, collects more information.
The designer should also determinate the agent‟s
intentions represented by the Intentions section. The
intentions of an agent are the actions it has decided to
do to accomplish his goals.
To choose the correct agent‟s beliefs from the
incorrect
ones,
this
class
offers
the
“Revise_beliefs(Pres, Belief)” function which is based
on the agent‟s knowledge base and his beliefs. Then,
the “Generate_desires(Belief, int)” function comes to
generate all the agent‟s desires that he may be able to
accomplish at once. The desires of an agent
representing all things the agent would like to see
made. An agent may have conflicting desires, in
which case he must choose between her desires a
subset that is consistent. This subset consists of his
desires is identified with the beliefs and the intentions
of the agent.
Another function comes after that, the “Filter(Belief,
Generate_desires, int)” which filters all those elements
above and gives the consistent beliefs, desires and
intentions of the intentional agent.
Finally, the agent can select his actions according to
this
the
by
them
execute
and
filtration
“Actions_selection(Filter)” function.
Rational agent is the last specialisation of the
Cognitive Agent class. Like Intentional Agent class,
Rational Agent class has the Beliefs and the Intentions
sections but possesses
just one function called
“Mesure_performance(Percept, Belief)” where agent
must use to execute his actions as efficient as possible.
This function is based both on his perceptions and his
beliefs.
B. The generic UML Class Diagram
This generic AUML class diagram was subsequently
converted into a generic class diagram based on UML notation.
This transformation will allow the designer to easily use
AndroMDA to generate the source code equivalent to its UML
diagram [1].
The passage from AUML to UML was performed by
following the steps below:
1. Keep the same titles of classes and associations
which constitute the AUML diagram.
2. Assign roles, perceptions, intentions, beliefs and
representations of each agent, and any possible
additional attributes, in the attributes part of the
UML class.
3. Combine all methods or
functions
operations part of the UML class.
in
the
We can obtain, in the end, the following result shown in
Fig. 6:
www.ijacsa.thesai.org
153 P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 2, No. 11, 2011
Figure 6. An UML generic class diagram for a MAS
Our approach can present one desadvantage. It is the
complexity of generating a good code source by AndroMDA.
The model developed at the design phase, should be reliable in
order to build the application and realize its implementation
without errors [5].
V. APPLICATION EXAMPLE
A. Description
Our proposed AUML class diagram was used for design of
one multi-agent system for a Chat Application. This example is
designed as follows [5]:
Three reactive agents: These agents will be the chatters,
the interest that these are reactive agents relies on the fact
that an agent doesn't react before the declaration of the
name of the receiver by the user of the application.
Therefore an agent will react to get ready to catch the
name and the message and to send it to the appropriate
person. He will react also to clear the sent and the received
message from their area in his interface.
We can respectively obtain the following AUML and UML
diagrams corresponding to this example, shown in the Figures
7 and 8:
B. Realization
To validate our model for this example, we‟ve tried to
download AndroMDA with all the required dependencies
(including all profiles referenced by models). Then, we
generated our project « ChatAgents » by running « mvn
org.andromda.maven.plugins:andromdaapp-maven
plugin:3.4-SNAPSHOT:generate ». The
result of
command is as follows:
this
Figure 7. AUML Class diagram for a chat application
Figure 8. UML C lass diagram for a chat application
When we examine the various folders and files created by
the andromdapp plug-in, we will notice files called pom.xml in
various folders under ChatAgents. These files make up several
Maven projects. In fact, the ChatAgents directory contains a
hierarchy of Maven projects as shown below [5].
ChatAgents: This is the master project that controls
the overall build process and common properties.
mda: The mda project is the most important sub-
project of the application. It houses the ChatAgents
UML model under the src/main/uml directory. The
mda project is also where AndroMDA is configured
to generate
the
to assemble
the files needed
application.
common: The common sub-project collects resources
and classes that are shared among other sub-projects.
These include value objects and embedded values.
www.ijacsa.thesai.org
154 P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 2, No. 11, 2011
classes that use the Spring framework, optionally
making use of Hibernate and/or EJBs under the hood.
These include entity classes, data access objects,
hibernate mapping files, and services.
web: The web sub-project collects those resources
and classes that make up the presentation layer.
app: The app sub-project collects those resources and
classes that are required to build the .ear bundle.
By opening the file “ChatAgents.xml” in MagicDraw, we
will be
able to build various graphs of our model to
generate then
entire
the
of
code
source
the
application. Note that AndroMDA can't read MagicDraw 17
models directly. Therefore, you can export it to another file
format: EMF-UML2.
After import of AndroMDA profiles to use for our
application, we designed our class diagram as shown in Fig.10
as follows [5]:
The result of exporting our “ChatAgents” model to EMF-
UML2
the
in
located
is
format
folder C:/ChatAgents/mda/src/main/uml in explorer. Below his
content:
ChatAgents.xml: the MagicDraw 17 model file.
ChatAgents.uml: ChatAgents model in EMF/UML2
format. It's the file that will be processed by
AndroMDA.
10 files ending with .profile.uml:
profiles used by ChatAgents.uml
the different
Following the definition of our model, the generation
of application code is achieved by executing the command
"mvn install", the result appears as in the figure [5].
Thus,
the class “Chat.java” is created and can be
easily accessed and modified by the developer where he has the
ability to implement its operations in the generated code.
We conducted this implementation and got the final result.
Figure 9 : ChatAgents project generation
ChatAgents
-- mda
-- common
-- core
-- web
+-- app
core: The core sub-project collects resources and
VI. CONCLUSION AND FUTURE SCOPE
The purpose of this paper is to demonstrate the feasibility of
our approach to analyze, design and implement multi-agent
systems. With AUML modeling and MDA, we can generate all
the necessary components described by the class meta-model
that we proposed. Which leads us to obtain a generic design
based on SOA more or less reusable components using one of
the most MDA tools used in development is AndroMDA [27].
In the future, we would like to model another application
sample of our model but in a more complex form using
cognitive or adaptive agents and in other platforms like C++,
Web services, etc. It will help us to validate the efficacy of our
proposed approach and lead us to consider it as a generic
approach which can be adopted by every type of information
system and used for any real world application.
www.ijacsa.thesai.org
155 P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 2, No. 11, 2011
Figure 10 : Cla ss diagram built on MagicDraw 17
Figure 11 : Code generation a fter definition model
Figure 12. Chat applica tion with three agents
ACKNOWLEDGMENT
I would like to thank to my advisor Ms. M. Addou, Phd. for
his invaluable guidance and many useful suggestions during
my work on this paper. I would also like to express my
gratitude to all those who gave me the possibility to complete
this paper.
www.ijacsa.thesai.org
156 P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 2, No. 11, 2011
REFERENCES
[1] D. Isern, D.Sanchez, A.Moreno, “Organizational structures supported by
agent-oriented methodologies” , The journal of Systems and Software,
vol. 84, n. 2, Oxford, UK: Elsevier, 2011, pp. 169 -184.
[2] S. Maalal, M. Addou, “A Model Design of Multi -Agent Systems”,
Proceedings of the 2nd Edition of the IEEE International Conference on
Multimedia Computing and Systems ICMCS‟11 , Ouarzazate Morocco,
p. 674, 2011.
[3] M. Wooldr idge, Intelligent Agents, Multi agent systems, In The MIT
Press, “A modern Approach to D istributed Artificial Intelligence”,
(England Ma ssachutts London: MIT Press Cambridge, 1995, p. 27 -78)
[4] M. Wooldridge, An Introduction to Multi -Agent Systems, Wiley &
Sons, 2000.
[5] S. Maalal, M. Addou, “A practical application of a method of designing
multi-agent systems based on the AUML language and the MDA
approach”, Proceedings of the Fourth Work shop on Informa tion
Technologies and Communication WOTIC‟11, Ca sablanca, Morocco,
p.104, 2011.
[6] O. Shehory, A. Sturm, “Evaluation of modeling techniques for agent -
bases systems”, Proceedings of the 5th International Conference on
Autonomous Agents, pp.624-631, 2001.
[7] N. R. Jennings, “On agent-ba sed software engineering” , Artificial
Intelligence, vol. 117, pp. 277-296, 2000.
[8] M. Wooldr idge, N. R. Jennings, “Intelligent agent: Theory and practice”,
The Knowledge Engineer ing Review, Vol. 10, n. 2, pp. 115 -152, 1995.
[9] A. M. Florea, D . Kayser, S. Pentiuc, A. El Fallah Segrounichi,
Intelligents agents, Agents Intelligents, Politechnica University of
Bucharest, 2002.
[10] L. Cernuzzi, T. Juan, L.Ster ling, F. Zambonelli, “The Gaia methodology:
basic concepts and extensions”, Methodologies and Software
Engeneering for Agent Systems, US: Springer , pp.69 -88, 2004.
[11] J. Pavón, , J . Gómez-Sanz., “Agent Oriented Software Engineer ing with
INGENIAS”, Proceedings of the international Central and Eastern
European conference on Multi -Agent Systems CEEMAS‟03 , pp.394-
403, 2003.
[12] R. Fuentes-Fernández, I. García -Magariñio, A.M. Gómez-Rodríguez,
J.C. González-Moreno, “A
technique for defining agent -oriented
engineering processes with tool support” , Artificial Intelligence, vol.23,
pp.432-444.
[13] J. Pavón, , J.J. Gómez-Sanz., R. Fuentes, „The INGENIAS methodology
and tools” in Agent-oriented Methodologies, B . Henderson -Sellers and
P. G iorgini Eds. Idea Group, 2005, pp. 236–276.
[14] E. Argente, V. Julian, V. Botti, “Multi-agent system development ba sed
on organizations”, Electronic Notes in Theoretical Computer Science,
vol.150, pp.55 -71, 2006.
[15] IDK
(INGENIAS
http://sourceforge.net/projects/ingenia s/
Development
Kit),
[16] JADE (Java Agent DEvelopment Framework), http://jade.tilab.com/.
[17] S.A. DeLoach, “The MaSE methodology”, in Methodologies and
Software Engineering for Agent Systems, F. Bergenti, M.P Gleizes, F.
Zambonelli, Eds. The Agent-oriented Software Engineering Handbook.
Kluwer Academic Publishers, 2004, pp. 107–125
[18] S. Lynch, K. Rajendran, “Design Diagrams for Multi -agents Systems”,
Proceedings of the 16th Annual Workshop of the Psychology of
Programming Interest Group PPIG‟04 , pp. 66-78, 2004.
[19] R. Cervenka, I. Trencansky, “Agent Modeling Language (AML) : A
Comprehensive Approach to Modeling MAS”, Informatica, vol. 29, n. 4,
pp. 391-400, 2005.
[20] M. Cossentino, N . Gaud, V. Hilaire, S.Galland, A. Koukam, „ASPECS:
An Agent-oriented Software Process for Engineer ing Complex Systems:
How to design agent societies under a holonic perspective”, 2010.
[21] D. Isern, C . Gómez-Alonso, A. Moreno, “Methodological development
of a multi-agent system in the healthcare domain”, Commun, SIWN 3,
pp. 65–68, 2008.
[22] A. Giret, V. Botti, S. Valero, “MAS methodology for HMS”, In the
Second International Conference on Indu str ial Applications of Holonic
and Multi-Agent Systems HoloMAS, Springer -Ver lag, Copenhagen,
Denmark, pp. 39–49, 2005.
[23] J. Ferber, O . Gutknecht, F. Michel, “From agents to organizations: an
organizational view of multi -agent systems” , in Spr inger -Verlag Berlin
Heidelberg, P. G iorgini, J. Müller , J . Odell, Eds 2003, in the 4th
International Workshop on Agent -oriented Software Engineer ing IV
(AOSE) , Melbourne, Australia, pp. 214–230, 2003.
[24] T . Jarraya, Re-u se of interaction protocols and Career-or iented models
for multi-agents development, Réutilisation des protocoles d‟interaction
et Démarche or ientée modèles pour le développement multi -agents ,
Ph.D. Thesis, Dept. Computer Engineering, University of Reims
Champagne Ardenne, France, 2006.
[25] N. Bhatia,
“Getting Started with AndroMDA
(www.andromda.org, 2010).
for
Java”
[26] JBoss Seam (http://www.jboss.com/products/seam/).
[27] S. Maalal, M. Addou, “A Model Design of Multi -Agents Systems”, in
the
Informa tion and
International Conference on Models of
Communication Systems MICS‟10, Rabat, Morocco, 2010, unpublished.
AUTHORS PROFILE
Sara M aalal wa s born in Rabat the Morocco‟s capita l in 1985. She received
his professional ma ster in Computer Engineering and Internet (3I), Option:
Security Network s and Systems, in 2008 from the Faculty of science of
HASSAN II University, Ca sablanca, Morocco . In 2010 she joined the system
architecture team of the National and H igh School of Electr icity and Mechanic
(ENSEM: Ecole Nationale Supérieure d‟Electricité et de Mécanique),
Casablanca, Morocco.
Her actual main research interests concern Designing and modeling Multi -
Agent Systems.
Ms. Maalal is actually a Software Engineer in a Moroccan multinational
society called Hightech Payment Systems (HPS) which has always proved
itself a s a leading payment solutions provider .
Malika Addou received her Ph.D . in Ar tificial Intelligence from University of
Liege, Liege, Belgium, in 1992. She got her engineer degree in Compu ter
Systems from the Mohammadia School of Engineers (EMI
: Ecole
Mohammadia des ingénieurs), Rabat, Morocco in 1982. She is Professor of
Computer Science at the Hassania School of Public Work s (EHTP : Ecole
Hassania des Travaux Publics), Ca sablanca, since 1982.
Her research focuses on Software Engineering (methods and technologies for
design and development), on Information Systems (D istributed Systems) and
on Artificial Intelligence (especially Multi-Agent Systems technologies) .
www.ijacsa.thesai.org
157 P a g e
|
1611.08951 | 1 | 1611 | 2016-11-28T01:10:54 | Distributed Estimation for Adaptive Networks Based on Serial-Inspired Diffusion | [
"cs.MA"
] | Distributed estimation and processing in networks modeled by graphs have received a great deal of interest recently, due to the benefits of decentralised processing in terms of performance and robustness to communications link failure between nodes of the network. Diffusion-based algorithms have been demonstrated to be among the most effective for distributed signal processing problems, through the combination of local node estimate updates and sharing of information with neighbour nodes through diffusion. In this work, we develop a serial-inspired approach based on message-passing strategies that provides a significant improvement in performance over prior art. The concept of serial processing in the graph has been successfully applied in sum-product based algorithms and here provides inspiration for an algorithm which makes use of the most up-to-date information in the graph in combination with the diffusion approach to offer improved performance. | cs.MA | cs |
DISTRIBUTED ESTIMATION FOR ADAPTIVE NETWORKS BASED ON
SERIAL-INSPIRED DIFFUSION
Cornelius T. Healy and Rodrigo C. de Lamare
CETUC - Pontifical Catholic University of Rio de Janeiro - PUC-RJ
Email: [email protected], [email protected]
Rio de Janeiro, Brazil
ABSTRACT
Distributed estimation and processing in networks modeled by
graphs have received a great deal of interest recently, due to the
benefits of decentralised processing in terms of performance and
robustness to communications link failure between nodes of the
network. Diffusion-based algorithms have been demonstrated to be
among the most effective for distributed signal processing problems,
through the combination of local node estimate updates and sharing
of information with neighbour nodes through diffusion. In this work,
we develop a serial-inspired approach based on message-passing
strategies that provides a significant improvement in performance
over prior art. The concept of serial processing in the graph has
been successfully applied in sum-product based algorithms and
here provides inspiration for an algorithm which makes use of the
most up-to-date information in the graph in combination with the
diffusion approach to offer improved performance.
Index Terms -- Diffusion networks, wireless sensor networks,
distributed processing.
1. INTRODUCTION
Distributed signal processing is an important tool for problems
which may be modeled by a graph of nodes working to estimate
a parameter of interest as it allows computations to be carried lo-
cally at the individual nodes, avoiding the need for a centralised
processing unit and thus offering robustness to scenarios where the
communication links to that central node are subject to channel ef-
fects. To achieve this each node makes use of its local observations
in combination with the estimates produced at neighbour nodes to
produce an improved estimate of the parameters of interest. This
improved estimate is then shared with all neighbours of the node,
leading to propagation of the information through the network.
The distributed estimation problem has been considered in terms
of incremental [1], consensus [2] and diffusion [3, 4, 5] strategies.
The incremental strategy in general demands a computationally
costly operation for identifying a path through the graph nodes upon
which to operate, while the diffusion based strategies have been
demonstrated to be superior to those based on consensus in terms of
convergence, performance and stability [6].
Recent work on the diffusion strategies has included sparsity-
aware approaches of [7, 8, 9, 10, 11, 12, 13], which exploit the
knowledge that the parameter vector to be estimated may be sparse.
Related work on improving the combiners in the information diffu-
sion stage of the algorithm has been reported in [14, 15]. The effect
of the network topology on the diffusion strategies and how it may
be exploited has been considered in [16, 17, 18, 19, 20]. A number
of studies have considered imperfect communications links between
nodes in the network [21, 22]. Significant work has also been carried
out on analysis of the diffusion strategies [23, 24].
In this paper, the schedule of node estimate updates is consid-
ered as a source of performance improvement. This is motivated
by the observation that such an approach in the case of the sum-
product algorithm operating on a bipartite graph, as for the decoding
of LDPC codes, offers significantly faster convergence at almost no
cost in terms of additional complexity. This approach was termed se-
rial, shuffled or layered scheduling in the literature [25, 26]. Further
improvements were found through more advanced update schedules
[27, 28, 29, 30, 31]. Effectively, after each individual node update,
the newly updated messages are made available to the neighbour
nodes of the updated node, ensuring those neighbours compute their
own updates with more up-to-date and accurate information. As the
diffusion approach is based on the sharing of information with neigh-
bour nodes in the graph of the network, this concept of serialisation
translates well. In particular, we develop a serial-inspired (SI) least-
mean square (LMS) , which we denote SI-LMS and can exploit the
schedule of node updates to obtain improved performance. In the
proposed SI-LMS algorithm, serialisation is introduced through the
inclusion of an additional diffusion combination which has access
to the most recently updated estimates in the graph. The proposed
SI-LMS algorithm offers significant improvements in convergence
speed, as is demonstrated by the simulation study provided in this
paper.
This paper is organized as follows. Section 2 provides the prob-
lem statement and introduces the diffusion strategy for system iden-
tification using the LMS algorithm. In Section 3 the proposed algo-
rithm is developed and described in detail, along with pseudocode
representation. Section 4 provides the numerical simulation results,
and Section 5 concludes the paper.
Notation: Throughout this paper, lowercase letters such as x
indicate scalars, lowercase boldface letters such as x denote column
vectors and uppercase boldface letters such as A denote matrices.
The superscript i denotes that A(i) is the realization of A at the time
index i, likewise for scalars as in d(i). Subscripts are used to identify
the node or nodes in the graph with which a value is associated.
2. PROBLEM STATEMENT AND THE DIFFUSION
STRATEGY
Consider a network modeled by a graph with N nodes as depicted in
Fig. 1. The value d(i)
k is the scalar observation at time instant i for
the node k in the graph, and the observation is related to the input
k
Nk
Fig. 1. An example of a connected graph with neighbourhood Nk of
node k shown.
signal x(i)
k by
d(i)
k = ωH
0 x(i)
k + n(i)
k ,
i = 1, 2, . . . , N,
(1)
where the input signal vector x(i)
for node k at time index i is an
k
M × 1 vector. The value n(i)
is the noise sample at node k and
k
time index i and has zero mean and variance σ2
v,k. The goal of the
distributed estimation problem is to estimate the value of ω0 based
on the knowledge at the nodes in the network of the observations
d(i)
k , the input signal vectors x(i)
k and the relation in (1) through use
of that local knowledge and the ability to share information with
neighbours in the network graph.
The diffusion strategy for distributed estimation involves a pro-
cess of local adaptation with the information available using for
example the LMS estimate update, followed by information sharing
with neighbour nodes involving a weighted sum of the estimates
across the neighbourhood of each node. This process leads to
diffusion of information through the fully connected graph. The
adaptation and combination steps of the diffusion strategy can be
performed in either order, leading to in one case the adapt -- then --
combine (ATC) diffusion strategy and in the other the combine --
then -- adapt (CTA) diffusion strategy [3]. The two steps of ATC
diffusion are described by
iterate
iterate
{d(i)
k , xk,i}
ω(i−1)
k
A.F.
ψ(i)
k
Node k
ψ(i)
k
ψ(i)
a
ψ(i)
d
(a) Produce output ψ(i)
k .
(b) Produce output ω(i)
k .
Fig. 2. (a) Filter adaptation with local observations and combined
estimate. (b) Information diffusion through weighted combination
of neighbour estimates.
3. PROPOSED SERIAL-INSPIRED ALGORITHM
In this section, the proposed SI-LMS algorithm is introduced. In the
case of sum-product type algorithms operating on bipartite graphs,
the standard message update schedule is to activate all nodes of one
type and then to activate all nodes of the other type. It was demon-
strated that improvements in error rate convergence of the algorithms
may be found at no increased computational complexity if the nodes
in the graph are updated in a serial fashion, also termed shuffled or
layered schedule [25, 26]. This improvement in convergence be-
haviour is derived from the fact that the most recently updated mes-
sages in the graph may be used to improve the next updates within
an iteration. This observation has motivated the investigation of the
diffusion LMS algorithm and resulted in the development of the al-
gorithm proposed in this paper. Essentially, the process of informa-
tion diffusion is used to improve the LMS adaptation through the use
of new estimates at neighbour nodes as soon as they are available.
The MSE cost function at node k takes the form
Jk(ω) = E[d(i)
k − ωH x(i)
k 2],
which through expansion and rearrangement results in
Jk(ω) = Jk,min + ω − ω02
Rx,k ,
(6)
(7)
ψ(i)
k = ω(i−1)
k
+ µkx(i)
k [d(i)
k
k − ω(i−1)H
cklψ(i)
,
l
x(i)
k ]∗,
(2)
(3)
where Jk,min is the value of Jk(ω) evaluated at ω = ω0. The local
cost function at node k when information sharing with neighbours is
allowed becomes:
ω(i)
k = X
l∈Nk
where the values ckl are known as the combination coefficients and
provide the weighting in the combination step of the respective algo-
rithms and wk represents the parameter estimator. They are related
to the topology of the graph, being nonzero only if node k and node
l are neighbours and additionally must satisfy the constraint:
ckl = 1, l ∈ Nk∀k.
(4)
X
l
There are a number of rules specifying the combination coefficients
to be found in the literature, including the uniform , Metropolis , rel-
ative degree and Laplacian rules. The Metropolis combiner is given
by:
1
max(Nl,Nk) ,
ckl =
ckl = 1 − Pl∈Nk/k ckl,
ckl = 0,
if l /∈ Nk
if l ∈ Nk, l 6= k
if l ∈ Nk, l = k
(5)
Fig. 2 provides the block diagram for the ATC diffusion algo-
rithm which implements (2) - (3).
J local
k
(ω) = X
l∈Nk
al,kJl(ω).
(8)
The global cost function is simply the sum across all nodes l of this
local cost function. Rewritten in terms of the node of interest and
its neighbours, we have the global function from the perspective of
node k:
J global
k
(ω) = J local
k
(ω) + X
l∈Nk\{k}
J local
l
(ω).
(9)
Applying the steepest-descent method we arrive at the recursion for
updating the parameters of the estimator:
ω(i)
k = ω(i−1)
k
− µk[∇ωJ global
k
(ω(i−1)
k
)]∗,
(10)
(ω(i−1)
) is the gradient of J global
where ∇ωJ global
(ω) with respect
to ω evaluated at ω(i−1)
. Through the use of the expanded versions
of (6) and through a number of approximations detailed in [4, 32],
k
k
k
k
the update recursion may be reformulated as:
ω(i)
k = ω(i−1)
k
+ µk X
l∈Nk
al,k(rdx,l − Rx,lω(i−1)
k
)
+ µk X
l∈Nk\{k}
bl,k(ω0 − ω(i−1)
k
),
(11)
k
k x(i)
k x(i)H
] and rdx,l = E[d(i)∗
where Rx,l = E[x(i)
k ]. In (11) the
previous estimate is corrected by a filter adaptation term and an in-
formation diffusion term. In the development of the ATC and CTA
algorithms, the two correction terms are applied successively. In the
proposed algorithm, the information diffusion term will be applied
both before and after the adaptation of the estimator, and as in the
development of those algorithms the best available estimate will be
used to substitute for both ω0 and ω(i−1)
in (11). In the proposed
algorithm these best estimates are improved upon the previously pre-
sented works through the observation that the estimates which have
been updated at neighbour nodes are available for use immediately,
and so the first diffusion correction term is applied in a serial fash-
ion. In particular, we employ instantaneous estimates of Rx,l and
rdx,l to obtain the recursion for the proposed SI-LMS algorithm:
k
iterate
Node k
ω(i−1)
k
ω(i−1)
a
{d(i)
k , xk,i}
iterate
Node k
ψ(i)
k
A.F.
φi
k
φ(i)
k
ω(i−1)
b
φ(i)
c
φ(i)
d
φ(i)
a
φ(i)
d
(a) Produce output ψ(i)
k .
(b) Produce output φ(i)
k .
(c) Produce output ω(i)
k .
Fig. 3. (a)Weighted sum of updated and prior estimates at the neigh-
bours. (b) Filter adaptation with local observations and combined
estimate. (c) Final weighted combination of neighbour estimates.
• Nk extra multiplications
• Nk extra additions
With the complexity cost across the network being N times each
of these. Note that in addition to the cost in terms of increased com-
plexity, the proposed SI-LMS algorithm requires that the nodes in
the graph share their updated estimates with their neighbours as soon
as they are produced by the LMS adaptation. Thus the SI-LMS al-
gorithm also incurs an extra communications cost of
ω(i)
k = ω(i−1)
k
+ µk X
l∈Nk
al,kx(i)
k [d(i)
k − ω(i−1)H
k
x(i)
k ]∗
• N (Nk − 1) transmissions of a vector of dimension M × 1
when compared to the ATC-LMS diffusion algorithm [3].
+ µk X
l∈Nk\{k}
bl,k(ω0 − ω(i−1)
k
),
(12)
4. SIMULATION RESULTS
Given the previous development, the steps of the proposed SI-LMS
algorithm are as follows:
1. Combine prior and new estimates available from neighbour-
hood nodes, including the node of interest, by weighted sum.
2. Adapt the parameters according to the chosen rule, using lo-
cal observations at the node and combined estimate from the
first step. Make new estimate available to neighbour nodes.
3. Combine estimates available from neighbourhood.
The SI-LMS algorithm is presented as
ψ(i)
k = ck,kω(i−1)
k
+ X
ℓ∈Nk:ℓ≥k
ck,ℓω(i−1)
ℓ
+ X
m∈Nk:m<k
φ(i)
k = ψ(i)
k + µkx(i)
ω(i)
p = X
q∈Np
k x(i)
k ]∗,
k [d(i)
k − ψ(i)H
ap,qφ(i)
q ,
ck,mφ(i)
m ,
(13)
(14)
(15)
Fig. 3 provides a block diagram of the proposed SI-LMS al-
gorithm, with blocks for the initial serial information diffusion, the
adaptation for the estimator and the final diffusion combination, re-
In Alg. ?? the pseudocode for the proposed SI-LMS
spectively.
algorithm is provided. This gives the details of the algorithm.
3.1. Computational Cost and Bandwidth Requirements of the
Proposed SI-LMS Algorithm
The proposed SI-LMS algorithm provides improvements in conver-
gence speed through the use of an additional combination of new and
old estimates prior to the LMS estimate adaptation. This additional
weighted sum prior to the adaptation step (line 4 in Algorithm ??)
comprises the only additional cost of the proposed algorithm. Thus,
in terms of complexity per node, the proposed algorithm costs
In this section, the simulation study for the proposed algorithm is
presented. Its performance, in terms of mean-square error (MSE),
is compared to the diffusion ATC algorithm [3]. Fig. 4 provides
the network graph topology, showing the network considered has
N = 20 nodes. We adopted the Metropolis combining rule [32].
The unknown parameter vector to be estimated has length M = 5.
Two cases are considered for the input signal, one with the signal
variance equal at all nodes in the network, another with varying sig-
nal variances. The noise of (1) is modeled by white complex circu-
lar Gaussian random variables with zero mean, with signal variances
that are arbitrary. Two cases are considered, the first in which the
signal variances are the same across all nodes in the network, and
another where they are allowed to vary. The variances are provided
in Fig. 5. The variances of Fig. 5(a) and 5(b) correspond to the
simulation environment for the results of Fig. 6 while the variances
of Fig. 5(c) and 5(d) correspond to the simulation environment for
the results of Fig. 7. The step size at all nodes in the network is
µk = 0.01 for both Fig. 6 and Fig. 7. Additional results for the
scenario with different variances at the nodes in the network are pro-
vided for a larger step size of µk = 0.05 in Fig. 8. The results
provided are averaged over 100 independent runs.
Figs. 6 and 7 demonstrate that the proposed SI-LMS algorithm
outperforms the standard-form ACT-LMS algorithm in speed of con-
vergence, with approximately a 40% reduction in the number of it-
erations required to converge. Fig. 8 shows that the performance
improvements of the proposed SI-LMS algorithm are consistent.
5. CONCLUSION
In this paper, a diffusion-based SI-LMS algorithm has been pre-
sented, which exploited the most recent estimates available in the
network graph to improve the convergence of the estimates through-
out the network. This was achieved through the inclusion of an ad-
ditional information diffusion step, which is carried out in a serial
i
t
e
a
n
d
r
o
o
c
−
y
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
0
0.1
0.2
0.3
Different signal powers − N=20,M=5
ATC LMS
SI−LMS
5
0
−5
−10
−15
−20
)
B
d
(
E
S
M
0.7
0.8
0.9
1
−25
0
50
100
200
150
250
Iteration number
300
350
400
0.5
0.6
0.4
x−coordinate
Fig. 4. The topology of the network for the results of Figs. 5 to 7.
11
10
9
8
7
11
10
9
8
7
)
B
d
(
k
,
2 u
σ
)
B
d
(
k
,
2 u
σ
Signal Power
5
10
(a)
15
20
5
10
15
20
Node index
(c)
−15
)
B
d
(
k
,
2 v
σ
−20
−25
−15
−20
−25
)
B
d
(
k
,
2 v
σ
Noise power
5
10
(b)
15
20
5
10
15
20
Node index
(d)
Fig. 5. The details of signal and noise power at the nodes in the
network of Fig. 4 considered in the results of Figs. 6 and 7, respec-
tively.
Same signal powers − N=20,M=5
ATC LMS
SI−LMS
5
0
−5
−10
−15
−20
)
B
d
(
E
S
M
−25
0
50
100
200
150
250
Iteration number
300
350
400
Fig. 6. The network MSE of the network with topology of Fig. 4 and
the signal and noise variance parameters provided in of Fig. 5(a) and
5(b).
manner. A discussion of the costs of the proposed SI-LMS algo-
rithm in terms of increased computation required at the nodes in the
Fig. 7. The network MSE of the network with topology of Fig. 4 and
the signal and noise variance parameters provided in of Fig. 5(c) and
5(d).
Different signal powers − N=20,M=5
ATC LMS
SI−LMS
0
−5
−10
−15
−20
)
B
d
(
E
S
M
−25
1
10
20
30
50
40
60
Iteration number
70
80
90
100
Fig. 8. The network MSE of the network with topology of Fig. 4
and the variance parameters provided in of Fig. 5(c) and 5(d) for the
case when a larger step size is used in the adaptive algorithms.
graph and additional necessary communication of estimates required
for information diffusion was provided, demonstrating that the pro-
posed algorithm is not prohibitively costly considering the benefits
offered. Numerical results justify the proposed SI-LMS algorithm
and illustrate its performance advantages.
6. REFERENCES
[1] D. P. Bertsekas, "A new class of incremental gradient methods
for least squares problems," SIAM J. on Optimization, vol. 7,
no. 4, pp. 913 -- 926, Apr. 1997.
[2] J.N. Tsitsiklis and M. Athans, "Convergence and asymptotic
agreement in distributed decision problems," IEEE Trans. Au-
tom. Control, vol. 29, no. 1, pp. 42 -- 50, Jan 1984.
[3] C. G. Lopes and A. H. Sayed, "Diffusion least-mean squares
over adaptive networks: Formulation and performance analy-
sis," IEEE Trans. Signal Process., vol. 56, no. 7, pp. 3122 --
3136, July 2008.
[4] F. S.Cattivelli and A. H. Sayed, "Diffusion lms strategies for
[19] S. Xu, R.C. de Lamare, and H.V. Poor, "Adaptive link selec-
tion strategies for distributed estimation in diffusion wireless
networks," in Proc. IEEE ICASSP, May 2013, pp. 5402 -- 5405.
[20] S. Xu, R. C. de Lamare, and H. V. Poor, "Adaptive link se-
lection strategies for distributed estimation in wireless sensor
networks," EURASIP Journal on Advances in Signal Process-
ing, 2015.
[21] X. Zhao, S-Y Tu, and A.H. Sayed,
"Diffusion adaptation
over networks under imperfect information exchange and non-
stationary data," IEEE Trans. Signal Process., vol. 60, no. 7,
pp. 3460 -- 3475, July 2012.
[22] A. Rastegarnia, W.M. Bazzi, A. Khalili, and J.A. Chambers,
"Diffusion adaptive networks with imperfect communications:
link failure and channel noise," IET Signal Processing, vol. 8,
no. 1, pp. 59 -- 66, Feb 2014.
[23] X. Zhao and A.H. Sayed, "Performance limits for distributed
estimation over lms adaptive networks," IEEE Trans. Signal
Process., vol. 60, no. 10, pp. 5107 -- 5124, Oct 2012.
[24] J. Chen and A.H. Sayed, "On the learning behavior of adap-
tive networks part i: Transient analysis," IEEE Trans. Inform.
Theory, vol. 61, no. 6, pp. 3487 -- 3517, June 2015.
[25] J. Zhang and M. Fossorier, "Shuffled belief propagation de-
coding," in Asilomar Conf. Signals, Systems and Computers,
Nov 2002, vol. 1, pp. 8 -- 15 vol.1.
[26] D.E. Hocevar, "A reduced complexity decoder architecture via
layered decoding of LDPC codes," in IEEE Workshop on Sig-
nal Processing Systems, SIPS, Oct 2004, pp. 107 -- 112.
[27] C.T. Healy and R.C. de Lamare, "Knowledge-aided informed
dynamic scheduling for LDPC decoding," in IEEE Conf. on
Communication Workshop, ICCW, June 2015, pp. 2212 -- 2217.
[28] Cornelius T Healy and Rodrigo C de Lamare, "Design of ldpc
codes based on multipath emd strategies for progressive edge
growth," IEEE Transactions on Communications, vol. 64, no.
8, pp. 3208 -- 3219, 2016.
[29] A.G.D. Uchoa, C.T. Healy, and R.C. de Lamare, "Iterative de-
tection and decoding algorithms for mimo systems in block-
fading channels using ldpc codes,"
IEEE Trans. Vehicular
Tech., 2016.
[30] R. C. de Lamare and R. Sampaio-Neto,
"Minimum mean-
squared error iterative successive parallel arbitrated decision
feedback detectors for ds-cdma systems," IEEE Transactions
on Communications, vol. 56, no. 5, pp. 778 -- 789, 2008.
[31] R. C. de Lamare, "Adaptive and iterative multi-branch mmse
decision feedback detection algorithms for multi-antenna sys-
tems," IEEE Transactions on Wireless Communications, vol.
12, no. 10, pp. 5294 -- 5308, 2013.
[32] A.H. Sayed,
"Diffusion adaptation over networks,"
in E-
Reference Signal Processing, R. Chellapa and S. Theodoridis,
Eds. Elservier, 2013.
distributed estimation," IEEE Trans. Signal Process., vol. 58,
no. 3, pp. 1035 -- 1048, Mar. 2010.
[5] J. Chen and A. H. Sayed, "Diffusion adaptation strategies for
distributed optimization and learning over networks," IEEE
Trans. Signal Process., vol. 60, no. 8, pp. 4289 -- 4305, Aug
2012.
[6] SY Tu and A. H. Sayed, "Diffusion strategies outperform con-
sensus strategies for distributed estimation over adaptive net-
works," Signal Processing, IEEE Transactions on, vol. 60, no.
12, pp. 6217 -- 6234, Dec 2012.
[7] Y. Liu, C. Li, and Z. Zhang,
"Diffusion sparse least-mean
squares over networks," IEEE Trans. Signal Process., vol. 60,
no. 8, pp. 4480 -- 4485, Aug 2012.
[8] S. Chouvardas, K. Slavakis, Y. Kopsinis, and S. Theodoridis,
"A sparsity promoting adaptive algorithm for distributed learn-
ing," IEEE Trans. Signal Process., vol. 60, no. 10, pp. 5412 --
5425, Oct 2012.
[9] R. C. de Lamare and R. Sampaio-Neto, "Adaptive reduced-
rank processing based on joint and iterative interpolation, dec-
imation, and filtering," IEEE Transactions on Signal Process-
ing, vol. 57, no. 7, pp. 2503 -- 2514, 2009.
[10] Rui Fa, R. C. de Lamare, and Lei Wang, "Reduced-rank stap
schemes for airborne radar based on switched joint interpola-
tion, decimation and filtering algorithm," IEEE Transactions
on Signal Processing, vol. 58, no. 8, pp. 4182 -- 4194, 2010.
[11] Yang Zhaocheng, RC De Lamare, and Li Xiang, "L1 regu-
larized stap algorithm with a generalized sidelobe canceler ar-
chitecture for airborne radar," IEEE Transactions on Signal
Processing, vol. 60, no. 2, pp. 674 -- 686, 2012.
[12] S. Xu, R.C. de Lamare, and H.V. Poor,
"Distributed com-
pressed estimation based on compressive sensing," IEEE Sig-
nal Processing Letters, vol. 22, no. 9, pp. 1311 -- 1315, Sept
2015.
[13] T. G. Miller, S. Xu, R. C. de Lamare, and H. V. Poor,
"Distributed spectrum estimation based on alternating mixed
discrete-continuous adaptation," IEEE Signal Processing Let-
ters, vol. 23, no. 4, pp. 551 -- 555, 2016.
[14] N. Takahashi, I. Yamada, and A.H. Sayed, "Diffusion least-
mean squares with adaptive combiners: Formulation and per-
formance analysis," IEEE Trans. Signal Process., vol. 58, no.
9, pp. 4795 -- 4810, Sept 2010.
[15] S-Y Tu and A.H. Sayed, "Optimal combination rules for adap-
tation and learning over networks,"
in IEEE Workshop on
Comp. Adv. in Multi-Sensor Adaptive Process., CAMSAP, Dec
2011, pp. 317 -- 320.
[16] C.G. Lopes and A.H. Sayed, "Diffusion adaptive networks
in Proc. IEEE ICASSP, March
with changing topologies,"
2008, pp. 3285 -- 3288.
[17] P. Clarke and R. C. de Lamare, "Transmit diversity and re-
lay selection algorithms for multirelay cooperative mimo sys-
tems," IEEE Transactions on Vehicular Technology, vol. 61,
no. 3, pp. 1084 -- 1098, 2012.
[18] Tong Peng and Rodrigo C de Lamare,
"Adaptive buffer-
aided distributed space-time coding for cooperative wireless
networks," IEEE Transactions on Communications, vol. 64,
no. 5, pp. 1888 -- 1900, 2016.
|
1902.06039 | 4 | 1902 | 2019-04-11T02:54:29 | PT-ISABB: A Hybrid Tree-based Complete Algorithm to Solve Asymmetric Distributed Constraint Optimization Problems | [
"cs.MA",
"cs.DS"
] | Asymmetric Distributed Constraint Optimization Problems (ADCOPs) have emerged as an important formalism in multi-agent community due to their ability to capture personal preferences. However, the existing search-based complete algorithms for ADCOPs can only use local knowledge to compute lower bounds, which leads to inefficient pruning and prohibits them from solving large scale problems. On the other hand, inference-based complete algorithms (e.g., DPOP) for Distributed Constraint Optimization Problems (DCOPs) require only a linear number of messages, but they cannot be directly applied into ADCOPs due to a privacy concern. Therefore, in the paper, we consider the possibility of combining inference and search to effectively solve ADCOPs at an acceptable loss of privacy. Specifically, we propose a hybrid complete algorithm called PT-ISABB which uses a tailored inference algorithm to provide tight lower bounds and a tree-based complete search algorithm to exhaust the search space. We prove the correctness of our algorithm and the experimental results demonstrate its superiority over other state-of-the-art complete algorithms. | cs.MA | cs |
PT-ISABB: A Hybrid Tree-based Complete Algorithm to Solve
Asymmetric Distributed Constraint Optimization Problems
Yanchen Deng
College of Computer Science,
Chongqing University
Chongqing, China
[email protected]
Ziyu Chen∗
College of Computer Science,
Chongqing University
Chongqing, China
[email protected]
Dingding Chen
College of Computer Science,
Chongqing University
Chongqing, China
[email protected]
Xingqiong Jiang
College of Computer Science,
Chongqing University
Chongqing, China
[email protected]
Qiang Li
College of Electrical Engineering,
Chongqing University
Chongqing, China
[email protected]
ABSTRACT
Asymmetric Distributed Constraint Optimization Problems (AD-
COPs) have emerged as an important formalism in multi-agent
community due to their ability to capture personal preferences.
However, the existing search-based complete algorithms for AD-
COPs can only use local knowledge to compute lower bounds,
which leads to inefficient pruning and prohibits them from solving
large scale problems. On the other hand, inference-based complete
algorithms (e.g., DPOP) for Distributed Constraint Optimization
Problems (DCOPs) require only a linear number of messages, but
they cannot be directly applied into ADCOPs due to a privacy
concern. Therefore, in the paper, we consider the possibility of
combining inference and search to effectively solve ADCOPs at an
acceptable loss of privacy. Specifically, we propose a hybrid com-
plete algorithm called PT-ISABB which uses a tailored inference
algorithm to provide tight lower bounds and a tree-based complete
search algorithm to exhaust the search space. We prove the correct-
ness of our algorithm and the experimental results demonstrate its
superiority over other state-of-the-art complete algorithms.
KEYWORDS
ADCOP; Complete algorithms; Search; Inference
ACM Reference Format:
Yanchen Deng, Ziyu Chen, Dingding Chen, Xingqiong Jiang, and Qiang
Li. 2019. PT-ISABB: A Hybrid Tree-based Complete Algorithm to Solve
Asymmetric Distributed Constraint Optimization Problems. In Proc. of the
18th International Conference on Autonomous Agents and Multiagent Systems
(AAMAS 2019), Montreal, Canada, May 13 -- 17, 2019, IFAAMAS, 9 pages.
1 INTRODUCTION
Distributed Constraint Optimization Problems (DCOPs) [28] are a
fundamental framework in multi-agent systems where agents co-
operate with each other to optimize a global objective. DCOPs have
∗Corresponding author.
Proc. of the 18th International Conference on Autonomous Agents and Multiagent Systems
(AAMAS 2019), N. Agmon, M. E. Taylor, E. Elkind, M. Veloso (eds.), May 13 -- 17, 2019,
Montreal, Canada. © 2019 International Foundation for Autonomous Agents and
Multiagent Systems (www.ifaamas.org). All rights reserved.
been successfully deployed in many real world applications includ-
ing smart grids [6], radio frequency allocation [15], task scheduling
[25], etc.
Algorithms for DCOPs can generally be classified into two cate-
gories, i.e., complete algorithms and incomplete algorithms. Search-
based complete algorithms like SBB [10], AFB [7], ConFB [16],
ADOPT [14] and its variants [9, 27] perform distributed searches
to exhaust the search space, while inference-based complete al-
gorithms including Action-GDL [26], DPOP [20] and its variants
[21, 22] use dynamic programming to optimally solve problems. In
contrast, incomplete algorithms including local search [12, 17, 29],
GDL-based algorithms [3, 4, 24, 30] and sampling-based algorithms
[5, 18] trade optimality for small computational efforts.
Asymmetric Distributed Constraint Optimization Problems (AD-
COPs) [8] are a notable extension to DCOPs, which can capture
ubiquitous asymmetric structures in real world scenarios [2, 13, 23].
That is, a constraint in an ADCOP explicitly defines the exact pay-
off for each participant instead of assuming equal payoffs for con-
strained agents. Solving ADCOPs is more challenging since algo-
rithms must evaluate and aggregate the payoff for each participant
of a constraint. ATWB and SABB [8] are asymmetric versions of
AFB and SBB based on an one-phase strategy in which the algo-
rithms systematically check each side of the constraints before
reaching a full assignment. Besides, AsymPT-FB [11] is another
search-based complete algorithm for ADCOPs, which implements
a variation of forward bounding on a pseudo tree. However, to
the best of our knowledge, there is no asymmetric adaptation of
inference-based complete algorithms for DCOPs (e.g., DPOP). That
is partially because these algorithms require the total knowledge
of each constraint to perform variable elimination optimally. In
other words, parent agents must surrender their private constraints
to eliminate their children variables, which is unacceptable in a
asymmetric scenario.
In this paper, we investigate the possibility of combining both
inference and search to efficiently solve ADCOPs at an acceptable
loss of privacy. Specifically, our main contributions are listed as
follows.
• We propose a hybrid tree-based complete algorithm for AD-
COPs, called PT-ISABB.1 The algorithm first uses a tailored
version of ADPOP [19] to solve a subset of constraints, and
the inference results stored in agents are served as look-up
tables for tight lower bounds. Then, a variant of SABB is
implemented on a pseudo tree to guarantee optimality.
• We theoretically show the completeness of our proposed
algorithm. Moreover, we also prove that the lower bounds
in PT-ISABB are at least as tight as the ones in AsymPT-FB
when its maximal dimension limit k = ∞ .
• We empirically evaluate our algorithm on various bench-
marks. Our study shows that PT-ISABB requires signifi-
cantly fewer messages and lower NCLOs than state-of-the-
art search-based complete algorithms including AsymPT-FB.
The experimental results also indicate that our proposed
algorithm leaks less privacy than AsymPT-FB when solving
complex problems.
2 BACKGROUND
In this section, we review the preliminaries including ADCOPs,
pseudo tree, DPOP and ADPOP.
2.1 Asymmetric Distributed Constraint
Optimization Problems
An asymmetric distributed constraint optimization problem can be
defined by a tuple ⟨A, X , D, F⟩ in which
• A = {a1, . . . , aq} is a set of agents
• X = {x1, . . . , xn} is a set of variables
• D = {D1, . . . , Dn} is a set of finite and discrete domains.
Each variable xi takes a value from Di
• F = { f1, . . . , fm} is a set of constraints. Each constraint
fi : Di1 ×· · ·× Dik → Rk
+ defines a set of non-negative costs
for every possible value combination of the set of variables
it is involved in
For the sake of simplicity, we assume that an agent only controls
a variable and all constraints are binary. Therefore, the term agent
and variable can be used interchangeably. Besides, for the constraint
between xi and xj, we denote the private cost functions for xi and
xj as fij and fji, respectively. Note that in the asymmetric setting,
fij does not necessarily equal to fji. A solution to an ADCOP is the
assignments to all the variables with the minimal aggregated cost.
An ADCOP can be visualized by a constraint graph in which the
vertexes denote the variables and the edges denote the constraints
between agents. Fig. 1 (a) visualizes an ADCOP with four agents
and four constraints.
2.2 Pseudo Tree
A pseudo tree is an ordered arrangement to a constraint graph
in which agents in different branches are independent and thus
search can be performed in parallel on these independent branches.
A pseudo tree can be generated by a depth-first traverse of the
constraint graph, which categorizes the constraints into tree edges
and pseudo edges. For an agent ai, we denote its parent as P(ai)
which is the ancestor connecting to ai through a tree edge, its
1The source code is available at https://github.com/czy920/DCOPSovlerAlgorithm_PTISABB.
(a)
(b)
Figure 1: An example of constraint graph and pseudo tree
pseudo parents as PP(ai) which is a set of ancestors connecting to
ai through pseudo edges, its children and pseudo children as C(ai)
and PC(ai) which are the sets of descendants connecting to ai via
tree edges and pseudo edges, respectively. For the sake of clarity, we
denote all the parents of ai as AP(ai) = PP(ai) ∪ {P(ai)}. We also
denote its separator, i.e., the set of ancestors that are constrained
with ai or its descendants, as Sep(ai) [21]. Fig. 1 (b) gives a possible
pseudo tree deriving from Fig. 1 (a).
2.3 DPOP and ADPOP
DPOP is an important inference-based algorithm that performs
dynamic programming on a pseudo tree, starting with a phase of
utility propagation. In the phase, each agent joins the received util-
ities from its children with its local utility, eliminates its dimension
by calculating the optimal utility for each assignment combination
of its separator, and propagates the reduced utility to its parent.
After that, a value propagation phase starts from the root agent. In
the phase, each agent chooses the optimal assignment according to
the utilities calculated in the previous phase and the assignments
from its parent, and broadcasts the extended assignments to its
children. The algorithm terminates when all agents have chosen
their optimal assignments.
Although DPOP only requires a linear number of messages to
solve a DCOP, its memory consumption is still exponential in in-
duced width, which prohibits it from solving more complex prob-
lems. Thus, Petcu et. al, proposed ADPOP which is an approximate
version of DPOP and allows the desired trade-off between solution
quality and computational complexity. Specifically, ADPOP imposes
a limit maxDim on the maximum number of dimensions in each
message. When the number of dimensions in an outgoing message
exceeds the limit, the algorithm drops a set of dimensions to stay
below the limit. That is, the algorithm computes an upper bound
and a lower bound by applying a maximal/minimal projection on
these dimensions. During the value propagation phase, agents can
make decisions according to the highest utilities in either upper
bounds or lower bounds.
3 PROPOSED METHOD
In this section, we present our proposed PT-ISABB, a two-phase
hybrid complete algorithm for ADCOPs. We begin with a motiva-
tion, and then present the details of the inference phase and the
search phase, respectively.
a minimal projection (line 12 - 13). Here, local_utili denotes the
combination of the constraints between agent ai and its parent and
pseudo parents enforced in ai side, i.e.,
local_utili =
fij
aj ∈AP(ai)
Note that in our algorithm we do not require the parent agents
to disclose their private functions to perform inference exactly.
In this way, a local utility table only involves the functions of
that agent and the privacies of its parent and pseudo parents are
therefore guaranteed. On the other hand, however, ignoring the
private functions of parents and pseudo parents leads to severe
inconsistencies when performing variable elimination. In other
words, we actually trade lower bound tightness for privacy. We try
to alleviate the problem by performing non-local elimination which
is elaborated as follows.
When ai receives a UTIL message from its child ac, it joins the
utility from ac with its corresponding private constraint function
and then eliminates the dimension xc for a more complete utility
Child_utilc
(line 4). Compared to DPOP and ADPOP, the elimina-
i
tion of each variable is postponed to its parent in the pseudo-tree.
Taking Fig. 1 (b) for example, the UTIL message from a3 to a2 is
given by
f32 + f31
if the maximal dimension limit k ≥ 3, and the elimination of x3 is
actually performed by a2. That is,
3
2 = min
x3
(f23 + f32 + f31)
Child_util
Then, ai initiates the search phase after receiving all UTIL messages
from its children if it is the root agent (line 6 - 8). Otherwise, it
propagates the joint utility to its parent (line 9 - 10).
3.3 Search Phase
The phase performs a branch-and-bound search on a pseudo tree
to exhaust the search space. Specifically, each branching agent de-
composes the problem into several subproblems, and each of its
children solves a subproblem in parallel. To detect and discard the
suboptimal solution, each agent maintains a upper bound for its sub-
problem and an lower bound for each value in its domain. Therefore,
each agent ai needs to maintain the following data structures.
• Srch_valc
records the assignment currently being explored
i
in the subtree rooted at ac ∈ C(ai). The data structure is
necessary because asynchronous search is carried out in
parallel in sub-trees based on different possible values of xi.
• hiдh_costi(di) is the cost for di ∈ Di between ai and its par-
ent and pseudo parents under the current partial assignment
(Cpa), which is initially set to the cost enforced in ai side.
That is,
hiдh_costi(di) =
fi j(di, Cpa(xj))
(1)
i (di) is the lower bound of child ac ∈ C(ai) for di ∈ Di,
• lbc
which is initially set to the utility under Cpa and di. That is,
(2)
i (Cpa[Sep(ac)], xi = di)
i (di) = Child_util c
lbc
aj ∈AP(ai)
where Cpa[Sep(ac)] is a slice to Cpa under Sep(ac), i.e.,
Cpa[Sep(ac)] = {(xj , dj)(xj , dj) ∈ Cpa ∧ xj ∈ Sep(ac)}
Figure 2: Pseudo code of inference phase
3.1 Motivation
The existing search-based complete algorithms for ADCOPs can
only use local knowledge to compute lower bounds, which leads
to inefficient pruning. More specifically, unassigned agents report
the best local costs under the given partial assignments to compute
lower bounds. Taking Fig. 1 as an example, in AsymPT-FB agent
a1 can receive LB_reports from a2 and a3. As a consequence, a1
can only be aware of the lower bounds of f21 and f31 and does
not have any knowledge about the remaining constraints (i.e., the
constraints between a2 and a3, a2 and a4). On the other hand, in-
ference algorithms like DPOP are able to aggregate and propagate
the global utility, but they are not applicable to ADCOPs due to
a privacy concern. For example, a3 needs to know both f13 and
f23 to optimally eliminate x3, which violates the privacies of a1
and a2. Thus, to overcome the pathologies, we propose a novel hy-
brid scheme to solve ADCOPs, which combines both inference and
search. Specifically, the scheme consists of the following phases.
• Inference phase: performing a bottom-up utility propaga-
tion with respect to a subset of constraints to build look-up
tables for lower bounds
• Search phase: using a tree-based complete search algorithm
for ADCOPs to exhaust the search space and guarantee opti-
mality
In this paper, we propose a tailored version of ADPOP for the
inference phase to avoid the severe privacy loss and exponential
memory consumption in DPOP. Furthermore, we implement SABB
on a pseudo tree for the search phase and propose an algorithm
called PT-ISABB. Although they both operate on pseudo trees, our
algorithm excels AsymPT-FB twofold. When its maximal dimension
limit k = ∞, the lower bounds in our algorithm are at least as tight
as the ones in AsymPT-FB (see Property 4.1 for detail). Moreover,
PT-ISABB avoids to perform forward bounding which is expensive
during the search phase.
3.2 Inference Phase
Fig. 2 gives the sketch of the inference phase for PT-ISABB. The
phase begins with leaf agents who send their local utilities to their
parents via UTIL messages (line 1 - 3). Particularly, if the number
of dimensions in the utility exceeds the limit k (line 11), we drop
the dimensions of the highest ancestors to stay below the limit by
Algorithm1:InferencephaseforaiWhenInitialization:1joini←copy(local_utili)2ifaiisaleafthen3SendUtil()WhenreceivedUTIL(child_util)fromac∈C(ai):4Child_utilci←minxcchild_util⊗fic5joini←joini⊗Child_utilci6ifaihasreceivedallUTILfromC(ai)then7ifaiistherootthen8startSearchphase9else10SendUtil()FunctionSendUtil():11ifdim(joini)>kthen12selectS⊂dim(joini)\xi,s.t.S=dim(joini)−k13joini←minSjoini14sendUTIL(joini)toP(ai)1Figure 4: Pseudo code of search phase (auxiliary functions)
• Spai(di) is the optimal assignment to its subproblem under
Cpa when xi = di and is initially set to {xi = di}. Particu-
larly, Spai(d∗
i ) is the optimal solution if ai is the root agent,
where d∗
= arg mindi ∈Cmplt_vali lbi(di).
i
Fig. 3 and Fig. 4 give the pseudo codes of the search phase for
PT-ISABB. The phase begins with the root agent sending the first
element in its domain to its children (line 1 - 4). When an agent ai
receives a CPA message from its parent, it first stores the partial
assignment Cpa and upper bound ubi and then finds the first fea-
sible assignment (line 5 - 7), i.e., the first assignment di such that
lbi(di) < ubi (line 57 - 60). If such an assignment exists, ai sends
COST_REQ messages to its parent and pseudo parents to request
the private costs of other side for di (line 8 - 10, line 13). Otherwise,
it sends a BACKTRACK message with an infinity cost and an empty
subproblem assignment (line 64 - 65) to its parent to announce that
the given Cpa is infeasible (line 11 - 12).
When ai receives a COST message for di, it adds the other side
cost to hiдh_costi(di) (line 14). After receiving all the COST mes-
sages for di from its parent and pseudo parents, ai is able to de-
termine whether it should continue to explore di. If ai is a leaf
agent, it just updates the current upper bound and switches to the
next feasible assignment d′
(line 17 - 19) since the search space no
longer needs to be expanded. If such d′
i
exists, ai requests costs for
i
the assignment (line 20 - 21). Otherwise, it backtracks to its parent
by reporting the best cost and the best subproblem assignment ex-
plored under Cpa (line 22 - 23, line 66 - 68). If ai is not a leaf agent
and the current lower bound for di is still less than its upper bound,
it expands the search space by sending CPA messages to its children
who are going to explore di (line 25 - 27). Each message contains
an extended partial assignment (line 61) and an upper bound which
is the remainder after deducting the cost incurred by di and the
lower bounds of the other children from ai's upper bound (line 62).
Otherwise, di is proven to be suboptimal and the agent switches to
the next feasible assignment (line 28 - 30). If such an assignment
exists, ai requests costs for it (line 31 - 32). A backtrack takes place
if all children exhaust ai's domain (line 33 - 34).
Figure 3: Pseudo code of search phase (message passing)
When ai receives a BACKTRACK message from ac, it re-
places the initial lower bound with the actual cost reported
by ac (or ∞ if di is infeasible for ac given Cpa).
• lbi(di) is the lower bound for di ∈ Di, i.e.,
i (di)
lbc
lbi(di) = hiдh_costi(di) +
(3)
• Cmplt_valsi is the set of assignments for which ai has re-
ceived all BACKTRACK messages from its children, and is
initially set to ∅. Particularly, Cmplt_valsi = Di if ai is a leaf
agent.
• lb∗
is the best cost explored under Cpa, which is given by
i
(4)
min
lb∗
i =
ac ∈C(ai)
di ∈Cmpl t_valsi
Particularly, if Cmplt_valsi = ∅, lb∗
lbi(di)
= ∞.
i
Algorithm2:Searchphaseforai(messagepassing)WhenInitialization:1ifaiistherootthen2InitializeVariables()3di←thefirstelementinDi,Cpa←(xi,di)4sendCPA(Cpa,∞)toac,∀ac∈C(ai)WhenreceivedCPA(Cpa,ubi)fromP(ai):5store{Cpa,ubi}6InitializeVariables()7di←NextFeasibleAssignment(null)8ifdi(cid:44)nullthen9sendCOST_REQ(Cpa(xj),di)toaj,∀aj∈AP(ai)10Srch_valci←di,∀ac∈C(ai)11else12SendBacktrack()WhenreceivedCOST_REQ(di,dc)fromac∈C(ai)∪PC(ai):13sendCOST(fic(di,dc),dc)toacWhenreceivedCOST(cost,di)fromap∈AP(ai):14hiдh_costi(di)←hiдh_costi(di)+cost15ifaihasnotreceivedallCOSTfromAP(ai)fordithen16return17ifaiisaleafthen18ubi←min(ubi,lbi(di))19d′i←NextFeasibleAssignment(di)20ifd′i(cid:44)nullthen21sendCOST_REQ(Cpa(xj),d′i)toaj,∀aj∈AP(ai)22else23SendBacktrack()24else25iflbi(di)<ubithen26foreachac∈C(ai)∧Srch_valci=dido27SendCpa(di,ac)28else29d′i←NextFeasibleAssignment(di)30Srch_valci←d′i,∀ac∈C(ai)∧Srchci=di31ifd′i(cid:44)nullthen32sendCOST_REQ(Cpa(xj),d′i)toaj,∀aj∈AP(ai)33elseif∀ac∈C(ai),Srch_valci=nullthen34SendBacktrack()WhenreceivedBACKTRACK(lb∗c,Spac)fromac∈C(ai):35di←Srch_valci,lbci(di)←lb∗c,Spai(di)←Spai(di)∪Spac36ifaihasreceivedallBACKTRACKfromC(ai)fordithen37Cmplt_valsi←Cmplt_valsi∪{di}//marksdiascomplete38ubi←min(ubi,lbi(di))39d′i←NextFeasibleAssignment(di),Srch_valci←d′i40ifd′i(cid:44)nullthen41ifaihasreceivedallCOSTfromAP(ai)ford′ithen42SendCpa(d′i,ac)43elseifaihasnotrequestedcostsford′ithen44sendCOST_REQ(Cpa(xj),d′i)toaj,∀aj∈AP(ai)45elseif∀ac∈C(ai),Srch_valci=nullthen46ifaiistherootthen47sendTERMINATEtoac,∀ac∈C(ai)48terminate49else50SendBacktrack()WhenreceivedTERMINATEfromP(ai):51sendTERMINATEtoac,∀ac∈C(ai)52terminate1Algorithm2:Searchphaseforai(auxiliaryfunctions)FunctionInitializeVariables():53initializeCmplt_valsi54initializehiдh_costi(di),Spai(di),∀di∈Di55initializeSrch_valci,∀ac∈C(ai)56initializelbci(di),∀ac∈C(ai),di∈DiFunctionNextFeasibleAssignment(di):57d′i←theelementnexttodiinDi58whiled′i(cid:44)null∧lbi(d′i)≥ubido59d′i←thenextelementinDi60returnd′iFunctionSendCpa(di,ac):61TmpCpa←Cpa∪(xi,di)62ubc←ubi−hiдh_costi(di)−(cid:80)aj∈C(ai)∧j(cid:44)clbji(di)63sendCPA(TmpCpa,ubc)toacFunctionSendBacktrack():64ifCmplt_valsi=∅then65sendBACKTRACK(∞,∅)toP(ai)66else67d∗i←argmindi∈Cmplt_valsilbi(di)68sendBACKTRACK(lb∗,Spai(d∗i))toP(ai)1When ai receives a BACKTRACK message for di from a child ac,
i (di) with the actual
it updates the corresponding lower bound lbc
cost lb∗
c reported by ac if Cpa and the assignment di is feasible
(otherwise lb∗
c = ∞), and merges the best assignments from ac (line
35). If ai has received all the BACKTRACK messages for di from
its children, it marks di as complete and updates the current upper
bound for its subproblem (line 36 - 38). ai also needs to determine
the next assignment d′
exists and
i
ai has received all the COST messages from its parent and pseudo
parents, it informs ac to explore d′
by sending a CPA message (line
40 - 42). Otherwise, ai requests costs for d′
if it has not been done
(line 43 - 44). If d′
does not exist and all children have exhausted
i
ai's domain, ai informs its children to terminate and terminates
itself if it is the root agent (line 45 - 48). Otherwise, it backtracks to
its parent (line 49 - 50).
for ac to explore (line 39). If d′
i
i
i
4 THEORETICAL RESULTS
4.1 Correctness
In this section, we first prove the termination and optimality, and
further establish the completeness of PT-ISABB.
Lemma 4.1. PT-ISABB will terminate after a finite number of iter-
ations.
Proof. Directly from the pseudo codes, the inference phase will
terminate since it only needs a linear number of messages. Thus, to
prove the termination, it is enough to show that the same partial
assignment cannot be explored twice in the search phase, i.e., an
agent will not receive two identical Cpas. Obviously, the claim holds
for the root agent since it does not receive any CPA message. For
an agent and a given Cpa from its parent, it will send several CPA
messages to each child. Since each of them contains the different
assignments of the agent (line 29, line 39, line 57 - 60), the Cpas sent
to the child are all different. Therefore, the termination is hereby
guaranteed.
□
Lemma 4.2. For an agent ai and a given Cpa, the cost incurred by
any assignment Spai to the subtree rooted at ai with the assignment
(xi = di) is no less than the corresponding lower bound lbi(di).
Proof. The lemma for a leaf is trivial since lbi(di) is set to the
cost of di which is obviously no greater than the cost of the feasible
assignment. We now focus on no-leaf agents. Recall that ai will
replace the original lower bound with the actual cost reported by
ac after receiving a BACKTRACK message for di from ac ∈ C(ai)
(line 35). Thus, to prove the lemma, it is sufficient to show that
i (di) is no greater than the actual cost
the initial lower bound lbc
of Spac ,∀ac ∈ C(ai), where Spac ⊂ Spai is the assignment to the
subtree rooted at ac.
Consider the induction basis, i.e., ai's children are leafs. For each
child ac ∈ C(ai), we have
cost(Spac) =
fjc(dj, dc) + fc j(dc, dj)
fic(di, xc) +
aj ∈AP(ac)
≥ min
xc
fc j(xc, dj)
aj ∈AP(ac)
≥ Child_util c
i (Cpa[Sep(ac)], xi = di) = lbc
i (di)
where dl is the assignment to xl in Cpa or Spac.The equation in
the second to the last step holds when the maximal dimension limit
k = ∞. Thus, the lemma holds for the basis.
Assume that the lemma holds for all ac ∈ C(ai). Next, we are
going to show the lemma holds for ai as well. For each child ac ∈
C(ai), we have
cost(Spac ) =
≥
fc j (dc , dj ) + fjc (dj , dc ) +
fc j (dc , dj ) + fjc (dj , dc ) +
fc j (xc , dj ) +
cost(Spac′)
lbc′
c (dc )
lbc′
c (xc )
fic (di , xc ) +
aj ∈AP(ac )
≥ min
xc
ac′∈C(ac )
ac′∈C(ac )
aj ∈AP(ac )
aj ∈AP(ac )
≥ Child_ut ilc
i (Cpa[Sep(ac )], xi = di ) = lbc
ac′∈C(ac )
i (di )
which establishes the lemma.
□
Lemma 4.3. For an agent ai and a given Cpa, any assignment to
the subtree rooted at ai with cost greater than ubi cannot be a part of
a solution with cost less than the global upper bound.
Proof. We will prove recursively, by showing that for a partial
assignment Spai to the subtree rooted at ai with cost(Spai) > ubi,
any partial assignment Spaj ⊃ Spai to the subtree rooted at aj
will have cost(Spaj) > ubj where aj = P(ai). Note that ubi could
be either an upper bound from aj via a CPA message (line 5) or
a result of updating the upper bound locally (line 18, line 38). ai
cannot backtrack by reporting Spai in the latter case since there
must exist a better partial assignment whose cost is ubi. If ubi is
received from aj, according to line 62, we have
ubj = ubi + hiдh_costj(dj) +
j (dj)
lbc
ac ∈C(aj)∧c(cid:44)i
Thus, cost(Spai) > ubi necessarily means that any partial assign-
ment Spaj ⊃ Spai will have cost(Spaj) > ubj.
□
Theorem 4.4. PT-ISABB is complete.
Proof. Immediately from Lemma 4.1, Lemma 4.2 and Lemma
4.3, the algorithm will terminate and all pruned assignments are
suboptimal. Thus, PT-ISABB is complete.
□
4.2 Lower bound tightness
Property 4.1. For an agent ai and a given Cpa, the initial lower
i (di) of ac ∈ C(ai) for di is at least as tight as the one in
bound lbc
AsymPT-FB when the maximal dimension limit k = ∞.
Proof. In AsymPT-FB, the lower bound for ac after receiving
all the LB_Reports from the subtree rooted at ac is given by the
sum of the best single side local costs of ac's descendants under
Cpa. That is,
Subtr eeLBc
i (di) =
aj ∈Desc(ac )
+ min
xc
al ∈AP(ac )
fjl (xj , dl )
al ∈Sep(ac )∩P P(aj )
min
xj
fcl (xc , dl )
where Desc(ac) is the set of the descendants of ac. For the sake of
clarity, we denote the vector of xc and its descendant variables as
i (di). Since k = ∞, the
i (di) = min
lbc
xc
i (di) ≥ SubtreeLBc
xc. Next, we will show lbc
inference phase does not drop any dimension. Thus, we have
(cid:169)(cid:173)(cid:173)(cid:171)
fjl (xj , xl ) +
fcl (xc , dl ) +
al ∈C(aj )
fcl (xc , xl ) + fic(di , xc)
fjl (xj , xl )(cid:170)(cid:174)(cid:174)(cid:172)
al ∈AP(aj )∩Desc(ai )
al ∈AP(aj )∩Sep(ac )
aj ∈Desc(ac )
fjl (xj , dl )
al ∈C(ac )
fjl (xj , dl )
aj ∈Desc(ac )
al ∈AP(aj )∩Sep(ac )
fcl (xc , dl )
+
+
+
al ∈AP(ac )
≥ min
xc
al ∈AP(ac )
Since xc ∈ xc and AP(aj) ⊃ PP(aj), the right-hand side of the
inequality in the last step can be further reduced. That is,
fjl (xj , dl )
i (di) ≥ min
lbc
xc\xc
aj ∈Desc(ac )
al ∈AP(aj )∩Sep(ac )
+ min
xc
al ∈AP(ac )
al ∈AP(ac )
+ min
xc
≥ min
xc\xc
≥
+ min
xc
aj ∈Desc(ac )
fcl (xc , dl )
fjl (xj , dl )
fjl (xj , dl )
aj ∈Desc(ac )
al ∈P P(aj )∩Sep(ac )
fcl (xc , dl )
min
xj
fcl (xc , dl )
al ∈Sep(ac )∩P P(aj )
(a)
(b)
al ∈AP(ac )
= Subtr eeLBc
i (di)
which concludes the property.
Figure 5: Performance comparison under different agent
numbers
□
and lbc
Sep(ai)+1
max
4.3 Complexity
i (di) for each child,
Since an agent ai stores Child_utilc
i
the overall space complexity in the worst case (i.e., k = ∞) is
+C(ai)Di) where dmax = maxaj ∈Sep(ai) Dj.
O(C(ai)d
Since it contains all the dimensions of Sep(ai) and itself, the size of
an UTIL message from ai is O(d
) when k = ∞. For a CPA
message, it consists of the assignment of each agent and an upper
bound. Thus, the size of a CPA message is O(A). Other messages
including COST_REQ, COST, BACKTRACK and TERMINATE carry
several scalars and thus they only require O(1) space.
Different than standard DPOP/ADPOP, PT-ISABB only requires
A − 1 messages in the inference phase since it does not have the
value propagation phase. Like any other search based complete algo-
rithm, the message number of the search phase grows exponentially
with respect to the agent number.
Sep(ai)+1
max
5 EXPERIMENTAL RESULTS
We empirically evaluate PT-ISABB with state-of-the-art search-
based complete algorithms for ADCOPs including SABB, ATWB
and AysmPT-FB on three configurations. To demonstrate the real
power of non-local elimination, we also consider SABB on a pseudo-
tree (PT-SABB) and the local elimination version of PT-ISABB (PT-
ISABB, local) with k = ∞. In the first ADCOP configuration, we set
the graph density to 0.25, the domain size to 3 and vary the agent
number from 8 to 18. The second configuration is ADCOPs with 8
agents and the domain size of 8. The graph density varies from 0.25
to 1. In the last configuration, we consider asymmetric MaxDCSPs
with 10 agent, the domain size of 10 and the graph density of 0.4,
and the tightness varies from 0.1 to 0.8. For each of the settings, we
generate 50 random instances and the results are averaged over all
instances. In our experiments, we use the number of non-concurrent
logical operations (NCLO) [16] to evaluate hardware-independent
runtime, in which the logical operations in the inference phase
are accesses to utility tables, and for the search phase and other
competitors they are constraint checks. Also, we use the message
number and the size of total information exchanged to measure the
network load. For asymmetric MaxDCSPs, we use entropy [1] to
quantify the privacy loss [8, 11]. The experiments are conducted
on an i7-7820x workstation with 32GB of memory and for each
algorithm we set the timeout to 2 minutes.
Fig. 5 gives the performance comparison on different agent num-
bers, and the average induced widths in the experiments are 1 ∼
6.84. It can be seen from the figure that all the algorithms suffer
from exponential overheads as the agent number grows. Among
them, our proposed PT-ISABB requires significant fewer messages
and lower NCLOs than the other competitors, which demonstrates
the superiority of the hybrid execution of inference and search.
On the other hand, although PT-ISABB (k = ∞, local) employs an
complete one-side inference to construct the initial lower bounds,
it is still inferior to PT-ISABB with k > 2, which demonstrate the
necessity of non-local elimination. Besides, it is worth noting that
81012141618Agent Number102103104105106107Message Number81012141618Agent Number102103104105106NCLOsATWBSABBAsymPT-FBPT-SABBPT-ISABB(k=1,local)PT-ISABB(k=2)PT-ISABB(k=4)PT-ISABB(k=6)PT-ISABB(k=1)(a)
(b)
(a)
(b)
Figure 6: Performance comparison under different graph
densities
Figure 7: Performance comparison under different tightness
PT-ISABB requires much fewer messages than AsymPT-FB even
when the maximal dimension limit k is small (e.g., k = 2). That
is because PT-ISABB does not rely on forward bounding which is
expensive in message-passing to compute lower bounds. Moreover,
the phenomenon also indicates that our algorithm can produce
tighter lower bounds even if the memory budget is relatively low.
Fig. 6 gives the results under different graph densities. The aver-
age induced widths here are 1 ∼ 6. Note that in this configuration,
the size of the search space does not change and the complexity
is reflected in the topologies. It can be concluded from the fig-
ure that all the tree-based algorithms exhibit great superiorities
when the graph density is low, and the advantages vanish as the
density grows. That is because those algorithms can effectively par-
allel the search processes on sparse problems. Dense problems, on
the other hand, usually result in pseudo trees with low branching
factors, making the tree-based algorithms require more messages
than SABB. Even so, our proposed PT-ISABB with large k still
outperforms SABB when the problems are fully connected, which
demonstrates the necessity of tighter lower bounds. Additionally,
the figure also indicates that PT-ISABB with different k performs
similarly on sparse problems, but the performances vary a lot on
dense problems. That is due to the fact that the induced width of a
pseudo tree is relatively small when solving a spare problem and
thus only a small set of dimensions is dropped during the inference
phase. Besides, it can be seen from the figure that although both
PT-ISABB (k = ∞, local) and PT-ISABB (k = ∞) perform complete
Table 1: The size of total information exchanged of each al-
gorithm under different graph densities (in KB)
inferences, the non-local elimination version requires lower NCLOs
and fewer message numbers in most of the settings. That is because
the non-local elimination version can provide tighter lower bounds
which result in efficient pruning, and thus the algorithm incurs
fewer constraint checks and messages in the search phase.
Table 1 presents the size of total information exchanged of each
algorithm under different densities. It can be seen from the table
that all the non-local elimination versions of PT-ISABB exhibit
great advantages over the other search-based competitors, except
that PT-ISABB (k = 2) is slightly inferior to AsymPT-FB when
solving the fully-connected problems. The phenomenon indicates
that although a message in the inference phase is generally larger
than the one in the search phase, the algorithms can still gain great
reductions on network traffics since the effective pruning in the
search phase greatly reduces the message number. Besides, it is
interesting to find that a large dimension limit (e.g., k = ∞) does
0.250.40.550.70.851Density102103104105106107Message NumberATWBSABBAsymPT-FBPT-SABBPT-ISABB(k=1,local)PT-ISABB(k=2)PT-ISABB(k=4)PT-ISABB(k=6)PT-ISABB(k=1)0.250.40.550.70.851Density102103104105106107NCLOsATWBSABBAsymPT-FBPT-SABBPT-ISABB(k=1,local)PT-ISABB(k=2)PT-ISABB(k=4)PT-ISABB(k=6)PT-ISABB(k=1)0.10.20.30.40.50.60.70.8Tightness102103104105106107Message Number0.10.20.30.40.50.60.70.8Tightness102103104105106107NCLOsATWBSABBAsymPT-FBPT-SABBPT-ISABB(k=1,local)PT-ISABB(k=2)PT-ISABB(k=4)PT-ISABB(k=6)PT-ISABB(k=1)AlgorithmDensity0.250.40.550.70.851ATWB91,273.2997,715.94175,594.67190,195.50266,654.30373,255.37SABB64,264.4468,342.30142,308.71164,670.95233,956.11329,344.13AsymPTFB168.071,174.823,161.299,483.7623,958.5257,261.91PT-SABB85.37990.773,260.3012,920.1035,221.34103,409.30PT-ISABB(k=∞,local)67.41581.412,137.578,653.5225,444.4573,442.96PT-ISABB(k=2)8.59343.041,661.957,426.9923,572.6869,207.66PT-ISABB(k=4)8.58143.45811.753,812.2514,755.5150,844.86PT-ISABB(k=6)8.57147.73897.093,199.699,734.1735,617.43PT-ISABB(k=∞)8.59147.55897.393,198.511,0435.5794,536.77not necessarily result in the smallest traffic. That is because the size
of a message in the inference phase is exponential to the minimum
of the induced width and the dimension limit. Besides, it should be
noted that although PT-SABB requires more messages than ATWB
and SABB when solving fully-connected problems according to Fig.
6, it still incurs much smaller traffic due to the fact that the last
agent in ATWB and SABB needs to broadcast the reached complete
solution to all other agents once a new solution is constructed. In
contrast, agents in PT-SABB only back up the assignments to their
descendants, which are subsets of the complete solution, to their
parents via BACKTRACK messages.
Fig. 7 presents the results on asymmetric MaxDCSPs with differ-
ent tightness, and the average induced width is 3.92. This configu-
ration neither increases the search space nor affects the topologies,
but instead increases the difficulty of pruning. All the algorithms
except ATWB produces few messages when solving problems with
low tightness. That is because on these problems the algorithms
can find low upper bounds very quickly to prune most of the search
space. As the tightness grows, the number of prohibited combina-
tions increases and the algorithms can no longer find low upper
bounds promptly. As a result, the algorithms require much more
search efforts to exhaust the search space. Since they cannot ex-
ploit topologies to accelerate the search process, SABB and ATWB
perform poorly and can only solve the problems with tightness
up to 0.6. On the other hand, the tree-based algorithms divide a
problem to several smaller subproblems at each branching agent
and search the subproblems in parallel. Thus, those algorithms
exhibit better performances and solve all the problems. Among
them, our proposed PT-ISABB with k ≥ 4 incurs much smaller
overheads, which demonstrates the effectiveness of the inference
phase in computing tighter lower bounds. In other words, although
PT-ISABB only guarantees to produce lower bounds as tight as
the ones of AsymPT-FB when k = ∞ according to Property 4.1, it
requires less memory consumption to compute such lower bounds
in practice. Besides, it can be seen from the figure that PT-SABB
incurs smaller communication overheads than AsymPT-FB when
solving the problems with low tightness, which demonstrates for-
ward bounding is expensive in message-passing. Additionally, it can
be concluded that PT-ISABB algorithms with large k require much
more NCLOs than the other competitors when solving problems
with low tightness. That is no surprise since inference on problems
with large domain sizes would be more expensive, and a search-
based algorithm actually can find a feasible solution very quickly
even if the lower bounds are poor when solving these problems.
Fig. 8 gives privacy losses under different tightness. Privacy loss
in PT-ISABB comes from both the inference phase and the search
phase. Specifically, since the variable elimination is performed by
parents (i.e., line 4 of the inference phase), parents can easily figure
out which pairs of assignments are feasible with respect to the
constraints enforced in children sides from the zero entries of the
utilities from children. Thus, the inference phase would cause a
half privacy loss only on each tree edge in the worst case, which
is still better than leaking at least a half privacy if we directly use
DPOP to solve problems. Besides, the direct disclosure mechanism
of the search phase in which agents request their (pseudo) parents
to expose the private costs before expanding the search space also
leads to the privacy loss. However, the loss could be much reduced
Figure 8: Privacy losses under different tightness
via the effective pruning. It can be seen that our proposed algorithm
leaks more privacy than the other competitors when solving the
problems with low tightness. That is no surprise because these
problems usually have feasible solutions, which leads to the fact
that most of entries in a utility from a child are zero. That being said,
PT-ISABB with k ≥ 4 leaks less privacy than the other competi-
tors when solving the problems with high tightness. The reason is
twofold: parents can no longer infer the feasible assignment pairs as
the tightness grows, and the inference phase produces tight lower
bounds which lead to the effective pruning in the search phase.
Besides, it is worth mentioning that the local elimination version of
PT-ISABB performs better in terms of privacy preservation when
solving the problems with low tightness. That is because variables
are already eliminated before sending utilities to their parents. As a
result, parents can only know the best utilities they can achieve, but
cannot figure out the corresponding assignments to their children.
6 CONCLUSION
It is known that DPOP/ADPOP for DCOP cannot be directly ap-
plied to ADCOP due to a privacy concern. In this paper, we take
ADPOP into solving ADCOP for the first time by combining with a
tree-based variation of SABB, and present a two-phase complete
algorithm called PT-ISABB. In the inference phase, a non-local
elimination version of ADPOP is performed to solve a subset of
constraints and build look-up tables for the tighter lower bounds.
In the search phase, a tree-based variation of SABB is implemented
to exhaust the search space. The experimental results show that our
algorithms exhibit great superiorities over state-of-the-art search
based algorithms, as well as the local elimination version of PT-
ISABB. Also, our algorithms leak less privacy when solving complex
problems.
ACKNOWLEDGMENTS
The authors would like to thank the anonymous referees for their
valuable comments and helpful suggestions. This work is supported
by the Chongqing Research Program of Basic Research and Fron-
tier Technology under Grant No.:cstc2017jcyjAX0030, Fundamen-
tal Research Funds for the Central Universities under Grant No.:
2018CDXYJSJ0026, National Natural Science Foundation of China
under Grant No.: 51608070 and the Graduate Research and Innova-
tion Foundation of Chongqing, China under Grant No.: CYS18047
0.10.20.30.40.50.6Tightness00.10.20.30.40.50.60.7Privacy LossATWBSABBAsymPT-FBPT-SABBPT-ISABB(k=1,local)PT-ISABB(k=2)PT-ISABB(k=4)PT-ISABB(k=6)PT-ISABB(k=1)REFERENCES
[1] Ismel Brito, Amnon Meisels, Pedro Meseguer, and Roie Zivan. 2009. Distributed
constraint satisfaction with partially known constraints. Constraints 14, 2 (2009),
199 -- 234.
[2] David A Burke, Kenneth N Brown, Mustafa Dogru, and Ben Lowe. 2007. Sup-
ply chain coordination through distributed constraint optimization. In The 9th
International Workshop on DCR.
[3] Ziyu Chen, Yanchen Deng, and Tengfei Wu. 2017. An Iterative Refined Max-
sum_AD Algorithm via Single-side Value Propagation and Local Search. In Proc.
of the 16th Conference on AAMAS. 195 -- 202.
[4] Alessandro Farinelli, Alex Rogers, Adrian Petcu, and Nicholas R Jennings. 2008.
Decentralised coordination of low-power embedded devices using the max-sum
algorithm. In Proc. of the 7th AAMAS. 639 -- 646.
[5] Ferdinando Fioretto, William Yeoh, and Enrico Pontelli. 2016. A dynamic
programming-based MCMC framework for solving DCOPs with GPUs. In Interna-
tional Conference on Principles and Practice of Constraint Programming. Springer,
813 -- 831.
[6] Ferdinando Fioretto, William Yeoh, Enrico Pontelli, Ye Ma, and Satishkumar J
Ranade. 2017. A Distributed Constraint Optimization (DCOP) Approach to the
Economic Dispatch with Demand Response. In Proc. of the 16th Conference on
AAMAS. 999 -- 1007.
[7] Amir Gershman, Amnon Meisels, and Roie Zivan. 2009. Asynchronous forward
bounding for distributed COPs. Journal of Artificial Intelligence Research 34 (2009),
61 -- 88.
[8] Tal Grinshpoun, Alon Grubshtein, Roie Zivan, Arnon Netzer, and Amnon Meisels.
2013. Asymmetric Distributed Constraint Optimization Problems. Journal of
Artificial Intelligence Research 47 (2013), 613 -- 647.
[9] Patricia Gutierrez, Pedro Meseguer, and William Yeoh. 2011. Generalizing ADOPT
and BnB-ADOPT. In Proc. of the 22nd IJCAI. 554 -- 559.
[10] Katsutoshi Hirayama and Makoto Yokoo. 1997. Distributed partial constraint
satisfaction problem. In International Conference on Principles and Practice of
Constraint Programming. 222 -- 236.
[11] Omer Litov and Amnon Meisels. 2017. Forward bounding on pseudo-trees for
DCOPs and ADCOPs. Artificial Intelligence 252 (2017), 83 -- 99.
[12] Rajiv T Maheswaran, Jonathan P Pearce, and Milind Tambe. 2004. Distributed
Algorithms for DCOP: A Graphical-Game-Based Approach.. In Proceeding of
ISCA PDCS'04. 432 -- 439.
[13] Rajiv T. Maheswaran, Milind Tambe, Emma Bowring, Jonathan P. Pearce, and
Pradeep Varakantham. 2004. Taking DCOP to the Real World: Efficient Complete
Solutions for Distributed Multi-Event Scheduling. In Proc. of the 3rd AAMAS.
310 -- 317.
[14] Pragnesh Jay Modi, Wei-Min Shen, Milind Tambe, and Makoto Yokoo. 2005.
ADOPT: Asynchronous distributed constraint optimization with quality guaran-
tees. Artificial Intelligence 161, 1-2 (2005), 149 -- 180.
[15] Tânia L Monteiro, Guy Pujolle, Marcelo E Pellenz, Manoel C Penna, and
Richard Demo Souza. 2012. A multi-agent approach to optimal channel assign-
ment in wlans. In Wireless Communications and Networking Conference (WCNC).
2637 -- 2642.
[16] Arnon Netzer, Alon Grubshtein, and Amnon Meisels. 2012. Concurrent forward
bounding for distributed constraint optimization problems. Artif. Intell. 193
(2012), 186 -- 216.
[17] Steven Okamoto, Roie Zivan, and Aviv Nahon. 2016. Distributed breakout: beyond
satisfaction. In Proc. of the 25th IJCAI. 447 -- 453.
[18] Brammert Ottens, Christos Dimitrakakis, and Boi Faltings. 2017. DUCT: An Upper
Confidence Bound Approach to Distributed Constraint Optimization Problems.
ACM Transactions on Intelligent Systems and Technology (TIST) 8, 5 (2017), 69.
[19] Adrian Petcu and Boi Faltings. 2005. Approximations in distributed optimization.
In International Conference on Principles and Practice of Constraint Programming.
802 -- 806.
[20] Adrian Petcu and Boi Faltings. 2005. A Scalable Method for Multiagent Constraint
[21] Adrian Petcu and Boi Faltings. 2006. ODPOP: an algorithm for open/distributed
[22] Adrian Petcu and Boi Faltings. 2007. MB-DPOP: a new memory-bounded algo-
Optimization. In Proc. of the 19th IJCAI. 266 -- 271.
constraint optimization. In Proc. of the 21st AAAI. 703 -- 708.
rithm for distributed optimization. In Proc. of the 20th IJCAI. 1452 -- 1457.
[23] Sarvapali D Ramchurn, Perukrishnen Vytelingum, Alex Rogers, and Nick Jen-
nings. 2011. Agent-based control for decentralised demand side management in
the smart grid. In Proc. of the 10th AAMAS. 5 -- 12.
[24] Alex Rogers, Alessandro Farinelli, Ruben Stranders, and Nicholas R Jennings. 2011.
Bounded approximate decentralised coordination via the max-sum algorithm.
Artificial Intelligence 175, 2 (2011), 730 -- 759.
[25] Evan A Sultanik, Pragnesh Jay Modi, and William C Regli. 2007. On modeling
multiagent task scheduling as a distributed constraint optimization problem. In
Proc. of the 20th IJCAI. 1531 -- 1536.
[26] Meritxell Vinyals, Juan A Rodriguez-Aguilar, and Jesús Cerquides. 2009. General-
izing DPOP: Action-GDL, a new complete algorithm for DCOPs. In Proc. of The
8th AAMAS. 1239 -- 1240.
[27] William Yeoh, Ariel Felner, and Sven Koenig. 2010. BnB-ADOPT: An asyn-
chronous branch-and-bound DCOP algorithm. Journal of Artificial Intelligence
Research 38 (2010), 85 -- 133.
[28] William Yeoh and Makoto Yokoo. 2012. Distributed problem solving. AI Magazine
33, 3 (2012), 53.
[29] Weixiong Zhang, Guandong Wang, Zhao Xing, and Lars Wittenburg. 2005. Dis-
tributed stochastic search and distributed breakout: properties, comparison and
applications to constraint optimization problems in sensor networks. Artificial
Intelligence 161, 1-2 (2005), 55 -- 87.
[30] Roie Zivan and Hilla Peled. 2012. Max/min-sum distributed constraint opti-
mization through value propagation on an alternating DAG. In Proc. of the 11th
AAMAS. 265 -- 272.
|
1805.10109 | 1 | 1805 | 2018-05-25T12:39:27 | Resisting hostility generated by terror: An agent-based study | [
"cs.MA"
] | We aim to study through an agent-based model the cultural conditions leading to a decrease or an increase of discrimination between groups after a major cultural threat such as a terrorist attack. We propose an agent-based model of cultural dynamics inspired from the social psychological theories. An agent has a cultural identity comprised of the most acceptable positions about each of the different cultural worldviews corresponding to the main cultural groups of the considered society and a margin of acceptance around each of these most acceptable positions. An agent forms an attitude about another agent depending on the similarity between their cultural identities. When a terrorist attack is perpetrated in the name of an extreme cultural identity, the negatively perceived agents from this extreme cultural identity modify their margins of acceptance in order to differentiate themselves more from the threatening cultural identity. We generated a set of populations with cultural identities compatible with data given by a survey on groups' attitudes among a large sample representative of the population of France; we then simulated the reaction of these agents facing a threat. For most populations, the average attitude toward agents with the same preferred worldview as the terrorists becomes more negative; however, when the population shows some cultural properties, we noticed the opposite effect as the average attitude of the population becomes less negative. This particular context requires that the agents sharing the same preferred worldview with the terrorists strongly differentiate themselves from the terrorists' extreme cultural identity and that the other agents be aware of these changes. | cs.MA | cs | Resisting hostility generated by terror: an agent-based
study
Huet S. 1, Deffuant G. 1, Nugier A. 2, Streith M. 2, Guimond S.2
1 LISC, Irstea, 9 av. Blaise Pascal, 63178 Aubière, France – sylvie.huet and
[email protected]
2 LAPSCO, UCA, 17 rue Paul Collomp, 63037 Clermont-Ferrand, France
armelle.nugier, michel.streith and [email protected]
Abstract. We propose an agent-based model of cultural dynamics inspired from the social
psychological theories. An agent has a cultural identity made of most acceptable positions
about each of the different cultural worldviews corresponding to the main cultural groups of the
considered society and a margin of acceptance around each of these most acceptable positions.
An agent forms an attitude about another agent depending on the similarity between their cul-
tural identities. When a terrorist attack is perpetrated in the name of an extreme cultural identi-
ty, the agents which are perceived negatively from this extreme cultural identity modify their
margins of acceptance in order to differentiate themselves more from the threatening cultural
identity. We initialized agents' cultural identities with data given by a survey on groups' atti-
tudes among a large sample representative of the population of France, and then simulated
these agents facing a threat. While in most cases, agents' attitude become more negative toward
the agents belonging to the same group as the terrorists, we notice that when the population
shows some cultural properties, the opposite takes place: the average attitude of the population
for the cultural group to which the terrorists argued to belong becomes less negative. These
properties are identified and explained. They especially permit to non-terrorists agents assimi-
lated to terrorists to differentiate from them, and to other agents to perceive this change.
Keywords: Intergroup hostility, culture dynamics, Terror Management Theory,
self-opinion
Cultural worldviews are defined as "shared conceptions of reality" [1, 2]. They are an
important defense mechanism allowing people to cope with existential threats. This is
why people are motivated to maintain faith in them. Terror Management Theory
(TMT) has shown that a death fatality reminder, such as a terrorist attack, is a cultural
threat or a self-worth threat [3]. Such a threat generally leads to an increase in nega-
tive intergroup bias in order to defend one's cultural worldviews [4, 5]. However,
recent research showed that "increased prejudice and hostility are not an inevitable
response to existential threat" [6]. Some cultural properties, when becoming salient
simultaneously with the threat, increase perceived similarity of members of different
groups, and protect against an increase of the intergroup hostility [6, 7]. Understand-
ing when and why people react to a cultural or collective threat one way or the other
is a basic problem having widespread theoretical and practical implications. To deal
with this paradox, we study how the simulated change of cultural worldviews due to a
cultural threat impacts virtual groups' attitudes toward each other. Our agent-based
2
model helps to characterize cultural properties leading to acceptance or hostility be-
tween groups.
Agent-based model of culture dynamics have been seminally introduced by Axel-
rod [8]. The Axelrod model represents a culture as a set of traits and changes an un-
shared cultural trait by two agents to a shared one, with a probability depending on
their level of shared properties. Several variants have been studied [9], introducing
also a process leading traits to be more different [8, 10-13] instead of being shared.
However, none of these models consider the impact of an existential threat on the
cultural properties in relation with the self-worth and the group dynamics. This con-
clusion is also true for opinion dynamics model, very close from the cultural models.
Though some of them include the possibility of rejecting the other's opinion instead
conforming [12], or some rules for the evolution of the self-worth [14, 15], none of
them address cultural properties, self-worth and group dynamics in relation to each
other.
We model agents facing a cultural threat with dynamics of attitudes inspired by the
general principles of the TMT. An agent has a segment of tolerance for each of the
main cultural worldviews available in its environment and forms an attitude about the
other agents depending on the similarity of acceptance segments about these
worldviews. We assume that a terrorist attack is related to some extreme acceptance
segments and related attitudes about the worldviews that are perceived as a threat by
some agents, leading to differentiation from these extreme positions. These changes in
acceptance segments modify the attitudes that the agents have about each other. We
initialize the population of agents from aggregated data given by a representative
survey on groups' attitudes conducted in France in 2014 [16] and then we submit it to
a virtual threat. We generally observe an increase of hostility toward the group as-
similated to the terrorist's group except in some particular cases where, on the contra-
ry the hostility decreases. We study the evolution of the population in relation to its
initial properties and propose some explanations to these variations.
The next section presents the model as well as the material. Then section 2 shows
how the model is initialized and parameterized. Section 3 gives details about the evo-
lutions and the related cultural properties. We finally conclude and discuss our results.
1 Method and materials
1.1 The model
Hypothesis
This model is based on the idea of cultural worldview given by [3] and inspired by the
Social Judgement Theory (SJT) [19]. We now propose an overview of the concepts
that we use and their translation into the model.
Cultural worldview. We assume that K cultural worldviews are available in the
environment. A cultural worldview is a consistent set of concepts, beliefs, tradi-
3
tions or rituals organizing the world and agent behaviour. For instance we con-
sider Christian, Muslim and areligious worldviews.
Agent position about a worldview. Each agent has a most acceptable position
about each worldview which is defined on a continuous axis from -1 (very nega-
tive), to +1 (very positive). This most acceptable position expresses her attitude
about the considered worldview, i.e how much she likes/adheres, or dis-
likes/rejects it. It can be related to the most acceptable position of the SJT [19].
Note that an agent may have positive most acceptable positions about several
worldviews. For instance, an agent can have a high positive most acceptable posi-
tion for the areligious worldview, and also have a lower positive most acceptable
position for Christian or Muslim worldviews.
Lower and higher margin of acceptance, acceptance segment of an agent for a
worldview. In addition to her position, an agent has margins of acceptance around
it. The lower margin of acceptance is a segment of the [-1,1] axis which is lower
than the agent most acceptable position, and the higher margin of acceptance is a
segment defined similarly higher than the agent's most acceptable position. For
convenience, the lower margin of acceptance is called margin(l) in the following,
while the higher margin of acceptance is called margin(h). The segment defined
by the union of the lower and higher margins of acceptance and the most ac-
ceptable position is called the acceptance segment. The positions located in this
segment are assumed acceptable for the agent, while the positions located outside
are not acceptable and perceived negatively.
Cultural identity of an agent. The segments of acceptance for the K available
worldviews represent the cultural identity of an agent [17, 18]. They indeed ex-
press the agent's own positions about the different worldviews and the positions
that it considers acceptable.
Attitude of an agent about an acceptance segment for a worldview. We compute
an agent's attitude about an acceptance segment for a worldview applying a simi-
larity function between this segment and her own acceptance segment for this
worldview. The result is positive if the segments strongly overlap and more and
more negative when they are separated and far apart. This is supported by Social
judgement theory [19] which has shown "… the perceived distance depends on
the level of involvement and the width of the latitude of acceptance." [21, 22].
Attitude of an agent about a cultural identity. The attitude about a cultural identi-
ty is the average of the attitudes about the acceptance segments for the
worldviews. To summarize, the more an agent perceives the cultural identity of
another to be similar, i.e. in agreement to its own, the more its attitude about this
agent is positive [6], whereas perceived differences lead to negativity. Indeed,
"people exaggerate the value of those who share their worldview or who provide
positive evaluations and denigrate the value of those with diverging worldviews
or who provide negative evaluations." [20].
Cultural group of an agent. We assume that, if asked to declare her membership
in a cultural group (such as Christian, Muslim, areligious), the agent would an-
swer the one corresponding to the worldview for which his position is the high-
est.
4
We use this model to simulate how a terrorist attack may change the cultural identities
of the agents and, as a consequence, the opinions attitudes of agents about each other
(supposing that they are aware of all changes). We suppose that when perpetrating an
attack, terrorists stress their cultural identity, for instance an extreme positive position
for the Islamic worldview, extreme negative positions for the other worldviews and
very narrow margins of acceptance around all these positions. We assume that the
agents whose cultural identity is perceived negatively by the terrorists [17, 18], feel
threat for their identity [3] and decrease their margins of acceptance in order to dif-
ferentiate themselves from the terrorist cultural identity. Moreover, we assume that
they reduce their margins more strongly when they perceive the terrorist identity rela-
tively close to their own, (though far enough to be threatening) than when they are
already very different.
The cultural identities of agents
We consider a population of N agents, each agent i has a cultural identity defined
by:
K values between -1 and +1, corresponding to its most acceptable position 𝑎𝑘
𝑖 pro
or anti on each of the K cultural worldview present in the population. In the simu-
lated populations, for each agent there is at least one worldview for which the
agent has a positive most acceptable position. The identity group of an agent is de-
fined by the worldview for which it has the highest most acceptable position.
𝑖 , and lower 𝑏𝐾
Moreover, the agent i is also defined by margins of acceptance higher
𝑖 its most acceptable positions which define a segment of ac-
𝐵𝐾
ceptance indicating the acceptable positions for the agent. The segment going from
𝑖 is called mar-
𝑖 𝑡𝑜 𝐵𝐾
𝑎𝑘
gin(l). These segments are included in [-1;+1].
𝑖 is called margin(h). The segment going from 𝑏𝐾
𝑖 to 𝑎𝑘
Differences between cultural identities determine the attitude of agents about
each other
Attitudes of agents about each other are computed from the comparison of their
cultural identities. Each agent perceives its environment through its cultural identity
and its attitude about another agent depends also on its perception of the other agent's
cultural identity. Its attitude about its own cultural identity is at the maximum value:
1. An agent's attitude toward another agent's cultural identity is an average of the
attitudes its gives to the perceived segments of acceptance composing the other
agent's cultural identity. Indeed the agent perceives another agent's segments of ac-
ceptance as a discretized segment of positions 𝑎.
Then, considering a worldview K of an agent i, its related most acceptable position
𝐾(𝑎) about a position a
and margins of acceptance allow it to compute the attitude 𝜔𝑖
of the worldview K as follows:
a) 𝜔𝐾
𝑖 (𝑎) = 1, if 𝑎 < 𝐵𝐾
𝑖
𝑖 and 𝑎 > 𝑏𝐾
(1)
5
𝑖 , if 𝑎 ≤ 𝑏𝐾
𝑖
𝑖
𝑖 , if 𝑎 ≥ 𝐵𝐾
b) 𝜔𝐾
𝑖 (𝑎) =
c) 𝜔𝐾
𝑖 (𝑎) =
𝑒𝑦−1
𝑒𝑦+1
𝑒𝑦−1
𝑒𝑦+1
with 𝑦 = 1 +
with 𝑦 = 1 +
𝑖
𝑎−𝑎𝐾
𝑖 −𝑏𝐾
𝑎𝐾
𝑖 −𝑎
𝑎𝐾
𝑖 −𝑎𝐾
𝐵𝐾
𝑖 (𝑎) equals +1 if a is in the margins of acceptance of i. If not,
We suppose that 𝜔𝐾
𝑖 () is 0 for a at the bounds of the segment of acceptance and it decreases with the
𝜔𝐾
distance between a and its closest bound of the segment of acceptance, with an as-
ymptote at -1. Moreover, the decrease to -1 is faster for smaller margin of acceptance.
When the decrease is fast, the opinion of the agent can be almost the same (close to -
1) for different values of attitude a. This function behavior is illustrated in figure 1.
𝑖 (𝑎) related to each position a (in abscissa) for two agents
Fig. 1. Computation of the attitude 𝜔𝐾
with a similar segment of acceptance valued 1 for every a of their segment, but a different
width of margin(h) (see the orange arrow for the orange agent, and the blue arrow for the blue
agent). We see the agent having the smallest width, the blue one, going more quickly to highly
negative values than the orange agent for every a outside their segment
The axis of each worldview K is divided regularly into d values 𝑎𝑝(from -1 to +1)
and agent i computes its attitude about the K acceptance segment of agent j, its aver-
age attitude for the positions 𝑎𝑝 located in the acceptance segment of the agent j.
More formally, the opinion of i about j 's acceptance segment in worldview K is given
by:
∑
𝑖𝑗 = 2
𝜔𝐾
𝑑
𝑝=1
𝑖 (𝑎𝑝)max (𝜔𝐾
𝜔𝐾
𝑑
∑ max (𝜔𝐾
𝑝=1
𝑗 (𝑎𝑝), 0)
𝑗 (𝑎𝑝), 0)
(2)
𝑖𝑗
Note, that 𝜔𝐾
Finally the overall attitude of i about j is the average attitude over the #K different
is maximal when the two acceptance segments are identical.
acceptance segments designing totally the cultural identity of an agent:
𝜔𝑖𝑗 =
∑
𝑖𝑗
𝜔𝐾
#𝐾
𝐾=1
#𝐾
(3)
6
Qualitatively, the agents with large margins of acceptance tend to have a positive
attitude of most of the others, whereas agents with small margins of acceptance are
very selective and have very negative attitudes about many others.
Impact of a threat on agent's cultural identity
A terrorist attack is modeled by a scenario of messages in the media, conveying the
cultural identity of terrorists. The most acceptable positions of terrorists are assumed
to be very positive for one worldview and very negative about the others. Moreover
their margins of acceptance are assumed to be very small.
The agents of the population perceiving as negative the attitude of terrorist about
their cultural identity are assumed to perceive a "threat" and modify their margins of
acceptance. More precisely, let the most acceptable positions of terrorist be defined
𝑞), the agents compute 𝜔𝑞𝑖 q the attitude of terrorist q, about
by values (𝑎𝐾
them. If this attitude is positive, i is not scared and does not react. But if 𝜔𝑞𝑖 is nega-
tive, i modifies its margins of acceptance away from the acceptance segments of q as
follows.
𝑞 , 𝑏𝐾
𝑞, 𝐵𝐾
If 𝜔𝑞𝑖 < 0, the intensity of the margin of acceptance modification 𝜇 is:
𝜇 = 𝛼
(4)
𝑒𝜔𝑞𝑖
− 1
𝑒𝜔𝑞𝑖 + 1
where 𝛼 is a positive number smaller than 1. The value of 𝜇 is close to -1 when 𝜔𝑞𝑖
is very negative.
For 𝐾 equal to the main acceptance segment of the terrorist, i.e. the aggressor, the
is modified as follows (with t equals
𝑞
𝑖 } which is the closest to 𝑎𝐾
𝑖 ∈ {𝑏𝐾
𝑖 , 𝐵𝐾
bound 𝑏𝐾
to the time):
𝑖 (𝑡 + 1) = 𝑏𝐾
𝑏𝐾
𝑖 (𝑡) + 𝜇(𝑏𝐾
𝑖 (𝑡) − 𝑎𝐾
𝑖 − 𝜀
𝑖
𝑖 (𝑡) − 𝑎𝐾
𝑏𝐾
𝑖 ))
𝑖 (𝑡) − 𝑎𝐾
𝑏𝐾
(5)
where 𝜀 is a small positive number representing the smallest possible margin of ac-
ceptance width (parameter of the model).
This change in the margins of acceptance results in a more negative attitude about
the aggressor, in accordance with experimental observations [20].
1.2 Data source
A survey on group's attitudes in France has been used to initialize the model [16].
We wanted our virtual groups composing our populations to respect the measured in-
group and intergroup attitudes. The surveyed sample includes 1000 people, repre-
sentative of the French population. People answered to the question « what is your
general attitude about the following groups?». The groups are A (for Areligious), M
(for Muslims), and C (for Christians). They have to answer using a five-point scale
ranging from "strongly unfavorable" to "strongly favorable". Averages and standard-
deviations for in-group attitudes and every out-group attitudes have been computed
and normalized between -1 to +1 for modeling purpose. Figure 2 shows the groups'
attitudes.
7
Fig. 2. Attitudes of each group M (for Muslims), C (for Christians), A (for Areligious) toward
each other (averages and standard-deviations in parenthesis for each relation computed from the
representative survey of the French population)
2
Initialisation of the virtual population and parametrization of
the model
2.1 Building virtual initial populations
Our population of virtual agents, have a cultural identity defined by their ac-
ceptance segment for 3 cultural worldviews C, M and A. The worldview for which the
agent has the highest most acceptable position defines the agent's cultural group.
We assume that each group includes agents of two types:
Agents with exclusive identities: these agents have their acceptance segment in the
positive side for the worldview 𝐾 ∈ {𝑀, 𝐶, 𝐴} defining their group, and on the neg-
ative side for the other worldviews. Amongst these agents, we identify the extrem-
ists which have most acceptable positions close to 1 or -1 and narrow acceptance
segments.
Agents with inclusive identities: these agents have one or two most acceptable
which are positive and the corresponding margin of acceptance in the positive side
and the one or two others close to zero, with a margin of acceptance also mostly in
the positive side
We assume that each group (C, M or A) of the initial population includes x% of in-
clusive and y% of exclusive agents having their highest most acceptable position for
the worldview defining their group. The values x and y are determined to fit indicators
extracted from the survey.
Thus the set of values defining the 3 acceptance segments of each one of the 6
"prototypical" agents, as well as every x and y associated to each group are deter-
mined by an optimization minimizing the distance between indicators computed from
the virtual population and references. Indeed, to build a virtual initial population close
M (3.6%)C (60.6%)A (35.8%)0.52 (0.48)0.14 (0.45)8
enough to the aggregated indicators (averages and standards deviations) computed
from the data of the survey, we minimize the sum of the absolute distances to the
references of the corresponding indicators measured for the virtual populations.
From the optimization results, we keep the 120 best virtual populations having rel-
ative average errors (over all the distance to the references) going from 5% to 7%, and
maximum errors going from 21 % to 44 %.
2.2
Parameterizing the evolution of the population.
Once we have virtual populations, we want to simulate their evolution facing a set
of "threat" messages conveying the cultural identity of a terrorist.
The tested scenario comprises seven consecutive similar terrorists' messages. The
terrorists have very narrow acceptance segments with a very positive most acceptable
position for the worldview M defining their group and very negative most acceptable
positions about the two other worldviews (C and A). Thus they tend to have a very
negative attitude about all other cultural identities.
The following section presents how the agents change their margins of acceptance
when they receive the messages. The parameters of the dynamics take the following
value: α=0.5; ε=0.05 and d = 400.
3
Evolution of virtual group attitudes facing "threats"
We simulate the evolution of our 120 populations facing a set of seven consecutive
"threat" messages. At each step, due to the high level of mediatization and related
discussions after a terrorist act, agents are considered as perfectly informed about the
other's current acceptance segments. We investigate the result to identify how the
average attitude of the population about the cultural identities of the inclusive and
exclusive agents of group M, which is also the group of the terrorists, evolves.
They show that in most of the selected populations, the average attitude about
group M cultural identities decreases, while for some of them it increases on the con-
trary. The attitudes about the other groups C and A remain rather stable on average.
The challenge is thus to understand why and when a population becomes more posi-
tive toward M after facing a threat coming from agents from this group.
From the analysis of the results shown in figure 3, we obtain more information about
which agent decreases or increases its attitude about group M. We see at first that the
majority of each group decreases its attitude toward inclusive and exclusive M (in
white). Complementary, we see also these are mainly the agents of group C which
generally become more positive, about inclusive M (in red) only, but also sometimes
about exclusive M (if C are inclusives) (in dark blue). Moreover, we observe that
agents of group A can also sometimes increase their attitude about inclusive M (in
red), but never about exclusive M. We observe also a minority of M agents increases
their attitude about exclusive M and decrease it for inclusive M (in light blue).
We then focus on agent's cultural properties explaining these observations. During
the simulations, agents change their higher margin of acceptance in their attitudinal
9
segment on the M worldview. In populations increasing their average attitude about
group M, we notice that:
M agents decrease strongly their higher margin of acceptance on the M worldview;
Non-M (especially C) agents decrease moderately their higher margin of ac-
ceptance on the M worldview.
Fig. 3. Distribution in percentage of all the agents' types of change of attitude over all the 120
initial populations and times
Going further in the observation of data, we establish that the following set of condi-
tions is met altogether in these populations at the time 0 and/or later due to the impact
of the threat:
For the M agents: the attitude toward M worldview tends to be lower and _ the
margin(h – for higher)) of acceptance larger - than in the average population.
Moreover, a large margin(l - for lower) of acceptance is necessary to get an in-
crease of attitude from others. Indeed, these properties lead to decrease strongly the
margin(h) of acceptance when facing an M extremist cultural identity. The
margin(l) of acceptance has to be large enough to ensure an overlap of its
acceptance segment with the ones of non-M agents, overlap which is necessary for
a positive attitude.
For the non-M agents: the attitude about M worldview is higher, the margin(h) of
acceptance is smaller and the margin(l) of acceptance is larger than in the average
populations. The small margin(h) of acceptance (condition 1) indeed ensures that
this margin is weakly modified by the threat. Their high attitude and their large
margin(l) of acceptance (condition 2) ensure an overlap of their acceptance
segment with the one of the group M agents (mainly inclusive).
The next figures illustrate why these conditions lead to increase the attitude about
the group with the same main worldview as the terrorists. We consider a standard case
10
when the expected outcome of decreasing average opinion about group M takes place.
In the following figures, the attitudinal function on the M worldview of a group A or
C exclusive or inclusive is represented in orange while the attitudinal function of a
group M inclusive or exclusive agent is represented in blue. The left panel represents
the attitudinal funtion before the aggression and the right panel this function after the
aggression.
Figures 4 illustrate what occur when there isn't a small margin(h) of acceptance of
non-M blue agent (this is generally a property of inclusive agents). We clearly see on
the figures that despite the increasing part of the overlap in the inclusive M
acceptance segment, the decreasing of the margin(h) of acceptance of the inclusive A
is such as it perceives the inclusive M as very much further than before.
Figures 5 illustrate what occur when there isn't a large margin(h) of acceptance
for blue M agents (this is generally a property of exclusive agents). We observe that
the attitude of the inclusive C for the exclusive M is not changed by the change of M
since the average view of C for M remains -1.
Figures 6 illustrate what occur when the condition 2 is not met. We have then a
large margin(h) of acceptance for both M and non-M agents. Then, when the two
agents (C and M) reject the extremist's view, the non-M agent becomes less tolerant
(from 0.29 to -0.01 on the graphs)!
Fig. 4. Evolution of the attitude of inclusive A (in orange) for inclusive M (in blue): on the left
before the terrorist attack, on the right, after the agression: the attitude decreases (from 0.23 to
0.14) due to the decreasing of the margin(h) of acceptance of the inclusive A and despite the
part of the overlap over the inclusive M acceptance segment has increased. Indeed, being less
inclusive(h), it sees the part of the inclusive M's segment external to it strongly more negatively
than before.
11
Fig. 5. Evolution of the attitude of exclusive C (in orange) for exclusive M (in blue): on the left
before the aggression, on the right, after the agression: the attitude does not change despite the
change of M margin(h) of acceptance
Fig. 6. Evolution of the attitude of exclusive C (in orange) for exclusive M (in blue): on the left
before the attack, on the right, after the agression: most of the time, when the two agents (C and
M) reject the extremist's view, the non-M agent becomes less tolerant (from 0.29 to -0.01 on
the graphs).
4
Conclusion - Discussion
The modeled populations increasing their attitude about the group of main
worldview M to which a terrorist group is assimilated, show specific initial
acceptance segments about this worldview: (1) all agents tend to have a large
margin(l) of acceptance; (2) group C and group A agents have a small margin(h) of
acceptance and group M agents have a large margin(h) of acceptance; (3) group C and
A agents have a high attitude about worldview M .
In other words, an average increase of attitude about the group of the terrorists
takes place if:
this group is mainly composed from very inclusive agents with a moderately
positive attitude for their own group worldview. They also should have a large
margin of acceptance for critical attitudes about their group worldview.
the members of the other groups have a relatively high positive attitude about the
terrorist group worldview, and their view is not affected by the attack. Moreover,
12
they are tolerant, inclusive for attitudes different from theirs about the terrorist
group worldview.
The large margin of acceptance for mean or mild attitudes about the terrorist group
worldview increases the overlap between acceptance segments of the agents of the
population. Such overlaps can be related to the feeling of wide similarity and
solidarity observed in the large French demonstrations that took place after the
Charlie Hebdo terrorist attacks. These conclusions are in line with the results of [6, 7].
Indeed, we observe that some cultural properties, when becoming salient simultane-
ously with the threat, may increase perceived similarity of members of different
groups, and protect against an increase of the intergroup hostility.
It should be underlined that, in the model, this solidarity takes place because
the agents of the same group as the terrorists reject strongly the radical attitude
of the terrorists, and that the other agents are aware of their evolution. The next
step of our work is to come back to experiment to check the relevance of the model
behaviour.
Another step regarding the study of the model is a larger study of the sensitivity of
the result to the distribution of inclusive versus exclusive agents in each group.
Indeed, we have seen inclusive agents are more enclined to become less negative to M
than the other agents. Then the proportion of such type of agent in the population is
very important to observe an increase of the attitude. A variation of this proportion
can probably change drastically the result.
Acknowledgements
The authors acknowledge funding from the "Mission for Interdisciplinarity" of the
CNRS.
References
1.
2.
3.
4.
Greenberg, J. and J. Arndt, Terror management theory, in Handbook of theories of
social psychology, P.A.M. Van Lange, A.W. Kruglanski, and E. Higgins, Editors.
2013, Sage: London, England. p. 398-415.
Pyszczynski, T., J. Greenberg, and S. Solomon, A dual-process model of defense
against conscious and unconscious death-related thoughts: An extension of terror
management theory. Psychological Review, 1999. 106(4): p. 835-845.
Greenberg, J., T. Pyszczynski, and S. Solomon, The Causes and Consequences of a
Need for Self-Esteem: A Terror Management Theory, in Public Self and Private Self,
R.F. Baumeister, Editor. 1986, Springer, New York, NY: Springer Series in Social
Psychology.
Greenberg, J. and S. Kosloff, Terror Management Theory: Implications for
Understanding Prejudice, Stereotyping, Intergroup Conflict, and Political Attitudes.
Social and Personality Psychology Compass, 2008. 2(5): p. 1881-1894.
13
Vyver, J.V.d., et al., Boosting Belligerence:How the July 7, 2005, London Bombings
Affected Liberals' Moral Foundations and Prejudice. Psychological Science, 2016.
27(2): p. 169-177.
Motyl, M., et al., Subtle priming of shared human experiences eliminates threat-
induced negativity toward Arabs, immigrants, and peace-making. Journal of
Experimental Social Psychology, 2011. 47(6): p. 1179-1184.
Nugier, A., et al., The Psychological Effects of Terrorism are Moderated by Cultural
Worldviews. International Review of Social Psychology, 2016. 29(1): p. 7.
Axelrod, R., The dissemination of culture a model with local convergence and global
polarization. Journal of Conflict Resolution, 1997. 41(2): p. 203-226.
Castellano, C., S. Fortunato, and V. Loreto, Statistical physics of social dynamics.
Reviews of Modern Physics, 2009. 81(2): p. 591-646.
Schaller, M. and C.S. Crandall, The Psychological Foundations of Culture. 2004,
Mahwah, New Jersey - London: Lawrence Erlbaum Associates. 384.
Radillo-Díaz, A., L.A. Pérez, and M. del Castillo-Mussot, Axelrod models of social
influence with cultural repulsion. Physical Review E, 2009. 80(6): p. 066107.
Flache, A., et al., Models of Social Influence: Towards the Next Frontiers. Journal of
Artificial Societies & Social Simulation, 2017. 20(4): p. 31.
Flache, A. and M.W. Macy, Local Convergence and Global Diversity: From
Interpersonal to Social Influence. Journal of Conflict Resolution, 2011. 55(6): p. 970-
995.
Deffuant, G., S. Huet, and T. Carletti. The Leviathan Model: Absolute Dominance,
Generalised Distrust, Small Worlds and Other Patterns Emerging from Combining
Vanity with Opinion Propagation. in JASSS, 2013, 16, (1) 5..
Friedkin, N. and E. Johnsen, Social influence and opinions. Journal of Mathematical
Psychology, 1990. 15(3-4): p. 193-205.
Guimond, S., The effects of integration policies on intergroup relations and well-
being in France and in Québec, F.r.s.t. ANR, Editor 2016, Laboratoire de
Psychologie Sociale et Cognitive (LAPSCO): Clermont-Ferrand.
Tajfel, H. and J.C. Turner, The social identity theory of intergroup behavior., in
Psychology of intergroup relations, S. Worchel and W.G. Austin, Editors. 1986,
Nelson-Hall: Chicago. p. 7-24.
Turner, J.C. and K.J. Reynolds, Self-categorization theory., in Handbook of theories
of social psychology, P.A.M. Van Lange, A.W. Kruklanski, and T.E. Higgins,
Editors. 2013, Sage: London. p. 399-417.
Sherif, M. and C.I. Hovland, Social Judgment. Assimilation and contrast effects.
Communication and attitude change. 1961: New Haven and London: Yale University
Press.
Pyszczynski, T., S. Solomon, and J. Greenberg, Chapter One - Thirty Years of Terror
Management Theory: From Genesis to Revelation, in Advances in Experimental
Social Psychology, J.M. Olson and M.P. Zanna, Editors. 2015, Academic Press. p. 1-
70.
Petty, R., J. Cacioppo, and C. Haugtvedt, Ego-involvement and Persuasion: An
appreciative look at the Sherif's contribution to the study of self-relevance and
attitude change, in Social judgment and intergroup relations: Essays in honor of
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
14
22.
Muzafer Sherif, D. Granberg and G. Sarup, Editors. 1992, Springer/Verlag: New
York. p. 147-175.
Eagly, A.H. and K. Telaak, Width of the latitude of acceptance as a determinant of
attitude change. Journal of Personality and Social Psychology, 1972. 23(3): p. 388-
397.
|
1804.04746 | 3 | 1804 | 2018-09-06T16:58:16 | Analytically Modeling Unmanaged Intersections with Microscopic Vehicle Interactions | [
"cs.MA"
] | With the emergence of autonomous vehicles, it is important to understand their impact on the transportation system. However, conventional traffic simulations are time-consuming. In this paper, we introduce an analytical traffic model for unmanaged intersections accounting for microscopic vehicle interactions. The macroscopic property, i.e., delay at the intersection, is modeled as an event-driven stochastic dynamic process, whose dynamics encode the microscopic vehicle behaviors. The distribution of macroscopic properties can be obtained through either direct analysis or event-driven simulation. They are more efficient than conventional (time-driven) traffic simulation, and capture more microscopic details compared to conventional macroscopic flow models. We illustrate the efficiency of this method by delay analyses under two different policies at a two-lane intersection. The proposed model allows for 1) efficient and effective comparison among different policies, 2) policy optimization, 3) traffic prediction, and 4) system optimization (e.g., infrastructure and protocol). | cs.MA | cs | Analytically Modeling Unmanaged Intersections
with Microscopic Vehicle Interactions
Changliu Liu and Mykel J. Kochenderfer
8
1
0
2
p
e
S
6
]
A
M
.
s
c
[
3
v
6
4
7
4
0
.
4
0
8
1
:
v
i
X
r
a
Abstract -- With the emergence of autonomous vehicles, it is
important to understand their impact on the transportation
system. However, conventional traffic simulations are time-
consuming. This paper introduces an analytical traffic model for
unmanaged intersections accounting for microscopic vehicle in-
teractions. The macroscopic property, i.e., delay at the intersec-
tion, is modeled as an event-driven stochastic dynamic process,
whose dynamics encode the microscopic vehicle behaviors. The
distribution of macroscopic properties can be obtained through
either direct analysis or event-driven simulation. They are more
efficient than conventional (time-driven) traffic simulation, and
capture more microscopic details compared to conventional
macroscopic flow models. We illustrate the efficiency of this
method by delay analyses under two different policies at a two-
lane intersection. The proposed model allows for 1) efficient
and effective comparison among different policies, 2) policy
optimization, 3) traffic prediction, and 4) system optimization
(e.g., infrastructure and protocol).
I. INTRODUCTION
With the emergence of autonomous vehicles, it is important
to understand how the microscopic interactions of those
autonomous vehicles affect the delay of the macroscopic
traffic flow, especially at unmanaged intersections.
The literature contains many traffic models that can support
the analysis of delay and congestion [1]. There are two major
types of traffic models: 1) microscopic simulation models
where every car is tracked and 2) macroscopic flow models
where traffic is described by relations among aggregated
values such as flow speed and density, without distinguishing
its constituent parts. The major advantage of microscopic
simulation models is the precise description of inter-vehicle
interactions. Such models have been widely adopted in
evaluating the performance of autonomous vehicles [2].
However, it can be time-consuming to obtain the micro-macro
relationships by simulation. Only "point-wise" evaluation can
be performed in the sense that a single parametric change in
vehicle behavior requires new simulations. To gain a deeper
understanding of the micro-macro relationships, an analytical
model is desirable.
Macroscopic flow models provide a tractable mathematical
structure with few parameters to describe interactions among
vehicles. Those models usually come in the form of partial
differential equations. However, it remains challenging to
model intersections. Existing methods introduce boundary
constraints to represent intersections [3], [4]. However, these
models can only tolerate simple first-in-first-out (FIFO)
C. Liu and M. Kochenderfer are with the Department of Aeronau-
tics and Astronautics, Stanford University, CA 94305 USA (e-mail:
changliuliu, [email protected]).
(a)
(b)
Fig. 1: Intersection scenario. (a) Road topology. (b) Conflict graph.
(a)
(b)
(c)
Fig. 2: The time of occupancy at the intersection. (a) The desired
time of occupancy. (b) The actual time of occupancy under the
FIFO policy. (c) The actual time of occupancy under the FO policy.
policies at intersections. To consider other kinds of policies,
the vehicles need to be treated as particles that interact among
one another, which has not been captured by existing flow
models.
This paper introduces an analytical stochastic continuous-
time, discrete-event traffic model. We use it to describe
delays at unmanaged intersections under different microscopic
vehicle behaviors. The model considers microscopic inter-
actions and is analytical, which absorbs the advantages of
both the microscopic simulation models and macroscopic
flow models. With this model, we can better understand how
the microscopic behavior design of a single vehicle affects
the macroscopic transportation system. In addition to direct
analysis, we can perform event-driven simulation under this
model, which is more efficient than conventional time-driven
traffic simulation. The policies under consideration are not
required to have closed-form solutions.
The remainder of the paper is organized as follows.
Section II formulates the traffic model as an event-driven
stochastic process, and illustrates how vehicle behaviors
are encoded in the traffic model. Section III illustrates the
effectiveness of the model through case studies. Section IV
discusses applications of the method and concludes the paper.
Lane 1Lane 2Lane 3Lane 4T3T2T1T4Incoming flowOutgoing flowTimeLane1234t⇤1t⇤2t⇤3t⇤4t⇤5t⇤6t⇤7t⇤8t⇤9TimeLane1234¯t1¯t2¯t3¯t4¯t5¯t6¯t7¯t8¯t9TimeLane1234¯t1¯t2¯t3¯t4¯t5¯t6¯t7¯t8¯t9II. TRAFFIC MODEL
This section introduces the traffic model. The traffic delay
at an intersection is modeled as an event-driven stochastic
process. An event is defined as the introduction of a new
vehicle. This section then describes how the microscopic
vehicle interactions affect the macroscopic dynamics.
A. Traffic Model at Intersections
Consider an intersection with K incoming lanes. A conflict
is identified if two incoming lanes intersect. These relation-
ships can be described in a conflict graph G with the nodes
being the incoming lanes and the links representing conflicts.
For example, Fig. 1a shows one road configuration with four
incoming lanes, and Fig. 1b shows the conflict graph. T k is
the delay at lane k, which will be introduced in (1).
When there are conflicts, vehicles from the corresponding
lanes cannot occupy the intersection at the same time. Let
t∗i be the desired time for vehicle i to pass the center of the
intersection. The vehicles are numbered such that t∗i < t∗i+1.
Fig. 2a shows the desired time of occupancy (centered at t∗i )
for vehicles coming in the four lanes in Fig. 1a. According
to the graph in Fig. 1b, the scenario in Fig. 2a is infeasible
as vehicles 1 through 4 cannot occupy the intersection at
the same time. Based on the FIFO policy, vehicles 2 and 3
yield to vehicle 1. Vehicles 4 and 5 yield to vehicles 2 and 3,
and so on. Let ¯ti be the actual time for vehicle i to pass the
center of the intersection. Fig. 2b shows the actual time of
occupancy when all vehicles adopt FIFO. The actual time of
occupancy may change when the policy changes, resulting
in different traffic delay. For example, Fig. 2c corresponds to
another policy that will be introduced in Section III.
Poisson process {t∗1, t∗2, . . .} with parameter λ =(cid:80)
The traffic at the intersection is modeled as an event-driven
stochastic system with the state being the traffic delay and the
input being the incoming traffic. It is assumed that the desired
passing time for incoming vehicles from lane k follows a
Poisson distribution with parameter λk. The traffic flows
from different lanes are independent. Since the combination
of multiple Poisson processes is a Poisson distribution [5],
the incoming traffic from all lanes can be described as one
k λk. The
input to the model is chosen to be the random arrival interval
between vehicle i + 1 and i, i.e., xi = t∗i+1 − t∗i , and the
lane number si+1 for vehicle i + 1. For all i, the probability
density for xi = x is px(x) = λe−λx. The probability of
λ . The delay for lane k considering i
si+1 = k is Ps(k) = λk
vehicles is denoted T k
i , which captures the difference between
the actual passing time and the traffic-free passing time of
those vehicles, i.e.,
T k
i = max
sj =k,j≤i
¯t(i)
j − t∗i ,
(1)
where ¯t(i)
j denotes the actual passing time for vehicle j only
considering the interactions among the first i vehicles, e.g.,
vehicle i + 1 has not approached the intersection yet. Here,
¯t(i)
corresponds to an equilibrium in microscopic vehicle
j
interactions which will be introduced in (8). It may differ
from ¯t(k)
j
for k (cid:54)= i.
Define Ti := [T 1
i , . . . , T K
i
]T . The dynamics of the traffic
delay at the intersection is determined by
Ti+1 = F(Ti, xi, si+1),
(2)
where the function F depends on the policies adopted by
the vehicles and the road topology defined by the conflict
graph G. Given (2), the conditional probability density of
Ti+1 given Ti, xi and si+1 is
x
τ
k
k
=
=
(cid:90)
Ps(k)
(cid:90)
(cid:90)
pTi+1(t)
(3)
where δ(·) is the delta function. The probability density is
pTi+1(t Ti, xi, si+1) = δ(t = F(Ti, xi, si+1)),
(cid:88)
(cid:88)
. . .(cid:82) (tk)+
which involves integration over a manifold. The cu-
is denoted as PTi(t) =
mulative probability of Ti
pTi(τ 1, . . . , τ k)dτ 1 . . . dτ k where t =
pTi+1(t τ , x, k)pTi(τ )dτ px(x)dx
−∞
−∞
[t1, . . . , tk]. The problems of interest are:
• Does the sequence {pTi}i converge in L1-norm?
Divergence corresponds to the formation of congestion,
i.e., the case that the expected delay keeps growing.
δ(0)pTi (τ )px(x)dτ dx,
(cid:82) (t1)+
F (τ ,x,k)=t
Ps(k)
(4)
• If converged, what is the steady state distribution of
pT := limi→∞ pTi?
From the steady state distribution, we may compute the
expected delay.
These two problems will be considered in the case studies
in Section III. Moreover, from the distribution of the lane
delays, we can compute the scalar delay introduced by the
(i + 1)th vehicle as
di+1 =
¯t(i+1)
j
+ ¯t(i+1)
i+1 − t∗i+1.
(5)
(cid:88)
(cid:16)
j≤i
(cid:17)
j
− ¯t(i)
(cid:88)
In the case that the introduction of a new vehicle only affects
the last vehicle in other lanes (which is usually the case),
di+1 = T si+1
i+1 +
(T k
i+1 − T k
i + xi).
(6)
B. Microscopic Interactions
k(cid:54)=si+1
It is assumed that the vehicles at intersections have fixed
paths. When interacting with other vehicles, they only change
their speed profiles to adjust the time to pass the intersection.
Such simplification is widely adopted [6], [7]. In this paper,
we further reduce the high dimensional speed profile for
vehicle i to a single state ti which denotes the time for
vehicle i to pass the center of the intersection. Since the
mapping from ti to a speed profile is surjective, interactions
can be analyzed using ti's.
The policy of vehicle i is denoted
ti(k) = f (t∗i , t−i(k − 1)),
(7)
where k denotes time step. The subscript −i denotes all
other indices except i. The one step delay is due to reaction
TABLE I: The mapping (2) under FIFO for si+1 = 1.
Region
1
2
3
4
Domain
i < xi − ∆s
T 1
i < xi − ∆d
T 2
i ≥ xi − ∆s
T 1
i < xi − ∆d
T 2
T 2
i < T 1
i
i ≥ xi − ∆d
T 2
T 2
i < T 1
i
i ≥ xi − ∆d
T 2
T 2
i > T 1
i
(a) Domain
(b) Value
Fig. 3: Illustration of the mapping (2) under FIFO for si+1 = 1.
Value
T 1
i+1 = 0
i+1 = −∆d
T 2
T 1
i+1 = T 1
i + ∆s − xi
i+1 = −∆d
T 2
T 1
i+1 = T 1
T 2
i+1 = T 2
T 1
i+1 = T 2
T 2
i+1 = T 2
i + ∆s − xi
i − xi
i + ∆d − xi
i − xi
time. An equilibrium is achieved if the vehicles do not have
incentives to adjust the passing time. Such equilibrium may
be broken with a new vehicle. It is assumed that the time for
the vehicles to achieve a new equilibrium is negligible. The
assumption is true when the flow rate is low. Every event
then leads to one equilibrium. The actual passing time ¯t(i)
j
when i vehicles are considered lies at the ith equilibrium
such that
¯t(i)
j = f (t∗j , ¯t(i)
−j),∀j ≤ i.
(cid:88)
The average delay of the vehicles satisfies
1
N
(¯t(N )
i − t∗i ) = lim
N→∞
¯d = lim
N→∞
1
N
i
(8)
di,
(9)
(cid:88)
i
where the second equality is due to (5). According to the
central limit theorem, the system is ergodic such that the
average delay of all vehicles equals the expected delay
introduced by any event in the steady state,
E(di).
(10)
E( ¯d) = lim
i→∞
III. CASE STUDIES
To illustrate the effectiveness of the model, this section
derives traffic properties under two frequently used policies
by analysis, event-driven simulation (EDS) as well as con-
ventional time-driven traffic simulation. The two policies
are first-in-first-out (FIFO) policy [8] and flexible order
(FO) policy [9]. For simplicity, we only consider a two-
lane intersection (which is equivalent to lane merging). More
detailed analyses are discussed in the extended version [10].
A policy specifies 1) the passing order, and 2) the temporal
gap between two consecutive vehicles. The temporal gap
refers to the time distance or headway maintained between
vehicles. Denote ∆d and ∆s to be the temporal gap between
vehicles from different lanes and the temporal gap between
vehicles from the same lane respectively. The gap may be
affected by vehicle speed, uncertainties in perception, and
etc. When the traffic flow rate is low, we assume ∆s = 0.
A. Case 1: Lane Merging with FIFO
Under FIFO, the passing order is determined by the desired
arrival times {t∗i }i such that the actual passing time for vehicle
i should be after the actual passing times for all conflicting
vehicles j such that j < i.As the passing order is fixed, the
actual passing time will not be affected by later vehicles, i.e.,
¯t(i)
j = ¯t(j)
for all j < i. For vehicle i,
j
¯t(i)
i
:= max{t∗i ,Di,Si},
(11)
where
Di = max
Si = max
j
j
(¯t(i)
j + ∆d) s.t. j < i, (sj, si) ∈ G,
(¯t(i)
j + ∆s) s.t. j < i, sj = si.
(12)
(13)
i = max{T j
The effect of FIFO is illustrated in Fig. 2b. Following from
(1) and (11), the equation (2) for FIFO can be computed,
which is listed in Table I and shown in Fig. 3. Only the case
for si+1 = 1 is shown. The case for si+1 = 2 can be obtained
by switching superscripts 1 and 2. To bound the domain from
below, let T j
i ,−∆d} for all i and j ∈ {1, 2}. The
mapping is piece-wise smooth with four smooth components.
Region 1 corresponds to where there is a sufficient gap in
both lanes for the (i + 1)th vehicle to pass without delay.
Regions 2 and 3 correspond to where the last vehicle is from
the ego lane and it causes delay for the (i + 1)th vehicle.
Region 4 corresponds to where the last vehicle is from the
other lane and delays the (i + 1)th vehicle.
Given the dynamic equation, the distribution of traffic
delay in (4) can be computed. The propagation of pTi for
λ1 = 0.1 s−1, λ2 = 0.5 s−1, ∆d = 2 s, ∆s = 1 s is shown
in Fig. 4a by an event-driven simulation of (2) with 10, 000
particles. At iteration 1, Ps(1) percent of particles are at
(0,−∆d), while the others are at (−∆d, 0). Every particle
corresponds to a traffic scenario. For conventional time-driven
traffic simulation, it is computationally expensive to obtain
distributions with 10, 000 traffic scenarios. However, with
the event-driven simulation under the proposed model, the
distributions can be obtained in real time. The distribution
approached steady state at iteration 8 with a unique pattern.
Theoretical analysis [10] also verifies this pattern.
B. Case 2: Lane Merging with FO
FO allows high priority vehicles to yield to low priority
vehicles if low priority vehicles can arrive earlier. The
passing order may change over time. At step i, let ¯t(i−1)
:=
max{t∗i , maxj<i,sj =si(¯t(i−1)
+ ∆s)} be the earliest desired
time for vehicle i to pass considering its front vehicles in
the same lane. Sort the list {¯t(i−1)
} in
i−1 , ¯t(i−1)
, . . . , ¯t(i−1)
1
j
i
i
xixi s d00T1iT2i1234 d132 d0T1i+1T2i+142
0
6
Delay in lane 1 [s]
4
8
2
0
6
Delay in lane 1 [s]
4
(a) Case 1: Lane Merging with FIFO. Iterations 2, 3, 4, 8.
0
−2
−2
8
6
4
2
8
6
4
2
]
s
[
2
e
n
a
l
n
i
y
a
l
e
D
]
s
[
2
e
n
a
l
n
i
y
a
l
e
D
0
−2
−2
8
6
4
2
8
6
4
2
]
s
[
2
e
n
a
l
n
i
y
a
l
e
D
]
s
[
2
e
n
a
l
n
i
y
a
l
e
D
0
−2
−2
8
8
0.2
0.1
0
0.2
0.1
0
8
2
0
6
Delay in lane 1 [s]
4
2
0
6
Delay in lane 1 [s]
4
0
−2
−2
8
6
4
2
8
6
4
2
]
s
[
2
e
n
a
l
n
i
y
a
l
e
D
]
s
[
2
e
n
a
l
n
i
y
a
l
e
D
0
−2
−2
2
0
6
Delay in lane 1 [s]
4
2
0
6
Delay in lane 1 [s]
4
8
8
0
−2
−2
8
6
4
2
8
6
4
2
]
s
[
2
e
n
a
l
n
i
y
a
l
e
D
]
s
[
2
e
n
a
l
n
i
y
a
l
e
D
0
−2
−2
0
−2
−2
2
0
6
Delay in lane 1 [s]
4
8
2
0
6
Delay in lane 1 [s]
4
Fig. 4: Event-driven simulation with pTi for λ1 = 0.1 s−1, λ2 = 0.5 s−1, ∆d = 2 s, and ∆s = 1 s with 10000 particles.
(b) Case 2: Lane Merging with FO. Iterations 2, 3, 4, 8.
ascending order and record the ranking in an injection Q.
Ties are broken by index. For the first vehicle in Q, i.e.,
vehicle k = Q−1(1), ¯t(i)
. By induction, assuming
that ¯t(i)
j
for Q(j) < Q(k) has been computed, then
k := ¯t(i−1)
k
k := max{¯t(i−1)
¯t(i)
k
,Di
k},
k,S i
(14)
where
Di
k = max
S i
k = max
j
j
j + ∆d) s.t. Q(j) < Q(k), (sj, sk) ∈ G,(15)
(¯t(i)
(¯t(i)
(16)
j + ∆s) s.t. Q(j) < Q(k), sj = sk.
(a) Domain
(b) Value
Fig. 5: Illustration of the mapping (2) under FO for si+1 = 1.
Under FO, the actual passing time may change at every
step. There is a distributed algorithm [11] for this policy
where the vehicles do not need to compute the global passing
order. Fig. 2c shows the effect of FO. Vehicles in the same
direction tend to form groups and pass together.
Following from (1) and (14), the dynamic equation (2)
for FO can be computed, which is listed in Table II and
illustrated in Fig. 5 for si+1 = 1. There are eight smooth
components in the mapping. Regions 1 to 4 are the same as in
the FIFO case such that vehicle i + 1 passes the intersection
after all other vehicles. Regions 5 to 8 correspond to where
vehicle i + 1 passes the intersection before the last vehicle
in the other lane. In regions 5 and 7, vehicle i + 1 does not
experience delay due to sufficient gap in the ego lane. The
last vehicle in the other lane is delayed in region 5, and not
delayed in region 7. Regions 6 and 8 correspond to where
the (i + 1)th vehicle is delayed by the last vehicle in the ego
lane but can still go before the last vehicle in the other lane.
Delay is caused in the other lane in region 6.
Given the dynamic equation, the distribution of delay in (4)
can be computed. Fig. 4b shows the event-driven simulation
with the same conditions as the FIFO case. FO generates
less delay than FIFO. However, the distribution under FO no
longer has the "zebra" pattern shown in FIFO. We investigate
the steady state distribution of delay for ∆s = 0 and leave the
case of ∆s > 0 for future work. When ∆s = 0, the mapping
pTi (cid:55)→ pTi+1 is a contraction as shown in Fig. 6. Proposition 1
provides a solution of pT when ∆s = 0 and λ1 = λ2. As the
problem is symmetric, define g(t) := pT(t, t−∆d) = pT(t−
∆d, t). The function g(t) represents half of the probability
part of the function be g(t) and the delta component be(cid:98)g(t),
density that t equals the maximum lane delay. Let the finite
which is nonzero only at 0 and ∆d.
Proposition 1 (Steady State Distribution for ∆s = 0 under
xixi s d00T1iT2i12345678 d86571432 d0T1i+1T2i+18
6
4
2
]
s
[
2
e
n
a
l
n
i
y
a
l
e
D
0
−2
−2
2
0
6
Delay in lane 1 [s]
4
8
8
6
4
2
]
s
[
2
e
n
a
l
n
i
y
a
l
e
D
0
−2
−2
2
0
6
Delay in lane 1 [s]
4
8
8
6
4
2
]
s
[
2
e
n
a
l
n
i
y
a
l
e
D
0
−2
−2
8
6
4
2
]
s
[
2
e
n
a
l
n
i
y
a
l
e
D
0
−2
−2
0.2
0.1
0
8
2
0
6
Delay in lane 1 [s]
4
2
0
6
Delay in lane 1 [s]
4
8
(a) Iteration 1.
(b) Iteration 3.
(c) Iteration 10.
(d) Iteration 20.
Fig. 6: Illustration of the convergence of (4) under FO for λ1 = 1.1 s−1, λ2 = 0.5 s−1, ∆d = 2 s, and ∆s = 0 s with 10000 particles.
TABLE II: The mapping (2) under FO for si+1 = 1.
Domain
i < xi − ∆s
T 1
i < xi − ∆d
T 2
i ≥ xi − ∆s
T 1
i < xi − ∆d
T 2
T 2
i < T 1
i
i ≥ xi − ∆d
T 2
T 2
i < T 1
i
i ∈ [xi − ∆d, xi)
T 2
T 2
i > T 1
i
i ∈ [xi, xi + ∆d)
T 2
i < xi − ∆s
T 1
i ∈ [∆d , ∆d + ∆s]
i − T 1
T 2
i ≥ xi − ∆s
T 1
i < xi − ∆s
T 1
i ≥ xi + ∆d
T 2
i − T 1
T 2
i > xi + ∆d + ∆s
i ≥ xi − ∆s
T 1
1
2
3
4
5
6
7
8
Value
T 1
i+1 = 0
i+1 = −∆d
T 2
T 1
i+1 = T 1
i + ∆s − xi
i+1 = −∆d
T 2
T 1
i+1 = T 1
T 2
i+1 = T 2
T 1
i+1 = T 2
T 2
i+1 = T 2
i + ∆s − xi
i − xi
i + ∆d − xi
i − xi
T 1
i+1 = 0
T 2
i+1 = ∆d
T 1
i+1 = T 1
i − xi + ∆s
i − xi + ∆s + ∆d
i+1 = T 1
T 2
T 1
i+1 = 0
i+1 = T 2
T 2
i − xi
T 1
i+1 = T 1
i − xi + ∆s
i − xi
T 2
i+1 = T 2
g(t) = Ce
where C =
FO). If ∆s = 0 and λ1 = λ2, we have
λ
2 ∆d
2e
λ
C, (17)
λ
1
2 −
λ(1+e
λ
∆d +e
2
2
λ
−λ∆d )
− λ
2
C, (cid:98)g(∆d) =
(cid:21) .
2 t, (cid:98)g(0) =
(cid:20)
(cid:104)(cid:82) ∞
∆d−t g(t + x − ∆d)pxdx +(cid:82) ∞
∆d−1
8
e
(cid:105)
Proof. For t ∈ (0, ∆d), using the mapping in regions 3,
4, and 8, we get the following steady state relationship
.
g(t) = 1
0 g(t + x)pxdx
2
Multiply both sides by e−λt, and then differentiate with
respect to t to get
λ
2
g.
Hence, g = Ce
g(cid:48) − λg = −
the constant C. Due to symmetry, (cid:82) ∆d
the fact that g = g +(cid:98)g and g = Ce
λ
2 t for some constant C. Now we solve for
2. Using
g(t)dt = 1
(18)
.
1
2
(19)
(cid:98)g(0) +
2C(e
λ
2 ∆d − 1)
λ
λ
0
2 t, we get
+(cid:98)g(∆d) =
0
0
0
2
0
1
2
at
2
0
of
By
the
τ +∆d
region
Consider
(cid:82) ∞
∆d
changing
point mass
integration, we
pxdxg(τ )dτ + 1
2
2
e−λ∆d + 1
(cid:98)g(0) =
0 e−λτ g(τ )dτ. Hence,
0 e−λ(τ +∆d)g(τ )dτ + 1
1. The
g(τ )dτ pxdx + 1
2
order
(cid:82) ∞
(cid:82) x
(cid:82) ∞
(cid:82) ∞
is
0 g(τ )dτ pxdx.
get
τ pxdxg(τ )dτ =
(cid:82) x−∆d
(cid:82) ∞
(cid:98)g(0) = 1
(cid:82) ∞
(cid:82) ∞
(cid:98)g(0) = 1
(cid:82) ∞
where I =(cid:82) ∞
I =(cid:98)g(0) + e−λ∆d(cid:98)g(∆d) +
Consider region 5. The point mass at ∆d is (cid:98)g(∆d) =
(cid:82) ∞
(cid:82) ∆d
(cid:98)g(∆d) = 1
g(τ )dτ pxdx. By changing the order of integration,
(cid:20) 1
(1 − e−λτ )g(τ )dτ.
(22)
2C(1 − e−
λ
(cid:82) ∆d
(cid:21)
0 e−λτ g(τ )dτ. Plugging in the expression of
0 pxdxg(τ )dτ = 1
g(τ ), we have
(cid:82) ∆d
(cid:98)g(∆d) =
(cid:82) τ
Then,
(20)
(21)
I,
2 )
λ∆d
2
0
2
0
1
2
2
x
.
.
0
1
2
2 − I
We combine (19) to (22) to verify Proposition 1.
According to (17), the probability of zero-delay (2(cid:98)g(0))
and the probability of ∆d-delay (2(cid:98)g(∆d)) only depend on
λ∆d, i.e., the ratio between the temporal gap and the arrival
interval. Fig. 7 illustrates those relationships. When the ratio
between the temporal gap and the arrival interval increases,
the probability of zero-delay decreases while the probability
of ∆d-delay increases. Fig. 7 also illustrates the result from
EDS, which verifies Proposition 1.
We validate the event-driven model against the time-driven
traffic simulation. By ergodicity (10), the mean delay of all
vehicles in the time-driven traffic simulation should equal
the expectation of the delay induced by any event in the
steady state. The statistical mean delay under each scenario
is obtained through the time-driven traffic simulation for
10 min. The details of the simulation is provided in an earlier
journal [11]. The expected steady state delay is computed
using the result from Proposition 1. Given (6), the steady
state probability density of delay for t ∈ [0, ∆d) satisfies
pd(t) =
[g(t + x) + g(t + x− ∆d) + g(x− t + ∆d)]pxdx.
(23)
(cid:90) ∞
0
y
t
i
l
i
b
a
b
o
r
P
1
8
.
0
6
.
0
4
.
0
2
.
0
0
0
Analytical 0-delay (2(cid:98)g(0))
Analytical ∆d-delay (2(cid:98)g(∆d))
Probability of 0-delay from EDS
Probability of ∆d-delay from EDS
]
s
[
d
y
a
l
e
d
d
e
t
c
e
p
x
E
1
5
.
0
0
0
Analytical
Approximated
EDS
Traffic Sim
0.2
0.4
0.6
0.8
1
1.2
Traffic flow rate λ [s−1]
1
2
3
λ∆d
4
5
6
Fig. 9: The expected delay for ∆d = 1.5 s and different λ.
Fig. 7: The probability of delay with respect to parameter λ∆d.
∆d = 1 s Analytical
∆d = 3 s Analytical
∆d = 4 s EDS
∆d = 2 s Analytical
∆d = 4 s Analytical
y
t
i
l
b
a
b
o
r
P
1
5
.
0
0
0
0.5
1
1.5
2
2.5
3
3.5
4
Delay d [s]
Fig. 8: Illustration of Pd in (24) for λ = 1 s−1 with different ∆d.
2 ∆d−λt(cid:105)
λ
1 − e−λt
.
+
2
(cid:104)
(cid:90) ∆d
Applying (17), the distribution of steady state delay becomes
Pd(t) =
4C
λ
e
λ
2 t − e
λ
2 (∆d−t) + e
(24)
Fig. 8 shows the distributions. The shaded area is obtained
though EDS with 104 particles, which validates (24).
The expected delay can be computed as:
∆d
2
e−λ∆d − 1
2 ∆d + e− λ
λ
2
d
0
2λ
∆d
+
2λ(e
(λ∆d )2
E(d) =
tdPd(t) =
= λ∆2
4 .
.
2 ∆d − 1)
(25)
When λ → 0, i.e., the traffic flow rate is low, E(d) →
2 + −λ∆d+
When ∆d = 1.5 s, Fig. 9 shows the analytical expected
delay (25), the approximation function λ∆2
4 , the expected
delay obtained through EDS, and the statistical mean delay
in the simulation. When the flow rate is low, the delays
obtained through the four methods align well. As the flow
increases, the model underestimates the traffic delay because
the assumption ∆s = 0 is only valid for small λ.
IV. DISCUSSION AND CONCLUSION
d
This paper introduced an analytical
traffic model for
unmanaged intersections. The macroscopic property, i.e.,
delay at the intersection, was modeled as an event-driven
stochastic dynamic process. The macroscopic dynamics
encoded the equilibrium resulted from microscopic vehicle
interactions. Both the vehicle policies and the road topology
could affect the macroscopic dynamics. With the model, the
distribution of delay can be obtained through either direct
analysis or event-driven simulation, which are more efficient
than conventional time-driven traffic simulation and capture
more microscopic details than conventional macroscopic flow
models. The steady state traffic properties were studied, and
the accuracy was verified in simulation.
The potential applications of the analytical model include
1) efficient verification or comparison of policies through
analysis or event-driven simulation; 2) policy optimization
(e.g., choosing optimal ∆d) with respect to macroscopic
objectives; 3) real-time traffic prediction for intersections;
and 4) infrastructure optimization (e.g., designing better road
structure and network) to improve traffic efficiency.
REFERENCES
[1] S. P. Hoogendoorn and P. H. L. Bovy, "State-of-the-art of vehicular
traffic flow modelling," Proceedings of the Institution of Mechanical
Engineers, Part I: Journal of Systems and Control Engineering, vol.
215, no. 4, pp. 283 -- 303, 2001.
[2] P. Gora and I. Rub, "Traffic models for self-driving connected cars,"
Transportation Research Procedia, vol. 14, pp. 2207 -- 2216, 2016,
transport Research Arena TRA2016.
[3] R. Corthout, G. Flotterod, F. Viti, and C. M. Tamp`ere, "Non-unique
flows in macroscopic first-order intersection models," Transportation
Research Part B: Methodological, vol. 46, no. 3, pp. 343 -- 359, 2012.
[4] G. Flotterod and J. Rohde, "Operational macroscopic modeling of
complex urban road intersections," Transportation Research Part B:
Methodological, vol. 45, no. 6, pp. 903 -- 922, 2011.
[5] C. Gardiner, Stochastic Methods. Springer, 2009, vol. 4.
[6] F. Altch´e, X. Qian, and A. de La Fortelle, "Time-optimal coordination
of mobile robots along specified paths," in IEEE/RSJ International
Conference on Intelligent Robots and Systems (IROS), Oct 2016.
[7] X. Qian, F. Altch´e, J. Gr´egoire, and A. de La Fortelle, "Autonomous
intersection management systems: criteria, implementation and evalua-
tion," IET Intelligent Transport Systems, vol. 11, no. 3, pp. 182 -- 189,
April 2017.
[8] K. Dresner and P. Stone, "Multiagent traffic management: A reservation-
based intersection control mechanism," in International Joint Confer-
ence on Autonomous Agents and Multiagent Systems, 2004.
[9] M. Ahmane, A. Abbas-Turki, F. Perronnet, J. Wu, A. El Moudni,
J. Buisson, and R. Zeo, "Modeling and controlling an isolated urban
intersection based on cooperative vehicles," Transportation Research
Part C: Emerging Technologies, vol. 28, pp. 44 -- 62, 2013.
[10] C. Liu and M. J. Kochenderfer, "Analyzing traffic delay at unmanaged
intersections," arXiv:1806.02660, 2018.
[11] C. Liu, C. W. Lin, S. Shiraishi, and M. Tomizuka, "Distributed conflict
resolution for connected autonomous vehicles," IEEE Transactions on
Intelligent Vehicles, vol. 3, no. 1, pp. 18 -- 29, March 2018.
|
1809.07392 | 1 | 1809 | 2018-09-19T20:05:55 | Improved Bounds on Information Dissemination by Manhattan Random Waypoint Model | [
"cs.MA"
] | With the popularity of portable wireless devices it is important to model and predict how information or contagions spread by natural human mobility -- for understanding the spreading of deadly infectious diseases and for improving delay tolerant communication schemes. Formally, we model this problem by considering $M$ moving agents, where each agent initially carries a \emph{distinct} bit of information. When two agents are at the same location or in close proximity to one another, they share all their information with each other. We would like to know the time it takes until all bits of information reach all agents, called the \textit{flood time}, and how it depends on the way agents move, the size and shape of the network and the number of agents moving in the network.
We provide rigorous analysis for the \MRWP model (which takes paths with minimum number of turns), a convenient model used previously to analyze mobile agents, and find that with high probability the flood time is bounded by $O\big(N\log M\lceil(N/M) \log(NM)\rceil\big)$, where $M$ agents move on an $N\times N$ grid. In addition to extensive simulations, we use a data set of taxi trajectories to show that our method can successfully predict flood times in both experimental settings and the real world. | cs.MA | cs |
Improved Bounds on Information Dissemination by Manha(cid:130)an
Random Waypoint Model
Aria Rezaei
Stony Brook University
[email protected]
Je(cid:130) M. Phillips
University of Utah
je(cid:130)[email protected]
Jie Gao
Stony Brook University
[email protected]
Csaba D. T´oth
Cal State Univ. Northridge
[email protected]
ABSTRACT
With the popularity of portable wireless devices it is important to
model and predict how information or contagions spread by nat-
ural human mobility -- for understanding the spreading of deadly
infectious diseases and for improving delay tolerant communica-
tion schemes. Formally, we model this problem by considering M
moving agents, where each agent initially carries a distinct bit of
information. When two agents are at the same location or in close
proximity to one another, they share all their information with
each other. We would like to know the time it takes until all bits
of information reach all agents, called the (cid:131)ood time, and how it
depends on the way agents move, the size and shape of the network
and the number of agents moving in the network.
We provide rigorous analysis for the Manha(cid:138)an Random Way-
point model (which takes paths with minimum number of turns),
a convenient model used previously to analyze mobile agents,
and (cid:128)nd that with high probability the (cid:131)ood time is bounded by
O(cid:0)N log M(cid:100)(N/M) log(N M)(cid:101)(cid:1), where M agents move on an N × N
grid. In addition to extensive simulations, we use a data set of taxi
trajectories to show that our method can successfully predict (cid:131)ood
times in both experimental se(cid:138)ings and the real world.
KEYWORDS
Mobile Information Systems, Mobile Agents, Information Dissemi-
nation
1 INTRODUCTION
It has always been an interesting research topic to understand
human mobility and how contagions spread via such motion. One of
the motivations is to understand how infectious diseases spread by
moving agents. (cid:140)ink of a strain of an infectious virus such as SARS
or Ebola. When two individuals are at the same location at the same
time, there is a possibility for one to spread that strain of virus to the
other. (cid:140)erefore the spread of contagions in a population is highly
dependent on the density of the population and how individuals
move around. In another example, human motion can be used
for our bene(cid:128)t. It has become common that people carry wireless
devices around. Short range low cost wireless communication
can be established at the contact events to allow energy e(cid:129)cient
information exchange. In this case the mobility model in(cid:131)uences
how long it takes for a piece of information from one node to reach
all nodes in the network.
(cid:140)ere have been two main approaches to study human mobility
in the literature: data-driven methods versus theoretical analysis.
In recent years wireless technology has made it possible to collect
a large amount of mobility data through wireless devices. (cid:140)ere
has been a lot of work on (cid:128)nding exciting pa(cid:138)erns in human move-
ments and information spreading in real-world data [1, 19, 23]. It
has been shown that human mobility is immensely complex. Accu-
rate models can be built using historic tra(cid:129)c data to predict agents'
locations and social ties [20, 42]. But these models each work only
for a speci(cid:128)c scenario. It is unclear how these models can help us
analyze asymptotic behavior of moving agents or whether a model
generalizes to a di(cid:130)erent geographical location, a di(cid:130)erent travel
modality, or a di(cid:130)erent group of people. Furthermore, long-term
mobility data can be identity revealing. Even with great e(cid:130)orts
to anonymize the data and with removing big fractions of it, in-
dividuals are identi(cid:128)able by their movement pa(cid:138)erns. A seminal
work revealed that 4 randomly selected points in an hourly location
sequence of a person recorded over 15 months via cellphone anten-
nas is enough to make that person identi(cid:128)able among 1.5 million
individuals [17]. As a result, mobility data sets are usually not
published by companies due to concerns over user privacy, except
for a few special cases of shared vehicles (taxis or shared bikes).
On the other hand, an extensive amount of work has been ded-
icated to mathematical models of mobility and their asymptotic
behaviors. Although these models cannot compete with the ac-
curacy of data-driven models in the presence of enough historic
mobility data, they have been used for their rigorous analysis and
their ability to predict future events with provable certainty. Over
the years theoretical models have evolved from simplistic models,
inspired by known physical phenomena in real world, to more
sophisticated ones, taking into account the complexity of human
mobility. We brie(cid:131)y review these models and their analytical results
below. For a comprehensive survey on these models refer to [8].
• Random Walk: Perhaps the most studied movement model.
Inspired by the movement of (cid:131)oating particles in a liquid
or gas, called Brownian Motion [22], in its simplest version
an agent starts its movement in an arbitrary node in a
given network. At each time step, the agent chooses one
of the neighbors of its current node uniformly at random
and moves to that neighbor. (cid:140)ere are variations in which
agents can rest in their current position for a period of time
or use a non-uniform transition probability when choosing
a neighbor.
• Random Direction Model: In this model, an agent chooses
a random direction and possibly a random velocity, then
moves in that direction until it collides with the boundary
of the network. (cid:140)e agent then chooses a new direction
and velocity and continues as before.
• Random Way-point: In this model, an agent, starting
from an initial position in the network, chooses the next
destination from all nodes in the network uniformly at ran-
dom. (cid:140)en, using one of the shortest paths, moves towards
the destination and a(cid:137)er reaching it (cid:128)nds a new destina-
tion with the same method. (cid:140)is has been widely used in
modeling human motion and in many prior simulations
for mobile networks [6, 7, 26, 29, 37].
• Manhattan Random Way-point : (cid:140)is is a special case
of the Random Way-point model [6]. In a grid (or torus)
networks, agents move to the destination with as few turns
as possible. (cid:140)us they travel (cid:128)rst horizontally and then
vertically (or vice versa) to the destination. (cid:140)is model is
inspired by the fact that in urban streets, turning can be
time-consuming [13, 16].
• L´evy Walk: Studies on intelligent moving agents, espe-
cially humans, have revealed that the distance to the next
destination chosen by such agents seems to follow a fat-
tailed distribution [2, 25, 43]. A popular movement model
in this category is called L´evy Walk [41]. (cid:140)is model is sim-
ilar to Random Way-point, but instead of choosing a new
destination uniformly at random, an agent chooses a node
as its next destination with probability proportional to the
inverse of its distance from the agent's current position, to
some power α > 0.
1.1 Our Contributions
In this paper we provide improved upper bounds on the rate of
information dissemination when agents move according to the Man-
ha(cid:138)an Random Way-point model. (cid:140)rough a series of simulations
we show that, combined with bounds on Random Walk, our bounds
lead to a new conjecture on the time it takes for information to
disseminate through a network when agents' movements follow
the L´evy Walk model, a challenging question that remains widely
open. Finally, we report the result of a series of experiments we
have designed, which show that our model is capable of predicting
trends on experimental se(cid:138)ings, as well as real-world data.
We formally de(cid:128)ne our problem as follows. Consider a set of
M autonomous agents, each starting at time 0 with a unique bit
of information, bi, at a node selected uniformly at random in an
N × N torus1 denoted by G. Agents all follow the same movement
model and they share information with each other when they meet
during their move. Meeting is de(cid:128)ned as being at the same location
at the same time, where the location can be inside a node or on
an edge between two nodes. Agents start their movement at the
beginning of each time step in a synchronized fashion. We consider
uniform speed for all agents2 and transmission radius is practically
0 as agents have to be collocated in order to pass along information,
for simplicity. However our (cid:128)ndings can be extended for arbitrary
constant transmission radius.
In the above se(cid:138)ing, we are interested in (cid:128)nding bounds on
the time it takes until every agent (cid:128)nds out about every piece of
information. (cid:140)is value is called the (cid:131)ood time (TF ). An equally
important statistic is the time it takes for all agents to learn a
speci(cid:128)c bit of information, called broadcast time and denoted by
TB. Clearly TB ≤ TF . Using the union bound, any upper bound on
TB extends to TF , too, if the probability of the bound occurring is
su(cid:129)ciently high3. Both TF and TB are important statistics in various
applications. In the case of disease spreading, TB corresponds to the
time when an infection of any agent would have been passed to the
entire population. In a delay-tolerant wireless mobile network, TF
corresponds to the time in the past, from which we can assume all
information has been shared across the network; we can predicate
the start of a new protocol based on assuming all agents are up to
date a(cid:137)er this delay. In mobile social networks, TB corresponds to
the time it takes a new piece of information to permeate society.
Overall, both TF and TB are important statistics which capture
information (cid:131)ow in a network, and will be the focus of our study.
Our contributions are as follows:
M
• We (cid:128)nd a new upper bound for TF and TB that is tight
for a wide range of se(cid:138)ings. Speci(cid:128)cally, when M agents
move on an N × N grid with torus topology, we show
TB ≤ TF = O(N log M(cid:100) N
log(N M)(cid:101)). (cid:140)is bound im-
proves upon recent upper bounds for topologies with more
complex boundary conditions.
• We analyze the relation between Random Walk, Manha(cid:138)an
Random Way-point and L´evy Walk. (cid:140)rough simulations,
we show empirically that the L´evy Walk model can be
understood by carefully interpolating between the heavily
studied Random Walk model and our new results on the
Manha(cid:138)an Random Way-point model.
• We validate the theoretical bounds in a number of empirical
studies using simulated scenarios, bike and taxi trajectory
data sets.
2 BACKGROUND AND RELATED WORKS
Since the advent of social networks, researchers studied how in-
formation (e.g., rumors or viral videos) spreads through a network
[21, 24, 30]. (cid:140)e rate of change in these networks is slow enough
that they can be considered static throughout the course of infor-
mation dissemination. (cid:140)is assumption simpli(cid:128)es the mathematical
models tremendously. (cid:140)ese studies do not (cid:128)t dynamic mobile
networks, due to the high rate of topology changes. (cid:140)e spreading
behavior heavily depends on how agents move [32].
For analyzing the mobility models mentioned earlier, arguably
the simplest model for a geographically spread network is a 2D grid.
In some metropolitan se(cid:138)ings the downtown area is a reasonable
grid. Wrapping the grid around to a torus has been commonly
adopted in prior papers that analyze information spreading in a
mobile network. (cid:140)e bene(cid:128)t of the torus model is to get rid of
1A grid where nodes in the boundaries are each connected to their corresponding
node in the opposite boundary.
2In some previous de(cid:128)nitions of Random Way-point the agents choose their speed
uniformly at random from a range. But this choice will lead to the average moving
speed to be decreasing over time [45]. Also in reality vehicles/pedestrians o(cid:137)en move
with a (cid:128)xed speed.
3If Pr{TB > T } < 1/N d , for some d > 0, we know that Pr{TF > T } < M/N d <
1/N d(cid:48), when d is su(cid:129)ciently large.
2
the boundary e(cid:130)ect, thus simplifying the analysis. (cid:140)e torus also
removes the boundary e(cid:130)ect in the Random Way-point model,
which o(cid:137)en caused unwanted artifacts in simulations [3, 11, 39].
For direct comparison, we review prior results in the same format
as ours, where N and M are decoupled and there are no assump-
tions on their ratio, near-zero transmission radius (R ≈ 0), and
where each move consists of walking along a path from source
node to destination node, rather than jumping to the destination
instantaneously.
(cid:140)e Random Walk movement model has been extensively stud-
ied and tight bounds on many characteristics have been fully re-
solved [18, 31, 33]. One of the tightest bounds for Random Walk
is given by Pa(cid:138)erin et al. [38]. (cid:140)ey found that even with a very
small transmission radius, broadcast time does not depend on the
relation between the mobility speed and the transmission radius.
(cid:140)ey prove that with high probability (w.h.p):
TB = O
N
.
(1)
(cid:16)
(cid:109)(cid:17)
(cid:108) N√
M
Keeping track of a bit of information b, they (cid:128)rst divide the initial
grid into smaller cells and (cid:128)nd the time by which an arbitrary cell
is in(cid:128)ltrated by an agent carrying b. (cid:140)en they show that this
in(cid:128)ltrating agent will inform the majority of agents near this cell
and spread the information locally. A(cid:137)er the local spread is done
within the cell, information leaks into adjacent cells and this whole
process is repeated. Ultimately, every cell is in(cid:128)ltrated and every
agent in the network (cid:128)nds out about b.
Clementi et al. [14] have proved bounds for TF in Manha(cid:138)an-
like grids where agents move according to the Manha(cid:138)an Random
Way-point model. (cid:140)eir se(cid:138)ing slightly di(cid:130)ers from ours as they
do not employ boundary loops, which results in two zones with
very di(cid:130)erent tra(cid:129)c of agents. On the one hand, nodes in the
central zone are visited by agents across all nodes in the grid with
high probability. On the other hand, the periphery, called suburb
areas, are starved of agents: the probability that an agent passes
through these areas is signi(cid:128)cantly lower than that of the central
zone. (cid:140)ey prove that w.h.p. TF = O(cid:0)N/R + N
(cid:17)
the transmission radius and v is the agents' speed. We can rewrite
this in our se(cid:138)ing as:
M(cid:1), where R is
3/vR
(cid:16)
3
2
(2)
TF = O
N + N
M
.
(cid:140)ey found that the bulk of the Flooding Time is devoted to carrying
the information to the "suburbs," as it requires a (cid:131)ow of informed
agents traveling from the central zone to the suburbs.
A di(cid:130)erent line of work focused on solving the problem in a
general platform, oblivious to geometric considerations. Clementi
et al. [15] have derived an upper bound for TF , and the mixing time4
of the Markov chain corresponding to agent movements, as well as
how independent the collisions between di(cid:130)erent pairs are, play
a major role in the analysis of TF . Applying Manha(cid:138)an Random
Way-point model to their general bound yields the following:
(cid:16) N
(cid:0) N
2 + 1(cid:1) log2
2
(cid:17)
M
,
TF = O
vmax
MR
4Mixing time is the time needed for a Markov chain to reach its stationary distribution,
starting from an arbitrary distribution.
3
(cid:16)
(cid:108) N
2
(cid:109)(cid:17)
where vmax is the maximum speed of any agent. Rewri(cid:138)en in our
se(cid:138)ing, the bound is:
TF = O
N
(3)
Since their method is very general, their bound is not competi-
tive with the bounds on speci(cid:128)c movement models and networks.
Table 1 shows that our bound is a signi(cid:128)cant improvement over
these bounds on di(cid:130)erent movement models.
M
.
Table 1: Recent bounds on Manhattan Random Way-point
(MRWP), Random Way-point (RWP) and Random Walk
(RW).
Ours
Authors
Model
MRWP
Clementi et al. 2010 [14] MRWP
RWP
Clementi et al. 2015 [15]
Pe(cid:138)arin et al. 2011 [38]
RW
Bound
O(N (cid:100)N/M(cid:101))
3/M)
O(N + N
O(N (cid:100)N
2/M(cid:101))
O(N (cid:100)N/√
M(cid:101))
Rigorous analysis of the L´evy Walk model is much more chal-
lenging due to the strong spatiotemporal correlation [4, 34, 40]. (cid:140)e
most relevant work is done by Wang et al. [44] where the authors
have analyzed the distribution of the minimum time needed until a
piece of information reaches a certain region. However, to the best
of our knowledge, there are no bounds for TF when the agents are
moving according to a L´evy Walk.
Besides theoretical work, there has been a lot of empirical anal-
ysis of how information can spread through opportunistic peer
communication among mobile agents using simulations or empiri-
cal evaluations. Protocols for reducing communication cost (e.g., to
avoid a message be delivered to a node multiple times) have been
studied extensively [10, 28, 36]. Last, there has also been work on
a model assuming that a supporting static wireless network is in
place, which helps to cache and propagate these events [46]. (cid:140)is
model is di(cid:130)erent from ours.
3 BOUNDS ON FLOOD TIME
In this section, we present and prove our main theoretical results
on the (cid:131)ooding time on torus networks. We start with a trivial
lower bound.
Theorem 3.1. For M agents initially positioned at uniformly ran-
dom nodes and moving with constant speed in an N × N torus, with
constant probability, we have:
TF ≥ TB ≥ Ω(N).
(4)
Proof. Let bi be the bit of information initially carried by agent
Ai, and Aj the farthest agent to Ai at time 0. (cid:140)e time it takes until
bi reaches Aj, denoted by T(Aj , bi), is a lower bound for both TF
and TB. Since we are assuming uniformly random initial positions,
with 1/2 probability the distance between Ai and Aj is at least N/2.
Also note that information can only travel as fast as agents can.
(cid:140)is means that at each time step the distance between Aj and
the closest copy of bi is reduced by at most 2 units. As a result,
with probability 1/2, T(Aj , bi) is at least N/4, which completes the
proof.
(cid:3)
Now we move forward to our main theorem on the upper bound
for Manha(cid:138)an Random Way-point model.
Theorem 3.2. For M agents moving according to the Manha(cid:136)an
Random Way-point model with constant speed in an N × N torus,
with high probability5, we have:
TB ≤ TF = O
N log M
.
(5)
(cid:16)
log(N M)(cid:109)(cid:17)
(cid:108) N
M
W present the proof in two parts. (cid:140)e (cid:128)rst part is to analyze
when and with what probability two agents have a collocation
event so they can share information. (cid:140)is involves a few necessary
conditions: time-wise the moves made by two agents with a collo-
cation event need to overlap; geometrically their trajectories need
to have an intersection; and thirdly, they arrive at the intersection
at the same time. Next we need to analyze the global property: how
information sharing enabled by collocation events leads to global
dissemination. (cid:140)e next two subsections focus on these two parts
of the proof respectively.
3.1 Bounding Collocation Probability
We consider agents moving non-stop following Manha(cid:138)an Random
Way-point model, and partition the mobility trace of each agent into
moves between randomly chosen destinations. First, observe that
any move by an agent following Manha(cid:138)an Random Way-point
model takes Ω(N) time with constant probability. We call the two
straight parts of a movement, one horizontal and the other vertical,
segments. Note that any move in this model can have at most two
segments of di(cid:130)erent directions appearing in an arbitrary order.
We say two agents have a connection during their moves if they
are at the same location at the same time. For that to happen, the
moves of the two agents must at least overlap over time.
De(cid:128)nition 3.3. Strongly overlapping moves are moves made
by two agents where the time interval of a segment of an agent's
move is completely contained within the time interval of the other
agent's whole move.
Note that this overlap only needs to happen in the time interval
of two moves and no condition is imposed on their geometric
locations.
Lemma 3.4. Every move Mi of an agent Ai strongly overlaps with
at least one of the moves of another agent Aj , say Mj . (cid:138)e starting
moment of the moves can be at most N time-steps apart and with con-
stant probability, a segment of Mi will have a time duration overlap
of Ω(N) with a segment of Mj .
j
Proof. First consider the move M−
j
of Aj that is still active
when Mi starts. If M−
ends a(cid:137)er the (cid:128)rst segment of Mi, then M−
j
covers the (cid:128)rst segment of Mi and the two moves strongly overlap
(Figure 1 case (i)). If not, then consider the next move of Aj, M +
. If
j
ends a(cid:137)er Mi ends, M +
completely covers Mi's second segment
M +
j
j
and the two moves strongly overlap (Figure 1 case (ii)). If not, then
must be completely covered by Mi and the two moves strongly
M +
j
overlap (Figure 1 case (iii)). We have shown that a strong overlap
occurs. Since the time duration of each move can be at most N , the
5High probability in our work means at least 1 − 1/N d for some constant d > 0.
starting point of Mi is at most N time-steps apart from the starting
points of both M−
j
and M +
j
.
Figure 1: Any move of one agent strongly overlaps with at
least one of the moves of another agent.
Without loss of generality, assume a segment Sj of Mj is covered
completely by Mi. With probability 1/2, the time duration of Sj
(equal to its length due to the constant speed assumption) is at least
N/4. Now take the segment of Mi with the longest time duration
overlap with Sj, and denote it by Si. (cid:140)is overlap should be at least
Sj/2. As a result, with probability 1/2, the time duration of this
overlap between Si and Sj is at least N/8, as required.
(cid:3)
Figure 2: (cid:135)e segments are trimmed to duration of their
overlap, (cid:96). Le(cid:133): (cid:135)e collocation event of two agents hap-
pens if the distance between the intersection point (P) and
the starting point of both segments is equal ((cid:96)1 = (cid:96)2). Right:
Connection happens if there is a non-zero overlap between
two segments and there are 2(cid:96) such placements for the blue
segment if the red segment is (cid:128)xed.
Lemma 3.5. If two agents Ai and Aj have two segments Si and Sj
2).
with a time interval overlap of (cid:96), they meet with probability Θ((cid:96)/N
Proof. We trim both segments to the duration of their overlap,
making them of equal length (cid:96). All cases of a connection between
the two agents can be reduced to three main cases below by rotating
the torus or swapping the agents:
(1) Si is horizontal and Sj vertical. Here, the two agents con-
nect, if the two segments intersect geometrically at a point
P and P is at equal distance from the starting points of
Si and Sj (see Figure 2, le(cid:137)). Since we assume that G is a
2
torus, we can (cid:128)x Si's position in our analysis. Out of all N
possible placements of Sj on G, there are (cid:96) placements that
result in an intersection that meets the above condition.
Hence the probability of a connection between Ai and Aj
is (cid:96)/N
2 in this scenario.
4
MiM−j(i)M+j(ii)(iii)M−jM+jM−j(cid:96)1(cid:96)2P(cid:96)(2) Both Si and Sj are horizontal and in opposite directions.
In this case, any geometric intersection is enough for a
connection to happen (see Figure 2, right). If both agents
move in the same row, there would be 2(cid:96) placements of Sj
once Si's position is (cid:128)xed that results in an intersection.
(cid:140)e probability of both agents moving in the same row is
1/N , which makes the overall probability 2(cid:96)/N
(3) Both Si and Sj are horizontal and in the same direction. In
this case, the starting points of Si and Sj have to be in the
same exact node, which happens with probability 1/N
2.
Based on the 4 possible directions of each segment, there are
16 possible cases for Si and Sj, all of which happens with equal
probability and can be reduced to one of the 3 cases above. (cid:140)e
overall probability of a connection between two agents can be
bounded as:
2.
(cid:96)
N
2 ≤ Pr{Connect(Ai , Aj , (cid:96))} ≤ 32 (cid:96)
2 .
N
(6)
(cid:3)
An immediate consequence of Lemmas 3.5 and 3.4 is:
Lemma 3.6. Two agents with strongly overlapping moves have a
connection with probability Θ(1/N).
Proof. For the probability of two strongly overlapping agents
connecting we have:
N/2
P((cid:96) = x) Pr{Connect(Ai , Aj , x)}, (7)
Pr{Connect(Ai , Aj)} =
where P((cid:96) = x) is the probability that the time duration of the
overlap between segments of Ai and Aj is x. From Lemma 3.4 we
know that P((cid:96) ≥ N/8) ≥ 1/2. As a result we can rewrite (7) as:
x =1
Pr{Connect(Ai , Aj)} ≥ 1
2
N/8
2 ≥ 1
16N
N
.
(cid:140)e upper bound in (6) yields:
Pr{Connect(Ai , Aj)} ≤ max
x
Pr{Connect(Ai , Aj , x)} ≤ 16
N
.
(cid:3)
3.2 Bounding the Flood Time
Given the probability of two agents sharing information during
their moves, we are now ready to argue for how information propa-
gates to the entire network. For simplicity, we (cid:128)nd an upper bound
for the broadcast time TB (one speci(cid:128)c message reaching everyone)
and extend it to the (cid:131)ood time TF (all messages reaching everyone).
(cid:140)ere are two issues that we need to address. First, the positions of
an agent are temporally correlated -- but fortunately, if su(cid:129)ciently
far apart in time, the positions of agents are independent which
will help to simplify our analysis. Second, we need to track agents
who have been informed and who have not, and analyze how in-
formation spreads from the informed ones to the uninformed ones.
Lemma 3.7. (cid:138)e locations of two agents at 2N steps apart are
independent of each other.
Xi +2. Also, nodes visited between two consecutive destinations are
only dependent on those two destinations. Let Pt and Pt +2N be the
position of A at time t and t + 2N . Since the agents move along the
shortest path towards their destination, a move is at most N steps
long. As a result, at least two destinations will be visited between
time t and t + 2N by A. Take the destination immediately a(cid:137)er Pt ,
Xi, and immediately before Pt +2N , Xj. As noted above, Pt is only
dependent on Xi−1 and Xi, while Pt +2N is only dependent on Xj
and Xj+1, where Xi and Xj are distinct positions. (cid:140)is makes Pt
and Pt +2N completely independent.
(cid:3)
As mentioned earlier, we track the spread of a single bit of in-
formation b among the agents. We (cid:128)rst divide the time span of the
whole process into windows of size 6N time steps, called cycles.
th cycle starts at time 6kN and ends at time 6(k + 1)N . Each
(cid:140)e k
agent would visit at least 4 destinations between time (6k + 1)N
and (6k +5)N , which yield at least 3 moves independent of other cy-
cles in an agent's trajectory (note the 2N margin between selected
moves in each cycle, which guarantees independence). According
to Lemma 3.4, we know that a move by an agent will strongly over-
lap with a move by another agent and the starting point of the two
moves are at most N time steps apart. As a result, for each pair of
agents and each cycle, we can (cid:128)nd two strongly overlapping moves
independent of other cycles, which according to Lemma 3.6 have a
c/N chance of connection, where c is a constant. (cid:140)is essentially
makes collocation events between a (cid:128)xed pair of agents in di(cid:130)erent
cycles i.i.d.
We now divide the whole process into consecutive epochs. Each
epoch consists of si cycles, and starts when we have a set Ii of
agents who know about b (referred to as informed agents) and a
set Ui of agents who do not (referred to as uninformed agents). An
epoch ends when the number of informed agents doubles, or the
number of uninformed agents drops to zero. For the broadcast time
of b, TB, we can write:
TB ≤ 6N
si .
(8)
log M
i =1
We now (cid:128)nd the number of cycles needed for that w.h.p. each
th epoch.
agent in Ii is paired with a distinct agent in Ui during the i
By arti(cid:128)cially forcing informed agents to (cid:128)nd distinct partners, we
only slow down the process of information spread, and an upper
bound found in this manner is valid as an upper bound for the
main problem. (cid:140)e reason we are require distinct partners for each
informed agent is to ensure that connections between di(cid:130)erent
pairs are independent.
(cid:140)e probability of an informed agent A ∈ Ii connecting to any
A(cid:48) ∈ Ui is as follows (arrow shows the direction of information
exchange):
Pr{(cid:154)A
Pr{∃A
(cid:48) ∈ Ui : A → A
(cid:48) ∈ Ui : A → A
(cid:16)1 − c
(cid:17)si Ui
(cid:17)si Ui
(cid:48)} = 1 −(cid:16)1 − c
(cid:48)} =
N
,
N
.
(9)
Proof. Let the sequence of destinations chosen by an agent A
be (cid:104)X0, X1, . . . , Xk(cid:105). Observe that regardless of what Xi is, every
node in the torus (including Xi) has the same probability of being
Let there be an arbitrary order for agents in Ii and one for agents
in Ui. (cid:140)e (cid:128)rst informed agent can match to any of the Ui unin-
formed agents. A(cid:137)er the (cid:128)rst matching is done, there will be Ui−1
5
potential matches for the second informed agent and so on. Assum-
ing that there are q pairs at the end of this epoch (q ≤ min(Ii, Ui))
and using Equation (9), the probability of this happening (i.e., hav-
ing q pairs of matched informed/uninformed agents) is:
Pr{q-matching} =
N
N
i =0
(cid:1)si(M−q−i)(cid:17)
(cid:16)1 −(cid:0)1 − c
q
≥(cid:16)1 −(cid:0)1 − c
(cid:1)si(M/2)(cid:17)q/2
≥(cid:16)1 − exp(cid:16)−sic(M/2)
(cid:17)(cid:17)q/2
≥ 1 − q exp(cid:16)−sic(M/2)
(cid:17)
(cid:17) ≥ 1 − 1
(cid:17) ≥ qN d
N d
N
N
.
si ≥ 2N
cM
2dN
cM
si >
(log q + d log N)
log(N M).
For the above to happen w.h.p., for d > 1, we need:
1 − q exp(cid:16)−sic(M/2)
exp(cid:16) sic(M/2)
N
N
(cid:140)e last step is due to the fact that q < M. To make sure that si is a
non-zero integer and we have at least one cycle, we set:
Substituting (10) into (8), we have:
si =
.
cM
(cid:108)2dN
log(N M)(cid:109)
log(N M)(cid:109)
(cid:108)2dN
log M
log(N M)(cid:109)(cid:17)
(cid:108) N
i =1
N log M
cM
(cid:16)
TB ≤ 6N
.
M
= O
(12)
Since our bound for TB works for arbitrarily high probability (1 −
1/N d, for a constant d > 0), it extends to TF using the Union Bound.
(cid:140)is completes the proof of (cid:140)eorem 3.2.
(cid:140)is is a pre(cid:138)y tight bound. Consider a semi-dense scenario
where M ≈ N , our bound becomes O(N), which nearly meets the
trivial lower bound of Equation (4).
Compared to previously mentioned bounds for the Random Way-
point model in (2) and (3), our bound is stronger. For the same
movement model, although under slightly di(cid:130)erent network as-
sumptions, Clementi et al. found the bound of O(N + N
3/M) [14],
which is mainly due to the choice of not having a torus as they
intended to study the impact of rarely visited areas on the total
information spread time. Our bound also improves that of [15] by
a huge margin. (cid:140)is can be due to the fact that their method is
a general framework to (cid:128)nd an upper bound for TF . Our version
of the Manha(cid:138)an Random Way-point model assumes that agents
complete their move in one coordinate then start moving in another.
As suggested in [15], this assumption increases the probability of
connection between two agents, which in turn leads to a be(cid:138)er
upper bound for TF and TB. Further, the Manha(cid:138)an Random Way-
point model is a be(cid:138)er (cid:128)t for mobility in urban areas it implicitly
incorporates the cost of turning during movement.
(10)
(11)
Depending on the application, one can think of various exten-
sions to our model, such as an arbitrary transmission radius or
random waiting time between two consecutive moves of an agent.
In this case, an approach similar to ours can be adopted to (cid:128)nd a
bound for TF if these three components are available: (1) suitably
sized independent time windows (called cycle here), (2) guarantee
of a long enough time interval overlap between segments of moves
by two agents and (3) probability of connection between those two
segments.
4 EXPERIMENTS
In this section, through a series of experiments we test the accuracy
of our discovered bound. First, we test our model where agents are
moving in a torus-like grid, following Manha(cid:138)an Random Way-
point model. Next, using bike sharing records in 3 major cities,
we create synthetic trajectories in real-world road networks, and
compare simulated behavior of (cid:131)ood time against our model. Finally,
using GPS traces of taxis in a major city, we verify our model against
a real-world case of information dissemination via mobile agents.
4.1 Simulated Movements in a Grid
We simulate the movement of agents in a torus-like grid following
a Manha(cid:138)an Random Way-point model, and compare the aver-
age (cid:131)ood times, TF , against our bound. First, we (cid:128)x N to 100
and (cid:128)nd TF for M = {25, 50, · · · , 1000} by averaging TF over 100
realizations. To (cid:128)t the resulting values to our bound, we use func-
tion f (M) = c1
log(c2M) log(c3M), where each ci is a positive
M
constant, accounting for (cid:128)xed N and constants in our asymptotic
analysis. (cid:140)e results of the simulation along with (cid:128)(cid:138)ed values are
shown in Figure 3, middle. Our bound has accurately captured the
2, is equal to
changes in TF as the coe(cid:129)cient of determination, R
0.9894. Next, using a similar procedure, we (cid:128)x M to 100 and (cid:128)nd
TF for N = {25, 50, · · · , 500}. We (cid:128)t the values to the function
f (N) = c1N
2(log N + c2), where again each ci is a positive con-
stant. (cid:140)e simulation results and the (cid:128)(cid:138)ed values are depicted in
Figure 3. As expected, we showed good performance here too by
2 values is
yielding an R
coincidental).
2 of 0.9894 (equality between the two R
4.2 Simulated Movements in Real Networks
To test our model against non-grid networks, we use the bike rental
records of 3 major US cities [9, 12, 27]. Each city has a unique road
network and a set of (cid:128)xed stations, {S1, S2, · · · , Sk}, which are used
as the set of possible destinations each agent can choose from. (cid:140)e
goal here is to test our model against a se(cid:138)ing beyond the grid
network and uniformly random selection of destinations. (cid:140)e data
sets include an origin and a destination station for each trip made.
Using these records, we can estimate the probability of choosing a
destination Sj given that an agent is currently positioned in station
Si, called the transition probability between Si and Sj and denoted
by P(Si , Sj). We can also calculate the probability of initiating a
trajectory from any given station, from here on called initiation
probability and denoted by P(Si). To gradually move our tests
away from the theoretical se(cid:138)ings, we use the following movement
models throughout our simulations:
6
Figure 3: (le(cid:133)) (cid:135)e sigmoid-like behavior of L´evy Walk, sandwiched by Random Walk and Manhattan Random Way-point.
(middle, right) Our bound accurately captures the changes in TF as M and N are tweaked while other parameters are (cid:128)xed.
Figure 4: Actual (empty circles) and (cid:128)tted (dotted lines) TF for two movement policies in 3 cities.
(1) Similar to Section 4.1, we select each station in the sequence
of stations visited by an agent uniformly at random. (cid:140)is is
equivalent to the Random Way-point model and denoted
by RWP in this experiment.
(2) Next, we use the calculated P(Si) and P(Si , Sj) values to
build synthetic trajectories. We call this model DATA
throughout this experiment.
In each experiment, a(cid:137)er selecting a sequence of stations visited
by each agent, we (cid:128)nd the shortest paths between consecutive
stations using Routino [5] and OpenStreetMap [35] extracts. Two
agents will connect, if at any time t they are closer than 100 meters
from each other. Finally, for each of these experiments, we iterate
over 10 values of M between 5 and 2000, and report the average
(cid:131)ood time (TF ) by aggregating over 25 realizations.
7
0246810α1000200030004000TFvs.αLWMRWPRW102103#Agents(M)103TFvs.#AgentsActualFitted100200300400500GridSize(N)0100002000030000TFvs.GridSizeActualFitted101102103Agents(M)103104FloodTime(TF)Boston(RWP)R2=0.998101102103Agents(M)103104NYC(RWP)R2=0.999101102103Agents(M)103104D.C.(RWP)R2=0.995101102103Agents(M)103104FloodTime(TF)Boston(DATA)R2=1.000101102103Agents(M)103104NYC(DATA)R2=0.998101102103Agents(M)103104D.C.(DATA)R2=0.934Table 2: Fitting score, R
cities.
2, for all movement policies in all
City
Boston
New York City
Washington, D.C.
RWP DATA
0.998
1.000
0.998
0.999
0.995
0.934
Using a function similar to Section 4.1, we can (cid:128)t the simulation
results to our bound. Figure 4 shows the actual and (cid:128)(cid:138)ed values
2 value of the (cid:128)(cid:138)ing. In these
for the 3 cities, along with the R
simulations, our bound closely approximates the (cid:131)ood time in the
simulations, even when the movement policy used is data-speci(cid:128)c
2 values care
rather than the Random Way-point model. (cid:140)e R
compared in Table 2. Across all se(cid:138)ings, we achieve > 0.93 (5 of
them > 0.99), which shows the (cid:131)exibility of our model to variations
of network and movement policy. Note that here the network was
a real-world road network, and far from a torus.
(cid:140)ere can be many di(cid:130)erent factors contributing to the (cid:131)ood
time in networks as complicated as urban maps, which are beyond
the scope of this study. Here, we tried to explore the limits of our
model's prediction capabilities by tweaking the se(cid:138)ings of experi-
ment in a controlled manner. Further investigation in the e(cid:130)ects of
structural properties of road networks, and di(cid:130)erent distributions
of frequent origins and destinations on the (cid:131)ood time is needed
to fully understand the process of information dissemination by
human mobility in real road networks.
4.3 Real-World Data
traces of taxi cabs in the city of Shenzhen in China [19]. Over the
course of 24 hours, the location of 9386 taxis are sampled every
1.01 minutes. We set the transmission radius to 100 meters and, for
simplicity, assume that connections can happen only on sampled
points in time. To generate di(cid:130)erent numbers of moving agents
(M), we have to subsample from the set of all taxis. Since these
trajectories are (cid:128)xed, we cannot extend them in the event of having
no information (cid:131)ood. Hence, we (cid:128)lter out those taxis that meet less
than 100 distinct taxis during the whole 24 hours, and 3905 taxis
will remain. We iterate over 10 di(cid:130)erent values of M between 500
and 3000, each time (cid:128)nding the (cid:131)ood time in hours. We average the
results of 25 realizations for each M and report it. (cid:140)e results are
shown in Figure 5. We have followed the same procedure to (cid:128)t the
simulation values to our bound. (cid:140)e resulting (cid:128)(cid:136)ed line is drawn
2 value of 0.996. (cid:140)is shows that our
in Figure 5, achieving an R
model is capable of predicting (cid:131)ood times for real-world scenarios
to some degree. It is worth noting that the real-world experiments
did not have signi(cid:128)cant (cid:131)uctuations in the (cid:131)ood time value and,
similar to controlled experiments in the two sections before, shows
a smooth behavior, even with only hundreds of moving agents in
some cases.
5 TOWARDS BOUNDING THE L´EVY WALK
Compared to other mobility models, the L´evy Walk if far less stud-
ied. Formally, in a L´evy Walk, given a constant α > 0, an agent
th destination, X = Xi, chooses node Y as its next
positioned at its i
destination, Xi +1, with the following probability:
Pr{Xi +1 = Y Xi = X} =
1
ZY − Xα ,
(13)
where Z is the normalizing factor and X − Y is the distance
between nodes X and Y, such as Manha(cid:136)an Distance in a grid,
Euclidean Distance in the 2D plane or Graph Shortest Path Distance
in any given network. Figure 6 compares a Random, a L´evy and a
Random Way-point walker, simulated for 250 steps. Notice that a
Random Way-point walker tends to take big steps and cover a vast
area in the grid, while a Random walker is concentrated to a small
area around its initial position. A L´evy walker shows a mixture
of the two behaviors. It roams around in a small area most of the
time, but occasionally makes a long move to a di(cid:130)erent region in
the grid.
Figure 5: Actual (empty circles) and (cid:128)tted (dotted lines) TF
for Shenzhen.
Next, we try to (cid:128)t our model to real-world GPS traces. Ideally, one
may want to experiment on personal trajectories, as the behavior of
a single moving agent is best understood by looking at individuals'
mobility traces. However, due to the sensitivity of such data, large
and high-quality data sets containing personal mobility traces are
extremely rare. As a substitute, we can study the mobility of shared
vehicles, as we did in the previous section. Here, we study GPS
Figure 6: A Random Way-point walker (le(cid:133)), a random
walker (middle), and a L´evy walker (α = 2) a(cid:133)er 250 steps.
8
100020003000Agents(M)05101520TF(hours)R2=0.996050100020406080100RWP4045505055606570RandomWalk02040406080100120140160L'evyWalkTo compare how information propagates in the three movement
models, we have to (cid:128)rst observe that Random Walk (or Brownian
motion) and Random Way-point can be thought of as two extreme
ends of the spectrum of all possible L´evy Walks. In (13), se(cid:138)ing
α to 0 (and applying the corresponding Z value) yields a constant
probability regardless of the distance between X and Y, similar
to Random Way-point. On the other hand, given any time limit
T , we can make α high enough so that w.h.p. no agent selects a
destination more than one unit distance away at any time t ≤ T ,
e(cid:130)ectively forcing them to follow Random Walk.
Figure 3, le(cid:137), shows the simulated results for the average (cid:131)ood
time, denoted by TF , of a system where agents are moving by
Random Walk, Manha(cid:138)an Random Way-point or L´evy Walk model
with di(cid:130)erent values of α. Both N and M are set to 100, α goes from 0
to 10 in 0.1 increments, and each point is created by aggregating the
results of 100 realizations. Additionally, with our newly discovered
bound for the Manha(cid:138)an Random Way-point model, the bounds
for TF in Random Walk and Manha(cid:138)an Random Way-point have
go(cid:138)en very close. We now have a reason to believe that any future
bound for L´evy Walk should be close to either of the bounds for
these two movement models. And since their bounds are close, it
is worth investigating whether or not a careful interpolation of the
bounds for Random Walk and Manha(cid:138)an Random Way-point is a
good predictor of how a L´evy Walker moves in a network.
6 CONCLUSION
(cid:140)anks to ever-present portable devices, there has been a grow-
ing interest in a be(cid:138)er understanding of mobile networks (also
called vehicular networks), where autonomous agents move inde-
pendently and are capable of carrying and transmi(cid:138)ing information.
We studied the case of M agents moving in an N × N torus.
ha(cid:138)an Random Way-point model, TF = O(N(cid:6)N/M(cid:7)), that is tight
We made a new improvement to the (cid:131)ood time bound for Man-
for a wide range of problem se(cid:138)ings. To the best of our knowl-
edge, this bound is stronger than all previous bounds found for this
movement model. (cid:140)rough extensive experiments, we showed that
our bound can accurately predict (cid:131)ood time for a wide variety of
simulated and real-world se(cid:138)ings.
Lastly, given the shrinking di(cid:130)erence between the bounds for
Random Walk and Random Way-point, and the fact that L´evy Walk
behaves in between the former two movement models, it is now
worth investigating whether a careful interpolation of Random
Walk and Random Way-point can describe L´evy Walk accurately
enough. Finding theoretical bounds for L´evy Walk can be a valuable
future work that further expands our knowledge of the relation
between these three movement models and ultimately of human
mobility.
ACKNOWLEDGEMENTS
A. Rezaei and J. Gao acknowledge support through NSF CCF-1535900,
CNS-1618391, and DMS-1737812. J. Phillips acknowledges sup-
port by NSF CCF-1350888, ACI-1443046, CNS-1514520, and CNS-
1564287. Research by C.D. T´oth was supported in part by NSF
CCF-1422311 and CCF-1423615. (cid:140)e experiments were conducted
with equipment purchased through NSF CISE Research Infrastruc-
ture Grant No. 1405641. (cid:140)e authors thank Dagstuhl Seminar 15111
9
on Computational Geometry during which some of the ideas were
developed.
[3] Christian Be(cid:138)ste(cid:138)er. 2001.
for Simulation of Wireless Networks.
[2] Albert-l´aszl´o Barab´asi. 2005. (cid:140)e origin of bursts and heavy tails in human
REFERENCES
[1] Paolo Bajardi, Chiara Pole(cid:138)o, Jose J Ramasco, Michele Tizzoni, Vi(cid:138)oria Colizza,
and Alessandro Vespignani. 2011. Human mobility networks, travel restrictions,
and the global spread of 2009 H1N1 pandemic. PloS one 6, 1 (2011), e16591.
dynamics. Nature 435, 7039 (2005), 207 -- 211.
Smooth is Be(cid:138)er than Sharp: A Ran-
dom Mobility Model
cite-
seerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.3460 (2001).
[4] B Birand, M Zafer, G Zussman, and K W Lee. 2011. Dynamic Graph Properties
of Mobile Networks under Levy Walk Mobility. In 2011 IEEE Eighth International
Conference on Mobile Ad-Hoc and Sensor Systems. 292 -- 301.
[5] Andrew M. Bishop. 2017. Router for OpenStreetMap Data. h(cid:138)p://www.routino.
org/. (2017).
J Y Le Boudec and M Vojnovic. 2006. (cid:140)e Random Trip Model: Stability, Stationary
Regime, and Perfect Simulation. IEEE/ACM Trans. Netw. 14, 6 (Dec. 2006), 1153 --
1166.
Josh Broch, David A Maltz, David B Johnson, Yih-Chun Hu, and Jorjeta Jetcheva.
1998. A Performance Comparison of Multi-hop Wireless Ad Hoc Network
Routing Protocols. In Proceedings of the 4th Annual ACM/IEEE International
Conference on Mobile Computing and Networking (MobiCom '98). ACM, New
York, NY, USA, 85 -- 97.
[8] Tracy Camp, Je(cid:130) Boleng, and Vanessa Davies. 2002. A survey of mobility models
for ad hoc network research. Wireless communications and mobile computing 2,
5 (2002), 483 -- 502.
h(cid:138)ps://www.
[9] Capital Bikeshare. 2017. Washington DC Trip Histories.
[6]
[7]
capitalbikeshare.com/system-data. (2017).
[10] Maurice Chu, Horst Haussecker, and Feng Zhao. 2002. Scalable information-
driven sensor querying and routing for ad hoc heterogeneous sensor networks.
(cid:138)e International Journal of High Performance Computing Applications 16, 3 (2002),
293 -- 313.
[11] Tommy Chu and Ioanis Nikolaidis. 2002. On the Artifacts of Random Waypoint
[12] Citi Bike. 2017. New York City Trip Histories. h(cid:138)ps://www.citibikenyc.com/
Simulations. In International Conference on Internet Computing.
system-data. (2017).
Information
[13] Andrea Clementi, Angelo Monti, and Riccardo Silvestri. 2011. Modelling mobility:
[15] Andrea Clementi, Riccardo Silvestri, and Luca Trevisan. 2015.
[18] Tassos Dimitriou, Sotiris Nikoletseas, and Paul Spirakis. 2006. (cid:140)e infection time
[14] Andrea Clementi, Angelo Monti, and Riccardo Silvestri. 2013. Fast (cid:131)ooding over
A discrete revolution. Ad Hoc Networks 9, 6 (Aug. 2011), 998 -- 1014.
Manha(cid:138)an. Distributed computing 26, 1 (2013), 25 -- 38.
spreading in dynamic graphs. Distributed Computing 28, 1 (2015), 55 -- 73.
[16] Pilu Crescenzi, Miriam Di Ianni, Andrea Marino, Gianluca Rossi, and Paola Vocca.
2009. Spatial Node Distribution of Manha(cid:138)an Path Based Random Waypoint
Mobility Models with Applications. In Structural Information and Communication
Complexity (Lecture Notes in Computer Science). Springer, Berlin, Heidelberg, 154 --
166.
[17] Yves-Alexandre De Montjoye, C´esar A Hidalgo, Michel Verleysen, and Vincent D
Blondel. 2013. Unique in the crowd: (cid:140)e privacy bounds of human mobility.
Scienti(cid:128)c reports 3 (2013), 1376.
of graphs. Discrete Applied Mathematics 154, 18 (2006), 2577 -- 2589.
Jiaxin Ding, Jie Gao, and Hui Xiong. 2015. Understanding and modelling informa-
tion dissemination pa(cid:138)erns in vehicle-to-vehicle networks. In Proceedings of the
23rd SIGSPATIAL International Conference on Advances in Geographic Information
Systems. ACM, 41.
[20] Nathan Eagle, Alex (Sandy) Pentland, and David Lazer. 2009. Inferring friendship
network structure by using mobile phone data. Proceedings of the National
Academy of Sciences 106, 36 (2009), 15274 -- 15278. h(cid:138)ps://doi.org/10.1073/pnas.
0900282106 arXiv:h(cid:138)p://www.pnas.org/content/106/36/15274.full.pdf+html
[21] David Easley and Jon Kleinberg. 2010. Networks, crowds, and markets: Reasoning
about a highly connected world. Cambridge University Press.
[22] Richard P Feynman, Robert B Leighton, and Ma(cid:138)hew Sands. 2013. (cid:138)e Feynman
Lectures on Physics, Desktop Edition Volume I. Vol. 1. Basic books.
[23] Enrique Frias-Martinez, Graham Williamson, and Vanessa Frias-Martinez. 2011.
An agent-based model of epidemic spread using human mobility and social
network information. In Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE
(cid:138)ird Inernational Conference on Social Computing (SocialCom), 2011 IEEE (cid:138)ird
International Conference on. IEEE, 57 -- 64.
[24] Manuel Gomez Rodriguez, Jure Leskovec, and Andreas Krause. 2010. Inferring
networks of di(cid:130)usion and in(cid:131)uence. In Proceedings of the 16th ACM SIGKDD
international conference on Knowledge discovery and data mining. ACM, 1019 --
1028.
[19]
[25] Marta C Gonz´alez, C´esar A Hidalgo, and Albert-L´aszl´o Barab´asi. 2008. Under-
standing individual human mobility pa(cid:138)erns. Nature 453, 7196 (2008), 779 -- 782.
[26] Yih-Chun Hu and David B Johnson. 2000. Caching Strategies in On-demand
Routing Protocols for Wireless Ad Hoc Networks. In Proceedings of the 6th Annual
International Conference on Mobile Computing and Networking (MobiCom '00).
ACM, New York, NY, USA, 231 -- 242.
[27] Hubway. 2017. Boston Trip Histories. h(cid:138)ps://www.thehubway.com/system-data.
(2017).
[32]
Media.
[28] Chalermek Intanagonwiwat, Ramesh Govindan, and Deborah Estrin. 2000. Di-
rected di(cid:130)usion: A scalable and robust communication paradigm for sensor
networks. In Proceedings of the 6th annual international conference on Mobile
computing and networking. ACM, 56 -- 67.
[29] David B Johnson and David A Maltz. 1996. Dynamic Source Routing in Ad Hoc
Wireless Networks. In Mobile Computing. Springer, Boston, MA, 153 -- 181.
[30] David Kempe, Jon Kleinberg, and ´Eva Tardos. 2003. Maximizing the spread of
in(cid:131)uence through a social network. In Proceedings of the ninth ACM SIGKDD
international conference on Knowledge discovery and data mining. ACM, 137 -- 146.
[31] Harry Kesten and Vladas Sidoravicius. 2005. (cid:140)e spread of a rumor or infection
in a moving population. Annals of Probability (2005), 2402 -- 2462.
Jon Kleinberg. 2007. Computing: (cid:140)e wireless epidemic. Nature 449, 7160 (2007),
287 -- 288.
[33] Gregoyr Lawler. 2013. Intersections of random walks. Springer Science & Business
[34] K Lee, Y Kim, S Chong, I Rhee, and Y Yi. 2011. Delay-capacity tradeo(cid:130)s for
mobile networks with L´evy walks and L´evy (cid:131)ights. In 2011 Proceedings IEEE
INFOCOM. 3128 -- 3136.
Planet dump retrieved from
h(cid:138)ps://planet.osm.org . h(cid:138)ps://www.openstreetmap.org. (2017).
[35] OpenStreetMap contributors. 2017.
[36] Wei Peng and Xi-Cheng Lu. 2000. On the reduction of broadcast redundancy in
mobile ad hoc networks. In Proceedings of the 1st ACM international symposium
on Mobile ad hoc networking & computing. IEEE Press, 129 -- 130.
[37] C E Perkins, E M Royer, S R Das, and M K Marina. 2001. Performance comparison
of two on-demand routing protocols for ad hoc networks. IEEE Pers. Commun. 8,
1 (Feb. 2001), 16 -- 28.
[38] Alberto Pe(cid:138)arin, Andrea Pietracaprina, Geppino Pucci, and Eli Upfal. 2011. Tight
bounds on information dissemination in sparse mobile networks. In Proceedings
of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed
computing. ACM, 355 -- 362.
[39] E M Royer, P M Melliar-Smith, and L E Moser. 2001. An analysis of the optimum
node density for ad hoc mobile networks. In ICC 2001. IEEE International Confer-
ence on Communications. Conference Record (Cat. No.01CH37240), Vol. 3. 857 -- 861
vol.3.
[40] K Shinki, M Nishida, and N Hayashibara. 2017. Message Dissemination Using
L´evy Flight on Unit Disk Graphs. In 2017 IEEE 31st International Conference on
Advanced Information Networking and Applications (AINA). 355 -- 362.
[41] Michael F Shlesinger, Joseph Kla(cid:137)er, and Gert Zumofen. 1999. Above, below and
beyond Brownian motion. American Journal of Physics 67, 12 (1999), 1253 -- 1259.
[42] Chaoming Song, Zehui (cid:139), Nicholas Blumm, and Albert-Lszl Barabsi. 2010.
Limits of Predictability in Human Mobility. Science 327, 5968 (2010), 1018 -- 1021.
h(cid:138)ps://doi.org/10.1126/science.1177170
[43] G M Viswanathan, F Bartumeus, Sergey V. Buldyrev, J Catalan, U L Fulco, Shlomo
Havlin, M G E da Luz, M L Lyra, E P Raposo, and H Eugene Stanley. 2002. L´evy
(cid:131)ight random searches in biological phenomena. Physica A: Statistical Mechanics
and its Applications 314, 1 (Nov. 2002), 208 -- 213.
[44] S Wang, X Wang, X Cheng, J Huang, and R Bie. 2014. (cid:140)e Tempo-Spatial Infor-
mation Dissemination Properties of Mobile Opportunistic Networks with Levy
Mobility. In 2014 IEEE 34th International Conference on Distributed Computing
Systems. 124 -- 133.
J Yoon, M Liu, and B Noble. 2003. Random waypoint considered harmful. In IEEE
INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer
and Communications Societies (IEEE Cat. No.03CH37428), Vol. 2. 1312 -- 1321 vol.2.
[46] Dengpan Zhou and Jie Gao. 2009. Opportunistic Processing and (cid:139)ery of Motion
Trajectories in Wireless Sensor Networks. In Proceedings of the 28th Annual IEEE
Conference on Computer Communications (INFOCOM'09). 1197 -- 1205.
[45]
10
|
1701.05108 | 1 | 1701 | 2017-01-18T15:36:46 | On the Computational Complexity of Variants of Combinatorial Voter Control in Elections | [
"cs.MA"
] | Voter control problems model situations in which an external agent tries toaffect the result of an election by adding or deleting the fewest number of voters. The goal of the agent is to make a specific candidate either win (\emph{constructive} control) or lose (\emph{destructive} control) the election. We study the constructive and destructive voter control problems whenadding and deleting voters have a \emph{combinatorial flavor}: If we add (resp.\ delete) a voter~$v$, we also add (resp.\ delete) a bundle~$\kappa(v) $ of voters that are associated with~$v$. While the bundle~$\kappa(v)$ may have more than one voter, a voter may also be associated with more than one voter. We analyze the computational complexity of the four voter control problems for the Plurality rule. We obtain that, in general, making a candidate lose is computationally easier than making her win. In particular, if the bundling relation is symmetric (i.e.\ $\forall w\colon w \in \kappa(v) \Leftrightarrow v \in \kappa(w) $), and if each voter has at most two voters associated with him, then destructive control is polynomial-time solvable while the constructive variant remains $\NP$-hard. Even if the bundles are disjoint (i.e.\ $\forall w\colon w \in \kappa(v) \Leftrightarrow \kappa(v) = \kappa(w) $), the constructive problem variants remain intractable. Finally, the minimization variant of constructive control by adding voters does not admit an efficient approximation algorithm, unless P=NP. | cs.MA | cs | On the Computational Complexity of Variants of
Combinatorial Voter Control in Elections
Leon Kellerhals, Viatcheslav Korenwein, Philipp Zschoche⋆,
Robert Bredereck⋆⋆, and Jiehua Chen
{leon.kellerhals, viatcheslav.korenwein, zschoche}@campus.tu-berlin.de
{robert.bredereck, jiehua.chen}@tu-berlin.de
TU Berlin, Germany
Abstract. Voter control problems model situations in which an external
agent tries to affect the result of an election by adding or deleting the
fewest number of voters. The goal of the agent is to make a specific
candidate either win (constructive control) or lose (destructive control)
the election. We study the constructive and destructive voter control
problems when adding and deleting voters have a combinatorial flavor:
If we add (resp. delete) a voter v, we also add (resp. delete) a bundle κ(v)
of voters that are associated with v. While the bundle κ(v) may have
more than one voter, a voter may also be associated with more than one
voter. We analyze the computational complexity of the four voter control
problems for the Plurality rule.
We obtain that, in general, making a candidate lose is computationally
easier than making her win. In particular, if the bundling relation is sym-
metric (i.e. ∀w : w ∈ κ(v) ⇔ v ∈ κ(w)), and if each voter has at most
two voters associated with him, then destructive control is polynomial-
time solvable while the constructive variant remains NP-hard. Even if the
bundles are disjoint (i.e. ∀w : w ∈ κ(v) ⇔ κ(v) = κ(w)), the constructive
problem variants remain intractable. Finally, the minimization variant
of constructive control by adding voters does not admit an efficient ap-
proximation algorithm, unless P = NP.
1 Introduction
Since the seminal paper by Bartholdi III et al. [3] on controlling an elec-
tion by adding or deleting the fewest number of voters or candidates with
the goal of making a specific candidate to win (constructive control), a lot
of research has been devoted to the study of control for different voting
rules [16, 14, 24, 23, 4, 21], on different control modes [17, 18], or even
on other controlling goals (e.g. aiming at several candidates' victory or a
⋆ PZ was supported by the Stiftung Begabtenförderung berufliche Bildung (SBB).
⋆⋆ RB was from September 2016 to September 2017 on postdoctoral leave at the Uni-
versity of Oxford (GB), supported by the DFG fellowship BR 5207/2.
7
1
0
2
n
a
J
8
1
]
A
M
.
s
c
[
1
v
8
0
1
5
0
.
1
0
7
1
:
v
i
X
r
a
specific candidate's defeat) [20, 26]. Recently, Bulteau et al. [8] introduced
combinatorial structures to constructive control by adding voters: When a
voter is added, a bundle of other voters is added as well. A combinatorial
structure of the voter set allows us to model situations where an external
agent hires speakers to convince whole groups of people to participate in
(or abstain from) an election. In such a scenario, convincing a whole group
of voters comes at the fixed cost of paying a speaker. Bulteau et al. [8]
model this by defining a bundle of associated voters for each voter which
will be convinced to vote "for free" when this voter is added or deleted.
Moreover, the bundles of different voters could overlap. For instance, con-
vincing two bundles of two voters each to participate in the election could
result in adding a total of four, three or even just two voters.
We extend the work of Bulteau et al. [8] and investigate the cases
where the agent wants to make a specific candidate win or lose by adding
(resp. deleting) the fewest number of bundles. We study one of the simplest
voting rules, the Plurality rule, where each voter gives one point to his
favorite candidate, and the candidate with most points becomes a winner.
Accordingly, an election consists of a set C of candidates and a set V of
voters who each have a favorite candidate. Since real world elections typ-
ically contain only a small number of candidates, and a bundle of voters
may correspond to a family with just a few members, we are especially
interested in situations where the election has only few candidates and the
bundle of each voter is small. Our goal is to ensure that a specific candidate
p becomes a winner (or a loser) of a given election, by convincing as few
voters from an unregistered voter set W as possible (or as few voters from
V as possible), together with the voters in their bundles, to participate
(or not to participate) in the election. We study the combinatorial voter
control problems from both the classical and the parameterized complex-
ity point of view. We confirm Bulteau et al.'s conjecture [8] that for the
Plurality rule, the three problem variants: combinatorial constructive con-
trol by deleting voters and combinatorial destructive control by adding
(resp. deleting) voters, behave similarly in complexity to the results of
combinatorial constructive control by adding voters: They are NP-hard
and intractable even for very restricted cases. We can also identify several
special cases, where the complexity of the four problems behave differently.
For instance, we find that constructive control tends to be computationally
harder than destructive control. We summarize our results in Table 1.
Related Work. Bartholdi III et al. [3] introduced the complexity study
of election control problems and showed that for the Plurality rule, the
non-combinatorial variant of the voter control problems can be solved in
2
linear time by a using simple greedy strategy. We refer the readers to the
work by Rothe and Schend [27], Faliszewski and Rothe [15] for general
expositions on election control problems.
In the original election control setting, a unit modification of the elec-
tion concerns usually a single voter or candidate. The idea of adding com-
binatorial structure to election voter control was initiated by Bulteau et al.
[8]: Instead of adding a voter at each time, one adds a "bundle" of vot-
ers to the election, and the bundles added to the election could intersect
with each other. They showed that combinatorial constructive control by
adding the fewest number of bundles becomes notorious hard, even for the
Plurality rule and for only two candidates. Chen [9] mentioned that even
if each bundle has only two voters and the underlying bundling graph is
acyclic, the problem still remains NP-hard. Bulteau et al. [8] and Chen [9]
conjectured that
"the combinatorial addition of voters for destructive control, and
combinatorial deletion of voters for either constructive or destruc-
tive control behave similarly to combinatorial addition of voters
for constructive control."
The combinatorial structure notion for voter control has also been
extended to candidate control [10] and electoral shift bribery [7].
Paper Outline. In Section 2, we introduce the notation used through-
out the paper. In Section 3 we formally define the four problem variants,
summarize our contributions, present results in which the four problem
variants (constructive or destructive, adding voters or deleting voters) be-
have similarly, and provide reductions between the problem variants. Sec-
tions 4 to 6 present our main results on three special cases (1) when the
bundles and the number of candidates are small, (2) when the bundles are
disjoint, and (3) when the solution size could be unlimited. We conclude
in Section 7 with several future research directions.
2 Preliminaries
The notation we use in this paper is based on Bulteau et al. [8]. We assume
familiarity with standard notions regarding algorithms and complexity
theory. For each z ∈ N we denote by [z] the set {1, . . . , z}.
Elections. An election E = (C, V ) consists of a set C of m candidates
and a set V of voters. Each voter v ∈ V has a favorite candidate c and we
call voter v a c-voter. Note that since we focus on the Plurality rule, we
simplify the notion of the preferences of voters in an election to the favorite
3
candidate of each voter. For each candidate c ∈ C and each subset V ′ ⊆ V
of voters, her (Plurality) score sc(V ′) is defined as the number of voters
from V ′ that have her as favorite candidate. We say that a candidate c is
a winner of election (C, V ) if c has the highest score sc(V ). For the sake
of convenience, for each C ′ ⊆ C, a C ′-voter denotes a voter whose favorite
candidate belongs to C ′.
Combinatorial Bundling Functions. Given a voter set X, a combina-
torial bundling function κ : X → 2X (abbreviated as bundling function)
is a function that assigns a set of voters to each voter; we require that
x ∈ κ(x). For the sake of convenience, for each subset X ′ ⊆ X, we define
κ(X ′) = Sx∈X ′ κ(x). For a voter x ∈ X, κ(x) is named x's bundle; x is
called the leader of the bundle. We let b denote the maximum bundle size
of a given κ. Formally, b = maxx∈X κ(x). One can think of the bundling
function as subsets of voters that can be added at a unit cost (e.g. κ(x)
is a group of voters influenced by x).
Bundling graphs. The bundling graph of an election is a model of how
the voter's bundle functions interact with each other.
Let κ : X → 2X be a bundling function. The bundling graph Gκ =
(V (Gκ), E(Gκ)) is a simple, directed graph: For each voter x ∈ X there is
a vertex ux ∈ V (Gκ). For each two distinct voters y, z ∈ X with z ∈ κ(y),
there is an arc (uy, uz) ∈ E(Gκ).
We consider three special cases of bundling functions/graphs which
we think are natural in real world. We say that a bundling function κ is
symmetric if for each two distinct voters x, y ∈ X, it holds that y ∈ κ(x)
if and only if x ∈ κ(y). The bundling graph for a symmetric bundling
function always has two directed arcs connecting each two vertices. Thus,
we can assume the graph to be undirected.
We say that κ is disjoint if for each two distinct voters x, y ∈ X, it
holds that either κ(x) = κ(y) or κ(x) ∩ κ(y) = ∅. It is an easy exercise
to verify that disjoint bundling functions are symmetric and the corre-
sponding undirected bundling graphs consist only of disjoint complete
subgraphs.
We say that κ is anonymous if for each two distinct voters x and y
with the same favorite candidate, it holds that κ(x) = κ(y), and that for
all other voters z we have x ∈ κ(z) if and only if y ∈ κ(z).
Parameterized Complexity. An instance (I, r) of a parameterized prob-
lem consists of the actual instance I and of an integer r referred to as the
parameter [13, 19, 25]. A parameterized problem is called fixed-parameter
tractable (in FPT) if there is an algorithm that solves each instance (I, r)
4
in f (r) · IO(1) time, where f is a computable function depending only on
the parameter r.
There is also a hierarchy of hardness classes for parameterized prob-
lems, of which the most important ones are W[1] and W[2]. One can show
that a parameterized problem L is (presumably) not in FPT by devis-
ing a parameterized reduction from a W[1]-hard or a W[2]-hard problem
to L. A parameterized reduction from a parameterized problem L to an-
other parameterized problem L′ is a function that acts as follows: For two
computable functions f and g, given an instance (I, r) of problem L, it
computes in f (r) · IO(1) time an instance (I ′, r′) of problem L′ so that
r′ ≤ g(r) and that (I, r) ∈ L if and only if (I ′, r′) ∈ L′. For a survey of
research on parameterized complexity in computational social choice, we
refer to Betzler et al. [5] and Bredereck et al. [6].
3 Central Problem
We consider the problem of combinatorial voter control in four variants.
The variants differ in whether they are constructive or destructive, mean-
ing that the goal is to make one selected candidate win or lose the election.
This goal can be achieved by either adding voters to or deleting voters from
the given election. Due to space constraints, we only provide the definition
of constructive control. Destructive control is defined analogously.
Combinatorial Constructive Control by Adding
(resp. Deleting) Voters [C-Cons-Add (resp. C-Cons-Del)]
Input: An election E = (C, V ), a set W of unregistered voters with
V ∩ W = ∅, a bundling function κ : W → 2W (resp. κ : V → 2V ),
a preferred winner p ∈ C, and an integer k ∈ N.
Quest.: Is there a size-at-most k subset W ′ ⊆ W (resp. V ′ ⊆ V ) of
voters such that p wins the election (C, V ∪ κ(W ′)) (resp. (C, V \
κ(V ′)))?
Throughout this work, when speaking of the "adding" or "deleting"
variants, we mean those variants in which voters are added or, respectively,
deleted. In similar fashion, we speak of the constructive and destructive
(abbr. by "Cons" and by "Des", respectively) problem variants. Further,
we refer to the set W ′ of voters as the solution for the "adding" variants
(the set V ′ of voters for the "deleting" variants, respectively) and denote
k as the solution size.
Our Contributions. We study both the classical and the parameterized
complexity of the four voter control variants. We are particularly inter-
ested in the real-world setting where the given election has a small number
5
Table 1: Computational complexity of the four combinatorial voter con-
trol variants with the Plurality rule. The parameters are "the solution size
k", "the number m of candidates" and "the maximum bundle size b". We
refer to I as the instance size. The rows distinguish between different
maximum bundle sizes b and the number m of candidates. All parameter-
ized intractability results are for the parameter "solution size k". ILP-FPT
means FPT based on a formulation as an integer linear program and the
result is for the parameter "number m of candidates".
C-Cons-Add C-Cons-Del C-Des-Add C-Des-Del References
κ symmetric
b = 2
b = 3
m = 2
O(I)
P
O(mI)
O(mI)
O(I5)
O(I5)
O(I5)
O(I5)
m unbounded
NP-h
NP-h
O(mI5)
O(mI5)
Obs 2, Thm 3
Thm 5
Thm 2,
Cor 1+2
Obs 1, Prop 2,
Cor 2
b unbounded
m = 2
m unbounded and
W[2]-h
W[2]-h
W[2]-h
W[2]-h
[8], Thm 1
κ disjoint
W[1]-h
W[2]-h
O(mI)
O(mI)
Thm 4+5
κ anonymous
ILP-FPT
ILP-FPT
ILP-FPT
ILP-FPT
Thm 1
κ arbitrary
b = 3, m = 2
W[1]-h
W[1]-h
W[1]-h
W[1]-h
Thm 1
of candidates and where only a few voters are associated to a voter. On the
one hand, we were able to confirm the conjecture given by Bulteau et al. [8]
and Chen [9] that when parameterized by the solution size, C-Cons-Del,
C-Des-Add, and C-Des-Del are all intractable even for just two candi-
dates or for bundle sizes of at most three, and that when parameterized by
the number of candidates, they are fixed-parameter tractable for anony-
mous bundling functions. On the other hand, we identify interesting spe-
cial cases where the four problems differ in their computational complexity.
We conclude that in general, destructive control tends to be easier than
constructive control: For symmetric bundles with at most three voters,
C-Cons-Add is known to be NP-hard, while both destructive problem
variants are polynomial-time solvable. For disjoint bundles, constructive
control is parameterized intractable (for the parameter "solution size k"),
while destructive control is polynomial-time solvable. Unlike for C-Cons-
Del, a polynomial-time approximation algorithm for C-Cons-Add does
not exist, unless P = NP. Our results are gathered in Table 1.
6
The following theorem summarizes the conjecture given by Bulteau
et al. [8] and Chen [9]. The proofs are deferred to Appendices A.1 to A.3.
Theorem 1. All four combinatorial voter control variants are
(i) W[2]-hard with respect to the solution size k, even for only two can-
didates and for symmetric bundling functions κ
(ii) W[1]-hard with respect to the solution size k, even for only two can-
didates and for bundle sizes of at most three.
(iii) fixed-parameter tractable with respect to the number m of candidates
if the bundling function κ is anonymous.
Relations between the four problem variants. We provide some re-
ductions between the problem variants. They are used in several sections
of this paper. The key idea for the reduction from destructive control to
constructive control is to guess the candidate that will defeat the distin-
guished candidate and ask whether one can make this candidate win the
election. The key idea for the reduction from the "deleting" to the "adding"
problem variants is to build the "complement" of the registered voter set.
Proposition 1. For each X ∈ {Add, Del}, C-Des-X with m candi-
dates is Turing reducible to C-Cons-X with two candidates. For each
Y ∈ {Cons, Des}, C-Y -Del with two candidates is many-one reducible
to C-Y -Add with two candidates. All these reductions preserve the prop-
erty of symmetry of the bundling functions.
4 Controlling Voters with Symmetric and Small Bundles
In this section, we study combinatorial voter control when the voter bun-
dles are symmetric and small. This could be the case when a voter's bun-
dle models his close friends (including himself), close relatives, or office
mates. Typically, this kind of relations is symmetric, and the number of
friends, relatives, or office mates is small. We show that for symmetric
bundles and for bundles size at most three, both destructive problem vari-
ants become polynomial-time solvable, while both constructive variants
remain NP-hard. However, if there are only two candidates, then we can
use dynamic programming to also solve the constructive control variants
in polynomial time. If we restrict the bundle size to be at most two, then
all four problem variants can be solved in polynomial time via simple
greedy algorithms.
7
As already observed in Section 2, we only need to consider the undi-
rected version of the bundling graph for symmetric bundles. Moreover, if
the bundle size is at most two, then the resulting bundling graph consists
of only cycles and trees. However, Bulteau et al. [8] already observed that
C-Cons-Add is NP-hard even if the resulting bundling graph solely con-
sists of cycles, and Chen [9] observed that C-Cons-Add remains NP-hard
even if the resulting bundling graph consists of only directed trees of depth
at most three.
Observation 1. C-Cons-Add is NP-hard even for symmetric bundling
functions with maximum bundle size b = 3.
It turns out that the reduction used by Bulteau et al. [8] to show
Observation 1 can be adapted to show NP-hardness for the deleting case.
Proposition 2. C-Cons-Del is NP-hard even for symmetric bundling
functions with maximum bundle size b = 3.
If, in addition to the bundles being symmetric and of size at most
three, we have only two candidates, then we can solve C-Cons-Add in
polynomial time. First of all, due to these constraints, we can assume
that the bundling graph Gκ is undirected and consists of only cycles and
paths. Then, it is easy to verify that we can consider each cycle and each
path separately. Finally, we devise a dynamic program for the case when
the bundling graph is a path or a cycle, maximizing the score difference
between our preferred candidate p and the other candidate. The crucial
idea behind the dynamic program is that the bundles of a minimum-size
solution induce a subgraph where each connected component is small.
Lemma 1. Let (E = (C, V ), W, κ, p, k) be a C-Cons-Add instance such
that C = {p, g}, and κ is symmetric with Gκ being a path. Then, finding
a size-at-most-k subset W ′ ⊆ W of voters such that the score difference
between p and q in κ(W ′) is maximum can be solved in O(W 5) time,
where W is the size of the unregistered voter set W .
Proof. Since Gκ is a path, each bundle has at most three voters. We denote
the path in Gκ by (w1, w2, . . . , wW ) and introduce some definitions for
this proof. The set W (s, t) := {wi ∈ W s ≤ i ≤ t} contains all voters on
a sequence from ws to wt. For every subset W ′ ⊆ W we define gap(W ′) :=
sp(κ(W ′)) − sg(κ(W ′)) as the score difference between p and g. One can
observe that if W ′ is a solution for (E = (C, V ), W, κ, p, k) then gap(W ′) ≥
sg(V ) − sp(V ); note that we only have two candidates. An (s, t)-proper-
subset W ′ is a subset of W (s, t) such that κ(W ′) ⊆ W (s, t). A maximum
8
(s, t)-proper-subset W ′ additionally requires that each (s, t)-proper-subset
W ′′ ⊆ W with W ′′ = W ′ has gap(W ′′) ≤ gap(W ′).
We provide a dynamic program in which a table entry T [r, s, t] contains
a maximum (s, t)-proper-subset W ′ of size r. We first initialize the table
entries for the case where t − s + 1 ≤ 9 and r ≤ 9 in linear time.
For t − s + 1 > 9, we compute the table entry T [r, s, t] by considering
every possible partition of W (s, t) into two disjoint parts.
T [r, s, t] := T [r − i, s, s + j] ∪ T [i, s + j + 1, t],
where i, j = arg max
gap(T [r − i, s, s + j]) + gap(T [i, s + j + 1, t]).
0≤i≤r
0≤j≤t−s−2
Note that a maximum (1, W )-proper-subset W ′ of size r − 1 could have
a higher gap than a maximum (1, W )-proper-subset W ′′ of size r.
To show the correctness of our program, we define the maximization
and minimization function on a set of voters W ′, which return the largest
and smallest index of all voters on the path induced by W ′, respectively:
max(W ′) := arg max
i∈W ′
{wi ∈ (W ′)} and min(W ′) := arg min
i∈W ′
{wi ∈ (W ′)}.
First, we use the following claim to show that each maximum (s, t)-proper-
subset W ′ can be partitioned into two (s, t)-proper-subsets W1, W2 such
that the two sets κ(W1) and κ(W2) are disjoint. (The formal proof of the
following claim can be found in the Appendix.)
Claim 1. Let W ′ be a maximum (s, t)-proper-subset and (max κ(W ′) −
min κ(W ′)+ 1) > 9. Then, there is a j with s < j < t such that there is an
(s, j)-proper-subset W1 and a (j+1, t)-proper-subset W2 with W1+W2 ≤
W ′ and κ(W1 ∪ W2) = κ(W ′).
Now, we show that the two subsets W1 and W2 from Claim 1 are indeed
optimal: There is a j such that W1 is a maximum (s, j)-proper-subset and
W2 is a maximum (j + 1, t)-proper-subset.
Assume towards a contradiction that W2 is a (j + 1, t)-proper-subset
but not a maximum (j + 1, t)-proper-subset. Therefore, there exists a
maximum (j+1, t)-proper-subset W ′
2. This implies that
gap(W1 ∪ W ′
2) > gap(W1 ∪ W2). This is a contradiction to W ′ = W1 ∪ W2
being a maximum (s, t)-proper-subset. The case in which W1 is not a
maximum (s, j)-proper-subset is analogous.
2 where W2 = W ′
Altogether, we have shown that we can compute T [k, s, t] in constant
time if t − s + 1 ≤ 9, and that otherwise there exist an i and a j such
9
that T [k, s, t] = T [k − i, s, t − j] ∪ T [i, t − j + 1, t]. The dynamic program
considers all possible i and j. The table entry T [i, 1, W ] contains a subset
W ′ ⊆ W of size i with maximum gap such that κ(W ′) ⊆ W (1, W ), which
is identical to κ(W ′) ⊆ W .
This completes the correctness proof of our dynamic program. The ta-
ble has O(k ·W 2) entries. To compute one entry the dynamic program ac-
cesses O(k · W ) other table entries. Note that the value gap(T [i, s, t]) can
be computed and stored after the entry T [i, s, t] is computed. This takes
at most O(W ) steps. Thus, the dynamic program runs in O(W 5) time.
⊓⊔
The dynamic program can be used to solve the same problem on cycles.
Altogether, we obtain the following.
Theorem 2. C-Cons-Add with a symmetric bundling function, maxi-
mum bundle size of three, and for two candidates can be solved in O(W 5)
time, where W is the size of the unregistered voter set.
Proof. Let (E = (C, V ), W, κ, p, k) be a C-Cons-Add instance, where
the maximum bundle size b is three, κ is symmetric, and C = {p, g}. This
means that all connected components C1, . . . , Cℓ of Gκ are path or cycles.
Furthermore, all bundles only contain voters from one connected compo-
nent. We define a dynamic program in which each table entry A[i, s, t]
contains a solution W ′ ⊆ W of size i, where κ(W ′) ⊆ V (Cs) ∪ · · · ∪ V (Ct)
and 1 ≤ s ≤ t ≤ ℓ:
(i) If s = t = j, then A[i, s, t] = T [i, 1, V (Cj)], where T is the dynamic
program of Cj, depending on whether Cj is a path or cycle.
(ii) Otherwise, we build the table as follows:
A[d, s, t] = A[d − i, s, s + j] ∪ A[i, s + j + 1, t], where
i, j = arg max
gap(A[d − i, s, s + j]) + gap(A[i, s + j + 1, t]).
0≤i≤d
1≤j≤t−s−1
Each of the table entries A[i, j, j] can be computed in O(i2 ·V (Cj)3) time
(see Lemmas 1 and B.1) and each of the table entries A[i, s, t] for s < t
can be computed in O(k · ℓ) time. Since we have k · ℓ2 entries, the total
running time is
Pℓ
i=1 O(k2 · V (Cj)3) = O(k2)Pℓ
i=1 O(V (Ci)) = O(k2 · W 3).
⊓⊔
From the polynomial-time solvability of Theorem 2 and by Proposi-
tion 1, we obtain the following results:
Corollary 1. C-Cons-Del with a symmetric bundling function, a max-
imum bundle size of three and two candidates can be solved in O(V 5)
time, where V is the size of the voters.
10
Corollary 2. C-Des-Add and C-Des-Del with a symmetric bundling
function and maximum bundle size three can be solved in time O(m · W 5)
and O(m · V 5), respectively, where m is the number of candidates, and
W and V are the sizes of the unregistered and registered voter set, re-
spectively.
5 Controlling Voters with Disjoint Bundles
We have seen in Section 4 that the interaction between the bundles in-
fluences the computational complexity of our combinatorial voter control
problems. For instance, adding a voter v to the election may lead to adding
another voter v′ with v ∈ κ(v). This is crucial for the reductions used to
prove Theorem 1 and Observation 1. Thus, it would be interesting to know
whether the problem becomes tractable if it is not necessary to add two
bundles that share some voter(s). More specifically, we are interested in
the case where the bundles are disjoint, meaning that we do not need to
consider every single voter, but only the bundles as a whole, as it does
not matter which voters of a bundle we select.
First, we consider disjoint bundles of size at most two. This is the case
for voters who have a partner. If a voter is convinced to participate in or
leaves the election, then the partner is convinced to do the same. Note
that this is equivalent to having symmetric bundles of size at most two.
Bulteau et al. [8, Theorem 6] constructed a linear-time algorithm for C-
Cons-Add if the maximum bundle size is two and κ is a full-d bundling
function (which implies symmetry). We can verify that their algorithm
actually works for disjoint bundles of size at most two. Thus, we obtain
the following.
Observation 2. C-Cons-Add with a symmetric bundling function and
with bundles of size at most two can be solved in O(I) time, where I is
the input size.
If we want to delete instead of add voter bundles, the problem reduces
to finding a special variant of the f -Factor problem, which is a gener-
alization of the well-known matching problem and can still be solved in
polynomial time [1, 2].
Theorem 3. C-Cons-Del with a symmetric bundling function and with
bundles of size at most two can be solved in polynomial time.
If we drop the restriction on the bundle sizes but still require the
bundles to be disjoint, then C-Cons-Add and C-Cons-Del become pa-
rameterized intractable with respect to the solution size.
11
Theorem 4. Parameterized by the solution size k, C-Cons-Add and C-
Cons-Del are W[1]-hard and W[2]-hard respectively, even for disjoint
bundles.
Proof (with only the construction for the W[1]-hardness proof of C-Cons-
Add). We provide a parameterized reduction from the W[1]-complete
problem Independent Set (parameterized by the "solution size") which,
given an undirected graph G = (V (G), E(G)) and a natural number h ∈ N,
asks whether G admits a size-h independent set U ⊆ V (G), that is, all ver-
tices in U are pairwise non-adjacent. Let (G, h) be an Independent Set
instance with E(G) = {e1, . . . , em−1} and V (G) = {u1, . . . , un}. Without
loss of generality, we assume that G is connected and h ≥ 3. We construct
an election E = (C, V ) with candidate set C := {p} ∪ {gj ej ∈ E(G)}.
For each edge ej ∈ E, we construct h − 1 registered voters that all have gj
as their favorite candidate. In total, V consists of (h − 1) · (m − 1) voters.
The unregistered voter set W is constructed as follows: For each ver-
tex ui ∈ V (G), add a p-voter pi, and for each edge ej incident with ui,
add a gj-voter a(i)
j . The voters constructed for each vertex ui are bundled
by the bundling function κ. More formally, for each ui ∈ V (G) and each
ej ∈ E(G) with ui ∈ ej, it holds that
κ(pi) = κ(a(i)
j ) := {pi} ∪ {a(i)
j ′
ej ′ ∈ E(G) ∧ ui ∈ ej ′}.
To finalize the construction, we set k := h. The construction is both
a polynomial-time and a parameterized reduction, and all bundles are
disjoint. To show the correctness, we note that p can only win if only if
her score can be increased to at least h without giving any other candidate
more than one more point. The solution corresponds to exactly to a subset
of h vertices that are pairwise non-adjacent. The detailed correctness proof
and the remaining proof for the W[2]-hardness result can be found in the
⊓⊔
Appendix.
For destructive control, it is sufficient to guess a potential defeater d
out of m − 1 possible candidates that will have a higher score than p in
the final election and use a greedy strategy similar to the one used for
Observation 2 to obtain the following result.
Theorem 5. C-Des-Add and C-Des-Del with a symmetric bundling
function and disjoint bundles can be solved in O(m · I) time, where I
is the input size and m the number of candidates.
12
6 Controlling Voters with Unlimited Budget
To analyze election control, it is interesting to know whether a solution
exist at all, without bounding its size. Indeed, Bartholdi III et al. [3] al-
ready considered the case of unlimited solution size for the constructive
candidate control problem. They showed that the problem is already NP-
hard, even if the solution size is not bounded. (The non-combinatorial
destructive control by adding unlimited amount of candidates is shown
to be also NP-hard by Hemaspaandra et al. [20].) In contrast, the non-
combinatorial voter control variants are linear-time solvable via simple
greedy algorithms [3]. This leads to the question whether the combi-
natorial structure increases the complexity. To this end, we relax the
four problem variants so that the solution can be of arbitrary size and
call these problems C-Cons-Add-Unlim, C-Des-Add-Unlim, C-Cons-
Del-Unlim and C-Des-Del-Unlim.
First of all, we observe that C-Cons-Del-Unlim becomes trivial if
no unique winner is required.
Lemma 2. Let I = (E = (C, V ), κ, p) be a C-Cons-Del-Unlim in-
stance. Then I is a yes-instance.
If we consider a voting rule R that only returns unique winners, then
C-Des-Del-Unlim also becomes tractable since we only need to delete
all voters.
For the constructive adding voters case, we obtain NP-hardness. The
idea for the reduction derives from the W[1]-hardness proof of C-Cons-
Add shown by Bulteau et al. [8].
Lemma 3. C-Cons-Add-Unlim is NP-hard.
Lemma 3 immediately implies the following inapproximability result
for the optimization variant of C-Cons-Add (denoted as Min-C-Cons-
Add), aiming at minimizing the solution size.
Theorem 6. There is no polynomial-time approximation algorithm for
Min-C-Cons-Add, unless P = NP.
7 Conclusion
We extend the study of combinatorial voter control problems introduced
by Bulteau et al. [8] and obtain that the destructive control variants tend
to be computationally easier than their constructive cousins.
13
Our research leads to several open questions and further research op-
portunities. First, we have shown hardness results for the adding candidate
case: if the bundling function consists of disjoint cliques, then parameter-
ized by the solution size, C-Cons-Add is W[1]-hard and C-Des-Add is
W[2]-hard. If one could also determine the complexity upper bound, that
is, under the given restrictions, if C-Cons-Add would be contained in
W[1], then this would yield another difference in complexity between the
destructive and the constructive variants. This also leads to the question
whether the problem variants in their general setting are not only W[2]-
hard, but W[2]-complete.
Second, we have only shown that Min-C-Cons-Add is inapproximable
and Min-C-Des-Del is trivially polynomial-time solvable. For the other
two problem variants, we do not know whether they can be approximated
efficiently or not.
Another open question is whether there are FPT-results for any natural
combined parameters. As a starting point, we conjecture that all problem
variants can be formulated as a monadic second-order logic formula with
length of at most f (k, b, m) (where k is the solution size, b is the maxi-
mum bundle size, m is the number of candidates, and f is a computable
function). Courcelle and Engelfriet [11] showed that every graph problem
expressible as a monadic second-order logic formula ρ can be solved in
g(ρ, ω) · I time, where ω is the treewidth of the input graph and I is
the input size. Our conjecture would provide us with a fixed-parameter
tractability result with respect to the solution size, the maximum bun-
dle size, the number of candidates, and the treewidth of our bundling
graph Gκ.
We have studied the Plurality rule exclusively. Thus it is still open
which of our results also hold for other voting rules, especially for the
Condorcet rule. Since with two candidates, the Condorcet rule is equiva-
lent to the strict majority rule, we can easily adapt some of our results
to work for the Condorcet rule as well. Other results (i.e., the Turing
reductions) cannot be easily adapted to work for the Condorcet rule.
References
1. R. P. Anstee. An algorithmic proof of Tutte's f -factor theorem. Journal of Algo-
rithms, 6(1):112–131, 1985. 11
2. R. P. Anstee. Minimum vertex weighted deficiency of (g, f )-factors: A greedy
algorithm. Discrete Applied Mathematics, 44(1–3):247–260, 1993. 11, 33
3. J. J. Bartholdi III, C. A. Tovey, and M. A. Trick. How hard is it to control an
election? Mathematical and Computer Modelling, 16(8-9):27–40, 1992. 1, 2, 13
14
4. N. Betzler and J. Uhlmann. Parameterized complexity of candidate control in
elections and related digraph problems. Theoretical Computer Science, 410(52):
43–53, 2009. 1
5. N. Betzler, R. Bredereck, J. Chen, and R. Niedermeier. Studies in computational
aspects of voting. In The Multivariate Algorithmic Revolution and Beyond, pages
318–363. Springer, 2012. 5
6. R. Bredereck, J. Chen, P. Faliszewski, J. Guo, R. Niedermeier, and G. J. Woeg-
inger. Parameterized algorithmics for computational social choice: Nine research
challenges. Tsinghua Science and Technology, 19(4):358–373, 2014. 5
7. R. Bredereck, P. Faliszewski, R. Niedermeier, and N. Talmon. Large-scale election
campaigns: Combinatorial shift bribery. Journal of Artificial Intelligence Research,
55:603–652, 2016. 3
8. L. Bulteau, J. Chen, P. Faliszewski, R. Niedermeier, and N. Talmon. Combinatorial
voter control in elections. Theoretical Computer Science, 589:99–120, 2015. 2, 3,
6, 7, 8, 11, 13, 17, 19, 21, 26, 27, 36, 37
9. J. Chen. Exploiting Structure in Computationally Hard Voting Problems. PhD
thesis, Technische Universität Berlin, 2015. 3, 6, 7, 8
10. J. Chen, P. Faliszewski, R. Niedermeier, and N. Talmon. Elections with few voters:
Candidate control can be easy. In AAAI '15, pages 2045–2051, 2015. 3
11. B. Courcelle and J. Engelfriet. Graph structure and monadic second-order logic: A
language-theoretic approach, volume 138. Cambridge University Press, 2012. 14
12. M. J. A. N. C. de Condorcet. Essai sur l'application de l'analyse a la probilite des
decisions rendues a la pluralite dex voix, 1785. 17
13. R. G. Downey and M. R. Fellows. Fundamentals of Parameterized Complexity.
Springer, 2013. 4
14. G. Erdélyi, M. R. Fellows, J. Rothe, and L. Schend. Control complexity in Buck-
lin and fallback voting: A theoretical analysis. Journal of Computer and System
Sciences, 81(4):632–660, 2015. 1
15. P. Faliszewski and J. Rothe. Control and bribery in voting.
In F. Brandt,
V. Conitzer, U. Endriss, J. Lang, and A. D. Procaccia, editors, Handbook of Com-
putational Social Choice, chapter 7. Cambridge University Press, 2016. 3
16. P. Faliszewski, E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. Llull and
Copeland voting computationally resist bribery and constructive control. Journal
of Artificial Intelligence Research, 35:275–341, 2009. 1
17. P. Faliszewski, E. Hemaspaandra, and L. Hemaspaandra. Multimode control at-
tacks on elections. Journal of Artificial Intelligence Research, 40:305–351, 2011.
1
18. P. Faliszewski, E. Hemaspaandra, and L. A. Hemaspaandra. Weighted electoral
control. Journal of Artificial Intelligence Research, 52:507–542, 2015. 1
19. J. Flum and M. Grohe. Parameterized Complexity Theory. Springer, 2006. 4
20. E. Hemaspaandra, L. A. Hemaspaandra, and J. Rothe. Anyone but him: The
complexity of precluding an alternative. Artificial Intelligence, 171(5):255–285,
2007. 2, 13
21. L. A. Hemaspaandra, R. Lavaee, and C. Menton. Schulze and ranked-pairs vot-
ing are fixed-parameter tractable to bribe, manipulate, and control. Annals of
Mathematics and Artificial Intelligence, 77(3-4):191–223, 2016. 1
22. H. W. Lenstra Jr. Integer programming with a fixed number of variables. Mathe-
matics of operations research, 8(4):538–548, 1983. 21, 23
23. H. Liu and D. Zhu. Parameterized complexity of control problems in Maximin
election. Information Processing Letters, 110(10):383–388, 2010. 1
15
24. H. Liu, H. Feng, D. Zhu, and J. Luan. Parameterized computational complexity
of control problems in voting systems. Theoretical Computer Science, 410(27–29):
2746–2753, 2009. 1
25. R. Niedermeier.
Invitation to Fixed-Parameter Algorithms. Oxford University
Press, 2006. 4
26. A. D. Procaccia, J. S. Rosenschein, and A. Zohar. Multi-winner elections: Com-
plexity of manipulation, control and winner-determination. In IJCAI '07, pages
1476–1481, 2007. 2
27. J. Rothe and L. Schend. Challenges to complexity shields that are supposed to pro-
tect elections against manipulation and control: A survey. Annals of Mathematics
and Artificial Intelligence, 68(1–3):161–193, 2013. 3
16
Appendix
A Similarities in Complexity between the Problem
Variants
In this section we provide the theorems and proofs for results in which
the four problem variants behave similarly in complexity which are sum-
marized in the main text as Theorem 1.
First, we provide hardness results with different constraints on the pa-
rameters of the problem variants. Then, we show that the problem variants
are fixed-parameter tractable with respect to the number of candidates.
For this appendix, we introduce the Condorcet voting rule.
A candidate c is a Condorcet winner if it wins against every other
candidate in a head-to-head contest [12]. Formally, c is a Condorcet winner
if ∀c′ ∈ C \{c} :
{ v ∈ V c ≻v c′ } > { v ∈ V c′ ≻v c }. Condorcet's
voting rule returns a set consisting of the unique Condorcet winner if it
exists. Otherwise, it returns the empty set.
Note that, for the Condorcet rule, the problem definitions stated in
Section 3 need to be modified as the preferred winner (loser) p needs to
win (lose) the election evaluated by the Condorcet rule.
A.1 W[2]-Hard for the Solution Size
Bulteau et al. [8] originally stated that C-Cons-Add is W[2]-hard with
respect to the solution size for the Plurality and for the Condorcet voting
rule. Theorem A.1 uses their proof concept and extends their result for
the other three variants of the combinatorial voter control problem.
Theorem A.1. For both Plurality and Condorcet, C-Cons-Del, C-Des-
Add and C-Des-Del are all W[2]-hard with respect to the solution size
k, even if there are only two candidates and even if the bundling function
κ is symmetric.
Proof. We first consider the Plurality rule and provide a parameterized
reduction from the W[2]-complete problem Dominating Set parameter-
ized by the solution size h.
Dominating Set
Input: An undirected graph G = (V (G), E(G)) and a natural
number h ∈ N.
Question: Is there a dominating set of size at most h, that is, a
vertex subset U ⊆ V (G) with U ≤ h such that each vertex from
V (G) \ U is adjacent to at least one vertex from U ?
17
Let (G, h) be a Dominating Set instance. We construct an election
E = (C, V ) with C = {p, g}, where p is our preferred candidate. We define
the voter set for our three problem variants differently.
For C-Des-Add:
- The registered voter set V consists of V (G) − 1 p-voters (and no
g-voters).
- The unregistered voter set W consists of one g-voter wi for each
vertex ui ∈ V (G).
For C-Cons-Del, we define the voter set V such that
- V consists of one g-voter wi for each vertex ui ∈ V (G) and
- no p-voters.1
For C-Des-Del, we define the voter set V such that
- V consist of one p-voter wi for each vertex ui ∈ V (G) and
- one g-voter w′ with bundle κ(w′) = {w′}.
We define the bundle κ(wi) as the closed neighborhood of ui, formally
κ(wi) = wi ∪ {wj {ui, uj} ∈ E(G)}. Finalizing our construction, we set
k := h.
It is clear that our construction is both a polynomial reduction and
a parameterized reduction with respect to k. Also, it is obvious that the
bundling function used in the construction is symmetric.
We exemplary show for C-Cons-Del that there is a dominating set
of size h if and only if there is a subset V ′ of size at most k. The other
two variants can be proven analogously.
For the "only if" part, given a dominating set U of size at most h, we
define V ′ to be the corresponding voter set, that is, V ′ := {wi ui ∈ U }.
It is clear that V ′ ≤ h = k and p as well as g becomes winner, because
g loses V (G) points and has the same score as p.
For the "if" part, given a subset of the voters V ′ ⊆ V of size at most k
such that p is a winner of E′ = (C, V \ κ(V ′)), we define U to be the set of
vertices corresponding to the voters from V ′, that is, U := {ui wi ∈ V ′}.
It follows that U ≤ k = h and for each vertex ui ∈ V (G) \ U there must
be a vertex uj ∈ U which is a neighbor of ui, since otherwise we will still
have some g-voters and p will not become a winner.
Finally, we need to consider the Condorcet rule. For two candidates,
the Condorcet rule is equivalent to the strict majority rule and, hence,
the proof is analogous to the proof for the Plurality rule. We only need
1 For simplicity, we assume that every candidate is a winner in an election without
voters. However, if one requires a non-empty voter set, then one can easily adjust the
construction by adding one p-voter wp and one g-voter wg with κ(wp) = {wp} and
κ(wd) = {wd}. This makes the argumentation in the proof slightly more complicated.
18
to adapt the C-Des-Add such that the candidate p is the only winner.
We can accomplish that by adding to the V one p-voter w′ with bundle
κ(w′) = {w′}.
⊓⊔
A.2 W[1]-Hard for the Solution Size
From Bulteau et al. [8] we know that C-Cons-Add is W[1]-hard with
respect to the solution size for the Plurality voting rule, even when the
maximum bundle size is three. We show this for three other variants of the
combinatorial voter control and additional for Condorcet's voting rule.
Theorem A.2. For both Plurality and Condorcet, C-Cons-Add, C-Cons-
Del, C-Des-Add and C-Des-Del are all W[1]-hard with respect to the
solution size k, even if the maximum bundle size b is three and there are
only two candidates.
Proof. We first consider the Plurality rule and provide a parameterized
reduction from the W[1]-complete problem Clique parameterized by the
solution size h.
Clique
Input: An undirected graph G = (V (G), E(G)) and a natural
number h ∈ N.
Question: Is there a clique of size at least h, that is, a complete
subgraph with h vertices?
Let (G, h) be a Clique instance. Without loss of generality, we assume
h > 3. (If not, it can be solved in polynomial time.) We construct an
election E = (C, V ) with C = {p, g}, where p is our preferred candidate.
For each vertex u ∈ V (G) we define one vertex voter wu with the bundle
κ(wu) = {wu}. For each edge e = {u, u′} ∈ E(G) we define one edge voter
we with the bundle κ(we) = {we, wu, wu′}. Now, we finalize the voter set
definition which slightly differs for our three problem variants.
For C-Cons-Del, we define the voter set V such that:
- Vertex voters are p-voters.
- Edge voters are g-voters.
- We add a set Dp of dummy p-voters and a set Dg of dummy g-voters
with κ(w) = {w} for each w ∈ Dp ∪ Dg. We set set the cardinalities
of Dp and Dg such that sg(V ) − sp(V ) = (cid:0)h
2(cid:1) − h.
For C-Des-Del, we define the voter set V such that
- Vertex voters are g-voters.
- Edge voters are p-voters.
19
- We add a set Dp of dummy p-voters and a set Dg of dummy g-voters
with κ(w) = {w} for each w ∈ Dp ∪ Dg. We set set the cardinalities
of Dp and Dg such that sp(V ) − sg(V ) = (cid:0)h
2(cid:1) − h − 1.
For C-Des-Add:
- Vertex voters are unregistered g-voters.
- Edge voters are unregistered p-voters.
- There are no other voters in the unregistered voter set W .
- The registered voter set V consist of (cid:0)h
2(cid:1) − h − 1 p-voters.
Finally, we set k := (cid:0)h
2(cid:1).
It is clear that our construction is both a polynomial reduction and a
parameterized reduction with respect to k.
We exemplary show for C-Cons-Del that there is a clique U of size
at least h if and only if there is a subset V ′ of size at most k such that p
becomes a winner of E. The other two variants can be proven analogously.
For the "only if" part, given a clique U of size h, we construct V ′
by adding to it any edge voter we with e ∈ E(G[U ]). It is clear that
V ′ ≤ (cid:0)h
2(cid:1) = k. Observe that candidate p as well as candidate g become
winners. Candidate g loses (cid:0)h
2(cid:1) points and candidate p loses h points. Thus,
g and p have the same score.
For the "if" part, given a subset of the voters V ′ ⊆ V of size at most k
such that p is a winner of E′ = (C, V \ κ(V ′)), we define U to be the set
of vertices corresponding to the voters from V ′, that is, U := {u ∈ V (G)
we ∈ V ′ and u ∈ e}. We observe that deletion of vertex voters doesn't
reduce the score of g and removing a vertex voter from V ′ would lead to
a smaller solution. Hence, we can assume that V ′ does not contain any
vertex voters. In order to reduce the score of g, enough edge voters must
be removed, but a certain amount of vertex voters will be removed as well
since they are in the bundles of the edge voters. We denote the number of
indirectly removed vertex voters be x. Clearly x ≤ h, because otherwise
p loses more than h points, g loses at most (cid:0)h
2(cid:1) points, and g remains
the only winner. Assume towards a contradiction that x ≤ h − 2. The
score of g decreases by at least (cid:0)h
2(cid:1) − h in E′ (compared to E) so that
2 (cid:1) < (cid:0)h
V ′ contains at least (cid:0)h
2(cid:1) − h
for any h > 3. Hence, x ≥ h − 2 implying that there are at least (cid:0)h
2(cid:1) − 2
edge voters. Now, assume towards a contradiction that x = h − 1. Then,
2(cid:1) ≤ (cid:0)h−1
(cid:0)x
2(cid:1) − 2 for any h > 3. Thus, x = h implying that there are
exactly k = (cid:0)h
2(cid:1) edge voters in V ′ with altogether h different vertex voters
in their bundles. In this case, U is a clique of size h, since otherwise we
cannot have (cid:0)h
2(cid:1) edges incident to h vertices.
2(cid:1) − h edge voters. However, (cid:0)x
2(cid:1) ≤ (cid:0)h−2
2 (cid:1) < (cid:0)h
20
Finally, we need to consider the Condorcet rule. For two candidates,
the Condorcet rule is equivalent to the strict majority rule and, hence,
the proof is analogous to the proof for the Plurality rule. We only need to
adapt the C-Des-Add such that candidate p is the only winner. We can
accomplish that by adding to the V one p-voter d with bundle κ(d) = {d}.
⊓⊔
Condorcet-C-Cons-Add can be proved analogously.
A.3 Fixed-Parameter Tractability for the Number of
Candidates
Bulteau et al. [8] provide an integer linear program (ILP) that solves
Plurality- and Condorcet-C-Cons-Add for the case when the bundling
function is anonymous (see Section 2 for the corresponding definition)
and exploit Lenstra's theorem to show fixed-parameter tractability with
respect to the number of candidates. Their idea is to utilize the fact that
for anonymous bundling functions, voters with the same preference order
"lead" the same bundle of voters and "follow" the same voter as well. Thus,
with m candidates, we will have at most m! different bundles. By this ob-
servation, they introduce O(m!) variables, one variable for a bundle, to
encode whether to select a bundle to the solution. Indeed, as long as the
bundling function is anonymous, the same idea applies to the remaining
three combinatorial voter control variants. Although the technique is anal-
ogous, we provide the corresponding ILPs for Theorems A.3 to A.5 and
show the correctness for the sake of completeness.
Theorem A.3. For both Plurality and Condorcet, C-Cons-Del is fixed-
parameter tractable with respect to the number m of candidates, if the
bundling function κ is anonymous.
Proof. Given a C-Cons-Del instance ((C, V ), κ, p, k) with m candidates
and anonymous bundling function κ, we construct an integer linear pro-
gram (ILP) with at most O(m!) variables and at most O(V + m) con-
straints for C-Cons-Del similar to Bulteau et al. [8] for C-Cons-Add.
Fixed-parameter tractability follows because every ILP with ρ variables
and L input bits is solvable in O(ρ2.5ρ+o(ρ)L) time [22].
Since m candidates are given, there are at most m! voters with pair-
wise different preference orders. We denote these as ≻1, ≻2, . . . , ≻m! and
note that there are at most m! different bundles, because κ is leader-
anonymous.
We will use the following notation for the construction of the ILP:
21
1. Define κ(≻i) as the set of preference orders of the voters included in
the bundle of the voters with preference order ≻i; note that by the
anonymity, if κ(≻i) contains a preference order ≻, then every voter
with preference order ≻ is in the bundle of the voter that has preference
order ≻i.
2. Define κ−1(≻j) := {≻i≻j∈ κ(≻i)} as the set of preference orders that
include ≻j in their bundles.
3. Define Ni as the number of voters with preference order ≻i in V .
4. For each candidate a ∈ C, define F (a) as the set of preference orders
in which a ∈ C is ranked first and
5. let s(a) be the initial score in election (C, V ).
To encode a solution W ′, for each preference order ≻i, i ∈ [m!], we intro-
duce two Boolean variables, xi and yi. The intended meaning of xi = 1 is
that the sought solution contains a voter with preference order ≻i. The
intended meaning of yi = 1 is that κ(V ′) contains a voter with preference
order ≻i.
Now, we are ready to state the integer linear problem. Note that it
suffices to find a feasible solution. Thus, we do not need to specify any
objective function.
xi ≤ k,
X
i∈[m!]
xi ≤ Ni,
xi ≤ m! · yj,
xi ≥ yj,
X
≻i∈κ−1(≻j )
X
≻i∈κ−1(≻j )
∀i ∈ [m!]
∀j ∈ [m!]
∀j ∈ [m!]
s(p) − X
≻j ∈F (p)
Nj · yj ≥ s(a) − X
≻j∈F (a)
Nj · yj,
∀a ∈ C \ {p}
xi, yi ∈ {0, 1},
∀i ∈ [m!]
(1)
(2)
(3)
(4)
(5)
(6)
Constraint (1) ensures that at most k voters are added to the solution.
Constraint (2) ensures that the voters added to the solution are indeed
present in V . Constraints (3) and (4) ensure that variables yj, 1 ≤ j ≤ m!,
have correct values. Indeed, if for some preference order ≻i we have xi = 1
and ≻j∈ κ(≻i), then constraint (3) ensures that yj = 1. On the other
hand, if for some preference order ≻j we have that for each preference
order ≻i with ≻j∈ κ(≻i) it holds that xi = 0, then constraint (4) ensures
that yj = 0. Constraint (5) ensures that p has a (plurality) score which is
22
at least as high as the score of every candidate (which makes p a winner).
Clearly, there is a solution for this integer linear program if and only if
there is a solution for C-Cons-Del with the Plurality rule.
For the case of the Condorcet rule, we need to define the following
additional parameters: Let s(a, b) := {v ∈ V a ≻v b} denote the
number of voters that prefer candidate a over candidate b and P (a, b)
denote the set of preference orders in which a is preferred to b. We modify
only constraint (5) as follows:
s(p, a) − X
Nj · yj ≥ s(a, p) − X
≻j∈P (p,a)
≻j∈P (a,p)
Nj · yj + 1
∀a ∈ C \ {p}
(7)
This ensures that p can beat every other given candidate a in a head-to-
head contest if and only if there is a solution to the ILP.
As for the running time, it is clear that both ILPs have O(m) variables
and O(V + m) constraints. By the famous result of Lenstra Jr [22], fixed-
⊓⊔
parameter tractability follows.
Theorem A.4. For both Plurality and Condorcet, C-Des-Add is fixed-
parameter tractable with respect to the number m of candidates, if the
bundling function κ is anonymous.
Proof. As in the proof for Theorem A.3, we construct an integer linear
program (ILP) with at most O(m!) variables and constraints, and use the
same notation, except the following two:
– Ni denotes the number of voters with preference order ≻i in W .
– The intended meaning of yi = 1 is that κ(W ′) contains a voter with
preference order ≻i.
The constraints for the ILP are as follows:
(8)
∀i ∈ [m!]
(9)
∀j ∈ [m!] (10)
∀j ∈ [m!] (11)
Nj · yj(cid:17),
∀a ∈ C \ {p} (12)
αa(cid:16)s(p) + X
Nj · yj + 1(cid:17) ≤ αa(cid:16)s(a) + X
≻j ∈F (p)
≻j∈F (a)
xi ≤ k,
X
i∈[m!]
xi ≤ Ni,
xi ≤ m! · yi,
xi ≥ yj,
X
≻i∈κ−1(≻j )
X
≻i∈κ−1(≻j )
23
X
a∈C\{p}
αa ≥ 1,
xi, yi, αa ∈ {0, 1},
(13)
∀i ∈ [m!] (14)
If αa = 0, constraint (12) is valid. If αa = 1, constraint (12) ensures that
p loses against candidate a. Constraint (13) ensures that at least one of
the Boolean variables αa has value 1 and, therefore, there exists at least
one candidate a ∈ C such that a wins against p.
For the Condorcet rule, alter constraint (12) as follows:
αa(cid:16)s(p, a) + X
Nj · yj + 1(cid:17) ≤ αa(cid:16)s(a, p) + X
Nj · yj(cid:17), ∀a ∈ C \ {p}
≻j∈O(p,a)
≻j∈O(a,p)
(15)
Here s(a, b) = {w ∈ W a ≻w b} is the number of unregistered voters
that prefer candidate a over candidate b.
Constraint (13) ensures that at least one of the Boolean variables αa
has value 1 while constraint (15) ensures that p loses against at least one
of the candidates a in a head-to-head contest.
We omit the reasoning for the running time as it is the same as the
⊓⊔
one shown for Theorem A.3.
Theorem A.5. For both Plurality and Condorcet, C-Des-Del is fixed-
parameter-tractable with respect to the number m of candidates, if the
bundling function κ is anonymous.
Proof. This ILP is almost the same as the one for C-Des-Add. The only
difference is that we use "−" instead of "+" in constraint (12):
αa(cid:16)s(p) − X
Nj · yj + 1(cid:17) ≤ αa(cid:16)s(a) − X
Nj · yj(cid:17), ∀a ∈ C \ {p} (16)
≻j∈F (p)
≻j∈F (a)
Note that, in this problem variant, we do not try to find a subset of
unregistered voters W ′ ⊆ W to add to the election, but a subset of the
registered voters V ′ ⊆ V to remove from the election. The definitions for
Ni and yi change accordingly.
For the Condorcet rule, alter constraint (16) as follows:
αa(cid:16)s(p, a) − X
Nj · yj + 1(cid:17) ≤ αa(cid:16)s(a, p) − X
Nj · yj(cid:17), ∀a ∈ C \ {p}
≻j∈O(p,a)
≻j∈O(a,p)
(17)
24
Here s(a, b) = {w ∈ W a ≻w b} is the number of unregistered voters
that prefer candidate a over candidate b. We omit the reasoning for the
⊓⊔
running time as it is the same as the one shown for Theorem A.3.
B Missing Proofs
B.1 Proof of Proposition 1
Proposition B.1. For each X ∈ {Add, Del}, C-Des-X with m candi-
dates is Turing reducible to C-Cons-X with two candidates.
Proof. First, we provide a Turing reduction from C-Des-Add to C-Cons-
Add. Let I = (E = (C, V ), W, κ, p, k) be a C-Des-Add instance with
candidate set C = {p, g1, . . . , gm−1}. We compose m − 1 instances of the
problem C-Cons-Add Ji = (Ei = (Ci, Vi), W ′, κi, gi, k), where
– Ci := {p, gi},
– Vi := {v ∈ V v's more preferred candidate is either p or gi} ∪ {vd},
where vd is an additional p-voter,
– Wi := {w ∈ W w's more preferred candidate is either p or gi}, and
– κi : Wi → 2Wi with κi(w) := κ(w) ∩ Wi.
We show that I has a solution of size at most k if and only if at least one
of the instances Ji has a solution of size at most k.
For the "only if" part, let W ′
only two candidates p and gj, this implies sp(Vi∪κi(W ′
in Ji. Since we added an additional p-voter to Ji, sp(V ∪ κ(W ′
κ(W ′
for I.
i ⊆ Wi be a solution for Ji. Since Ji has
i ))
i )) < sgi(V ∪
i ⊆ W is a solution
i )) in I. Thus p loses election (C, V ∪κ(W ′
i )) ≤ sgi(Vi∪κi(W ′
i )) and W ′
For the "if" part, let W ′ ⊆ W be a solution for I, meaning that p loses
election (V ∪ κ(W ′)). Thus, there exists a gi ∈ C with sgi(V ∪ κ(W ′)) >
i := W ′∩Wi. Since gi and p are the only candidates in
sp(V ∪κ(W ′)). Let W ′
Ci, and since Vi has one additional p-voter compared to V , it follows that
sgi(Vi ∪κi(W ′
i )),
and W ′
i )). Thus, gi wins election (Ci, Vi ∪κi(W ′
i )) ≥ sp(Vi ∪κi(W ′
i is a solution for Ji.
For the Turing reduction from C-Des-Del to C-Cons-Del, the con-
struction of the reduction is similar to the one from C-Des-Add to
C-Cons-Add. Set the bundling functions κi : Vi → 2Vi with κi(v) :=
κ(v) ∩ Vi and κi(vd) = {vd}.
⊓⊔
Proposition B.2. For each Y ∈ {Cons, Des}, C-Y -Del with two can-
didates is many-one reducible to C-Y -Add with two candidates.
25
Proof. First, we provide a polynomial-time reduction from C-Cons-Del
to C-Cons-Add. Let I = (E = (C, V ), κ, p, k) be a C-Cons-Del in-
stance with C = {p, g}. We define V to be the complement voter set,
that is, it contains the same voters as V but all p-voters become g-voters
and all g-voters become p-voters. We construct a C-Cons-Add instance
J = (E = (C, V ), W, κ, p, k), where W := V . Clearly, the construction
of J can be implemented in polynomial time. We now claim that V ′ is a
size-k solution for I if and only if W ′ := V ′ is a size-k solution for J.
First, we observe that for V ′ to be a solution for I, it must hold that
sp(V ) − sp(κ(V ′)) ≥ sg(V ) − sg(κ(V ′)). Similarly for W ′ to be a solution
for I, it must hold that sp(V ) + sp(κ(W ′)) ≥ sg(V ) + sg(κ(W ′)). As per
definition of the complement voter set and because of V ′ = W ′, we know
that
sp(κ(V ′)) = sg(κ(W ′)) and sg(κ(V ′)) = sp(κ(W ′)).
Thus, it holds that
sp(V ) − sp(κ(V ′)) ≥ sg(V ) − sg(κ(V ′))
if and only if sp(V ) + sg(κ(V ′)) ≥ sg(V ) + sp(κ(V ′))
if and only if sp(V ) + sp(κ(W ′)) ≥ sg(V ) + sg(κ(W ′)),
implying that V ′ is a solution for I if and only if W ′ is a solution for J.
The reduction from C-Des-Del to C-Des-Add works analogously.
⊓⊔
B.2 Proof of Observation 1
Observation 1. C-Cons-Add is NP-hard even for symmetric bundling
functions with maximum bundle size b = 3.
Proof. Bulteau et al. [8, Theorem 7] have shown NP-hardness of C-Cons-
Add for full-d bundling functions2 and maximum bundle size b = 3. Since
a full-d bundling function is symmetric [8, Observation 1]. Thus, NP-
hardness of C-Cons-Add for symmetric bundling functions and b ≤ 3
⊓⊔
follows.
B.3 Proof of Proposition 2
Proposition 2. C-Cons-Del is NP-hard even for symmetric bundling
functions with maximum bundle size b = 3.
2 Full-d bundling functions are defined by Bulteau et al. [8, Section 2].
26
Proof. Bulteau et al. [8, Theorem 7] have shown NP-hardness of C-Cons-
Add for full-d bundling functions3 and maximum bundle size b ≤ 3. Their
idea was to construct a cycle for each variable x: The cycle contains ver-
tices that correspond to the clauses containing either x or x and are con-
nected through some p-voters in such a way that one must take the vertices
corresponding to the clauses with the same literal, that is, either x or x.
We utilize this construction to show the hardness for the deleting case
by reducing from the following NP-complete 3SAT problem [8].
(2-2)-3SAT
Input: A collection F of size-two-or-three clauses over the variable
set X = {x1, . . . , xn}, such that each clause has either two or three
literals, and each variable appears exactly four times, twice as a
positive literal and twice as a negative literal.
Question: Is there a truth assignment that satisfies all the clauses
in F?
Let I = (F, X ) be a (2-2)-3SAT instance. Now, we construct an
instance for C-Cons-Del as follows: Let p be the candidate whose victory
we want to ensure and let d be the winner of the original election. For
each clause fj = (ℓ1
j ) ∈ F, we introduce a candidate cj. Thus,
the candidate set is C = {p, d} ∪ {cj fj ∈ F}.
The voter set is composed of three groups:
j ∨ ℓ2
j ∨ ℓ3
1. For each variable xi, for each clause fj that contains xi as a literal
(that is, either positive or negated variable), we introduce a d-voter,
denoted as vj
i (we call him a variable voter ), and a cj-voter, denoted as
uj
i (we call him a clause voter ). Now, let fj, fr, j < r, be the clauses
containing xi, and let fs, ft, s < t be the two clauses containing
xi. We construct the bundles of these the clause voters corresponding
to fj, fr, fs, ft and the variable voters such that the bundling graph
forms a cycle with the d-voters between each two clause voters. More
precisely, let
κ(uj
κ(us
κ(ur
κ(ut
i ) := {uj
i ) := {us
i ) := {ur
i) := {ut
i , vj
i , vs
i , vr
i, vt
i , vs
i , vr
i , vt
i, vj
i }, κ(vs
i }, κ(vr
κ(vt
i},
κ(vj
i },
i ) := {vs
i ) := {vr
i) := {vt
i ):= {vj
i , uj
i , us
i, ur
i , us
i , us
i }
i , ur
i }
i , ut
i}
i , uj
i }.
3 See footnote 2.
27
2. For each clause Cj that contains only two literals, we introduce a cj-
voter uj
c and set his bundle to be the singleton κ(uj
c) = {uj
c}.
d , v−
d with the
3. We introduce two p-voters w+
p , w−
p and two d-voters v+
following bundles:
κ(w+
κ(v+
p ) := {w1
d ) := {v+
p, v+
d },
d , w+
p },
κ(w−
κ(v−
p ):= {w−
d ):= {v−
p , v−
d , w−
d },
p }.
The bundling graph for the first group of voters is depicted in the left
figure and the bundling graph for the second group of voters is depicted
in the middle figure, and the bundling graph for the last group of voters
is depicted in the right figure.
ur
i
vr
i
vt
i
us
i
ut
i
vs
i
vj
i
uj
i
uj
c
w+
p
w−
p
v+
d
v−
d
This completes the construction of the voters and their bundles. It is
straight forward that the construction runs in polynomial time.
By simple calculation, we have that the score difference between can-
didate d and p is 4 · n and the score difference between candidate cj and
p is one.
Now, we show that the given (F, X ) is a yes instance for (2-2)-3SAT
if and only if the constructed instance (C, V, κ, p, k = 2n) is a yes instance
for C-Cons-Del.
For the "only if" part, let σ : X → {0, 1} be a satisfying assignment
for I. Consider some variable xi. Let fj, fr, j < r, be the clauses con-
taining xi and let fs, ft, s < t be the two clauses containing xi. Now, if
σ(xi) = 1, then we add to V ′ the two clause voters uj
i ; otherwise we
add to V ′ the two clause voters us
i. We do this for each variable xi.
Since each of the bundles of uj
i contains two p-voters and σ is a
satisfying assignment, one can verify that V ′ = 2 and, after deleting the
bundles corresponding to V ′, only two d-voters and for each clause Cj at
most two cj-voters remain. Since there are in total two p-voters, p will
co-win with d (and with some clause candidates).
i and ur
i and ur
i and ut
28
For the "if" part, let V ′ be set of at most 2 · n voters, such that p wins
election (C, V \ κ(V ′)). First of all, we observe that the score difference
between d and p is 4 · n and deleting voters will not increase the score of
any candidate. Thus, in order to make p win, d has to lose at least 4 · n
points. Since each bundle contains at most two d-voters, it follows that
V ′ = 2n and for each voter v ∈ V ′, it must be that κ(v) contains two d-
voters. This precludes including any voter from the last two groups to V ′.
Moreover, for each two voters u, v ∈ V ′ that are on the same cycle (of the
bundling graph), by the construction of the bundles, we must have that
κ(u) ∩ κ(v) = ∅ since otherwise we will not delete enough d-voters. This
implies that, for each variable x, V ′ contains the two clause voters that
correspond to the clauses with either x or x. Now, if it is the case for x,
then we set σ(x) = 1; otherwise σ(x) = 0. The assignment σ is obviously
valid. It remains to show that σ satisfies F. Now, observe that each clause
candidate cj has to lose at least one point because of the original score
difference. This implies that there must be some literal ℓi from Cj such
that uj
i ∈ V ′, by our assignment we also set ℓi to 1, satisfying Cj. Thus,
our constructed σ satisfies all clauses.
B.4 Proof of Claim 1
Let W ′ be a maximum (s, t)-proper-subset and (max κ(W ′)−
Claim 1.
min κ(W ′) + 1) > 9. Then, there is a j with s < j < t, such that there
is a (s, j)-proper-subset W1 and a (j + 1, t)-proper-subset W2 with W1 +
W2 ≤ W ′ and κ(W1 ∪ W2) = κ(W ′).
Proof. Let s′ := min κ(W ′) and t′ := max κ(W ′). We split this in two
cases.
First, we consider the case in which k ≤ 3. Note that t′ − s′ + 1 > 9
and s ≤ s′ ≤ t′ ≤ t. Therefore, W (s′, t′) > 9. Since the maximum
bundle size is 3, we know that κ(W ′) is at most 9. This implies that
there is a wj ∈ W (s′, t′) \ κ(W ′). We set W1 := { wi ∈ W ′ i ≤ j } and
W2 := { wi ∈ W ′ j < i }. Thus, W1+W2 = W ′, κ(W1∪W2) = κ(W ′)
and W1 is a (s, j)-proper-subset and W2 is a (j + 1, t)-proper-subset.
Now, let us consider the case in which k > 3. If the set W ′ can be
partitioned into two disjoint subsets W1 and W2 where W1 ∪ W2 = W ′,
W1 ∩ W2 = W ′, κ(W1) ∩ κ(W2) = ∅ and κ(W ′) = κ(W1 ∪ W2), we
are done. So assume there is no such partition. That means there is no
wj ∈ W (s′, t′) \ κ(W ′), otherwise we could split κ(W ′) at position i as
we did in case k ≤ 3. Therefore, W (s′, t′) = κ(W ′). Furthermore, we
can conclude that there are two bundles of size 2 (the endpoints of the
29
path) and that all other bundles are of size 3, because of the maximum
bundle size and Gκ being a path. At least every second voter on the path
is in W ′, otherwise we could split κ(W ′) at position i or i + 1, where
wi, wi+1 6∈ W ′. Therefore, W ′ \ {ws′, ws′+1, . . . , ws′+8} ≤ W ′ − 4. One
can observe that κ({ws′+1, ws′+4, ws′+7}) = {ws′, ws′+1, . . . , ws′+8}. For
the set W ′′ := (W ′\{ws′, ws′+1, . . . , ws′+8})∪{ws′+1, ws′+4, ws′+7} it holds
that W ′′ ≤ W ′ and κ(W ′) = κ(W ′′). Furthermore, one can observe that
ws′+4 is the only element which has ws′+5 in its bundle and ws′+7 is the
only element which has ws′+6 in its bundle. That means we can split
W ′′ at this point. We set j := s′ + 5, W1 := { wi ∈ W ′
i ≤ j } and
W2 := { wi ∈ W ′ j < i }. Thus, W1+W2 ≤ W ′, κ(W1∪W2) = κ(W ′)
⊓⊔
and W1 is a (s, j)-proper-subset and W2 is a (j, t)-proper-subset.
The idea for cycles is similar.
Lemma B.1. If C-Cons-Add has only two candidates p, q and symmet-
ric bundling function κ with bundles of size at most three such that the
bundling graph Gκ is a cycle, then finding a size-at-most-k subset W ′ ⊆ W
of voters such that the score difference between p and q in κ(W ′) is max-
imum can be solved in O(W 5) time, where W is the size of the set W
of unregistered voters.
Proof. Let I = (E = (C, V ), W, κ, p, k) be a C-Cons-Add instance, where
b = 3, κ is symmetric and C = {p, g}. Let w1 . . . wW w1 be the cycle in
Gκ. Suppose that W ≤ 9. We compute sp(V ) and sg(V ) in linear time.
Every W ′ ⊆ W of size at most k ≤ W ≤ 9 is a solution if κ(W ′) contains
sg(V ) − sp(V ) more p-voter than g-voter. Since W is upper bounded by
a constant, the size of the power set of W is also upper bounded by a
constant. Therefore, we can check in constant time whether one of the
subsets of W is a solution.
Now let us consider the interesting case. Suppose that W > 9. The
idea is to break the cycle into a path and solve it with Lemma 1. We create
nine C-Cons-Add instances I1, . . . , I9 where Ii := (E = (C, V ), W ∪
{wb, we}, κi, p, k), and wb and we are g-voters and
κi : W → 2W , w 7→
{wb, wi},
{we, wi+1},
(κ(w) \ {wi+1}) ∪ {we},
(κ(w) \ {wi}) ∪ {wb},
κ(w),
if w = wb
if w = we
if w = wi
if w = wi+1
otherwise,
where i ∈ [9]. The bundling function κi is modified in such a way that the
30
w1 w2 w3 w4 w5 wb
we w6 w7 w8 w9
. . .
Fig. 1: Part of the construction used in Lemma B.1. Specifically, it shows
how the cycle is reduced to a path in I5.
instance Ii becomes a path and has g-voter on its endpoints, depicted in
Figure 1. Therefore, we can solve all 9 instances Ii in O(W 5), where W
is the size of the unregistered voters (see Lemma 1).
It remains to be shown that I is a yes-instance if and only there it
exists an i ∈ [9] such that Ii is a yes-instance.
For the "only if" part, let Ii, for some i ∈ [9], be a yes-instance. Thus,
there is a set W ′ ⊆ W ∪ {wb, we} of size at most k such that p ∈ Plu-
rality(C, V ∪ κi(W ′)). One can observe that the bundles of wb and we
are useless, because they each have only two voters and at least one of
them is a g-voter. For this reason we assume without loss of generality
that W ′ ⊆ W . Since we replaced an edge between wi and wi+1 with
two g-voters wb and we that are not connected, we can conclude that
wb ∈ κi(W ′) ⇔ wi ∈ W ′ and we ∈ κi(W ′) ⇔ wi+1 ∈ W ′. We now check
what happens when wi or wi+1 is in W ′.
(i) Assume wi, wi+1 ∈ W ′. Then κi(W ′) \ {wb, we} = κ(W ′). The set
κ(W ′) has 2 g-voter less than κi(W ′). Thus, p ∈ Plurality(C, V ∪
κ(W ′)).
(ii) Assume wi ∈ W ′ and wi+1 6∈ W ′. Then κ(W ′) = (κi(W ′) \ {wb}) ∪
{wi+1}. In contrast to κi(W ′), κ(W ′) loses the g-voter wb and may
win the voter wi+1. It does not matter whether wi+1 is a p-voter
or g-voter, as sg(κ(W ′)) ≤ sg(κi(W ′)) and sp(κ(W ′)) ≥ sp(κi(W ′)).
Thus, p ∈ Plurality(C, V ∪ κ(W ′)).
(iii) Assume wi+1 ∈ W ′ and wi 6∈ W ′. This case is analogous to (ii).
In the case where neither wi nor wi+1 is in W ′, we immediately get
κi(W ′) = κ(W ′) from the definition of κi. Therefore, I is a yes-instance.
For the "if" part, let I be a yes-instance. Thus, there is a set W ′ ⊆ W
of size at most k such that p ∈ Plurality(C, V ∪ κ(W ′)). It is sufficient
to show that for some i, 1 ≤ i ≤ 9 it holds that wi, wi+1 6∈ W ′, because
these are the only cases in which κi differs from κ. Thus, κ(W ′) = κi(W ′),
which means that Ii is a yes-instance.
Now, assume that such an i does not exist. Then, on the path w1 . . . w9
at least every second voter is in W ′. Therefore, W ′ \ {w1, . . . , w9} ≤
W ′ − 4. One can observe that κ({w2, w5, w8}) = {w1, . . . , w9}. For the
31
set W ′′ := (W ′ \ {w1, . . . , w9}) ∪ {w2, w5, w8} it holds that W ′′ ≤ W ′
and κ(W ′) = κ(W ′′), where W ′′ ≤ W ′. Furthermore, one can observe
that w6, w7 6∈ W ′′. That means κ(W ′′) = κ5(W ′′) and hence p ∈ Plural-
ity(C, V ∪ κ5(W ′′)). This implies that I5 is a yes-instance.
⊓⊔
B.5 Proof of Corollary 2
Corollary 2. C-Des-Add and C-Des-Del with a symmetric bundling
function and maximum bundle size three can be solved in time O(m·W 5)
and O(m · V 5), respectively, where m is the number of candidates, and
W and V are the sizes of the unregistered and registered voter set,
respectively.
Proof. To obtain the result for C-Des-Add, use the Turing reduction
from C-Des-Add to C-Cons-Add (Proposition 1). Note that the in-
stances produced by the Turing reduction only have two candidates. Thus,
we can use Theorem 2.
Analogously, we can use Corollary 1 to obtain the result for C-Des-
Del.
As in both Turing reductions we create O(m) instances, we need to
solve O(m) instances, resulting in a running time of O(m · n5) in both
cases, where n is the number of either the unregistered (for C-Des-Add)
⊓⊔
or the registered (for C-Des-Del) voters .
B.6 Proof of Theorem 3
Theorem 3. C-Cons-Del with a symmetric bundling function and with
bundles of size at most two can be solved in polynomial time.
Proof. Let I = ((C, V ), κ, p, k) be a C-Cons-Del instance, where the
bundling function κ is symmetric and each bundle has at most two voters.
We first consider the case where each bundle has size exactly two. Since
deleting bundles never increases any candidate's score, we can assume
that we do not delete any bundle that contains a p-voter. Under this
assumption, the original score of p equals her score in the final election.
Furthermore, if we know the score of p in the final election, then we know
for each remaining candidate ci 6= p how many ci-voters we need to delete
to make her have no more score than p; let di be the score difference
between ci and p. Due to this observation, we can construct a multigraph
(with loops), which contains a vertex ui for each candidate ci except p,
and where for each bundle with two voters supporting ci and cj there is
an edge incident to the vertices vi and vj (note that if ci = cj, then the
32
edge is a loop). Now, deleting minimum bundles to make each candidate ci
lose at least di points is equivalent to finding a subgraph with minimum
number of edges where each vertex has degree di. Anstee [2] showed that
the latter problem can be solved in polynomial time.
To handle the case where some bundle has only one voter, we first
observe that if our preferred candidate p has zero points, then we need to
delete all bundles. Note that the underlying bundling graph consist of only
disjoint edges and isolated vertices. The minimum number of bundles to
be deleted equals the number of edges plus the number of isolated vertices.
Now, we consider the case where our preferred candidate p has at least
one point. For each bundle with only one voter vi, we introduce a dummy
candidate di and a dummy di-voter, and bundle the voter with vi together.
Since each of the dummy candidates has exactly one point, the original
instance (with p having at least one point) is a yes instance if and only
if the modified instance is a yes instance. In the modified instance, every
bundle has size exactly two. The first case applies.
B.7 Proof of Theorem 4
In order to prove Theorem 4, we first show W[1]-hardness of C-Cons-Add
(Lemma B.2) and then W[2]-hardness of C-Cons-Del (Lemma B.3).
Lemma B.2. C-Cons-Add is W[1]-hard, even for disjoint bundling func-
tion.
Proof. We provide a parameterized reduction from the W[1]-complete
problem Independent Set (parameterized by the "solution size"), de-
fined as follows:
Independent Set
Input: An undirected Graph G = (V (G), E(G)) and a natural
number h ∈ N.
Question: Does G admit a size-h independent set, that is, all ver-
tices in U are pairwise non-adjacent.?
Let (G, h) be an Independent Set instance with E(G) = {e1, . . . ,
em−1} and V (G) = {u1, . . . , un}. Without loss of generality, we assume
that G is connected and h ≥ 3. We construct an election E = (C, V )
with candidate set C := {p} ∪ { gj ej ∈ E(G) }. For each edge ej ∈ E,
we construct h − 1 registered voters that all prefer gj most. In total, V
consists of (h − 1)(m − 1) voters.
The unregistered voter set W is constructed as follows: For each vertex
ui ∈ V (G), add a p-voter pi, and for each edge ej incident with ui, add
33
a gj-voter a(i)
j . The voters constructed for each vertex ui are bundled by
κ. More formally, for each ui ∈ V (G) and each ej ∈ E(G) with ui ∈ ej, it
holds that
κ(pi) = κ(a(i)
j ) := {pi} ∪ {a(i)
j
ej ∈ E(G) ∧ ui ∈ ej}.
To finalize the construction, we set k := h.
The construction is both a polynomial-time and a parameterized re-
duction, and all bundles are disjoint. To show the correctness, we note
that p can only win if only if her score can be increased to at least h
without giving any other candidate more than one more point. The so-
lution corresponds to exactly to a subset of h vertices that are pairwise
non-adjacent.
Now, it remains to show that G has a size-h independent set if and
only if ((C, V ), W, κ, p, k) is a yes-instance for C-Cons-Add.
For the "only if" part, suppose that U ⊆ V (G) is a size-h independent
set for G. Define the subset W ′ as the voters pi ∈ W corresponding to the
vertices ui ∈ U . Obviously, W ′ = h = k. As per definition, U does not
contain adjacent vertices, each candidate gj may achieve a score increase of
at most one, while p achieves a score increase of k. As the initial difference
in scores between p and every candidate gj is k − 1, p co-wins the final
election with each candidate gj such that ui ∈ ej for some voter pi ∈ W ′.
For the "if" part, suppose that there is a subset W ′ of size at most k
such that p is a winner of the Plurality election (C, V ∪ κ(W ′)). First,
we claim that W ′ = k and κ(W ′) contains exactly k p-voters: Since the
original score difference between p and any other candidate gj is k − 1 and
since each unregistered voter's bundle contains exactly one p-voter and
at least one non-p-voter, it follows that in the final election at least one
non-p-candidate has score of at least k, but p can have a score increase of
at most k. This means
(1) that p's final score must increase to k, that is, κ(W ′) must have exactly
k p-voters, and
(2) that no other candidate can have a score increase of more than one.
Now, define U := {ui pi ∈ κ(W ′)}. Due Observation (1) we have
that U = k = h. To show that U is also an independent set, we con-
sider two arbitrary vertices ui, uℓ ∈ U . Suppose for the sake of contradic-
tion that {ui, uℓ} ∈ E(G), denote this edge by ej. By the construction
of our bundling function, it must hold that a(i)
j ∈ κ(W ′). Then, gj
would have a score increase of at least two-a contradiction to our obser-
⊓⊔
vation (2).
j , a(ℓ)
34
Lemma B.3. C-Cons-Del is W[2]-hard, even for disjoint bundling func-
tion.
Proof. We provide a parameterized reduction from the W[2]-complete
problem Dominating Set (see Appendix A.1 for the corresponding def-
inition).
Let (G = (V (G), E(G)), h) be a Dominating Set instance with
E(G) = {e1, . . . , em′} and V (G) = {u1, . . . , un′}. Let ∆max denote the
maximum degree of G. We construct an election E = (C, V ) with candi-
date set C = {p, g1, . . . , gn′}.
The voter set V consists of two groups:
1. For each vertex ui ∈ V (G), add a gi-voter, denote as vertex voter v(i)
,
and for each of its neighbors uj ∈ N (ui) add agj-voter, denote as
neighbor voter v(i)
. Note that, for each vertex ui, we have added ex-
j
actly N [ui] voters that all most prefer gi. The vertex voters and
neighbor voters constructed due to vertex ui are contained in one bun-
dle. Formally, the bundling function for these voters looks as follows.
i
∀ui ∈ V (G) : κ(v(i)
i ) := {v(i)
j
uj ∈ N [ui]}, and
∀uj ∈ N (ui) : κ(v(i)
j ) := κ(v(i)
i )
2. For each vertex ui ∈ V (G), add ∆max + 1 − N [ui] gi-voters. Further-
more, add ∆max p-voters to V . All these voters are bundled together.
Note that in this bundle, each candidate gi has exactly N [ui] points
less than p.
We use D to denote the set of all voters constructed in the second group.
Finalizing the construction, set k := h.
The construction is both a polynomial-time and a parameterized re-
duction, and the bundling function is disjoint. Note that for all candidates
gi have score sgi(V ) = ∆max + 1, and the difference in score between every
gi and the candidate p is sgi(V ) − sp(V ) = ∆max + 1 − ∆max = 1.
It remains to show that there is a dominating set of size at most h
if and only if there is a subset V ′ of voters of size at most k, such that
if their respective bundles are deleted from the election, p becomes a
Plurality winner of the election.
For the "only if" part, given a dominating set U of size at most h, we
define V ′ to be the corresponding voter set, that is, V ′ := {v(i)
ui ∈ U }.
i
It is easy to verify that V ′ ≤ h = k and p has a score of ∆max, while
all other candidates have a score of at most ∆max. Thus, p is a Plurality-
winner of the election (C, V \ κ(V ′)).
35
For the "if" part, suppose that there is a subset V ′ ⊆ V of size at most
k such that p is a winner of the Plurality election (C, V \κ(V ′)). First of all,
since all voters in D are bundled together such that p has more supporters
than any other candidate in this bundle, by the disjoint property of the
bundles, we know that p will also win the election (C, V \ κ(V ′ \ D).
Thus, we can assume that V ′ does not contain any voter from the second
group D This means that in the final election, p will have score ∆max,
implying that each gi has to lose at least one point. In other words,
κ(V ′) contains at least one gi-voter for each candidate gi.
(∗)
Now, we define the vertex subset U := {ui u(i)
i ∈ κ(V ′)} and show
that it is a dominating set of size at most h. Since all bundles are disjoint
and V ′ ≤ k, it is clear that U ≤ k = h. To show that U is a dominating
set, we consider an arbitrary vertex uj /∈ U . By (∗), we know that κ(V ′)
contains a gj-voter; note that he is from the first group. Let this voter be
v(i)
. Due to the construction of our bundling function, it follows that κ(V ′)
j
also contains v(i)
i
ui ∈ U .
, implying that U contains ui. Thus uj is dominated by
⊓⊔
B.8 Proof of Theorem 5
Theorem 5. C-Des-Add and C-Des-Del with a symmetric bundling
function and disjoint bundles can be solved in O(m · I) time, where I
is the input size and m the number of candidates.
Proof. We consider C-Des-Add first. Let I = (E = (C, V ), W, κ, p, k)
be a C-Des-Add instance with k being symmetric. To make p lose, it
is enough to add voters such that there is some other candidate c that
has a higher score than p in the final election. Due to this observation,
we "guess" the defeater c ∈ C \ {p} and we use an even simpler greedy
strategy than the one used for Observation 2 (see Theorem 6 by Bulteau
et al. [8]) to add voters to maximize the score difference between c and
p: Since the bundles are disjoint, we greedily add bundles that maximally
improve the score difference between c and p (in favor of c). If using up
k bundles, we can make c have at least the same score as p, then return
yes; otherwise we continue with the next defeater. It is easy to verify that
this approach is correct and the running time is O(m · I).
The strategy for C-Des-Del works analogously.
36
B.9 Proof of Lemma 2
Lemma 2. Let I = (E = (C, V ), κ, p) be a C-Cons-Del-Unlim in-
stance. Then I is a yes-instance.
Proof. Let I = (E = (C, V ), κ, p, k) be a C-Cons-Del-Unlim instance.
Set V ′ := V . Since there is no voter in the election (C, V \ κ(V ′)), all
candidates have the same score. Thus p ∈ Plurality(C, V \ V ′).
⊓⊔
B.10 Proof of Lemma 3
Lemma 3. C-Cons-Add-Unlim is NP-hard.
Proof. To prove NP-hardness, we extend the proof idea for W[1]-hardness
from Bulteau et al. [8]. Let (G = (V (G), E(G)), h) be a Clique instance.
(The definition of Clique can be found in Appendix A.2.) Without loss of
generality, we assume h ≥ 4. We construct an election E := (C, V ) where
C := {p, g, x}. V consists of (cid:0)h
2(cid:1) p-voters and (2 · (cid:0)h
2(cid:1) − h) g-voters. The
set of unregistered voters W is composed as follows:
- For each vertex u ∈ V (G), add a g-voter wu ∈ W with κ(wu) = {wu}.
We call wu a vertex-voter.
- For each edge e = {u, u′} ∈ E(G) we add a p-voter we ∈ W and two
e) =
e ∈ W such that κ(we) = {we, wu, wu′, w′
e ) = {w′′
e }. We call we an edge-voter.
x-voters w′
{w′
e, w′′
e} and κ(w′′
e, w′′
e }, κ(w′
Obviously, our construction is a polynomial reduction. It remains to show
that there is a clique of size at least h if and only if there is a subset W ′
such that p is a winner of the Plurality election (C, V ∪ κ(W ′)).
For the "if" part, suppose that there is a subset W ′ ⊆ W such that
p ∈ Plurality(C, V ∪ κ(W ′)). We show that the vertex set U := { u ∈
V (G) we ∈ W ′ ∧ u ∈ e } is a clique of size h in G. First, we observe that
a solution W ′ ⊆ W cannot have more than (cid:0)h
2(cid:1) edge-voters, otherwise x
achieves a higher score than p. Second, a solution W ′ must have (cid:0)h
2(cid:1) edge-
voters which have only h different vertex-voters in its bundles (a clique in
G). For a precise argumentation see the proof of Theorem A.2.
For the "only if" part, suppose that U ⊆ V (G) is a size-h clique for
G. We construct the subset W ′ by adding any edge voter we with e ∈
E(G[U ′]). Now it is easy to check that p ∈ Plurality(C, V ∪ κ(W ′)).
⊓⊔
(Compare with the proof of Theorem A.2.)
B.11 Proof of Theorem 6
Theorem 6. There is no polynomial-time approximation algorithm for
Min-C-Cons-Add, unless P = NP.
37
Proof. Assume towards a contradiction that there is an approximation
algorithm Aα for Min-C-Cons-Add which runs in polynomial time and
provides a solution Wα such that α · OP T ≥ Wα, where OP T is a
solution of minimum size. Let (E, W, κ, p) be an C-Cons-Add-Unlim
instance. One can create a Min-C-Cons-Add instance (E, W, κ, p) and
compute a solution Wα of size α · OP T in polynomial time. Wα is a
solution for the instance (E, W, κ, p) of the NP-hard problem C-Cons-
⊓⊔
Add-Unlim. This is a contradiction unless P = NP.
38
|
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.